- Developers started it(!),
- Testers joined (automated testing done properly i.e, not recording mouse clicks),
- Infrastructure and Networking joined (IaaS and SDN),
- Middleware teams joined (e.g. Chef, Docker),
- …and the latter 3 even joined together to build platform applications (PaaS / PaaA).
Only Security teams are still gingerly sipping a drink on the edge of the dance floor and watching the others. Or perhaps waiting until the end of each song and shouting out complaints about anything making them unhappy.
So dance (code) Security teams… you’ll be fine and the party needs you.
Inspection does not improve the quality, nor guarantee quality. Inspection is too late. The quality, good or bad, is already in the product. As Harold F. Dodge said, “You can not inspect quality into a product.”
There are lots of neat ways Security teams can write code:
- Build-time checks on 3rd party dependencies e.g. the OWASP Dependency-Check Plugin or Black Duck (even legal departments may want to dance for that)
- Unit tests
- Static code analysis focused on security e.g. SonarQube
- Write runtime security checks (heck even do BDD and use something like Cucumber to capture malicious use cases).
- Penetration testing during a continuous delivery pipeline e.g. using OWASP ZAPP
- Many more opportunities I’m sure – feel free to add them as comments to this blog.
I’m not suggesting this idea is new, for example this document was from 2006. I just still don’t see evidence of enough of it.
So Security teams – if you haven’t already, it’s time to download an IDE!