Главная
Study mode:
on
1
Intro
2
Application Security Programs
3
Low Security Maturity
4
Medium Security Maturity
5
High Security Maturity
6
Application Security Team
7
Tactical and Strategic
8
Program vs No Program
9
Metrics
10
Starting from scratch
11
Existing models
12
BeSam vs Ideal State
13
Key Takeaways
14
Duo Security
15
The Big Takeaway
16
Team Values
17
Engineering
18
Low Friction
19
Paved Road
20
How Could It Go
21
No Code Left Behind
22
Security Maturity Model
23
Compliance
24
Efficiency
25
Community Content
26
Free Time
27
Microsoft SDL
28
Training
29
Security Services
30
Threat Modeling
31
Code audits
32
Security assessments
33
Security metrics
34
Functionally
35
QA
36
Office Hours
37
Intake Process
38
What do they need
39
TLDR
40
Kickoff Checklist
41
Hacking
42
Security Defects
43
Conclusion
Description:
Explore a conference talk from GrrCON 2017 that delves into the journey of realizing software security maturity, addressing both the challenges and benefits encountered along the way. Learn about the evolution of application security programs, from low to high maturity levels, and understand the importance of balancing tactical and strategic approaches. Discover key metrics, starting points, and existing models for implementing security programs. Gain insights into Duo Security's experiences, including their team values, engineering practices, and the concept of a "paved road" for security. Examine the Security Maturity Model, covering aspects such as compliance, efficiency, and community content. Investigate essential security services like threat modeling, code audits, and security assessments. Understand the significance of functional QA, office hours, and intake processes in maintaining security standards. Conclude with valuable takeaways on hacking, security defects, and the overall importance of a mature software security program. Read more

Realizing Software Security Maturity - The Growing Pains and Gains

Add to list