{"id":1471,"date":"2014-09-05T14:53:48","date_gmt":"2014-09-05T14:53:48","guid":{"rendered":"https:\/\/blogs.gov.scot\/digital\/?p=1471"},"modified":"2017-07-20T09:19:35","modified_gmt":"2017-07-20T09:19:35","slug":"security-within-agile-environments","status":"publish","type":"post","link":"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/","title":{"rendered":"Security within agile environments"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\"><i>This is a post by Neil Campbell, our Information Security Officer and is part of our series on <\/i><span class=\"s2\"><i>Standards &amp; Guidelines<\/i><\/span><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Security within agile environments can be challenging. There\u2019s a need to juggle a large number of competing factors including velocity, compliance requirements, ambitions around user experience and adherence to standards \u2013 all while maintaining the flexibility\u00a0required to deliver a\u00a0great product for our users.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">We thought about best practice in relation to security, and for risk, balancing these so we had something\u00a0we could work with. Risk in the <a href=\"https:\/\/alpha.mygov.scot\/\"><span class=\"s2\">mygov.scot<\/span><\/a> programme is being used to balance complex and at times competing factors, allowing us to have a well rounded response.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">As part of our risk management we are looking to ensure that the landscape people make decisions in is current. Security decisions should be reviewed, ensuring the service remains appropriately secure.<\/span><!--more--><\/p>\n<p class=\"p4\"><span class=\"s1\"><b>Our mechanisms for managing risk<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">We have a number of mechanisms in place for managing risk, specifically in relation to security.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Identification<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Risk identification this should be performed by all team members, stakeholders and any external 3rd parties. Subject matter expertise should be provided to quantify the risk.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Communication<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">it\u2019s important the management of security risks be<b>\u00a0<\/b>integrated into the wider management of risks within\u00a0programme. This will allow a balanced view of these\u00a0risks along side others including\u00a0usability, cost and delivery. Use different risk categories to facilitate discussions with the most appropriate\u00a0audience. Typical audiences include scrum teams, security stakeholders and technical architect.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Evaluation<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">At this point the<b>\u00a0<\/b>team, technical architect and information asset owner level evaluations should\u00a0take place. These confirm the acceptable target level for the risks and identify those that are currently an unacceptable level, which will then require mitigation or elimination.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Mitigation controls<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Once the risks have been identified as requiring mitigation or elimination, then solutions can be proposed, designed, evaluated and implemented to reposition the risk to an acceptable level.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><b>Our security models<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">In order to obtain and maintain a shared understanding of the security landscape of\u00a0<a href=\"https:\/\/alpha.mygov.scot\/\"><span class=\"s2\">mygov.scot<\/span><\/a>, we made use of a number of publicly available models that would meet our needs.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Security governance model<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">This identifies the security stakeholder both within and out with the programme, ensuring a clear understanding exists of whom is responsible.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Security stakeholder map, analysis, models and communication plan<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">These documents identify roles, their influence, any associated concerns, what information to share with them and the best ways to communicate\u00a0and keep them up to date.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Data architecture<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The cornerstone of any security is the data within the service. Security decision need to take into account the implications for the\u00a0actual data.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Security design<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">A high level view is important to help us understand what security controls are implemented and by whom. We have multiple teams working alongside 3rd party suppliers on a daily basis, so getting this right is critical. This enabled people\u00a0to understand discrepancies in thinking, which could then be addressed to form a\u00a0more complete view with those involved.