Page 1

Information Security In an Agile Environment Bologna 29 Ottobre 2016

Page 2

Welcome • Giacomo Collini Director of Information Security @ King.com

Page 3

Chi Sono

2002-2006

2006-2012

2014-…

Page 4

Chi Sono

2002-2006

2006-2012

2014-…

Karma 50 0 -50

Karma

Ti/CAD Online Gambling

-100

King

Karma

Page 5

About •FY 2015 • Revenues: 2Bn$ • 499m MAU • +12 Locations, 2000+ Employees, >50% Developers • 10+ Security team • 2016: Acquired by Activision|Blizzard for 5.9Bn$ • Currently operating as an independent unit of A|B Page 6

Cosa e’ Agile

Page 7

Page 8

What is Agile

Agile - Disclaimer • Agile Manifesto • Am I believer?

• Iterative approach • Short feedback • Fail Fast • Ready to Pivot • No Dependencies • Empowerment Page 9

• Individuals and interactions over processes and tools • Working software over comprehensive documentation • Customer collaboration over contract negotiation • Responding to change over following a plan

Page 10

What is Agile

• Iterative approach • Short feedback • Fail Fast • Ready to Pivot • No Dependencies • Empowerment

Page 11

What is Agile

Fail Fast: Not suitable for everybody

Page 12

Agile & Security

Page 13

Agile and Security

How Agile practices impact Security Domain

Impact

Domain

Impact

Risk Management

None

App. Security Testing

High

Capital Planning

None

Vendor Management

Medium

Resource Management

Medium

Asset Management

Medium

Policy Management

High

Physical Security

Medium

Data Management

Low

Data Management

Medium

Incident Management

Medium

Identity and Access

None

Disaster Recovery

Medium

Change Control

High

Threat Intelligence

Low

Vulnerability Mgmt.

High

Security Awareness

Low

Systems Standards

High

Page 14

Agile and Security

Policies, Standards and Guidelines PROBLEMS: • Policy Based approach won’t work or won’t be sufficient • Agile suggests external dependencies to be reduced to a minimum

MITIGATION: • Security to become a customer advocate • Work with Product Owners and Team Leads • Implement patterns that makes sense

Page 15

Agile Security

Secure SDLC • • • • •

Probably the, most impacted domain Embed Security in the Quality Program ( if there is any) Work with Lead Developers and Product Owners Find your champions Embed controls in the CI Loop

Page 16

Agile Security

Secure SDLC

Page 17

Agile Security

Secure SDLC

Libraries!!! Page 18

Agile Security

Empower your colleagues • People are a big part of the equation, Security Awareness must be at the centre of our strategy • Bring people to your side, explain why some controls are needed • Many vulnerabilities are reported by people and not tools

Never waste people’s time!

Page 19

Agile & Friends

Page 20

Agile & Friends

•Keep them out of privileged network •Adopt some sort of MDM •Strategy must be data driven rather than device driven

Page 21

Agile & Friends

Services

VS

Platforms

Page 22

Page 23

Identity Management

Page 24

Agile PAM

What we wanted to build and How did we built it • Success Criteria • • • • •

Automate as much as possible Open Architecture Support for Open protocol (SAML, openID, RESTful API) Accommodate both Cloud and On-premises Allow for exceptions and partially manual workflows Contractors, Service Accounts, Privileged Accounts

Page 25

How to do it (the Agile way) • Identify your MVP • Iterate • Keep communication flowing

Page 26

Agile PAM

Entitlement management BR Entitlement 1 Job Position

BR Entitlement 2

Assigned

BR Entitlement 3 Defines

Request

Approves Line Manager

Approves

Workflow 1

PRIVILEGED Entl

Workflow 2

Entitlement 5

Page 27

Automation

Page 28

• Automation is key to optimize the output of your workflows, you cannot afford to not do it • SOC Operations • Incident Mitigation • Identity Management

Page 29

• You need developers!

Page 30

• API vs Dashboards

Page 31

Agile and Security

SOC Platform Sandbox Ticketing system

Email

Network IDS

SIEM

End-Point Agents Logs

IM

Threat Intelligence FPC

Page 32

The human factor

Page 33

The Human Factor

1) You have to increase awareness to make sure your colleagues are not weaponized by the enemy 2) You need to involve them to maximize their buy-in 3) You need to lead by example

Page 34

The Human Factor

1) Establish a culture of mutual trust and respect 2) Communicate and look for feedback 3) Try to enforce your vision in your area of influence

Page 35

The Human Factor

• Phishing is one of the cheapest vector for attackers to attempt • Users must be trained according to their knowledge • High sensitive users must be given special attention • Phishing campaigns should be part of your Security Awareness Programme

Page 36

Phishing Exercise results driven targeted awareness Reported Did nothing Clicked Installed Page 37

Useful Metrics • Number of Security issues reported by colleagues • Time to report a phishing attack • End-point security events • RT exercises result

Page 38

Compliance

Page 39

Compliance

• Compliance != Security • Compliance usually is decontextualized and based on not current/wrong assumptions.

• It can be helpful to drive Security, especially to drive un-popular controls • If it’s finance driven it can be usually steered in an harmless way • Standard like ISO have been risk based for a long time, some auditors don’t know thou Page 40

Risk Management

Page 41

Agile Security

Risk Management • • • • • • • •

Align to business opportunities and risk, monitor the context Identify major risks and worst case scenarios Map controls to risks and monitor per risk expenditure Define your technical vision: Prevent VS Be Prepared Balance technical controls with non-technical Change metrics and level of details depending on the audience Aim for relevant and meaningful metrics Analyse historic data

Page 42

Board

Tech Leadership

Access Control Maturity Brand Reputation

Security Credentials Management Accounts Reconciliation Security Incidents

Audit Metrics Audit Logs

Page 43

Page 44

Thank you!

