SlideShare a Scribd company logo
Security Project Management
How to be Agile in Security
Testing Projects
whoami # Simone Onofri
• Security Business Consultant at
Hewlett Packard Enterprise
• Director at DSDM Consortium
• Volunteer: OWASP (Author TG v4),
CoderDojo…
• Certs: PRINCE2®, Agile Project
Management®, ITIL, Certified
ScrumMaster®, ISO 27001…
Disclaimer: The opinions expressed in this presentation and on
the following slides are solely those of the presenter. Any reference
to events or persons is purely coincidental 2
About us here
You «offer» Penetration
Testing Services
(Provider/Supplier)
3
About us here
You «receive»
Penetration Testing
services?
4
About us here
Something else?
5
Agenda
• What is Agile in Security Project Management
• The process and how to be Agile
• Embed Security in Agile Software Development Lifecycle
• Q&A
6
AGILE SECURITY PROJECT
MANAGEMENT
7
What is Agile
“Agile” is an umbrella term for several iterative
and incremental methodologies.
Is a mindset and a style of working where
requirements and solutions evolve through
collaboration. Agile promotes adaptive
planning, evolutionary development and
delivery, a timeboxed, iterative approach and
encourages rapid and flexible response to
change.
8
Quote from Sun Tzu
“Order and disorder
depends on organization”
9
What is Project Management
The planning (adaptively), delegating (at the lower level
as possible), monitoring-control (without micro-
manage) of all aspects of the project, and the motivation
of those involved, to achieve the project objectives within
the expected performance targets (e.g. time, cost, quality,
scope, benefits and risks), delivering proper business
product (what?)
(Inspired from PRINCE2® definition)
Question time
• Question: which is the typical business
product of a Web Application Penetration
Test?
• Scenario: Security Assessment is the process
of determining how effectively an “entity” (e.g.
Web Application) meets specific security
objectives.
• Hint: what the final customer will have at the
end of the activities?
(Security Assessment definition inspired by NIST SP800-115)
Which is the typical business product of
a Web Application Penetration Test?
«Document the Test Results
To conclude the testing process, it is important to
produce a formal record of what testing actions
were taken, by whom, when they were performed,
and details of the test findings. It is wise to agree on
an acceptable format for the report which is useful
to all concerned parties, which may include
developers, project management, business owners,
IT department, audit, and compliance.»
OWASP Testing Guide v4 - Introduction
Why Agile in Security Testing?
13
Enviormental factors:
• Nowaday Software Developmnet is
already Agile.
• Work is often on a fixed deadline, fixed
budget and we still need to deliver results
without compromising quality.
Specific Testing factors:
• Security Testing is Agile «by definition».
• We canot have info «by design» of testing
project (e.g. Black-Box).
• Often we will explore from the first
technical stage (OTG-INFO-001/010).
How be Agile in Security Testing
• Transparency and communication between customer
and supplier
• Use Agile techniques to solve common issues.
– Planning Poker for collaborative planning
– Timeboxing for managing time
– MoSCoW for managing priorities
• Integrate Security in Agile Development
14
AN AGILE SECURITY TESTING
PROJECT
15
Apply a PM structure to Security bieing
Agile
16
Feasibility Foundation Evolutionary Post-Project
•RFP / Tender
•High-level
requirements to
estimate (e.g. number
of applications and
size).
•Getting business
cases.
•Define output.
•Proposal accepted
•Planning and
technical
requirements
definition
•Sign the necessary
documentation (e.g.
NDA/Authorization*Jai
l free).
•Technical
Requirements
verification
•Technical activity
•Writing Reports...
•Presents results.
•Depth analysis
•Retesting activity
•….
Top tips - Feasibility
• In the feasibility phase the issue is to known the
Business Case of the Customer: Why needs a PT?
Often there are:
– Compliance: e.g. laws and regulamentations (e.g. ISO 27001,
Bank laws, PCI-DSS).
– Risk Management to protect the enterprise (e.g. known
vulnerabilities first to the attackers can exploit them).
• Define what is the business product (the report), and the
structure, of the final output of the project.
17
Top tips - Reporting
• Is often suggested that the report will have different
levels for different audience.
