Star 0

Abstract

This talk will introduce a new approach to SDL. At Twilio we call it End to End Security Engineering. It’s End-to-End because it covers the full product lifecycle, from Security Design to Monitoring and gives the ability to measure the state of security at each point.
 
The approach defines a ‘perfect secure system’ and produces metrics which tell us where we are relative to that perfect system.
 
The final state of the product’s security and risk depends on ‘collective understanding’ of threats and attacks as well as investments in building controls, tests and detections. Then we measure and adjust them to improve their effectiveness.
 
A perfect secure system is one for which:
- All products and features are threat modeled
- All possible attacks are identified
- All attacks are being monitored for
- All attacks are protected with controls
- All controls are covered with tests which check validity of implementation
- All controls are shown to be effective
 
To measure this we keep track of the following metrics:
- % of threat modeled products/features
- experience of threat modelers
- % of attacks being monitored
- % of attacks with implemented controls
- % of controls covered by full tests
- # of successful attacks
- # of prevented attacks after control has been put in place

Videos