Shift Left(er)

December 7, 2022

A Case for Governance in The Secure Software Development Lifecycle

Shooting billiards is all angles and vectors. It’s a fascinating process in where we begin with the end in mind and work backwards. Corner pocket, eight ball, the cue ball banked off the side railing. You calculate the shot and your stick strikes the cue ball at just the right angle and pace.

 

You can watch the shot unfold, just like you planned, complete with all the rewarding sights, sounds and feels of a perfectly executed shot. Or, you can haphazardly strike a cue ball and see, if by complete random chance, you strike any other ball on the table and maybe get it close to a pocket. This is how I typically play.

 

Such is securing the software development lifecycle (SDLC) for most of us.

 

What we should be doing is seeing the end from the beginning and planning our security activities accordingly. But, we end up with randomly struck balls scattering around the table and a tear in the felt from our cue stick. That way, there’s plenty of action, but not a lot of meaningful progress.

 

Luckily, there’s a way to stop haphazardly implementing security tools and policies with the best of intentions. To end up with a more secure SDLC, and as a result more secure software, we need to shift left(er).

 

 

To The Left, To The Left

In any of the traditional SDLC models when we say, “shift left,” what do you think of? Coding? Design? Security requirements? These are all common answers and certainly are “left”, or early in the SDLC. Implementing security tools and measures at the beginning is certainly an improvement from just having them in a dedicated testing phase, which is further “right” in the SDLC.

 

Image
tl-blog-ssdl-waterfall-project-management-agile-100.jpg

 

But these implementations aren’t left enough. We need to shift further left, beyond refined code, great design and solid security requirements.

 

How far left? We need to leave the confines of the traditional SDLC into enterprise-level activities that involve everyone from engineers to executives. This is known within the OWASP SAMM framework as Governance.

 

Image
tl-blog-ssdl-owasp-100.jpg

 

According to OWASP, Governance as a function “focuses on the processes and activities related to how an organization manages overall software development activities. Specifically, this includes concerns that impact cross-functional groups involved in development, as well as business processes established at the organization level.” We include personnel up to C-level, as well as policies, standards and strategies at the enterprise level.

 

I’ll dive deeper into each area in future posts of this series, but like a beautifully executed combo shot that buries the ball in a side pocket, here’s the type of magic that happens when we focus our security activities left.

 

 

Strategy: Create and Promote

There are many different tools, tactics and practices that come along with application security. More are flooding the market as you read this. Without a well thought out goal and strategy, you might end up spending a lot of time and money on security but end up with misaligned tools and tactics that don’t work well together.

 

Begin with a gap analysis of the current security posture within your SDLC. From that analysis, you should decide on goals for application security and a roadmap to get there. With a well-defined strategy and roadmap you can be more efficient and effective with your time and money and see sizeable returns.

 

Later in this blog series you can discover ways to build a scalable strategy in an iterative fashion that will have your efforts neatly aligned. An example of what elements might appear in a strategy document may include:

 

  • Mission or vision statement: To articulate in a few sentences what the high-level goal for information or application security will be three to five years into the future and how those align with larger company goals.
  • Values statement: How the above goal is achieved can take many forms. A values statement will make sure that achievement is aligned with company values.
  • Goals: Clearly state the goals for the next three to five years and the action steps needed to complete them. Consider including additional information, like a more detailed timeline, RACI and any prerequisites or next steps.

 

 

Training and Awareness

With a clear strategy in place, it’s time to equip everyone associated with software development with knowledge and guidance to execute the plan. Improving general security awareness across your enterprise is a great start. Those directly involved with application development need better, more targeted training.

 

What more mature organizations are implementing is a two-layered solution.

 

In the first layer, everyone involved in the SDLC, from project managers to engineers to incident management, has application security specific training. Think OWASP Top 10, secure design concepts and application security principles at a high level.

 

The second layer takes the broad topics above and drills down even further to provide trainings specific to certain roles within your SDLC. Developers receive secure code training specific to the languages they code in. Testers receive training on the tools they use.

 

 

Organization and Culture

As necessary as strategy may be, the old adage goes, “culture eats strategy for breakfast”. Many organizations draft a plan, assign training for their personnel and then cross their fingers, hoping the results will come. Making an intentional investment in building a security culture within your SDLC may seem like an uphill march. But there are simple, subversive and wildly effective tactics to transform the concept of application security from a nuisance into a seamlessly integrated part of your SDLC.

 

When implementing Governance practices, a little goes a long way. In the following posts of this series, I’ll deliver some practical steps to implementing strategy, training and culture solutions within your SDLC.

 

Just like billiards, the slightest of changes to how we strike the cue ball, in angle, pace or both, will have a dramatic effect on the results. A degree or two in angle, a pound or two more of pressure will greatly change the outcome of our shot. Likewise, decide to iteratively shift left(er) towards a Governance-focused SDLC based on this series and enjoy the wonderful feeling of burying that eight ball in the corner pocket.

Brendon Collins
Senior Security Consultant | Optiv
Brendon Collins is a Senior Consultant for Threat Management Services at Optiv. Brendon’s expertise is in strategic design and implementation of Application Security Programs. He is a subject matter expert in the securing the software development lifecycle and in OWASP’s Software Assurance Maturity Model. In his decade’s worth of experience in cyber security, Brendon has worked with a variety of organizations, from start-ups to Fortune 500 companies.

Optiv Security: Secure greatness.®

Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?