– Executive Summary
– Methodology and Tools
– Technical Summary
– Technical Details (exploits, TOP 10 mapping, CVSS v2…)
• Specific needs? Be Agile!
18
Question time
• Scenario: You are asked to test a Web
Application, using OWASP Testing Guide.
The application should be 20-40 dynamic
pages with 2 different profiles.
• Questions: who have to do the estimate?
Other requirements to ask?
19
Top tips – Estimates!
• Ask for a lot of information as possible: technology
used,
• Who? Technical guys/girls!!!
• Active/Idle time? People are active often about 80%
• Report warning the writing of the report can take about half the
time of technical activies
• Remote/on-site Travel time?
• Specific timeframe? As a risk reduction and possibility
to run automatic tools H24.
• Project Management Time/Meetings/Writing?
20
Agile is your friend
«We have a BrightRay™ Portal with 2 custom portlets and
one for payment of membership via
SecurePaymentGatewy™ portlet»
The Team Lead said to testers. Think about the
estimate and pick a card from your deck, wait to show
to not influence others.
21
Planning Poker – first hand
22
13
13
13
5
Tester #1
Tester #2
Tester #3
Tester #4
Agile is your friend
Team Lead sees that one tester is not aligned to the
others, he/she can has important info to share with
others, Tester #3 «I tested BrightRay™ few weeks ago
and already automated the procedure for IG (portlets ids
enumeration) and have a set of evil portlets for exploitation
and post-exploitation» Tester #1 said «this is a good news.
From my side I lost a lot of time with SPM portlet because
of sophisticated defenses in place.
23
Planning Poker – second hand
24
8
13
5
5
Tester #1
Tester #2
Tester #3
Tester #4
Foundations – Top tips
• Prepare a document with Scope, Rules of
Engagements, Limitations, Communication
Management Strategy (remember Transparency).
• Prioritize activities in particular if we are timeboxed
(we have an pre-defined and fixed amount of time e.g. to
get a fixed price), in order to get suitable and useful
results. Better a workshop with Supplier/Customer
25
Project Variables
26
Quality
Time
Functiona
lities
Quality
Cost Time
Waterfall approach Agile approach
Cost
Can vary
Fixed
Funcional
ities
What to prioritize?
• We have:
• Vulnerabilities
• Functionalities / Components
• Specific «Evil» Use Cases
• And Combine in a Matrix
• Y axis – Functionalities
• X axis - OWASP TOP 10
• Think also about:
• When and how to go deep?
• When to do manual and automatic activity?
• False Positive Management
Take care of vulnerabilities who have a wide application impact.
27
How to prioritize MoSCoW
28
Level Importance Effect if not
met
Effort
Must Vital Project will fail. 60%
Should Imporant Not wiil not fail,
but challanged
20%
Could Desirable Contingency 20%
Won’t Out of scope May be a next
PT
--
Wasp in MoSCoW
Injection Auth/SM XSS IDOR Security
Misconfig.
Payment Functionality Must Must (auto) Must (AutoScan™),
Should (man)
Must (man) Must (AutoScan™)
Registration Must
(AutoScan™),
Could (man)
Could Must (AutoScan™),
Should (man)
Could Must (AutoScan™)
Authentication Must
(AutoScan™),
Should (man)
Control
itself
Must (AutoScan™),
Should (man)
Could Must (AutoScan™)
Private Content portlet Must
(AutoScan™),
Should (man)
Must (man) Must Must (man) Must (AutoScan™)
29
Priorities
Exploitation: No
False Positive Management:
High (Must), Medium (Should)
Timeboxing – top tips
30
• Kick-off: define objective
• Investigation: do initial test and find quick-wins
• Refinenement: the big testing work
• Consolidation: stop starting, start finishing
• Close-out: met with customer about the job done
Kick-Off
Close-Out
Investigation
(effort 10-20%)
Consolidation
(effort 10-20%)
Refinement
(effort 60-80%)
AN AGILE SSDLC
31
Embedding Security in Agile SSDLC
In some cases, the customer has
already an Agile process for SDLC. How
Agile can be secure?
• Security Testing is still needed for
final testing at least (even if my
team is competent, it is goof to ask
for a Technical Advisor
• Implement a Definition of Done /
Acceptance Criteria for Security
• Implement Evil User Stories
• Pair Programming with Developers
and Security Experts
Image from Wikipedia, Lisamarie Babik
Be Agile, and Lean… how to manage
the Vulnerabilities
All todos are
blocked (red is
present on the
Kanban). Now is
the time to ask to
the Penetration
Tester team to
Retest.
THANK YOU
34
Simone Onofri
simone@onofri.org
https://onofri.org/
Trust the QR Code…
(linkedin, will
publish slides)

