SlideShare una empresa de Scribd logo
1 de 42
Scaled Agile Framework
Overview for Security and Privacy Specialists / Ops from DevOps Teams
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
1
Disclaimers
Not an in-depth briefing
SAFe treats security as one among many quality attributes
Also consider hybrid models and/or Site [Service] Reliability Engineering
Credit: Some content adapted from Scaled Agile materials
♫ = Personal “Professional” Opinion
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
2
SAFe: Built from Borrowed Concepts
 Lean
 Agile
 DevOps
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
3
 Composable Services ♫
 MBSE ♫
 OOP ♫
 Quality (ISO 9001, PDCA) ♫
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
4
Lean-Agile Principles5
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
6
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Core Values
in SAFe
7
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
1. Alignment
2. Fully integrated quality
3. Transparency
4. Program Execution
Agile Manifesto
 Individuals and interactions
over processes and tools
 Working software over
comprehensive
documentation
 Customer collaboration over
contract negotiation
 Responding to change over
following a plan
8 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
More of the Agile Manifesto
 1. Satisfy customer through early and continuous delivery
 2. Welcome changing requirements, even late in development.
 3. Deliver working software frequently
 4. People and developers must work together daily throughout a project
 5. Build projects around motivated people; support them; trust them
 6. Face to face conversation
 7. Working software is the primary measure of progress
 8. Agile processes promote sustainable development
 9. Continuous attention to technical excellence and good design enhances agility
 10. Simplicity – maximizing the amount of work not done – is essential
 11. Best architectures, requirements, designs emerge from self-organizing teams
 12. Teams regularly reflect on how to become more effective, then tune & readjust
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
9
SAFe Lean-Agile Principles10
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
11
Deming Cycle
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
12
Program Increment Planning
 “No event is more powerful than PI
planning. It’s the magic in SAFe.”
 “Teams create and take responsibility for
plans.”
 “Stakeholders appear face to face.”
 “Requirements and design emerge.”
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
13
 Requirements engineering depends on
story fidelity
 Story fidelity is more art than design
pattern
 Security is a bit player
 Privacy, compliance? Sometimes a starring
role
Architectural Runway14
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Delay-centric Optimization15
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
“Visualize and limit
WIP, reduce batch
sizes and manage
queue lengths.”
Ops issues such as
latency, scalability,
robustness
“Continuous
Exploration”
 Less well integrated in SAFe
 R&D
 Professional associations,
SDO’s, consortia
16 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Cadence and Synchronization
for Security & Privacy
17
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Most Powerful Principle18
“Iterate toward the sustainably
shortest lead time with best
quality and value to people and
society.”
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Security First? ♫
Not even close.
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
19
Symptom, not
Diagnosis ♫
 “Security is an afterthought.”
 “Security is tacked on.”
 “Security needs to be designed
in at the beginning.”*
 *My choice for the most
pernicious
20 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Applications Rule! ♫
 Unless you’re building a security tool, security is not even a stakeholder
 Applications are (almost) never about security
 Discussing security is a distraction from good story-craft
 By “security” customers mean:
 Privacy
 Functional features (e.g., “controls”) in a domain
 Expression of distrust in a process / developer team / internal competitors
 Indirectly express lack of awareness about security/privacy standards
 Dependencies
 Operations work as Apps, but it’s not a 1:1 mapping
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
21
“Secure Code” Reality Check ♫22
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
15-20% defects remain after
static/dynamic scans
Bug-free software production is beyond
the current state of the art
Goal subtracts from more important
objectives (sustainability, manageability,
risk, usability, maintainability, customer
needs)
Enablers
. . . To the rescue
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
23
SAFe Support for Security/Privacy
 Frequent iteration
 Automated test
 Shorter sprints
 Left-shifted test development
 Immersion with quality dimensions in value streams
 Nurture domain-rich security through “knowledge worker” focus
 Depicts security teams/artifacts as enablers, not blockers
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
24
Security as Quality ♫
So far, an insight external to SAFe
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
25
Meanwhile, at the Retrospective . . . ♫
 Enablers have different life cycles in different enterprises / projects
 Retrospectives often hint at enabler gaps
 Cut and paste
 Role of R&D
 Domain specific languages
 Repository deployment, discovery, development
 Maturing the CI/CD for security/privacy
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
26
Test Engineering
Security as test and vice versa
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
27
Frequent System Demos
 For security, as with quality, manageability, monitoring:
 Test must be fully integrated
 Left-shifted
 Tagging and annotation are valuable stubs when used with an orchestrator
 Increase reliance on IDE support
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
28
Deconstructing
“Configuration
Error”
29
 Developer or Insfrastructure engineering problem?
 Common Operations Responsibility
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Security is a Specialization ♫
 Haphazard coverage in college level software engineering
 Reflecting indifference?
 Reflecting moving target, weak domain integration
 Consider how a rheumatologist engages a neurologist
 Some (few?) software engineers will become security specialists
 (nor should they have to)
 Each operation (e.g., Akamai or Palo Alto firewall specialist) role is specialized
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
30
Legacy
“Over-the-
wall” Test
Engineering
♫
31
 Some hardening may require aggressive red teaming
 New paradigm
 Not part of, but supported by SAFe
 Mix of legacy and software-defined data centers
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Teaching Toys ♫
 “Zero Trust”
 Do what the unicorns do
 Many organizations (must) manage code written before Google was founded
 Security and capacity / performance management are unrelated
 Terraform
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
32
Security as Code ♫
Yes, partly, but also knowledge engineering for domain-aware safety
frameworks.
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
33
Decision
Support ♫
34
 Derive from a full Integration with quality
 What telemetry to support decision-making?
 Security incidents, use cases may require human
intervention
 Need for models & simulation
 Earlier, often, incrementally available
 Risk may need HCI engagement
 Support for operations support tooling / dashboard-
style management
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Security Big
Data ♫
35
 Old: Applications telemetry as “signature,” “snapshot”
 Now: Application telemetry will exceed the scale of most
applications
 No telemetry, no analytics
 Security Analytics -> Complex Event Processing -> Data
science
 Dashboards for big data are still emerging from the data
science community
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
HCI in Security and Privacy♫
Human - Computer Interaction
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
36
Repo’s,
Discovery &
Design
Patterns ♫
37
 What are these patterns?
 SAFe offers some ideas, solutions, enablers
 CNCF community is part of this ecosystem, but how?
 What is an Ops Repo? Is it teachable?
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Stories and
Domain
Knowledge ♫
38
 Stories = Natural Language = Complex
 Security stories (e.g., OWASP -> an application domain)
 Domain expertise supersedes security expertise
 Are operations stories similar or different?
 Is Ops a stakeholder?
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Technical Debt and Backlog
 Sometimes security dumping grounds
 Ops technical debt is . . . What?
 Failure to measure
 Telemetry gap
 Failure to design manageability
 Exogenous events
 New/updated integration points
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
39
The Enterprise
Lens in SAFe
40
 Small teams (e.g., CNCF teams)
 API-First
 Legacy software (owner, developer,
infrastructure)
 Product/Release Centered (vs. SRE)
 What is a “Product Owner” ?
 Simplistic views of
 Knowledge Management (vs.
CKO)
 Data / Application Management
(CDO)
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
Systemic Security Risks:
Termites in the House of Security ♫
 RBAC instead of ABAC
 The Admin Syndrome
 Short-sighted understanding of test engineering
 Weak adoption of ModSim
 Weak automation
 Excessive dependence on static / dynamic testing
 Risk registers are oil to security water
 Supply chain (especially OSS)
 “Machine Learning (‘AI’) will fix it”
 Frameworks (e.g., 800-53, etc., are too manual)
 DevSecOps based on weak software engineering (bash, CLI, no OOP)
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
41
Contact
@knowlengr dark@computer.org
www. scaledagile.com
Presented to CNCF Sig Security 2020-04-01
Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
42