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Security framework<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Our\u00a0<a href=\"https:\/\/alpha.mygov.scot\/\"><span class=\"s2\">mygov.scot<\/span><\/a>\u00a0implementation utilises the <a href=\"https:\/\/en.wikipedia.org\/wiki\/ISO\/IEC_27001:2013\"><span class=\"s2\">ISO 270001 <\/span><\/a>baseline control set. It has been set as the security framework of choice, providing the detailed design information regarding security controls delivered for our programme.\u00a0This also covers internal and external assessment.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><b>Options for integrating security<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Integration with sprint planning<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The security design draft allows for a baseline to be set. Teams can then ask themselves the question \u2013 \u201cDo we need to deviate from the security design in this sprint?\u201d.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">If a deviation is required it is possible to correct this through:<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\">Updating the security design draft to reflect any new information or decisions made, in turn reflecting them in the risk register<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">The addition of items to the backlog, correcting any temporary deviation\u00a0through future sprints<\/span><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"s1\">In our\u00a0alpha this allowed us the flexibility to compensate for a lack of formal operating procedures in early sprints with peer review and a close working team. This also allowed for the information asset owner to accept the higher risk of not using intrusion detection in all environments for the alpha.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Integration with retrospectives<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Integrating with retrospectives allows teams to answer \u00a0\u2013 \u201cDid we need to deviate from the draft security design in that sprint?\u201d.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">It is then possible to identify how to correct a temporary deviation or to record a permanent change. This gave us the flexibility to deliver manual server builds while scripted builds were being developed, with additional stories in the backlog to rebuild the manually built services through\u00a0automated processes when available.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><b>Implementing security controls<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Still with us? Then the final piece of the puzzle is the implementation of security controls in your environment. These can be implemented through:<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><b><\/b><span class=\"s1\"><b>Technology<\/b>\u00a0\u2013 such as firewalls or source repository version control<\/span><\/li>\n<li class=\"li1\"><b><\/b><span class=\"s1\"><b>Procedural <\/b>\u00a0\u2013 such security quality attributes and penetration testing<\/span><\/li>\n<li class=\"li1\"><b><\/b><span class=\"s1\"><b>Policy<\/b>\u00a0\u2013 such as those for data protection<\/span><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"s1\">Security and agile, they need not be polar opposites. Any recommended best practice should always be shaped for\u00a0your environment. This helps to make things work smoothly, so keep that in mind when planning your own approach!<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>We\u2019ll be sharing this post and more on social, so follow the team via <\/i><a href=\"https:\/\/twitter.com\/mygovscot\"><span class=\"s2\"><i>@mygovscot<\/i><\/span><\/a><i> on Twitter for more updates. Have a comment? Let us know below!<\/i><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a post by Neil Campbell, our Information Security Officer and is part of our series on Standards &amp; Guidelines Security within agile environments can be challenging. There\u2019s a need to juggle a large number of competing factors including velocity, compliance requirements, ambitions around user experience and adherence to standards \u2013 all while maintaining&#8230;<\/p>\n","protected":false},"author":224,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,10],"tags":[73,70],"class_list":["post-1471","post","type-post","status-publish","format-standard","hentry","category-digital-public-services","category-mygov-scot","tag-standards-guidelines","tag-technology-digital-architecture"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security within agile environments - Digital<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security within agile environments - Digital\" \/>\n<meta property=\"og:description\" content=\"This is a post by Neil Campbell, our Information Security Officer and is part of our series on Standards &amp; Guidelines Security within agile environments can be challenging. There\u2019s a need to juggle a large number of competing factors including velocity, compliance requirements, ambitions around user experience and adherence to standards \u2013 all while maintaining...