More Related Content

What's hot (20)

PDF
How should we build that? Evolving a development environment that's suitable ...
AdaCore
 
PPTX
Making Security Agile
Oleg Gryb
 
PDF
New Barriers of Transformation
DevOps Indonesia
 
PDF
Security champions v1.0
Dinis Cruz
 
PDF
Outpost24 webinar - The economics of penetration testing in the new threat la...
Outpost24
 
PPT
Introducing: Klocwork Insight Pro | November 2009
Klocwork
 
PDF
DevSecOps and the CI/CD Pipeline
James Wickett
 
PPTX
DEVSECOPS: Coding DevSecOps journey
Jason Suttie
 
PPTX
DevSecOps-OWASP Indonesia Day 2017
Suman Sourav
 
PPTX
Shifting the conversation from active interception to proactive neutralization
Rogue Wave Software
 
PDF
Are Agile And Secure Development Mutually Exclusive?
Source Conference
 
PPTX
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
PPTX
Digital Transformation, Testing and Automation
TEST Huddle
 
PDF
Building a Modern Security Engineering Organization
Zane Lackey
 
PPTX
Cyber security - It starts with the embedded system
Rogue Wave Software
 
PDF
Digital transformation testing.
Deepak Daniel
 
PDF
A Secure DevOps Journey
Veracode
 
PDF
DevOps not a Toolbox
DevOps Indonesia
 
PDF
Shift Left Security
gjdevos
 
PPTX
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 
How should we build that? Evolving a development environment that's suitable ...
AdaCore
 
Making Security Agile
Oleg Gryb
 
New Barriers of Transformation
DevOps Indonesia
 
Security champions v1.0
Dinis Cruz
 
Outpost24 webinar - The economics of penetration testing in the new threat la...
Outpost24
 
Introducing: Klocwork Insight Pro | November 2009
Klocwork
 
DevSecOps and the CI/CD Pipeline
James Wickett
 
DEVSECOPS: Coding DevSecOps journey
Jason Suttie
 
DevSecOps-OWASP Indonesia Day 2017
Suman Sourav
 
Shifting the conversation from active interception to proactive neutralization
Rogue Wave Software
 
Are Agile And Secure Development Mutually Exclusive?
Source Conference
 
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
Digital Transformation, Testing and Automation
TEST Huddle
 
Building a Modern Security Engineering Organization
Zane Lackey
 
Cyber security - It starts with the embedded system
Rogue Wave Software
 
Digital transformation testing.
Deepak Daniel
 
A Secure DevOps Journey
Veracode
 
DevOps not a Toolbox
DevOps Indonesia
 
Shift Left Security
gjdevos
 
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 

Viewers also liked (20)

PDF
ISACA - Gestire progetti di Ethical Hacking secondo le best practices
Simone Onofri
 
