{"id":12293,"date":"2019-11-21T07:30:49","date_gmt":"2019-11-21T12:30:49","guid":{"rendered":"http:\/\/www.analystik.ca\/blogue\/?p=12293"},"modified":"2019-11-19T09:43:42","modified_gmt":"2019-11-19T14:43:42","slug":"security-and-enterprise-agility-constraints-and-solutions","status":"publish","type":"post","link":"https:\/\/analystik.ca\/blogue\/language\/en\/security-and-enterprise-agility-constraints-and-solutions\/","title":{"rendered":"Security and Enterprise Agility: Constraints and Solutions"},"content":{"rendered":"<p>Security and Enterprise Agility do not usually go hand in hand. Also, the impact of security and compliance on Agility in today&rsquo;s technological environment, which requires many companies to take such measures to ensure the integrity of their operations and preserve data confidentiality, should not be underestimated.<\/p>\n<p>Definitely, the constraints that certain security and compliance measures impose suggest that Security and Enterprise Agility can hardly go hand in hand.<\/p>\n<p><span style=\"font-weight: 400;\">But, no matter how many developers there are in your organization, it is possible to do <a href=\"http:\/\/www.analystik.ca\/blogue\/perception-software-development-performance-management-style\/\">software development in Agile mode<\/a>. Hundreds of writings praise the merits of this <a href=\"http:\/\/www.analystik.ca\/blogue\/perception-software-development-performance-management-style\/\">development methodology<\/a>, so here are some of the most important points:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Better match between deliverables and needs;<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Minimize the risk of slippage by splitting the project into \u00ab\u00a0sprints\u00a0\u00bb and these into \u00ab\u00a0tasks\u00a0\u00bb of short duration;<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Better communication between the various project stakeholders;<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Emphasis is placed on identifying and categorizing the functionalities that will have the most added value for the organization;<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 In the \u00ab\u00a0cost, time, functionality\u00a0\u00bb trilogy, the challenge is to develop as many of the most important features as possible in the time allocated, even if it means removing features, unlike the Waterfall mode, which emphasizes features, all features, even if it means exceeding them over time.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-11743\" src=\"http:\/\/www.analystik.ca\/blogue\/wp-content\/uploads\/2017\/10\/stylegestion-en-1024x412.jpg\" alt=\"Plan Management vs Value Management\" width=\"680\" height=\"274\" srcset=\"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2017\/10\/stylegestion-en-1024x412.jpg 1024w, https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2017\/10\/stylegestion-en-300x121.jpg 300w, https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2017\/10\/stylegestion-en-768x309.jpg 768w, https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2017\/10\/stylegestion-en.jpg 1915w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">The purpose of this post is not to describe the Agile development method or even to try to convince you to use it because most IT projects are now in Agile mode.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The interest of this post is to discuss the relevance of this development method when in your organization or at your customer&rsquo;s premises, security and compliance take precedence.<\/span><\/p>\n<p>Our concern is rather: what happens to Enterprise Agility with the integration of security and compliance measures?\u00a0 \u00a0Can Security and Enterprise Agility coexist?\u00a0 \u00a0How are Agile practices and processes affected?<\/p>\n<p><span style=\"font-weight: 400;\">First, let us describe the impacts that these new priorities are having:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 More stakeholders and levels of stakeholders involved<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 More rigorous, more demanding tests<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Longer production start-up times<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Higher production start-up costs<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 More complex environment<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 A tenfold increase in documentation<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2><em><strong>Let us clarify these new constraints in the context of Security and Enterprise Agility :<\/strong><\/em><\/h2>\n<h2><span style=\"font-weight: 300;\">1. \u00a0 \u00a0 \u00a0 More stakeholders and levels of stakeholders involved<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">&#8211; In a more controlled environment, the developer may still have the task of writing test scripts, but it is certain that he will not be responsible for the tests.\u00a0 This responsibility will be given to the Quality Control team and the tests will probably be performed in another environment to which developers do not have access<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; Similarly, deployments of the test and production versions will have been performed by another team or by other users<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; As for the content of the version, the deployment team or even another team will be responsible for ensuring that the version of the deployed application does not contain any subprograms or APIs that are not approved by the organization&rsquo;s software environment team.