Secure Software Development Infrastructure Case Study
ORGANIZATION
This organization was a well-established software development company that provided financial solutions.
The client employed 460+ IT and Software Development professionals. Their clients included high profile professional services, manufacturing companies, and government agencies who typically serviced clients in multiple industries.
The board of directors the and the executive team understood that based on their current business-critical need for their solutions and their client base, a high standard of cyber security needed to be maintained to ensure digital assets were always protected.
The board of directors and the executive team wanted to ensure that all software development followed best practices. The board of directors the and the executive team engaged CyberSecOp to review their entire development lifecycle with the following requirements:
· Protection of Intellectual Property
· Reduce potential for supply chain attacks
· Identify gaps in the current development lifecycle
CHALLENGE
With ongoing cyber-attacks against the financial industry, the client was concerned that this may cause widespread disruption and potential business interruption, which may affect software update releases. They need to deliver secure solutions without the risk of harm to their clients.
The client had identified risks in the development lifecycle in regard to Intellectual Property, since 20% of their development team works remotely using unmanaged workstation and servers.
APPROACH
CyberSecOp completed a DevOps Assessment to gain an understanding around the current DevOps approach, by looking at the following elements:
Process Review
Technology and automation
Measurement
Strategy and Flexibility
Secure Development Environment
Compromise Assessment
Report Gaps
Redesign Development Environment
PROCESS
CyberSecOp IT development and risk management team identified that risk to security was being considered at all stages of a project lifecycle, for a new system or changes to an existing system. CyberSecOp IT development also take into consideration the confidentiality, integrity, and availability at a minimum.
CyberSecOp team performed a full assessment of DevOps processes and tooling.
CyberSecOp utilize ISO Methodology ISO/IEC/IEEE 90003:2018 - Software engineering and ISO 27001 – Annex A.14: System Acquisition, Development & Maintenance.
KEY FINDINGS
No multi factor authentication was in place to access development environment
Malware was found on multiple systems
Development infrastructure was not air gapped and segregated based on development, test, and production.
Live data was used for testing and not sample data.
No centralized location for code validation
No validation for publicly available codes downloaded
Codes were not peer reviewed before production
Codes could be checked in remotely from unmanaged system without verification
Multiple cases of out of work schedule unauthorized remote access to software code via a developer’s workstation.
Multiple cases of open administrative sessions between various servers
SOLUTIONS
Provided gaps and recommendation
Road map and diagram proposed environment
Designed new development infrastructure
Create new VDI Environment (Segregated environment)
Implement security controls
Implement Jenkins (Slave and Master) and SVN plugin
Ensure that Jenkins securely authenticate with SVN using username and SSL certificate
Worked with the development team to configure Jenkins Pipeline to trigger polling via Subversion
Worked with the development team on checkout process.
View revision number variables
Technical documentation of DevOps environment
Develop security development lifecycle policy based on the process.