PDF
SecDevOps Risk Workflow - v0.6
Dinis Cruz
 
PDF
ORM Injection
Simone Onofri
 
ODP
Building an Open Source AppSec Pipeline
Matt Tesauro
 
PDF
AppSec Pipelines and Event based Security
Matt Tesauro
 
PDF
AppSec is Eating Security
Alex Stamos
 
PPTX
Mamma, da grande voglio essere un Penetration Tester HackInBo 2016 Winter
Simone Onofri
 
PDF
Hackers vs Developers - Cross Site Scripting (XSS) Attacco e difesa
Simone Onofri
 
PDF
Meetmagento 2014 hackers_onofri
Simone Onofri
 
PDF
Introduzione ai network penetration test secondo osstmm
Simone Onofri
 
PPTX
Security Project Management: Esperienze nella gestione di Vulnerability Asses...
Simone Onofri
 
PDF
IPMA 2014 World Congress - Stakeholder Engagement between Traditional and Ag...
Simone Onofri
 
PDF
Penetration Testing con Python - Network Sniffer
Simone Onofri
 
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Stefan Streichsbier
 
PDF
How to adapt the SDLC to the era of DevSecOps
Zane Lackey
 
PPTX
Internet banking safeguards vulnerabilities - OWASP AppSec EU 2016
SecuRing
 
PDF
Legacy-SecDevOps (AppSec Management Debrief)
Dinis Cruz
 
PDF
Agile lean conference - Agile, Lean & Business
Simone Onofri
 
PDF
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
Dinis Cruz
 
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Threat Stack
 
ISACA - Gestire progetti di Ethical Hacking secondo le best practices
Simone Onofri
 
SecDevOps Risk Workflow - v0.6
Dinis Cruz
 
ORM Injection
Simone Onofri
 
Building an Open Source AppSec Pipeline
Matt Tesauro
 
AppSec Pipelines and Event based Security
Matt Tesauro
 
AppSec is Eating Security
Alex Stamos
 
Mamma, da grande voglio essere un Penetration Tester HackInBo 2016 Winter
Simone Onofri
 
Hackers vs Developers - Cross Site Scripting (XSS) Attacco e difesa
Simone Onofri
 
Meetmagento 2014 hackers_onofri
Simone Onofri
 
Introduzione ai network penetration test secondo osstmm
Simone Onofri
 
Security Project Management: Esperienze nella gestione di Vulnerability Asses...
Simone Onofri
 
IPMA 2014 World Congress - Stakeholder Engagement between Traditional and Ag...
Simone Onofri
 
Penetration Testing con Python - Network Sniffer
Simone Onofri
 
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Stefan Streichsbier
 
How to adapt the SDLC to the era of DevSecOps
Zane Lackey
 
Internet banking safeguards vulnerabilities - OWASP AppSec EU 2016
SecuRing
 
Legacy-SecDevOps (AppSec Management Debrief)
Dinis Cruz
 
Agile lean conference - Agile, Lean & Business
Simone Onofri
 
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
Dinis Cruz
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Threat Stack
 
Ad

Similar to OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Security Testing Projects (20)

PDF
The Complete Web Application Security Testing Checklist
Cigital
 
PPTX
Create Agile confidence for better application security
Rogue Wave Software
 
PPTX
Perforce on Tour 2015 - Grab Testing By the Horns and Move
Perforce
 
PDF
Agile Secure Development
Bosnia Agile
 
PPT
Agile Testing
Anand Ramdeo
 
PPT
Agile2011 Conference – Key Take Aways
Synerzip
 
PPTX
Agile in 'Real Life' Webinar
Sogeti UK
 
PPT
The QA/Testing Process
Synerzip
 
PDF
ProActive Security
Ibnisina Sina
 
PDF
ProActive Security
Ibnisina Sina
 
PDF
5 Steps to Scale Up Agile
Arun Chinnaraju MBA, PMP, CSM, CSPO, SA
 
PDF
Helpful Practices in Agile Testing
Josiah Renaudin
 
PPTX
Application security testing in the age of Agile development - by Julio Cesar...
Blaze Information Security
 
ODP
Matthew Coles - Izar Tarandach - Security Toolbox
Source Conference
 
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
PPTX
Step-by-Step Complete Agile Program Management Model
Vishal Sheth
 