Más contenido relacionado

La actualidad más candente

Continuous Delivery: The New Normal. London Event.
Continuous Delivery: The New Normal. London Event. Continuous Delivery: The New Normal. London Event.
Continuous Delivery: The New Normal. London Event.
Perforce
 
A Crash Course in Building Site Reliability
A Crash Course in Building Site ReliabilityA Crash Course in Building Site Reliability
A Crash Course in Building Site Reliability
Acquia
 

La actualidad más candente (20)

Diving Deeper into DevOps Deployments
Diving Deeper into DevOps DeploymentsDiving Deeper into DevOps Deployments
Diving Deeper into DevOps Deployments
 
Webinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps SuccessWebinar: A Roadmap for DevOps Success
Webinar: A Roadmap for DevOps Success
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
 
Site Reliability Engineering (SRE) - Tech Talk by Keet Sugathadasa
Site Reliability Engineering (SRE) - Tech Talk by Keet SugathadasaSite Reliability Engineering (SRE) - Tech Talk by Keet Sugathadasa
Site Reliability Engineering (SRE) - Tech Talk by Keet Sugathadasa
 
Continuous Delivery: The New Normal. London Event.
Continuous Delivery: The New Normal. London Event. Continuous Delivery: The New Normal. London Event.
Continuous Delivery: The New Normal. London Event.
 
