handling of security requirements in software … › karlsruhe › 2017 › sites...handling of...

36
HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE DANIEL KEFER, RENÉ REUTER

Upload: others

Post on 28-Jun-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

HANDLING OF SECURITYREQUIREMENTS IN SOFTWARE

DEVELOPMENT LIFECYCLEDANIEL KEFER, RENÉ REUTER

Page 2: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

@DKEFER

Page 3: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

@_ARES_SEC

Page 4: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

 

 

 

 

 

 

ISSUES

Page 5: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

REPEATING MISTAKES

Page 6: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

SECURITY DOCUMENTATION

Page 7: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

SECURITY BEHIND DEV PROCESSES ANDTOOLING

Page 8: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

 

 

 

 

 

 

APPROACH

Page 9: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

ALIGN THE PROCESS

Page 10: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

SCALE

Page 11: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

KISS

Page 12: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

SECURITYRAT

Page 13: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE
Page 14: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

USE CASESNew assets

Production assets

Page 15: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

 

 

 

 

 

 

DEMO

Page 16: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

 

 

 

 

 

 

INTERNALS

Page 17: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

Based on JHipster

Page 18: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

Requirement Skeletons

Page 19: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

Optional Columns

Page 20: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

Alternatives to Option Columns

Page 21: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

Status Columns

Page 22: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

Implementation Type

Page 23: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

Collections

Page 24: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

Tags

Page 25: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

AUTHENTICATIONOwn authentication scheme

CAS (Central Authentication Service)

Page 26: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

ROLESFrontend User

User

Admin

Page 27: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

JIRA INTEGRATIONCross Origin Request Sharing

SecurityRAT inherits user‘s rights in JIRA

Page 28: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

 

 

 

SECURITYCAT

Page 29: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE
Page 30: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE
Page 31: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE
Page 32: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE
Page 33: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

 

 

 

 

 

 

 

 

FUTURE PLANS

Page 34: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

SECURITYRAT 2.0https://github.com/SecurityRAT/SecurityRAT/wiki/Version-

2.0-Brainstorming

Page 35: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

COMMUNITYIssues

Pull requests

Derived projects

Page 36: HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE … › karlsruhe › 2017 › sites...HANDLING OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT LIFECYCLE ... KISS. SECURITYRAT. USE

THANK YOU FOR YOUR ATTENTION!https://securityrat.github.io

[email protected]

[email protected]