PPTX
Test Strategy-The real silver bullet in testing by Matthew Eakin
QA or the Highway
 
PPTX
Agile Topics - Explained Simply - Practical Agilist.pptx
Brian Link
 
PDF
Intro to Agile Methods for Execs, Leaders, and Managers
David Rico
 
PDF
Laura Delnevo - Winning your clients' trust with Agile project management
cameronandwilding
 
The Complete Web Application Security Testing Checklist
Cigital
 
Create Agile confidence for better application security
Rogue Wave Software
 
Perforce on Tour 2015 - Grab Testing By the Horns and Move
Perforce
 
Agile Secure Development
Bosnia Agile
 
Agile Testing
Anand Ramdeo
 
Agile2011 Conference – Key Take Aways
Synerzip
 
Agile in 'Real Life' Webinar
Sogeti UK
 
The QA/Testing Process
Synerzip
 
ProActive Security
Ibnisina Sina
 
ProActive Security
Ibnisina Sina
 
5 Steps to Scale Up Agile
Arun Chinnaraju MBA, PMP, CSM, CSPO, SA
 
Helpful Practices in Agile Testing
Josiah Renaudin
 
Application security testing in the age of Agile development - by Julio Cesar...
Blaze Information Security
 
Matthew Coles - Izar Tarandach - Security Toolbox
Source Conference
 
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
Step-by-Step Complete Agile Program Management Model
Vishal Sheth
 
Test Strategy-The real silver bullet in testing by Matthew Eakin
QA or the Highway
 
Agile Topics - Explained Simply - Practical Agilist.pptx
Brian Link
 
Intro to Agile Methods for Execs, Leaders, and Managers
David Rico
 
Laura Delnevo - Winning your clients' trust with Agile project management
cameronandwilding
 
Ad

More from Simone Onofri (20)

PDF
Threat Modeling Connect (TMC) Barcelona Meetup - Threat Modeling @ W3C - Age...
Simone Onofri
 
PDF
Serverless Meetup Barcelona - Attacking and Exploiting Modern Web Applications
Simone Onofri
 
PDF
Attacking and Exploiting Ethereum Smart Contracts: Auditing 101
Simone Onofri
 
PDF
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri
 
PDF
Attacking Ethereum Smart Contracts a deep dive after ~9 years of deployment
Simone Onofri
 
PDF
Linux Day 2018 Roma - Web Application Penetration Test (WAPT) con Linux
Simone Onofri
 
PDF
Agile Lean Conference 2017 - Leadership e facilitazione
Simone Onofri
 
PDF
Agile Business Consortium - LEGO SERIOUS PLAY e i Principi di Agile Project M...
Simone Onofri
 
PDF
Agile Project Framework
Simone Onofri
 
PDF
Agile nei servizi di cyber security (Security Summit Edition)
Simone Onofri
 
PDF
Security Project Management - Agile nei servizi di Cyber Security
Simone Onofri
 
PDF
Cyber Defense - How to find and manage zero-days
Simone Onofri
 
PDF
Cyber Defense - How to be prepared to APT
Simone Onofri
 
PDF
Agile e Lean Management
Simone Onofri
 
PDF
Nuove minacce nella Cyber Security, come proteggersi
Simone Onofri
 
PDF
Agile Lean Management - MoSCoW, Timeboxing e Kanban
Simone Onofri
 
PDF
Hackers vs Developers - SQL Injection - Attacco e Difesa
Simone Onofri
 
PDF
Lean Startup Machine - Rome - Agile e Lean Project Management
Simone Onofri
 
PDF
ITSMF Conferenza 2014 - L'officina Agile per innovare l'IT Service Management
Simone Onofri
 
PDF
TEDX TorVergataU - Intuition, Hacking e Nuove Tecnologie
Simone Onofri
 
Threat Modeling Connect (TMC) Barcelona Meetup - Threat Modeling @ W3C - Age...
Simone Onofri
 