DevOps Explained
DevOps ExplainedDevOps Explained
DevOps Explained
 
SRE vs DevOps
SRE vs DevOpsSRE vs DevOps
SRE vs DevOps
 
Starting and Scaling DevOps
Starting and Scaling DevOpsStarting and Scaling DevOps
Starting and Scaling DevOps
 
SRE in Apiary
SRE in ApiarySRE in Apiary
SRE in Apiary
 
A Crash Course in Building Site Reliability
A Crash Course in Building Site ReliabilityA Crash Course in Building Site Reliability
A Crash Course in Building Site Reliability
 
Accelerate User Driven Innovation [Webinar]
Accelerate User Driven Innovation [Webinar]Accelerate User Driven Innovation [Webinar]
Accelerate User Driven Innovation [Webinar]
 
Metrics to Power DevOps
Metrics to Power DevOpsMetrics to Power DevOps
Metrics to Power DevOps
 
How to Build the Right Automation
How to Build the Right AutomationHow to Build the Right Automation
How to Build the Right Automation
 
SRE in Startup
SRE in StartupSRE in Startup
SRE in Startup
 
Scaling Enterprise DevOps with CloudBees
Scaling Enterprise DevOps with CloudBeesScaling Enterprise DevOps with CloudBees
Scaling Enterprise DevOps with CloudBees
 
Building Production-Ready Microservices: DevopsExchangeSF
Building Production-Ready Microservices: DevopsExchangeSFBuilding Production-Ready Microservices: DevopsExchangeSF
Building Production-Ready Microservices: DevopsExchangeSF
 
SRE 101 (Site Reliability Engineering)
SRE 101 (Site Reliability Engineering)SRE 101 (Site Reliability Engineering)
SRE 101 (Site Reliability Engineering)
 
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBMAdopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
Adopting DevOps @ Scale: Lessons learned at Hertz, Kaiser Permanente and lBM
 
How to plug the data gap in DevOps
How to plug the data gap in DevOpsHow to plug the data gap in DevOps
How to plug the data gap in DevOps
 
Site Reliability Engineering: An Enterprise Adoption Story (an ITSM Academy W...
Site Reliability Engineering: An Enterprise Adoption Story (an ITSM Academy W...Site Reliability Engineering: An Enterprise Adoption Story (an ITSM Academy W...
Site Reliability Engineering: An Enterprise Adoption Story (an ITSM Academy W...
 

Similar a Security within Scaled Agile

BSides Vienna 2015
BSides Vienna 2015BSides Vienna 2015
BSides Vienna 2015
Daniel Liber
 

Similar a Security within Scaled Agile (20)

State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
 
Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Appsec Agility: A Brief Tour
Appsec Agility: A Brief TourAppsec Agility: A Brief Tour
Appsec Agility: A Brief Tour
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendationsManaging Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendations
 
BSides Vienna 2015
BSides Vienna 2015BSides Vienna 2015
BSides Vienna 2015
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
 
Null application security in an agile world
Null application security in an agile worldNull application security in an agile world
Null application security in an agile world
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
 
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
 
Applicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit ProgramApplicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit Program
 
Introducing a Security Program to Large Scale Legacy Products
Introducing a Security Program to Large Scale Legacy ProductsIntroducing a Security Program to Large Scale Legacy Products
Introducing a Security Program to Large Scale Legacy Products
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Why 'positive security' is a software security game changer
Why 'positive security' is a software security game changerWhy 'positive security' is a software security game changer
Why 'positive security' is a software security game changer
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 

Más de Mark Underwood

Más de Mark Underwood (12)

The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of Code
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine Learning
 
DevOps Support for an Ethical Software Development Life Cycle (SDLC)
DevOps Support for an Ethical Software Development Life Cycle (SDLC)DevOps Support for an Ethical Software Development Life Cycle (SDLC)
DevOps Support for an Ethical Software Development Life Cycle (SDLC)
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Technologies in Support of Big Data Ethics
Technologies in Support of Big Data EthicsTechnologies in Support of Big Data Ethics
Technologies in Support of Big Data Ethics
 
