Pushing Left, Like a Boss: Part 1

As originally published on my blog, SheHacksPurple.

In all of the talks and articles I have ever written and all the advice I have ever given, I am always telling people they should “push left”. When security people say they want to “shift left”, they are referring to the left side of the System Development Life Cycle (SDLC), which is the way software engineers describe the methodology or process for making software.

If you look at the image below, the further “left” you look, the earlier you are in the process. When we say we want to “push left”, we mean we want to start security at the very beginning and perform security in every step of the SDLC.

You might be reading this and thinking “Of course! Doesn’t everyone do that? It’s so obvious.” But from I’ve seen in industry, I have to tell you, it’s not obvious. And it’s definitely not what software developers are being taught in school.

As someone who was previously a web application penetration tester, I was generally asked to come in during either the testing phase, or after the product was already in production. At many places that I was hired I was also the very first person to look at the security of the application at all. When I was not the first person, often the person before me had been an auditor or compliance person, who had sent the developers a policy that was practically unreadable, generally unactionable, and often left the developers confused. As you can probably tell, I have not had productive experiences when interacting with compliance-focused security professionals.

Due to this situation, during engagements I looked AWESOME! I would always find a long list of things that were wrong. Not because I’m an incredibly talented hacker, but because no one else had looked. I seemed like a hero; swooping in at the last minute and saving the day. When in fact, coming in late meant the dev team didn’t have time to fix most of the problems I found, and that the ops team would have to scramble to try to patch servers or fix bad configs. They almost never had time to address all of the issues before the product went live, which means an insecure application went out on the internet.

As a security person, this is not a good experience. This is never the outcome I am hoping for. I want people releasing bulletproof apps.

You might be thinking: why are developers writing insecure code in the first place? Why can’t they just “make secure applications”? The answer is somewhat complicated, but bear with me.

One of the reasons is that most software development and engineering programs in university or college do not teach security at all. If they do, it’s often very short, and/or concentrates on enterprise security or network security, as opposed to the security of software (keeping in mind that they are learning how to make software, this should seem strange). Could you imagine if someone studied to become an electrician, and they were taught to twist the wires together and then push them directly into the wall? Skipping the step of wrapping them in electrical tape (safeguard #1) and then twisting a barrette around it (safeguard #2)? This is what is happening in universities and colleges all over the world, every day. They teach developers to write “Hello world” to the screen, but skip teaching them how to ensure the software that they are creating is safe to use.

Another reason we are having issues securing software is that traditional security teams have focused on enterprise security (locking down admin rights, ensuring you don’t click on phishing emails and that you reset your password every X number of days) and network security (ensuring we have a firewall and that servers are patched and have secure settings). Most people who work on security teams have a networking or system administrator background, meaning many of them don’t know how to code, and don’t have experience performing the formalized process of developing software. The result of this is that most people on a traditional security team don’t have the background to make them a good application security professional. I’m not saying it’s impossible for them to learn to become an AppSec person, but it would be quite a bit of work. More importantly, this means we have security teams full of people who don’t know what advice to give to a developer who is trying to create a secure application. This often leaves developers with very few resources as they try to accomplish the very difficult task of creating perfectly safe software.

The last reason that I will present here is that application security is HARD. When you go to the hardware store and buy a 2x4 that is 8 feet long, it should be the exact same no matter where you buy it. If you get instructions of how to build a shed, you know that each thing you buy to build it will be standardized. That is not so with software. When building software developers can (and should) use a framework to help them write their code, but each framework is changing all the time, and upgrading regularly can be tricky. On top of that, most apps contain many libraries and other 3rd party components, and often they contain vulnerabilities that users are unaware of (but still responsible for). Add to this the fact that every custom software application they build is a custom snowflake, meaning they can’t just copy what someone else made…. And all the while attackers are attacking websites constantly on the internet, all day, every day. This makes creating software that is secure a very difficult task.

With this in mind, I’m writing a series of blogs on the topic of “Pushing Left, Like a Boss”, which will outline what different types of application security activities exist that you could implement in your workplace, and what types of activities that developers can start doing themselves, right now, to start creating more secure code.

In part 2 of this series we will discuss Security Requirements.

Anthony Kempka

Innovate | Create | Collaborate

6 年

Spot on. It still amazes me how often software development (or more generally product development) does not take into account security at the start of the process. Baffling in today's world.

回复
Seth C.

Cybersecurity expertise for start-ups, entrepreneurs, small biz, and you | Cannabis, FinTech, Software, Healthcare, Retail

6 年

Great primer. I've spent the past year learning how software engineers think, and working on how I communicate concerns, so we meet in the middle and improve the security posture of our applications. Looking forward to part 2.

要查看或添加评论,请登录

Tanya Janca的更多文章

  • #SplunkConf23: Keynote Lessons

    #SplunkConf23: Keynote Lessons

    Hey there, fellow InfoSec-ers and IT professionals! How's it going? So, I recently (virtually) attended SplunkCon23…

  • Consulting on Canada’s Approach to Cyber Security

    Consulting on Canada’s Approach to Cyber Security

    You may not be aware but Canada’s Public Safety department put out a call to Canadian Citizens (sorry brilliant people…

    8 条评论
  • I want to talk about Log4j

    I want to talk about Log4j

    Lots of people are talking about how Log4J affects servers, but if you subscribe to this newsletter, you probably want…

    5 条评论
  • Application Security 101 Course Now Available for Pre-Registration

    Application Security 101 Course Now Available for Pre-Registration

    Our first course from SheHacksPurple.dev is now available for pre-registration, 'Application Security 101'.

  • #CyberMentoringMonday

    #CyberMentoringMonday

    Some people have been asking me online how to be a good mentor. Here are some thoughts for all of you.

    16 条评论
  • Promoting Yourself on Social Media

    Promoting Yourself on Social Media

    As originally published on my blog, SheHacksPurple. Many people who are aspiring to become a public speaker ask me how…

    9 条评论
  • Pushing Left, Like a Boss: Part 4?—?Secure Coding

    Pushing Left, Like a Boss: Part 4?—?Secure Coding

    As originally published on my blog, SheHacksPurple. In the previous article in this series we discussed secure design…

    2 条评论
  • Pushing Left, Like a Boss: Part 3— Secure Design

    Pushing Left, Like a Boss: Part 3— Secure Design

    As originally published on my blog, SheHacksPurple. In the previous article in this series we discussed security…

    1 条评论
  • Pushing Left, Like a Boss: Part 2?—?Security Requirements

    Pushing Left, Like a Boss: Part 2?—?Security Requirements

    As originally published on my blog, SheHacksPurple. In the previous article in this series we discussed why ensuring…

    1 条评论
  • Practice Makes Perfect: Comments on Public Speaking

    Practice Makes Perfect: Comments on Public Speaking

    As originally published on my blog, SheHacksPurple. Many people ask me about how to become a better speaker.

    1 条评论

社区洞察

其他会员也浏览了