Serverless Meetup Barcelona - Attacking and Exploiting Modern Web Applications
Simone Onofri
 
Attacking and Exploiting Ethereum Smart Contracts: Auditing 101
Simone Onofri
 
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri
 
Attacking Ethereum Smart Contracts a deep dive after ~9 years of deployment
Simone Onofri
 
Linux Day 2018 Roma - Web Application Penetration Test (WAPT) con Linux
Simone Onofri
 
Agile Lean Conference 2017 - Leadership e facilitazione
Simone Onofri
 
Agile Business Consortium - LEGO SERIOUS PLAY e i Principi di Agile Project M...
Simone Onofri
 
Agile Project Framework
Simone Onofri
 
Agile nei servizi di cyber security (Security Summit Edition)
Simone Onofri
 
Security Project Management - Agile nei servizi di Cyber Security
Simone Onofri
 
Cyber Defense - How to find and manage zero-days
Simone Onofri
 
Cyber Defense - How to be prepared to APT
Simone Onofri
 
Agile e Lean Management
Simone Onofri
 
Nuove minacce nella Cyber Security, come proteggersi
Simone Onofri
 
Agile Lean Management - MoSCoW, Timeboxing e Kanban
Simone Onofri
 
Hackers vs Developers - SQL Injection - Attacco e Difesa
Simone Onofri
 
Lean Startup Machine - Rome - Agile e Lean Project Management
Simone Onofri
 
ITSMF Conferenza 2014 - L'officina Agile per innovare l'IT Service Management
Simone Onofri
 
TEDX TorVergataU - Intuition, Hacking e Nuove Tecnologie
Simone Onofri
 

Recently uploaded (20)

PPTX
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
PPTX
Cost_of_Quality_Presentation_Software_Engineering.pptx
farispalayi
 
PPTX
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
PDF
Build Fast, Scale Faster: Milvus vs. Zilliz Cloud for Production-Ready AI
Zilliz
 
PPTX
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
PPTX
sajflsajfljsdfljslfjslfsdfas;fdsfksadfjlsdflkjslgfs;lfjlsajfl;sajfasfd.pptx
theknightme
 
PDF
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
PPT
introductio to computers by arthur janry
RamananMuthukrishnan
 
PPTX
Lec15_Mutability Immutability-converted.pptx
khanjahanzaib1
 
PDF
DevOps Design for different deployment options
henrymails
 
PPTX
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
PPTX
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
PPTX
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
PDF
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
PDF
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
PPTX
Optimization_Techniques_ML_Presentation.pptx
farispalayi
 
PPTX
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
PPT
introduction to networking with basics coverage
RamananMuthukrishnan
 
PPTX
internet básico presentacion es una red global
70965857
 
PPTX
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
Cost_of_Quality_Presentation_Software_Engineering.pptx
farispalayi
 
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
Build Fast, Scale Faster: Milvus vs. Zilliz Cloud for Production-Ready AI
Zilliz
 
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
sajflsajfljsdfljslfjslfsdfas;fdsfksadfjlsdflkjslgfs;lfjlsajfl;sajfasfd.pptx
theknightme
 
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
introductio to computers by arthur janry
RamananMuthukrishnan
 
Lec15_Mutability Immutability-converted.pptx
khanjahanzaib1
 
DevOps Design for different deployment options
henrymails
 
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
Optimization_Techniques_ML_Presentation.pptx
farispalayi
 