NIST Big Data Public WG : Security and Privacy v2
NIST Big Data Public WG : Security and Privacy v2NIST Big Data Public WG : Security and Privacy v2
NIST Big Data Public WG : Security and Privacy v2
 
Stakeholders in Systems Design
Stakeholders in Systems DesignStakeholders in Systems Design
Stakeholders in Systems Design
 
TEDx Poetry and Science
TEDx Poetry and ScienceTEDx Poetry and Science
TEDx Poetry and Science
 
IoT Day 2016: Cloud Services for IoT Semantic Interoperability
IoT Day 2016: Cloud Services for IoT Semantic InteroperabilityIoT Day 2016: Cloud Services for IoT Semantic Interoperability
IoT Day 2016: Cloud Services for IoT Semantic Interoperability
 
Ontology Summit - Track D Standards Summary & Provocative Use Cases
Ontology Summit - Track D Standards Summary & Provocative Use CasesOntology Summit - Track D Standards Summary & Provocative Use Cases
Ontology Summit - Track D Standards Summary & Provocative Use Cases
 
Design Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoTDesign Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoT
 

Último

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Último (20)

Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 

Security within Scaled Agile

  • 1. Scaled Agile Framework Overview for Security and Privacy Specialists / Ops from DevOps Teams Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 1
  • 2. Disclaimers Not an in-depth briefing SAFe treats security as one among many quality attributes Also consider hybrid models and/or Site [Service] Reliability Engineering Credit: Some content adapted from Scaled Agile materials ♫ = Personal “Professional” Opinion Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 2
  • 3. SAFe: Built from Borrowed Concepts  Lean  Agile  DevOps Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 3  Composable Services ♫  MBSE ♫  OOP ♫  Quality (ISO 9001, PDCA) ♫
  • 4. Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 4
  • 5. Lean-Agile Principles5 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 6. 6 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 7. Core Values in SAFe 7 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 1. Alignment 2. Fully integrated quality 3. Transparency 4. Program Execution
  • 8. Agile Manifesto  Individuals and interactions over processes and tools  Working software over comprehensive documentation  Customer collaboration over contract negotiation  Responding to change over following a plan 8 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 9. More of the Agile Manifesto  1. Satisfy customer through early and continuous delivery  2. Welcome changing requirements, even late in development.  3. Deliver working software frequently  4. People and developers must work together daily throughout a project  5. Build projects around motivated people; support them; trust them  6. Face to face conversation  7. Working software is the primary measure of progress  8. Agile processes promote sustainable development  9. Continuous attention to technical excellence and good design enhances agility  10. Simplicity – maximizing the amount of work not done – is essential  11. Best architectures, requirements, designs emerge from self-organizing teams  12. Teams regularly reflect on how to become more effective, then tune & readjust Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 9
  • 10. SAFe Lean-Agile Principles10 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 11. Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 11
  • 12. Deming Cycle Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 12
  • 13. Program Increment Planning  “No event is more powerful than PI planning. It’s the magic in SAFe.”  “Teams create and take responsibility for plans.”  “Stakeholders appear face to face.”  “Requirements and design emerge.” Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 13  Requirements engineering depends on story fidelity  Story fidelity is more art than design pattern  Security is a bit player  Privacy, compliance? Sometimes a starring role
  • 14. Architectural Runway14 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 15. Delay-centric Optimization15 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 “Visualize and limit WIP, reduce batch sizes and manage queue lengths.” Ops issues such as latency, scalability, robustness
  • 16. “Continuous Exploration”  Less well integrated in SAFe  R&D  Professional associations, SDO’s, consortia 16 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 17. Cadence and Synchronization for Security & Privacy 17 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 18. Most Powerful Principle18 “Iterate toward the sustainably shortest lead time with best quality and value to people and society.” Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 19. Security First? ♫ Not even close. Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 19
  • 20. Symptom, not Diagnosis ♫  “Security is an afterthought.”  “Security is tacked on.”  “Security needs to be designed in at the beginning.”*  *My choice for the most pernicious 20 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 21. Applications Rule! ♫  Unless you’re building a security tool, security is not even a stakeholder  Applications are (almost) never about security  Discussing security is a distraction from good story-craft  By “security” customers mean:  Privacy  Functional features (e.g., “controls”) in a domain  Expression of distrust in a process / developer team / internal competitors  Indirectly express lack of awareness about security/privacy standards  Dependencies  Operations work as Apps, but it’s not a 1:1 mapping Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 21
