How to Build a Product Security Roadmap

Nucleus Security
16 Nov 202209:01

Summary

TLDRIn this episode of Nucleus Shortcuts, host Adam Dudley discusses the concept of product security with Anshuman, a seasoned information security professional. Anshuman, currently a principal security engineer at 30 Madison, shares insights on building a product security roadmap, emphasizing the importance of prioritization and collaboration with stakeholders. He outlines key areas such as vulnerability management, security partnerships, and tooling and operations, advocating for a multi-year strategic plan. Anshuman's advice on ruthless prioritization and leveraging small wins to enhance security culture is highlighted as crucial for a successful product security program.

Takeaways

  • 😀 Adam Dudley hosts the 'Nucleus Shortcuts' show, discussing product security and roadmaps for success with expert Anshuman.
  • 🔒 Anshuman has over a decade of experience in information security, working at companies like Atlassian, Intuit, and Dell, and is currently a principal security engineer at 30 Madison.
  • 🛡️ Product security is defined as a set of functions within an organization that ensures the protection of customer data and information against unauthorized access.
  • 📈 Anshuman emphasizes the importance of establishing a shared understanding of risks among stakeholders and the role of a product security engineer in addressing these risks.
  • 🚀 A product security roadmap is crucial for a successful product security program, helping to align stakeholders and prioritize security initiatives.
  • 🔑 The product security function is divided into three major categories: vulnerability management, security partnerships, and security tooling and operations.
  • 🔍 Vulnerability management focuses on dealing with discovered vulnerabilities, while security partnerships involve working closely with engineering teams to integrate security into the development lifecycle.
  • 🛠️ Security tooling and operations involve deploying security scanners and ensuring the collection of valuable data to drive continuous improvement in security measures.
  • 📝 A roadmap should be a multi-year plan, prioritizing smaller tactical projects that contribute to the overall strategic goals of improving the organization's security posture.
  • 🤝 Anshuman suggests the term 'work streams' to describe the collaborative efforts of individuals representing various functions within an organization working towards a common project.
  • 🌟 The key takeaway from the conversation is the importance of ruthless prioritization, thoughtful planning, and leveraging small wins to improve security strategy and culture.

Q & A

  • What is the main topic of the 'Nucleus Shortcuts' episode featuring Anshuman?

    -The main topic of the episode is product security and how to build a roadmap for success in this domain.

  • What is Anshuman's professional background according to the transcript?

    -Anshuman is an information security professional with over a decade of experience. He has worked as a principal security engineer at 30 Madison, a healthcare company, and has also worked for major companies like Atlassian, Intuit, and Dell.

  • What does Anshuman believe in with respect to the security community?

    -Anshuman believes in giving back to the security community. He has open-sourced several security tools and is a strong advocate for innovation and solving challenging security problems using new technologies and automation.

  • How does Anshuman define product security in today's modern enterprise?

    -Anshuman defines product security as a function within an organization that establishes processes and activities to set up tooling and security scanners to ensure that customer data or information handled by the company's products is protected against unauthorized access by malicious actors.

  • What are the three major categories that Anshuman suggests dividing the overall product security function into?

    -The three major categories are vulnerability management, security partnerships, and security tooling and operations.

  • What is the significance of having a shared understanding of risks among stakeholders in a product security program?

    -A shared understanding of risks is crucial for a founding product security engineer to align different stakeholders on what the organization faces and how the product security engineer plans to address these risks in a prioritized order.

  • What does Anshuman mean by 'work streams' in the context of product security?

    -Work streams, as described by Anshuman, refer to teams of individuals representing different functions within an organization working towards a common project or goal, which in this case is improving product security.

  • What advice does Anshuman give for successfully building a product security program?

    -Anshuman advises not to get overwhelmed, to practice ruthless prioritization, and to bring all stakeholders along on the journey for a successful product security program.