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
introduction to networking with basics coverage
RamananMuthukrishnan
 
internet básico presentacion es una red global
70965857
 
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 

OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Security Testing Projects

  • 1. Security Project Management How to be Agile in Security Testing Projects
  • 2. whoami # Simone Onofri • Security Business Consultant at Hewlett Packard Enterprise • Director at DSDM Consortium • Volunteer: OWASP (Author TG v4), CoderDojo… • Certs: PRINCE2®, Agile Project Management®, ITIL, Certified ScrumMaster®, ISO 27001… Disclaimer: The opinions expressed in this presentation and on the following slides are solely those of the presenter. Any reference to events or persons is purely coincidental 2
  • 3. About us here You «offer» Penetration Testing Services (Provider/Supplier) 3
  • 4. About us here You «receive» Penetration Testing services? 4
  • 6. Agenda • What is Agile in Security Project Management • The process and how to be Agile • Embed Security in Agile Software Development Lifecycle • Q&A 6
  • 8. What is Agile “Agile” is an umbrella term for several iterative and incremental methodologies. Is a mindset and a style of working where requirements and solutions evolve through collaboration. Agile promotes adaptive planning, evolutionary development and delivery, a timeboxed, iterative approach and encourages rapid and flexible response to change. 8
  • 9. Quote from Sun Tzu “Order and disorder depends on organization” 9
  • 10. What is Project Management The planning (adaptively), delegating (at the lower level as possible), monitoring-control (without micro- manage) of all aspects of the project, and the motivation of those involved, to achieve the project objectives within the expected performance targets (e.g. time, cost, quality, scope, benefits and risks), delivering proper business product (what?) (Inspired from PRINCE2® definition)
  • 11. Question time • Question: which is the typical business product of a Web Application Penetration Test? • Scenario: Security Assessment is the process of determining how effectively an “entity” (e.g. Web Application) meets specific security objectives. • Hint: what the final customer will have at the end of the activities? (Security Assessment definition inspired by NIST SP800-115)
  • 12. Which is the typical business product of a Web Application Penetration Test? «Document the Test Results To conclude the testing process, it is important to produce a formal record of what testing actions were taken, by whom, when they were performed, and details of the test findings. It is wise to agree on an acceptable format for the report which is useful to all concerned parties, which may include developers, project management, business owners, IT department, audit, and compliance.» OWASP Testing Guide v4 - Introduction
  • 13. Why Agile in Security Testing? 13 Enviormental factors: • Nowaday Software Developmnet is already Agile. • Work is often on a fixed deadline, fixed budget and we still need to deliver results without compromising quality. Specific Testing factors: • Security Testing is Agile «by definition». • We canot have info «by design» of testing project (e.g. Black-Box). • Often we will explore from the first technical stage (OTG-INFO-001/010).
  • 14. How be Agile in Security Testing • Transparency and communication between customer and supplier • Use Agile techniques to solve common issues. – Planning Poker for collaborative planning – Timeboxing for managing time – MoSCoW for managing priorities • Integrate Security in Agile Development 14
  • 15. AN AGILE SECURITY TESTING PROJECT 15
  • 16. Apply a PM structure to Security bieing Agile 16 Feasibility Foundation Evolutionary Post-Project •RFP / Tender •High-level requirements to estimate (e.g. number of applications and size). •Getting business cases. •Define output. •Proposal accepted •Planning and technical requirements definition •Sign the necessary documentation (e.g. NDA/Authorization*Jai l free). •Technical Requirements verification •Technical activity •Writing Reports... •Presents results. •Depth analysis •Retesting activity •….
  • 17. Top tips - Feasibility • In the feasibility phase the issue is to known the Business Case of the Customer: Why needs a PT? Often there are: – Compliance: e.g. laws and regulamentations (e.g. ISO 27001, Bank laws, PCI-DSS). – Risk Management to protect the enterprise (e.g. known vulnerabilities first to the attackers can exploit them). • Define what is the business product (the report), and the structure, of the final output of the project. 17
