You are a software developer or engineering leader in a typical internet product or service company. You have web, mobile, or native apps for different platforms, and your backends run in the cloud. You embrace test-driven development, rapid iterations, infrastructure as code, continuous delivery, and monitoring.
But what about security? Someday your users, your clients, or your CEO will ask this question. Maybe there is another breach in the news. Or someone has sent you a vulnerability report to security@yourcompany.com. Waitdo you even have security@yourcompany.com mailbox?
In a big enterprise, someone takes care of security for you. In a growing product internet company, you must implement it from scratch.
In this talk, Ill show how to begin focusing on practical things that worked for us at Grammarly. We will talk about:
How much security is enough?
When to build a security team and how to establish roles and structure.
Working with external consulting and penetration testers.
How to launch a bug bounty program and make the most of it.
How a security team interacts with development teams in a non-blocking way.
What if your DevOps (or NoOps) teams release features and experiments multiple times per day?
Infrastructure, tools, monitoring, and automation for DevSecOps.
1 of 73
More Related Content
Building a Security Program at Grammarly - XP Days 2019
1. Building a Security Program
at Grammarly
Dima Tiagulskyi - Software Engineer, Security Team
70. Early Life
https://twitter.com/badthingsdaily
https://enterprise.verizon.com/resources/reports/dbir/
https://krebsonsecurity.com/
https://www.loopio.com/blog/respond-security-questionnaires-3
Bug Bounty
https://danielmiessler.com/study/security-assessment-types/
https://hackerone.com/grammarly
https://www.bugcrowd.com/
https://hackerone.com/dropbox
https://securitytxt.org/
References
71. References
Jurassic CorpSec
Building Identity for an Open Perimeter
https://www.gartner.com/reviews/market/access-management
https://support.1password.com/create-share-vaults/
https://aws.amazon.com/blogs/aws/built-in-authentication-in-alb/
Protecting Endpoints
https://www.jamf.com/
https://en.wikipedia.org/wiki/Endpoint_Detection_and_Response
Configure an external recipient warning
Security Team
https://about.gitlab.com/handbook/engineering/security/#security-department
https://www.owasp.org/index.php/OWASP_SAMM_Project
https://www.cisecurity.org/controls/cis-controls-list/
72. Incident Detection and Response
https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/AuroraMySQL.Auditing.html
https://www.dmtf.org/standards/cadf
https://aws.amazon.com/products/security/
https://www.sumologic.com/security/
https://www.cisecurity.org/cis-benchmarks/
Infrastructure
https://aws.amazon.com/organizations/
https://aws.amazon.com/controltower/
https://aws.amazon.com/blogs/compute/refreshing-an-amazon-ecs-container-instance-cluster-with-a-new-ami/
Abuse Research and Infrastructure
https://www.troyhunt.com/
https://elie.net/
References