  • How does Anshuman suggest leveraging smaller wins to improve overall security strategy and culture?

    -Anshuman suggests being thoughtful about what to do and when, using smaller wins to progressively enhance the security posture of the organization and its culture.

  • Where can interested individuals find more information about Anshuman's work and thoughts on product security?

    -People can visit Anshuman's blog at anshumanbartia.com, follow him on Twitter at @anshuman_bh, or email him for collaboration and sharing ideas.

  • What is the key takeaway Anshuman wants people to have from the conversation about product security?

    -The key takeaway is the importance of ruthless prioritization and including all stakeholders in the journey to build a successful product security program.

Outlines

00:00

🛡️ Introduction to Product Security

In the first paragraph, the host Adam Dudley introduces the topic of product security and welcomes Anshuman, an experienced information security professional, to the show. Anshuman discusses his extensive background in the field, having worked for major companies like Atlassian, Intuit, and Dell, and his commitment to innovation and open-source contributions. He provides a high-level definition of product security, emphasizing its role in protecting customer data and information from unauthorized access. The paragraph also touches on the broader scope of product security, which includes application security and cloud infrastructure security, and the importance of establishing a comprehensive security program.

05:02

📈 Building a Product Security Roadmap

The second paragraph delves into the importance of having a product security roadmap and the challenges faced by a founding product security engineer in a new organization. It highlights the need for stakeholders to have a shared understanding of risks and the steps to address them. The paragraph outlines three major categories for building a product security function: vulnerability management, security partnerships, and security tooling and operations. It also suggests dividing the roadmap into a multi-year plan, focusing on tactical projects that contribute to the strategic security posture improvement. Anshuman emphasizes the significance of ruthless prioritization and collaboration with stakeholders to ensure the success of the product security program. The paragraph concludes with a call to action for listeners to visit Anshuman's blog and social media for more insights and a final piece of advice on the importance of prioritization and leveraging small wins for overall security strategy enhancement.

Mindmap

Keywords

💡Product Security

Product security refers to the set of practices and measures taken to ensure that a company's products protect customer data and information from unauthorized access by malicious actors. It is a central theme of the video, as it discusses how to establish processes and activities to secure products throughout their lifecycle. The script mentions product security in the context of setting up tooling and security scanners.

💡Information Security Professional

An information security professional is an expert in the field of cybersecurity, responsible for the protection of information from unauthorized access, use, disclosure, disruption, modification, or destruction. In the script, the guest, Anshuman, is introduced as an information security professional with over a decade of experience, emphasizing his expertise in the subject matter.

💡Principal Security Engineer

A principal security engineer is a senior role in an organization, typically responsible for overseeing and enhancing the security measures of the company's products and infrastructure. Anshuman's current position at 30 Madison, a healthcare company, is mentioned as a principal security engineer, indicating his leadership in the field.

💡Application Security

Application security is a branch of cybersecurity focused on protecting software applications from threats. It is a subset of product security, as highlighted in the script, where securing applications is one aspect, but the broader scope includes their deployment on cloud infrastructure.

💡Cloud Infrastructure

Cloud infrastructure refers to the hardware and software resources made available over the internet to offer on-demand computing services. In the context of the video, cloud infrastructure like AWS, Google Cloud, and Azure is discussed as part of the product security domain, emphasizing the need to secure applications deployed on these platforms.

💡Vulnerability Management

Vulnerability management is the process of identifying, assessing, and mitigating vulnerabilities in systems and applications. The script discusses this as one of the three major categories of the product security function, highlighting the importance of dealing with discovered vulnerabilities effectively.

💡Security Partnerships

Security partnerships involve working closely with engineering counterparts to integrate security into the development lifecycle. The script mentions this as a key category in building a product security roadmap, emphasizing the importance of collaboration and integration for a successful security program.

💡Security Tooling and Operations

Security tooling and operations encompass the deployment and management of security scanners and programs that collect data to drive continuous improvement in security. The script describes this as a critical component of the product security roadmap, focusing on the operational aspects of security practices.