  • 18. Top tips - Reporting • Is often suggested that the report will have different levels for different audience. – Executive Summary – Methodology and Tools – Technical Summary – Technical Details (exploits, TOP 10 mapping, CVSS v2…) • Specific needs? Be Agile! 18
  • 19. Question time • Scenario: You are asked to test a Web Application, using OWASP Testing Guide. The application should be 20-40 dynamic pages with 2 different profiles. • Questions: who have to do the estimate? Other requirements to ask? 19
  • 20. Top tips – Estimates! • Ask for a lot of information as possible: technology used, • Who? Technical guys/girls!!! • Active/Idle time? People are active often about 80% • Report warning the writing of the report can take about half the time of technical activies • Remote/on-site Travel time? • Specific timeframe? As a risk reduction and possibility to run automatic tools H24. • Project Management Time/Meetings/Writing? 20
  • 21. Agile is your friend «We have a BrightRay™ Portal with 2 custom portlets and one for payment of membership via SecurePaymentGatewy™ portlet» The Team Lead said to testers. Think about the estimate and pick a card from your deck, wait to show to not influence others. 21
  • 22. Planning Poker – first hand 22 13 13 13 5 Tester #1 Tester #2 Tester #3 Tester #4
  • 23. Agile is your friend Team Lead sees that one tester is not aligned to the others, he/she can has important info to share with others, Tester #3 «I tested BrightRay™ few weeks ago and already automated the procedure for IG (portlets ids enumeration) and have a set of evil portlets for exploitation and post-exploitation» Tester #1 said «this is a good news. From my side I lost a lot of time with SPM portlet because of sophisticated defenses in place. 23
  • 24. Planning Poker – second hand 24 8 13 5 5 Tester #1 Tester #2 Tester #3 Tester #4
  • 25. Foundations – Top tips • Prepare a document with Scope, Rules of Engagements, Limitations, Communication Management Strategy (remember Transparency). • Prioritize activities in particular if we are timeboxed (we have an pre-defined and fixed amount of time e.g. to get a fixed price), in order to get suitable and useful results. Better a workshop with Supplier/Customer 25
  • 26. Project Variables 26 Quality Time Functiona lities Quality Cost Time Waterfall approach Agile approach Cost Can vary Fixed Funcional ities
  • 27. What to prioritize? • We have: • Vulnerabilities • Functionalities / Components • Specific «Evil» Use Cases • And Combine in a Matrix • Y axis – Functionalities • X axis - OWASP TOP 10 • Think also about: • When and how to go deep? • When to do manual and automatic activity? • False Positive Management Take care of vulnerabilities who have a wide application impact. 27
  • 28. How to prioritize MoSCoW 28 Level Importance Effect if not met Effort Must Vital Project will fail. 60% Should Imporant Not wiil not fail, but challanged 20% Could Desirable Contingency 20% Won’t Out of scope May be a next PT --
  • 29. Wasp in MoSCoW Injection Auth/SM XSS IDOR Security Misconfig. Payment Functionality Must Must (auto) Must (AutoScan™), Should (man) Must (man) Must (AutoScan™) Registration Must (AutoScan™), Could (man) Could Must (AutoScan™), Should (man) Could Must (AutoScan™) Authentication Must (AutoScan™), Should (man) Control itself Must (AutoScan™), Should (man) Could Must (AutoScan™) Private Content portlet Must (AutoScan™), Should (man) Must (man) Must Must (man) Must (AutoScan™) 29 Priorities Exploitation: No False Positive Management: High (Must), Medium (Should)
  • 30. Timeboxing – top tips 30 • Kick-off: define objective • Investigation: do initial test and find quick-wins • Refinenement: the big testing work • Consolidation: stop starting, start finishing • Close-out: met with customer about the job done Kick-Off Close-Out Investigation (effort 10-20%) Consolidation (effort 10-20%) Refinement (effort 60-80%)
  • 32. Embedding Security in Agile SSDLC In some cases, the customer has already an Agile process for SDLC. How Agile can be secure? • Security Testing is still needed for final testing at least (even if my team is competent, it is goof to ask for a Technical Advisor • Implement a Definition of Done / Acceptance Criteria for Security • Implement Evil User Stories • Pair Programming with Developers and Security Experts Image from Wikipedia, Lisamarie Babik
  • 33. Be Agile, and Lean… how to manage the Vulnerabilities All todos are blocked (red is present on the Kanban). Now is the time to ask to the Penetration Tester team to Retest.