\u00a0 The versions of these subprograms and APIs must be validated<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; We don&rsquo;t want infiltration into our environment.\u00a0 One of the above teams is also responsible for ensuring that robot software has scanned the code to ensure that it is of high quality and hermetic against any hacking attempts such as \u00ab\u00a0SQL injection\u00a0\u00bb or \u00ab\u00a0HTML injection<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 300;\">2. \u00a0 \u00a0 \u00a0 More rigorous, more demanding tests<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">&#8211; In an organization where security and compliance are paramount, depending on the criticality level of the application, testing is the nexus of war.\u00a0 Would you be willing to bank with your financial institution&rsquo;s application if you had only the shadow of a doubt that it is not honest?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; There is a wide gap between a bank transaction application and an application used by only a few users of the organization and whose impact of a temporary shutdown would be relatively minimal.\u00a0 The quality and quantity of tests will be adapted to the criticality level of the application to be put into production.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 300;\">3. \u00a0 \u00a0 \u00a0 Longer production schedules and 4. Higher production start-up costs<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">&#8211; It is certain that the two previous points have a major impact on production lead times and costs<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; In fact, the impact is so great that even with sprint periods of around 3 weeks, production start-ups will often take place every quarter<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; Obviously if we consider the number of stakeholders involved, the number of tests and the number of validations required for a production launch, we understand that the number of man-days required will be significant&#8230; and the costs too!<\/span><\/p>\n<h2><span style=\"font-weight: 300;\">5. \u00a0 \u00a0 \u00a0 More complex environment<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">&#8211; The previous points explain how a production deployment can be complex, how many stakeholders can be involved.\u00a0 It must be understood that a good number of tools will also be required to support all these operations. Please note that our objective is not to advertise some of the products mentioned below, the objective is only to name a product that is often a leader in the field.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">First for the tests, several stakeholders and perhaps several teams will be involved.\u00a0 It therefore takes a communication tool between these stakeholders to list the bugs, describe them, track them, assign them a status, etc.\u00a0 In many organizations, Hewlett Packard&rsquo;s product, ALM (Application Life Cycle Management), is used. Also, a local firm that specializes in software quality has also developed a great tool that integrates all test operations into a single platform: Askida CT.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Above, we have indicated that a robot must scan the code to ensure, among other things, that there is no code allowing \u00ab\u00a0SQL \/ HTML injections\u00a0\u00bb.\u00a0 Depending on the size of the organization, this work will be given externally or otherwise, a product such as Fortify will be used.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">We also want to ensure that the application we want to deploy complies with the organization&rsquo;s standards and rules.\u00a0 The number of these standards and rules can be staggering; again, it takes a tool to help us in this task, a tool like SD Elements.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 300;\">6. \u00a0 \u00a0 \u00a0 Much more documentation<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">&#8211; Compliance and documentation go hand in hand.\u00a0 We do not want a \u00ab\u00a0people centric\u00a0\u00bb organization where the organization&rsquo;s business intelligence is in people&rsquo;s heads. We want a \u00ab\u00a0process centric\u00a0\u00bb organization where the quality of processes allows to grow, to grow quickly and safely.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; A good process is a documented process with up-to-date documentation<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 300;\">Conclusion<\/span><\/h2>\n<p>In this post, we understand that in a technological context calling for Security and Enterprise Agility co-existence, the impact on IT developments mainly, for an organization where security and compliance prevail, can be significant.\u00a0 Is it always worth using an Agile development methodology when the organization&rsquo;s processes are not?<\/p>\n<p><span style=\"font-weight: 400;\">In my opinion yes&#8230; but by adapting to the constraints of the organization and understanding that there is a trade-off between Security and Enterprise Agility.