Is agile's inattention to security to blame for software vulnerabilities?

 

Connecting state and local government leaders

To protect evolving technologies, agile framework developers must refine and evolve their playbooks to incorporate security best practices.

Organizations across the globe are rapidly adopting agile frameworks for managing and implementing software systems. Agile frameworks like the Scaled Agile Framework (SAFe), Scrum, Kanban and many others are popular, with industry reports indicating more than 70% of organizations are now using agile approaches for managing projects. However, daily headlines point to cybersecurity breaches, website vulnerabilities and data loss issues. Do the agile frameworks commonly used by industry share some blame for the lack of security in systems?

A quick search on the SAFe website does not show even a single reference to the word “security” in the core tenets and principles of systems design and implementation. Further, reviewing the roles and responsibilities of key positions associated with agile development like product managers and product owners likewise does not return a single reference to security as a core responsibility. In an age where accountability for cybersecurity is increasingly a boardroom issue, it is important that security not be considered a non-functional requirement without adequate management oversight. The need for security in digital systems must be a core tenet, and key personnel should be held accountable for ensuring those requirements flow through the agile systems development lifecycle.

This issue is especially important for the federal government, which spends over $90 billion on IT. The President's Management Agenda and the Centers of Excellence drive modernization using artificial intelligence, big data and cloud services to improve efficiency and customer experiences. Given that innovative technology solutions come from industry, it is critical that we harden the supply chain and make sure we raise the bar for software and system security.

Numerous interviews with digital systems developers and managers from non-profits, health care and financial services companies demonstrate that security is an afterthought and continues to be a bolted-on feature. Industry by and large still does not consider security a core design principle. Key personnel responsible for product management such as product managers, product owners and architects do not have adequate training or accountability for building secure systems. Nor do they consider security is a core responsibility. Most believe that security is the responsibility of the “security team” and can be solved by simply hiring a chief information security officer.  They often create a separate security organization headed by a CISO who has neither the mandate nor the resources to drive deeper organizational transformation. This current approach is highly reactive, designed to resolve issues based on scans conducted by external security teams instead of being proactive and baking security requirements into the design itself.

Persistent security issues with commercial software and systems become readily evident when companies apply for authority to operate from the Federal Risk and Authorization Management Program. Simple requirements like multifactor authentication, strong password rules, data encryption at rest and in motion are often lacking in commercial systems. This requires expensive remediation and compensatory controls delaying the ATO process.

What if requirements based on globally accepted best security standards like the National Institute of Standards and Technology SP 800-53 or ISO 27001 were a core tenet of systems development and product owners had an obligation to incorporate them? Wouldn’t we get more secure systems as a result? As former DOD CIO Terry Halvorsen said many years ago, it is not a matter of industry developing special requirements for DOD but instead for government and industry together to raise the national bar and have some common security standards.

The goal of this piece is not pick on a specific framework or methodology but to help raise awareness and drive evolutionary transformation toward secure digital systems. Agile frameworks have been hugely successful in helping deliver software systems faster while meeting customer requirements with superior results over traditional waterfall methodologies.

There is hope on the horizon.

During a panel discussion at the recent Trend Micro Directions 2019 conference, a speaker from Vonage described how the security team got greater cooperation from the product owner when the application team hired an application security engineer. This helped streamline communications between the product owner and the security team to help ensure that security issues were acknowledged and addressed. This example is telling. Security cannot be a bolt-on feature that is sole responsibility of the security group. Security culture must be baked into the core systems design and development process, and the only sustainable way to drive security awareness is to assign responsibility and accountability at the beginning of the development lifecycle. This can be done by hardening commonly used systems development frameworks. Key personnel associated with systems development such as product owners and product managers must have a line item in their job description to “deliver a secure system.”

The government relies heavily on commercial software systems, cloud services and new solutions like AI, big data and robotic process automation among others to improve citizen services. Many of these new systems will be developed with agile methodologies, and all will require strong security features. Perhaps it is time that government, nonprofits and industry organizations help agile framework developers refine and evolve their playbooks to incorporate security best practices.

NEXT STORY: HHS wraps up blockchain CDM test

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.