Security workflows for DevOps teams with IriusRisk
Threat Modeling and defining security requirements is just step one on the journey to building a secure system. The threat model should really inform all downstream security activities, including implementation and testing. But all too often, the model is used only during design and then becomes less and less relevant as the project progresses. This is sometimes simply due to a mismatch in tooling: the Threat Model is documented in a spreadsheet, document or other file based system – and that doesn’t travel well when developers are using issue tracker to manage requirements or automated tests to verify that they’ve been implemented.
IriusRisk is firstly a risk and requirements automation tool but for the generated model to be effective and useful for the project team it offers integration with issue trackers, automated testing and security testing tools. A threat model that’s out of date or doesn’t accurately reflect the current risk quickly loses it’s value. The diagram below illustrates a typical security workflow:
1. The security or development team creates a new product definition on IriusRisk by answering a questionnaire. The questionnaire as well as the fields that can be stored are customizable by administrative users.
2. IriusRisk creates a threat model based on the responses to the questionnaire and it’s own internal library of risk patterns. The generated model contains Risks, Weaknesses (linked to CWE) and Countermeasures. Some of the countermeasures are created as recommendations, and others as Requirements. (The security team can optionally review and edit this model before uploading the requirements to an issue tracker)
3. Developers and Operations teams will see the newly created tickets representing the security requirements on their issue tracker. They treat these as they would any other requirements and can mark them as Implemented, or Rejected. Additionally, they can choose to include the new tickets and estimate the effort required as part of their normal sprint planning.
4. IriusRisk polls the issue trackers every 5 minutes and updates the status of the Countermeasure with the status of the ticket. If the ticket has been marked as resolved or implemented, then IriusRisk will do the same for the Countermeasure in its risk model. And it will then reduce the risk rating of the risk associated with that countermeasure:
5. Run security tests against the application or source code. These could be in the form of unit tests such as are provided by BDD-Security, other Cucumber, JUnit tests or scanning results from OWASP ZAP or HP Fortify. The tests can be executed as part of the continuous build or deploy process and the results uploaded to IriusRisk through the API.
6. IriusRisk will then evaluate the test result may adjust the risk rating again. If the risk rating was reduced due to a countermeasure being marked as Implemented, but the test result indicates that a weakness still exists – then IriusRisk will increase the risk rating back to its original value. In addition it can automatically create a new ticket on the issue tracker that represents this new vulnerability:
Since the model has an established relationship between Countermeasures and Weaknesses, the newly created ticket can reflect this so that the dev/ops team understands that the two tickets are related:
Should the test status change in a subsequent test run, IriusRisk will update the ticket and can also be configured to automatically close the ticket once the test passes.
This workflow was designed to cause minimal impact to the DevOps teams. They can continue to use their existing issue tracker to plan work and resolve incidents, while the security team can use IriusRisk to orchestrate the security process and manage risk as the project progresses. The near real-time integration between IriusRisk and the issue trackers and testing tools allows the security team to stay up to date on the current risk – and to provide feedback to the DevOps teams about newly identified issues or new security requirements.
If you’d like a demo of IriusRisk please contact our sales team.
Did you like this article?
- Adam Shostack joins Continuum Security’s board14 May 2018We at Continuum Security are absolutely delighted to announce that Adam Shostack has joined our Advisory Board. Adam brings with him considerable experience and wealth of knowledge that dovetails perfectly with Continuum Security’s mission to bring security into the software design & development process through threat modeling. Whilst at Microsoft, Adam was the lead designer […]READ MORE
- Building GDPR compliant software with IriusRisk27 March 2018The EU General Data Protection Regulation (GDPR) comes into effect on the 4th May 2018 and has wide ranging implications for any company anywhere that processes the personal data of EU citizens. A lot has been written about how GDPR applies at the organisation level, and what general controls should be in place to comply with […]READ MORE
- Schedule a meeting with us at RSA to discuss #EasyThreatModeling21 March 2018The Continuum Security team will be at RSA in San Francisco to answer all your threat modeling and DevSecOps questions. Threat Modeling is often seen as a complex activity that can only be performed by skilled security analysts who have to invest significant time and energy into producing a useful threat model and its corresponding […]READ MORE