Original Post: Appsec Development: Keeping it all together at scale
Summary: Appsec Development at Scale
The article discusses the challenges and solutions in scaling application security (Appsec) within a rapidly growing startup, Snowflake. Initially, security reviews were centralized and handled by a single individual, leading to significant delays and backlog as project complexity grew. To address this, Snowflake adopted a scalable, distributed approach involving multiple strategies:
-
Challenges with Informal, Centralized Security Review:
- Over-reliance on one individual for security reviews.
- Resulting project delays and inconsistent documentation.
-
Initial Solutions: Formalizing Processes:
- Introduction of structured security review meetings.
- Implementation of custom Jira workflows and standardized templates.
- Peer reviews and source control for security documentation.
-
Scaling Through Security Partners:
- Adoption of the "Security Champions" model, where designated security-aware engineers (Security Partners) within each team took ownership of security processes.
- Transition of the security team to a facilitation role, enabling engineering teams to lead threat modeling and risk assessments.
-
Enhanced Risk Assessment and Threat Modeling:
- Creation of a risk assessment questionnaire to identify high-risk projects early on.
- Introduction of security impact assessments to quickly identify low-risk changes.
- Shift of risk assessment to the project planning phase to avoid impacting timelines.
- Keys to Successful Scaling:
- Trust and empowerment over centralization.
- High initial security standards to refine processes and avoid vulnerabilities.
- Continuous engagement and feedback from software engineers to improve security processes.
- Adoption of tools (e.g., SAST tools like Semgrep) to reduce cognitive load and detect code issues early.
- Creation of secure defaults to streamline future threat models.
Key Takeaways
- Effective Appsec scaling involves empowering software engineers rather than relying on a centralized approach.
- Establishing robust evidence collection and repeatable processes is crucial.
- Collaboration and continuous feedback from engineering teams are essential to create practical and efficient security processes.
- Simplify security reviews by integrating risk and impact assessments, and leveraging automated tools.
- Provide tools for predicting review timelines to aid in project planning.
Visuals Included
- Diagrams illustrating project backlogs and security review processes.
- Happy team photos symbolizing successful collaboration.
Go here to read the Original Post