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-05T14:53:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-07-20T09:19:35+00:00\" \/>\n<meta name=\"author\" content=\"Jono Ellis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jono Ellis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/\"},\"author\":{\"name\":\"Jono Ellis\",\"@id\":\"https:\/\/blogs.gov.scot\/digital\/#\/schema\/person\/ee4d9f144db1f0c55b7d4f1118dfeeb6\"},\"headline\":\"Security within agile environments\",\"datePublished\":\"2014-09-05T14:53:48+00:00\",\"dateModified\":\"2017-07-20T09:19:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/\"},\"wordCount\":874,\"commentCount\":0,\"keywords\":[\"Standards &amp; Guidelines\",\"Technology &amp; Digital Architecture\"],\"articleSection\":[\"Digital Public Services\",\"mygov.scot\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/\",\"url\":\"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/\",\"name\":\"Security within agile environments - Digital\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.gov.scot\/digital\/#website\"},\"datePublished\":\"2014-09-05T14:53:48+00:00\",\"dateModified\":\"2017-07-20T09:19:35+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.gov.scot\/digital\/#\/schema\/person\/ee4d9f144db1f0c55b7d4f1118dfeeb6\"},\"breadcrumb\":{\"@id\":\"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blogs.gov.scot\/digital\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security within agile environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.gov.scot\/digital\/#website\",\"url\":\"https:\/\/blogs.gov.scot\/digital\/\",\"name\":\"Digital\",\"description\":\"Updates from the Scottish Government&#039;s Digital Directorate\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.gov.scot\/digital\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.gov.scot\/digital\/#\/schema\/person\/ee4d9f144db1f0c55b7d4f1118dfeeb6\",\"name\":\"Jono Ellis\",\"description\":\"Performance Manager for the MyGov programme.\",\"sameAs\":[\"https:\/\/www.twitter.com\/jonoellis\"],\"url\":\"https:\/\/blogs.gov.scot\/digital\/author\/jonoellis\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security within agile environments - Digital","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/","og_locale":"en_GB","og_type":"article","og_title":"Security within agile environments - Digital","og_description":"This is a post by Neil Campbell, our Information Security Officer and is part of our series on Standards &amp; Guidelines Security within agile environments can be challenging. There\u2019s a need to juggle a large number of competing factors including velocity, compliance requirements, ambitions around user experience and adherence to standards \u2013 all while maintaining...","og_url":"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/","og_site_name":"Digital","article_published_time":"2014-09-05T14:53:48+00:00","article_modified_time":"2017-07-20T09:19:35+00:00","author":"Jono Ellis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jono Ellis","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/#article","isPartOf":{"@id":"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/"},"author":{"name":"Jono Ellis","@id":"https:\/\/blogs.gov.scot\/digital\/#\/schema\/person\/ee4d9f144db1f0c55b7d4f1118dfeeb6"},"headline":"Security within agile environments","datePublished":"2014-09-05T14:53:48+00:00","dateModified":"2017-07-20T09:19:35+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/"},"wordCount":874,"commentCount":0,"keywords":["Standards &amp; Guidelines","Technology &amp; Digital Architecture"],"articleSection":["Digital Public Services","mygov.scot"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/","url":"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/","name":"Security within agile environments - Digital","isPartOf":{"@id":"https:\/\/blogs.gov.scot\/digital\/#website"},"datePublished":"2014-09-05T14:53:48+00:00","dateModified":"2017-07-20T09:19:35+00:00","author":{"@id":"https:\/\/blogs.gov.scot\/digital\/#\/schema\/person\/ee4d9f144db1f0c55b7d4f1118dfeeb6"},"breadcrumb":{"@id":"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.gov.scot\/digital\/2014\/09\/05\/security-within-agile-environments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.gov.scot\/digital\/"},{"@type":"ListItem","position":2,"name":"Security within agile environments"}]},{"@type":"WebSite","@id":"https:\/\/blogs.gov.scot\/digital\/#website","url":"https:\/\/blogs.gov.scot\/digital\/","name":"Digital","description":"Updates from the Scottish Government&#039;s Digital Directorate","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.gov.scot\/digital\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/blogs.gov.scot\/digital\/#\/schema\/person\/ee4d9f144db1f0c55b7d4f1118dfeeb6","name":"Jono Ellis","description":"Performance Manager for the MyGov programme.","sameAs":["https:\/\/www.twitter.com\/jonoellis"],"url":"https:\/\/blogs.gov.scot\/digital\/author\/jonoellis\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.gov.scot\/digital\/wp-json\/wp\/v2\/posts\/1471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.gov.scot\/digital\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.gov.scot\/digital\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.gov.scot\/digital\/wp-json\/wp\/v2\/users\/224"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.gov.scot\/digital\/wp-json\/wp\/v2\/comments?post=1471"}],"version-history":[{"count":0,"href":"https:\/\/blogs.gov.scot\/digital\/wp-json\/wp\/v2\/posts\/1471\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.gov.scot\/digital\/wp-json\/wp\/v2\/media?parent=1471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.gov.scot\/digital\/wp-json\/wp\/v2\/categories?post=1471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.gov.scot\/digital\/wp-json\/wp\/v2\/tags?post=1471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}