Security in Agile HiB Final 5 - HackInBo

What is Agile. Agile - Disclaimer. • Agile Manifesto. • Am I believer? • Iterative approach. • Short feedback. • Fail Fast. • Ready to Pivot. • No Dependencies. • Empowerment. Page 9 ... What is Agile. Fail Fast: Not suitable for everybody. Page 12 ... Security to become a customer advocate. • Work with Product Owners and ...

6MB Sizes 1 Downloads 195 Views

Recommend Documents

Data Security Model and Data Protection - HackInBo
Oct 29, 2016 - Credit Card Number DE_CCN. Tokenize. (expose first 6, last 4). Payments, CSR. 9 – 5,. M -F. EDW,. Hadoop. Unauthorized. Authorized. E-mail Address. DE_EMAIL. Tokenize All. HR, CSR,. DS_Haddop. EDW,. Hadoop. Unauthorized. Authorized.

HIB Officers.pdf
130 Old Tuckahoe Road Marmora, NJ 08223. 628-3500 ext. 2181 [email protected]. Page 1 of 1. HIB Officers.pdf. HIB Officers.pdf. Open. Extract.

go get my/vulnerabilities - HackInBo
Who. ○ ( Web|Mobile ) penetration tester. ○ Code reviewer. ○ Programmer. Roberto Clapis. @empijei. 2. Page 3. Go. ○ Google's language. ○ Born in 2007 (quite new). ○ Widespread. 3. Page 4. Cool, but how do I break it? 4. ○ Memory safety,

HIB-spanish.pdf
Whoops! There was a problem loading more pages. Retrying... HIB-spanish.pdf. HIB-spanish.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying ...

UTSD HIB Reporting Packet.pdf
Date: ______ Time: ______. Whoops! There was a problem loading this page. UTSD HIB Reporting Packet.pdf. UTSD HIB Reporting Packet.pdf. Open. Extract.

5.Security Alarm.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

5 steps to Agile success.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 5 steps to Agile ...

State HIB Scores.PDF
Jan 10, 2017 - 010-AUDUBON JUNIOR/SENIOR HIGH SCHOOL ................. 10 6 12 4 9 6 12 6 65. 040-HAVILAND AVENUE SCHOOL ............................ 10 6 12 4 9 6 12 6 65. 050-MANSION AVENUE SCHOOL ............................. 10 6 12 4 9 6 12 6 65

Alt Shot Final Results 5-5-18.pdf
GARRETT WALDRON. 3 Team 36 -6 66 ... Justin Platt. EVAN PLATT. 11 Team 5 +1 73 ... Main menu. Displaying Alt Shot Final Results 5-5-18.pdf. Page 1 of 3.

200808 final general overview francophone anglophone security ...
National security ... in former-Belgian colonies: DRC and Rwanda........................................................23. Police forces in francophone Africa . .... Police Forces . ..... 200808 final general overview francophone anglophone security

15-16 HIB Official Scores.pdf
15-16 HIB Official Scores.pdf. 15-16 HIB Official Scores.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying 15-16 HIB Official Scores.pdf. Page 1 of 1.

UTSD HIB Reporting Packet.pdf
525 Perry Road, Petersburg, NJ 08270. (609) 628-3500 ... Elementary School Anti-Bullying Specialist: Suzi Pashuck. Primary ... UTSD HIB Reporting Packet.pdf.

FINAL ANSWERKEY 5|l - SEB Exam
Dec 21, 2016 - 6. 5FJFU-4 lUZGFZ4 lCDF,I4VFZF;]Z v VF XaNMGM ;\7FGF SIF 5|SFZDF\ ;DFJ[X ... (A) 5}6" lJZFD (B) pNUFZ lRî (C) V

Final Project Report 5
This type of software development life cycle ... This type of lifecycle is very useful ...... http://www.csis.gvsu.edu/~heusserm/CS/CS641/FinalSpiralModel97.ppt ...

FINAL ANSWERKEY 5|l - SEB Exam
Dec 21, 2016 - 6. 5FJFU-4 lUZGFZ4 lCDF,I4VFZF;]Z v VF XaNMGM ;\7FGF SIF 5|SFZDF\ ;DFJ[X ... (A) 5}6" lJZFD (B) pNUFZ lRî (C) V

16-17 HIB Policy.pdf
Page 2 of 22. Page 3 of 22. 16-17 HIB Policy.pdf. 16-17 HIB Policy.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying 16-17 HIB Policy.pdf. Page 1 of ...

Catch me if you can! - HackInBo
Oct 29, 2016 - A real system (high-interaction honeyclient) or an emulated ... “The Document Object Model is a platform- and language-neutral interface that will allow .... dynamic analysis.. Symbols identification for later dynamic analysis. Easil

5.Security of Computer Networks.pdf
Download. Connect more apps... Try one of the apps below to open or edit this item. 5.Security of Computer Networks.pdf. 5.Security of Computer Networks.pdf.

978113372402Database security 5.pdf
Library of Congress Control Number: 2011930892. ISBN-13: 978-1-4354-5390-6. ISBN-10: 1-4354-5390-5. Course Technology. 20 Channel Center Street.

978113372402Database security 5.pdf
Page 3 of 45. Database Security. Alfred Basta and Melissa Zgola. Vice President, Editorial: Dave Garza. Director of Learning Solutions: Matthew Kane. Executive ...

5131.9 HIB EL 11062017.pdf
student(s)' education;. D. Severely or pervasively causes physical or emotional harm to a student(s);. E. Is motivated by any actual or perceived characteristic, such as race, color, religion,. ancestry, national origin, gender, sexual orientation, g