💡Roadmap

A roadmap in the context of the video refers to a strategic plan outlining the steps and initiatives to achieve product security goals. The script discusses the importance of having a roadmap to guide the prioritization of security projects and ensure alignment with the organization's security posture.

💡Ruthless Prioritization

Ruthless prioritization is a concept mentioned in the script as a key strategy for managing the demands and resources in product security. It involves making tough decisions on which security initiatives to focus on to achieve the most significant impact, as emphasized by the guest's advice for building a successful security program.

💡Stakeholders

Stakeholders in the video are the various parties with an interest in the organization's product security, such as VPs, engineering teams, and other departments. The script discusses the importance of engaging stakeholders in understanding risks and the product security engineer's role in addressing them.

Highlights

Adam Dudley introduces the topic of product security and its importance in modern enterprises.

Anshuman, an information security professional with over a decade of experience, shares his expertise on product security.

Anshuman's background includes working with major companies like Atlassian, Intuit, and Dell, and his focus on application and product security.

The definition of product security is discussed, emphasizing the protection of customer data against unauthorized access.

Product security is distinguished from application security, highlighting the broader scope of securing applications and cloud infrastructure.

Anshuman emphasizes the importance of establishing a shared understanding of risks among stakeholders in a product security program.

The concept of a product security roadmap is introduced as a strategic approach to building a successful security program.

Three major categories of the product security function are identified: vulnerability management, security partnerships, and security tooling and operations.

The necessity of prioritizing and executing tactical projects within the overall strategic roadmap is discussed.

Anshuman suggests dividing the roadmap into a multi-year plan based on resources and priorities.

The idea of 'work streams' is introduced to represent cross-functional teams working on specific projects within the organization.

The importance of ruthless prioritization in managing the demands of doing more with less is highlighted.

Anshuman's blog and Twitter handle are shared for further insights and collaboration.

The final recommendation emphasizes thoughtfulness in security strategy, leveraging small wins for overall improvement.

The phrase 'ruthless prioritization' is coined as the key takeaway for effectively managing a product security program.

The episode concludes with thanks to Anshuman for his valuable insights on building a product security roadmap.

Transcripts

play00:00

[Music]

