Description of session
The session considered how agile methodologies benefit the development lifecycle, and how security should and could be approached in the same, or a similar, way.
Outcomes/Deliverables
| SiA | AiS |
|---|
| Backlog | Backlog |
| Priorities | Priorities |
| Risk of not doing S | Not as such |
| Reacting to change | More strategic, less agile |
| Scaling is easy | Not scalable |
| Automation is easy | Difficult to automate |
| Continuous risk management and threat modelling |
| For SiA | For AiS |
|---|
| Playbooks with security requirements | Incident response |
| Sec requirements over Sec stories | Reserved points |
| Link discovery phase with analysis | ITIL (IT Infrastructure Library) |
| Educate Devs on Threat Modelling | Prioritize between reacting to incident vs. finishing the task |
| Security expectations known (ASVS) | |
| Triggers for checks before coding begins | |
| Decision for the right triggers based on predefined rules | |