Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Writing secure software and keeping it secure -...

Writing secure software and keeping it secure - Workshop

As we move towards architectures designed to cope with changing requirements, and eternal services that go live and iterate, how can we manage change in a secure way? How can we possibly build secure systems in this environment?

If you work in a governmental or regulated industry, then you’ll already be familiar with the hollow promises of accreditation. That’s commonly the thing left until the end, about the same time as the testing, and gives rise to the concept that security is the team that just says No.

What if it could be different? What if a service could be continually accredited, continually tested against a baseline of security tests, and that the team was able to own and manage the risk register?

In this tutorial, I will talk through how government is changing its approach to accreditation, to building secure services. We’ll cover things from continuous security testing through to living risk registers, team threat assessments, and security embracing the entire service design.

Michael Brunton-Spall

May 27, 2015
Tweet

More Decks by Michael Brunton-Spall

Other Decks in Technology

Transcript

  1. GDS Michael Brunton-Spall "FBI Fraud Scheme Zeus Trojan" by FBI.

    Licensed under Public Domain via Wikimedia Commons - http://commons.wikimedia.org/wiki/File:FBI_Fraud_Scheme_Zeus_Trojan.jpg
  2. GDS Michael Brunton-Spall As a fraudster, When I submit a

    fake claim for £1000, A payment for £1000 gets authorised