play00:03

hello and welcome back to nucleus

play00:05

shortcuts I'm your host Adam Dudley and

play00:07

our topic today is what is product

play00:09

security and how to build a roadmap for

play00:12

Success so today's expert on the topic

play00:14

is anshuman uh he is an information

play00:17

security professional of over a decade

play00:19

he's currently a principal security

play00:21

engineer at 30 Madison which is a

play00:23

Healthcare company and he's worked for

play00:26

some pretty big names atlassian Intuit

play00:29

and Dell as well and this is his first

play00:31

time on the shows I've been in this

play00:34

industry for about 13 14 years now and

play00:36

I've worked in both big Enterprises and

play00:40

smaller companies as well application

play00:42

and product security is something that

play00:44

I've been doing pretty much all my

play00:46

career and over the years I've also had

play00:50

the opportunity to look into other

play00:53

domains like infrastructure security

play00:54

automation uh incident response so I I

play00:57

feel very fortunate to have those

play01:00

opportunities during my career and you

play01:03

know I believe in giving back to the

play01:05

community I have open sourced a few

play01:07

tools security tools and I really

play01:10

believe in Innovation and solving some

play01:12

challenging security problems using some

play01:15

of the new technologies and automation

play01:17

could you give us just a a very brief

play01:20

definition you know how do you define

play01:21

product security what does that look

play01:23

like in today's modern Enterprise

play01:25

product security you can think of it uh

play01:27

it's a plague of function within an

play01:31

organization that allows uh you know you

play01:35

do establish processes activities like

play01:37

setup tooling security scanners what not

play01:41

to ensure that the customer data data or

play01:44

information that the company's products

play01:46

either store process or transfer is a

play01:50

protected against unauthorized access by

play01:53

malicious actors like that's a very high

play01:56

level overview of how we can think about

play01:59

it uh product security can uh you know

play02:03

contain things like application security

play02:05

which is more focused on just

play02:07

applications but I know folks use both

play02:09

the terms interchangeably securing

play02:11

applications is one thing but then how

play02:13

do you deploy those applications on the

play02:16

cloud infrastructure like these is it so

play02:18

it's all about Cloud right like right

play02:20

right AWS Google Cloud Azure right so uh

play02:24

apart from securing the application uh

play02:27

you know the deployment piece also I

play02:30

believe false under product security

play02:31

okay

play02:33

you want to make sure the product is

play02:35

from the point where it's committed like

play02:37

when the code gets committed to the

play02:39

point where it's actually deployed so

play02:41

the entire life cycle so getting into

play02:42

the meat of our topic and the article I

play02:45

read on your blog that inspired me to

play02:46

invite you here to shortcuts is you

play02:49

wrote an article about a product

play02:50

security roadmap and I learned a lot in

play02:52

that article and so you know first of

play02:55

all why does this matter you know in the

play02:57

context of having a successful product

play02:59

security program hasn't been you know

play03:01

you join

play03:02

um you know like the first part security

play03:04

engineer uh we are onboarded onto an

play03:07

organization you have different

play03:08

stakeholders that you're supposed to

play03:10

work with right these might be your VPS

play03:13

or different engineering organizations

play03:15

these might be your EMS right supporting

play03:18

different smaller teams engineering

play03:19

teams so it's really important as a

play03:22

founding product security engineer to

play03:25

have your stakeholders come to a shared

play03:28

understanding of what the risks are that

play03:30

your organization faces and what are the

play03:33

product security engineer you suppose

play03:34

you're planning to do to address them

play03:37

and in what order right so a uh making

play03:40

sure everybody is speaking the same

play03:42

language when it comes to the risk and

play03:45

then B making sure uh there's like a

play03:48

good understanding of how how to address

play03:51

it and how to prioritize what so now in

play03:53

Broad Strokes how does one go about

play03:55

building a product security roadmap I

play03:57

think of the overall product security

play03:59

function being broadly divided into

play04:01

three major categories uh first one is

play04:03

vulnerability management or how do you

play04:07

deal with vulnerabilities that you

play04:08

discover right second is security

play04:10

Partnerships or in other words you know

play04:13

how how do you make sure you are working

play04:17

with your engineering counterparts and

play04:19

integrating Security in the hdlc so

play04:21

those kind of relationships Partnerships

play04:23

there are different activities projects

play04:25

you can do underneath that so that all

play04:27

falls under this the third is security

play04:30

tooling and operations this basically

play04:32

contains you know uh deploying your

play04:34

scanners uh making sure you know any

play04:39

programs that you run

play04:41