  • 22. “Secure Code” Reality Check ♫22 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 15-20% defects remain after static/dynamic scans Bug-free software production is beyond the current state of the art Goal subtracts from more important objectives (sustainability, manageability, risk, usability, maintainability, customer needs)
  • 23. Enablers . . . To the rescue Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 23
  • 24. SAFe Support for Security/Privacy  Frequent iteration  Automated test  Shorter sprints  Left-shifted test development  Immersion with quality dimensions in value streams  Nurture domain-rich security through “knowledge worker” focus  Depicts security teams/artifacts as enablers, not blockers Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 24
  • 25. Security as Quality ♫ So far, an insight external to SAFe Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 25
  • 26. Meanwhile, at the Retrospective . . . ♫  Enablers have different life cycles in different enterprises / projects  Retrospectives often hint at enabler gaps  Cut and paste  Role of R&D  Domain specific languages  Repository deployment, discovery, development  Maturing the CI/CD for security/privacy Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 26
  • 27. Test Engineering Security as test and vice versa Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 27
  • 28. Frequent System Demos  For security, as with quality, manageability, monitoring:  Test must be fully integrated  Left-shifted  Tagging and annotation are valuable stubs when used with an orchestrator  Increase reliance on IDE support Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 28
  • 29. Deconstructing “Configuration Error” 29  Developer or Insfrastructure engineering problem?  Common Operations Responsibility Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 30. Security is a Specialization ♫  Haphazard coverage in college level software engineering  Reflecting indifference?  Reflecting moving target, weak domain integration  Consider how a rheumatologist engages a neurologist  Some (few?) software engineers will become security specialists  (nor should they have to)  Each operation (e.g., Akamai or Palo Alto firewall specialist) role is specialized Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 30
  • 31. Legacy “Over-the- wall” Test Engineering ♫ 31  Some hardening may require aggressive red teaming  New paradigm  Not part of, but supported by SAFe  Mix of legacy and software-defined data centers Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 32. Teaching Toys ♫  “Zero Trust”  Do what the unicorns do  Many organizations (must) manage code written before Google was founded  Security and capacity / performance management are unrelated  Terraform Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 32
  • 33. Security as Code ♫ Yes, partly, but also knowledge engineering for domain-aware safety frameworks. Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 33
  • 34. Decision Support ♫ 34  Derive from a full Integration with quality  What telemetry to support decision-making?  Security incidents, use cases may require human intervention  Need for models & simulation  Earlier, often, incrementally available  Risk may need HCI engagement  Support for operations support tooling / dashboard- style management Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 35. Security Big Data ♫ 35  Old: Applications telemetry as “signature,” “snapshot”  Now: Application telemetry will exceed the scale of most applications  No telemetry, no analytics  Security Analytics -> Complex Event Processing -> Data science  Dashboards for big data are still emerging from the data science community Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 36. HCI in Security and Privacy♫ Human - Computer Interaction Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 36
  • 37. Repo’s, Discovery & Design Patterns ♫ 37  What are these patterns?  SAFe offers some ideas, solutions, enablers  CNCF community is part of this ecosystem, but how?  What is an Ops Repo? Is it teachable? Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 38. Stories and Domain Knowledge ♫ 38  Stories = Natural Language = Complex  Security stories (e.g., OWASP -> an application domain)  Domain expertise supersedes security expertise  Are operations stories similar or different?  Is Ops a stakeholder? Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 39. Technical Debt and Backlog  Sometimes security dumping grounds  Ops technical debt is . . . What?  Failure to measure  Telemetry gap  Failure to design manageability  Exogenous events  New/updated integration points Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 39
  • 40. The Enterprise Lens in SAFe 40  Small teams (e.g., CNCF teams)  API-First  Legacy software (owner, developer, infrastructure)  Product/Release Centered (vs. SRE)  What is a “Product Owner” ?  Simplistic views of  Knowledge Management (vs. CKO)  Data / Application Management (CDO) Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1
  • 41. Systemic Security Risks: Termites in the House of Security ♫  RBAC instead of ABAC  The Admin Syndrome  Short-sighted understanding of test engineering  Weak adoption of ModSim  Weak automation  Excessive dependence on static / dynamic testing  Risk registers are oil to security water  Supply chain (especially OSS)  “Machine Learning (‘AI’) will fix it”  Frameworks (e.g., 800-53, etc., are too manual)  DevSecOps based on weak software engineering (bash, CLI, no OOP) Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 41
  • 42. Contact @knowlengr dark@computer.org www. scaledagile.com Presented to CNCF Sig Security 2020-04-01 Mark Underwood @knowlengr | Views my own | ShareAlike | v1.1 42