Slide 1

Slide 1 text

Secure by Design Building secure and useable systems in a connected world Laura Bell F O U N D E R & L E A D C O N S U LTA N T S A F E S TAC K @ l a d y _ n e rd l a u r a @ s a fe s t a c k . i o

Slide 2

Slide 2 text

the world is a terrible place

Slide 3

Slide 3 text

the internet is a festering pool of toxic waste

Slide 4

Slide 4 text

No content

Slide 5

Slide 5 text

somebody probably wants to do bad things to your computer

Slide 6

Slide 6 text

the security situation is beyond hope

Slide 7

Slide 7 text

No content

Slide 8

Slide 8 text

we can build amazing things

Slide 9

Slide 9 text

No content

Slide 10

Slide 10 text

No content

Slide 11

Slide 11 text

No content

Slide 12

Slide 12 text

doing this securely is hard

Slide 13

Slide 13 text

developers and testers you can avoid common pitfalls. bring security to any dev/test environment

Slide 14

Slide 14 text

Security for everyone

Slide 15

Slide 15 text

No content

Slide 16

Slide 16 text

Security needs a hero

Slide 17

Slide 17 text

security is a team sport

Slide 18

Slide 18 text

Security is a tester superpower

Slide 19

Slide 19 text

security starts with education

Slide 20

Slide 20 text

Tools and Techniques

Slide 21

Slide 21 text

1. Requirements capture 2. Language 3. Design level security 4. Automation 5. Consistency

Slide 22

Slide 22 text

Requirements Capture

Slide 23

Slide 23 text

security starts with requirements

Slide 24

Slide 24 text

Forgotten Password Example Functional/Story requirements: User enters username on forgotten password page User receives link to reset password page Password is reset User can login to system

Slide 25

Slide 25 text

Forgotten Password Example Security requirements: Password reset link expires after 24 hours Password reset link is unique to password reset request Password reset link is complex and pseudo random Password reset link can only be used once Error messages on password reset form do not allow username or email enumeration

Slide 26

Slide 26 text

Language

Slide 27

Slide 27 text

Language creates barriers and divides

Slide 28

Slide 28 text

Get the language right Critical High Medium Low Informational False Positive

Slide 29

Slide 29 text

Security vulnerabilities hide behind acronyms, jargon and assumptions.

Slide 30

Slide 30 text

Design level security

Slide 31

Slide 31 text

Vulnerabilities cluster between components

Slide 32

Slide 32 text

Our environments are complex

Slide 33

Slide 33 text

Bad things happen when low risk security issues cluster together…..

Slide 34

Slide 34 text

Automation

Slide 35

Slide 35 text

Human error threatens testing effectiveness

Slide 36

Slide 36 text

Test data creation and scrubbing Test case definition Load testing Regression testing Integration testing Security testing Test environment deployment

Slide 37

Slide 37 text

Automated security testing gives a continuous assessment of risk.

Slide 38

Slide 38 text

Consistency

Slide 39

Slide 39 text

Don’t leave security to chance

Slide 40

Slide 40 text

All testers All stories All the time

Slide 41

Slide 41 text

1. Requirements capture 2. Language 3. Design level security 4. Automation 5. Consistency

Slide 42

Slide 42 text

Common Challenges

Slide 43

Slide 43 text

1. Avoid security theatre 2. Stop ignoring legacy code 3. Maintain momentum 4. Face your fear

Slide 44

Slide 44 text

Avoid security theatre

Slide 45

Slide 45 text

Dealing with a legacy

Slide 46

Slide 46 text

Aim for continuous steady improvement

Slide 47

Slide 47 text

It’s OK to be afraid

Slide 48

Slide 48 text

1. Avoid security theatre 2. Stop ignoring legacy code 3. Maintain momentum 4. Face your fear

Slide 49

Slide 49 text

developers and testers you can avoid common pitfalls. bring security to any dev/test environment

Slide 50

Slide 50 text

Questions? Laura Bell F O U N D E R & L E A D C O N S U LTA N T S A F E S TAC K @ l a d y _ n e rd l a u r a @ s a fe s t a c k . i o