<\/span><\/p>\n<p>The benefits of Enterprise Agility listed at the beginning of this post (<a href=\"http:\/\/www.analystik.ca\/blogue\/perception-software-development-performance-management-style\/\">and in our 2 previous posts<\/a>) remain.\u00a0 To adapt to the constraints of a \u00ab\u00a0Safety &amp; Compliance\u00a0\u00bb oriented organization, I propose to adopt the following directives:<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Maintain relatively short sprint lengths<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Add a test environment that could be called \u00ab\u00a0PILOT TEST\u00a0\u00bb.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Form a pilot group with whom we work more closely and whose objective is to validate that the deliverables of a sprint correspond to business needs and requirements<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Compile a version at the end of each sprint (or almost) in order to be able to make a demo of the sprint to our pilot group and for them to comment on the deliverables<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Be sure to properly manage the different source code branches because when the business goes into production to release a version, it will be necessary to make corrections and modifications to code that is several weeks old and therefore it will not be necessary to include developments that have started since.<\/span><\/li>\n<\/ul>\n<p>And does the Agile Enterprise become inaccessible in such a security and compliance context?\u00a0 Let&rsquo;s say that the path to Enterprise Agility will be longer&#8230; much longer for these companies!<\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Security and Enterprise Agility do not usually go hand in hand. Also, the impact of security and compliance on Agility in today&rsquo;s technological environment, which requires many companies to take such measures to ensure the integrity of their operations and preserve data confidentiality, should not be underestimated. Definitely, the constraints that certain security and compliance&#8230;  <a class=\"excerpt-read-more\" href=\"https:\/\/analystik.ca\/blogue\/language\/en\/security-and-enterprise-agility-constraints-and-solutions\/\" title=\"Read Security and Enterprise Agility: Constraints and Solutions\">Read more &raquo;<\/a><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":10,"featured_media":12305,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"Security and Enterprise Agility do not mix well, but the current technological context calls for security and compliance measures","_seopress_robots_index":"","content-type":"","footnotes":""},"categories":[3421,3567],"tags":[5289,3264,5395,5287],"better_featured_image":{"id":12305,"alt_text":"","caption":"","description":"S\u00e9curit\u00e9 et Agilit\u00e9","media_type":"image","media_details":{"width":2880,"height":1620,"file":"2019\/11\/security.jpg","sizes":{"thumbnail":{"file":"security-63x63.jpg","width":63,"height":63,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security-63x63.jpg"},"medium":{"file":"security-300x169.jpg","width":300,"height":169,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security-300x169.jpg"},"medium_large":{"file":"security-768x432.jpg","width":768,"height":432,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security-768x432.jpg"},"large":{"file":"security-1024x576.jpg","width":1024,"height":576,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security-1024x576.jpg"},"bones-thumb-2880":{"file":"security-2880x1620.jpg","width":2880,"height":1620,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security-2880x1620.jpg"},"bones-thumb-1920":{"file":"security-1920x1271.jpg","width":1920,"height":1271,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security-1920x1271.jpg"},"bones-thumb-1536":{"file":"security-1536x1016.jpg","width":1536,"height":1016,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security-1536x1016.jpg"},"bones-thumb-960":{"file":"security-960x635.jpg","width":960,"height":635,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security-960x635.jpg"},"bones-thumb-600":{"file":"security-600x397.jpg","width":600,"height":397,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security-600x397.jpg"},"bones-thumb-300":{"file":"security-300x199.jpg","width":300,"height":199,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security-300x199.jpg"},"post-thumbnail":{"file":"security-125x125.jpg","width":125,"height":125,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security-125x125.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":null,"source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/11\/security.jpg"},"_links":{"self":[{"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/posts\/12293"}],"collection":[{"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/comments?post=12293"}],"version-history":[{"count":6,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/posts\/12293\/revisions"}],"predecessor-version":[{"id":12314,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/posts\/12293\/revisions\/12314"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/media\/12305"}],"wp:attachment":[{"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/media?parent=12293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/categories?post=12293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/tags?post=12293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}