Book description
Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren’t up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development.
Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them.
You’ll learn how to:
- Add security practices to each stage of your existing development lifecycle
- Integrate security with planning, requirements, design, and at the code level
- Include security testing as part of your team’s effort to deliver working software in each release
- Implement regulatory compliance in an agile or DevOps environment
- Build an effective security program through a culture of empathy, openness, transparency, and collaboration
Publisher resources
Table of contents
- Preface
- 1. Getting Started with Security
- 2. Agile Enablers
- 3. Welcome to the Agile Revolution
- 4. Working with Your Existing Agile Life Cycle
-
5. Security and Requirements
- Dealing with Security in Requirements
- Agile Requirements: Telling Stories
- Tracking and Managing Stories: The Backlog
- Dealing with Bugs
- Getting Security into Requirements
- Security Personas and Anti-Personas
- Attacker Stories: Put Your Black Hat On
- Attack Trees
- Infrastructure and Operations Requirements
- Key Takeaways
- 6. Agile Vulnerability Management
- 7. Risk for Agile Teams
-
8. Threat Assessments and Understanding Attacks
- Understanding Threats: Paranoia and Reality
- Your Systemâs Attack Surface
-
Agile Threat Modeling
- Understanding Trust and Trust Boundaries
- Building Your Threat Model
- âGood Enoughâ Is Good Enough
- Thinking Like an Attacker
- STRIDE: A Structured Model to Understand Attackers
- Incremental Threat Modeling and Risk Assessments
- Assess Risks Up Front
- Review Threats as the Design Changes
- Getting Value Out of Threat Modeling
- Common Attack Vectors
- Key Takeaways
- 9. Building Secure and Usable Systems
-
10. Code Review for Security
- Why Do We Need to Review Code?
- Types of Code Reviews
- Peer Code Reviews
- When Should You Review Code?
- How to Review Code
- Who Needs to Review Code?
- Automated Code Reviews
- Code Review Challenges and Limitations
- Adopting Secure Code Reviews
- Reviewing Security Features and Controls
- Reviewing Code for Insider Threats
- Key Takeaways
-
11. Agile Security Testing
- How Is Testing Done in Agile?
- If You Got Bugs, Youâll Get Pwned
- The Agile Test Pyramid
- Unit Testing and TDD
- Service-Level Testing and BDD Tools
- Acceptance Testing
- Functional Security Testing and Scanning
- Testing Your Infrastructure
- Creating an Automated Build and Test Pipeline
- A Place for Manual Testing in Agile
- How Do You Make Security Testing Work in Agile and DevOps?
- Key Takeaways
-
12. External Reviews, Testing, and Advice
- Why Do We Need External Reviews?
- Vulnerability Assessment
- Penetration Testing
- Red Teaming
- Bug Bounties
- Configuration Review
- Secure Code Audit
- Crypto Audit
- Choosing an External Firm
-
Getting Your Moneyâs Worth
- Donât Waste Their Time
- Challenge the Findings
- Insist on Results That Work for You
- Put Results into Context
- Include the Engineering Team
- Measure Improvement Over Time
- Hold Review/Retrospective/Sharing Events and Share the Results
- Spread Remediation Across Teams to Maximize Knowledge Transfer
- Rotate Firms or Swap Testers over Time
- Key Takeaways
- 13. Operations and OpSec
- 14. Compliance
- 15. Security Culture
- 16. What Does Agile Security Mean?
- Index
Product information
- Title: Agile Application Security
- Author(s):
- Release date: September 2017
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491938799
You might also like
book
Microservices Security in Action
Unlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. …
book
Practical Vulnerability Management
Bugs: they’re everywhere. Software, firmware, hardware — they all have them. Bugs even live in the …
book
API Security in Action
A web API is an efficient way to communicate with an application or service. However, this …
book
Web Application Security, 2nd Edition
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of …