you are collecting valuable data from

play04:45

them to make sure that you make

play04:46

continuous continuous progress things of

play04:49

that nature

play04:51

um and so like I said each of these

play04:52

categories will have a bunch of

play04:55

activities projects that you could be

play04:57

doing underneath them it's really

play04:59

important to highlight that uh you can't

play05:01

be doing everything together at once you

play05:04

know so you should really be thinking

play05:05

about splitting the overall roadmap into

play05:08

a multi-year plan can be a three year

play05:10

Prime can be a five year plan really

play05:12

depends on the resources and the

play05:13

priorities and and this roadmap the way

play05:17

you divide it it's really about working

play05:19

on smaller tactical projects in a

play05:22

prioritized order which eventually

play05:24

contributes towards uh overall strategic

play05:27

roadmap of how you go about improving

play05:30

the security posture of the organization

play05:31

got it got it so you mentioned three

play05:33

buckets there you have your VM security

play05:35

Partnerships and security tooling and uh

play05:39

for me what came up also is you know I

play05:42

think contained in all those buckets is

play05:44

the classic people process and

play05:46

Technology right okay areas of concerns

play05:50

um and then once you have that road map

play05:51

then you're building out those tactical

play05:53

projects uh and prioritizing them to

play05:56

make sure you're making progress on the

play05:57

longer term road map right right yes

play06:00

exactly now in your article you called

play06:02

these uh work streams I think which yeah

play06:04

I kind of like that word

play06:06

um you know your workflows a lot work

play06:08

streams I I like and that's an

play06:11

interesting way to break out I guess

play06:14

categories of work

play06:16

yeah like if you think about it in other

play06:18

words right like again uh based on my

play06:21

experience

play06:22

um the the places where I've heard work

play06:25

stream being uses so for let's say uh

play06:27

there's there's a big project right that

play06:30

that your company is undertaking and it

play06:32

impacts pretty much all the

play06:34

organizations within that right so it

play06:37

can be HR can be legal it can be

play06:38

engineering can be advertising sales

play06:40

marketing whatever right so really what

play06:43

you need is a team of individuals that

play06:46

represent each one of these functions

play06:48

right and they're working towards this

play06:51

project so you can think of it like a

play06:53

work stream where you don't necessarily

play06:56

have the entire teams working with you

play06:58

but your individuals representing those

play07:00

teams so I think yeah work stream is a

play07:03

good way to sort of make make that sense

play07:05

before we wrap up Angela would you

play07:08

please tell people where they can go to

play07:10

check out your blog and learn more about

play07:12

the stuff you're writing about

play07:13

yeah sure thing uh you can uh check out

play07:17

my blog on anshumanbartia.com that's

play07:20

just my first name last name.com uh you

play07:23

can also follow me on Twitter I'm uh

play07:26

available at lunch one underscore BH

play07:28

yeah and you know you can feel free to

play07:31

email me I'm more than happy to

play07:33

collaborate share ideas that's great

play07:36

well we'll link to the article that

play07:37

inspired this uh this episode so people

play07:40

can take a look at that and I just want

play07:42

you to thank you for coming on uh today

play07:44

I know you're very busy guy in the

play07:46

security World

play07:47

um this is excellent and um you know the

play07:50

the last thing I want to ask like in

play07:52

your view is there one most important

play07:54

thing you'd like folks to walk away with

play07:55

from this conversation

play07:57

yeah sure thing so I think you know

play08:00

since we are talking about like uh

play08:02

product security and how to get started

play08:05

and how to build a program I think not

play08:07

getting overwhelmed and being able to

play08:09

ruthlessly prioritize I I like that word

play08:11

ruthless prioritization and then

play08:13

bringing along everybody else with you

play08:15

on the journey like all your

play08:17

stakeholders is probably the most

play08:19

important important thing you can be

play08:21

doing in order to be successful at it

play08:23

right and then just being very

play08:25

thoughtful about what to do and when and

play08:27

how to uh leverage smaller wins in

play08:31

improving the overall security strategy

play08:33

and and the culture that goes a long way

play08:35

so that would be my recommendation yeah

play08:38

thank you and I love that phrase

play08:39

ruthless prioritization I'm going to

play08:41

call that the phrase of the episode here

play08:43

uh you have to do it right because

play08:46

there's there's always the demand to do

play08:48

more with less and we need to make real

play08:51

progress see you again soon on the next

play08:52

nuclear shortcuts thanks anjuman sounds

play08:55

good thank you so much for having me

play08:57

[Music]

Rate This

5.0 / 5 (0 votes)

Связанные теги
Product SecurityCybersecurityExpert InsightsSecurity EngineerVulnerability ManagementSecurity PartnershipsSecurity ToolingRisk AssessmentRoadmap BuildingIndustry Best Practices
Вам нужно краткое изложение на английском?