DTA's ethical hackers at work
The Digital Transformation Agency (DTA) is taking a customised approach to security testing, operating a team of ethical hackers working within an agile environment.
In a blog post, DTA ethical hacker Stephen Bradshaw has detailed how the agency modified the standard practices used in security testing to better fit within an agile rather than waterfall environment.
Many traditional approaches to security testing are better suited to the latter environment, involving larger, more infrequent releases. This typically involves conducting testing with every new release, Bradshaw said.
To adapt to the DTA’s agile environment of smaller frequent releases, the ethical hacking team considers a variety of factors before initiating a test, including a particular project milestone being hit, time passing between tests, significant changes being made to the project code or at the request of a project team member.
While normally security testers are only available after development is complete, at the DTA developers and security testers also work together to try to catch security issues early in the development process.
This collaboration also makes the reporting of vulnerabilities more efficient, while granting testers easy access to source code repositories provides opportunities for automated checks.
“Ethical Hackers in the DTA are generally not formally assigned to the projects they work on. This is in contrast to the way most other technical staff in the DTA work. They instead sit within their own ‘secops’ team and work with projects on an as-needed basis,” Bradshaw added.
“This requires balancing the schedules of the team, and of each project they support. The culture at the DTA facilitates this approach.”
Half of government agencies falling short on email security measures: report
Lack of consistency across Australian Government bodies leaves critical vulnerabilities in the...
CISA and Microsoft warn of “active attacks” on SharePoint
Alerts have been published active attacks exploiting a remote code execution vulnerability in...
NSW Government agencies have ineffective cybersecurity controls: report
The Audit Office of New South Wales has found that NSW Government agencies still have minimal...