Agile DevelopmentArticlesC2 Fall 2021Data SecurityData Solutions Balancing Agility with Data Security by Thomas Gloerfeld September 21, 2021 written by Thomas Gloerfeld September 21, 2021 Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and functionality to be available in the product on a regular basis. As opposed to the traditional, slower forms of software development, with releases methodically planned and executed over many months or even years, Agile keeps the focus on speed, user feedback, and iterative refinement. [vc_row][vc_column][vc_video link=”https://youtu.be/rjh5I2Zt_HQ” align=”center”][vc_column_text] Security as a business enabler Security is often perceived as slamming on the brakes, or saying “no.” These delays are typically focused on ensuring a vulnerability or risk does not get introduced into the product, introducing potential attack vectors downstream. Unfortunately, Agile development has been used as an excuse to bypass these types of controls. Now, this is obviously not a good strategy, but it raises a critical question: how can developers strike a balance between quick Agile-focused development and a secure product? The good news is, it can be done, and in fact Agile development and data security can work very well together and complement each other. Here are a few considerations if you have this goal in mind: Security should be included as early as possible, as far upstream as the first user story Sprint planning needs to include security stories as well as those focused on feature usage Security should be included “continuously” in development, testing, and deployment The pipeline should have security built into it In most organizations, the software development and data security teams are siloed and organizationally separate. Instead, security should be fully represented throughout the development and sprint processes. The security industry is constantly changing, so security user stories will need to be modified over time. Therefore, constant collaborative interaction between the two groups is a paramount requirement. As the importance of agility and fast go-to-market strategies increase, the ability to comply with a variety of different industry standards, data security regulations, and privacy laws becomes consistently more difficult. With this in mind, keeping track of sensitive data (where it resides and where it traverses) and what data security controls should apply when and where becomes critical. Tracking these issues and keeping developers properly aware and trained to manage all this is surely a difficult challenge in today’s Agile and modern development world, but organizations must meet the challenge with the right processes and tools. Most organizations that have learned to manage and successfully integrate Agile development with the complete spectrum of data security and addressed all their sensitive data needs have done so either by creating an internal tool to do so, or better yet leveraging a market-leading third-party tool to simplify this process. If you are in the process of working through these challenges at your organization, comforte can help to clarify these challenges specifically within your environment and help you find the balance between rapid Agile development with an appropriately secure approach that will then help your organization succeed. Nagging fear there’s a vulnerability you missed? Oftentimes the hardest challenge in protecting sensitive data is being able to locate all of it. comforte can help you to discover, classify, and protect sensitive data throughout your enterprise, whether in the cloud, on-premises, or both. Check out our data discovery & classification fact sheet below to learn more: [/vc_column_text][/vc_column][/vc_row] Agile DevelopmentcomfoteConnect Convergedata discoveryData SecurityHPE Mission CriticalHPE NonStopHPE NonStop TBC2021HPE user communitySecurityThomas Gloerfeld 0 comment 0 FacebookTwitterPinterestEmail Thomas Gloerfeld Thomas Gloerfeld is Director Partner Development & Marketing NonStop Solutions at comforte and has been associated with the NonStop community for over 25 years. Before joining comforte, he held various management positions at ACI Worldwide in Germany and the UK. In his role at comforte he manages all aspects of marketing for HPE NonStop solutions and comforte's NonStop partners. As part of his role, he closely monitors topics such as data security, risk and compliance, as well as digital transformation and connectivity. previous post Rise Above Downtime: 4 Critical Components of AI-Driven Infrastructure Deliver Agility and Uptime next post Discovering HPE DEV: One Developer’s Journey You may also like Historic collaboration: Next-gen virtual infrastructure accelerates apps, boosts... October 16, 2022 Modernize the hospital data center with personalized healthcare... October 16, 2022 Are we on the path to a National... October 16, 2022 The Struggle with Threat Intelligence October 16, 2022 Modernize your data management with HPE GreenLake and... October 16, 2022 Introducing Qualcomm Cloud AI 100 Accelerators for HPE... October 16, 2022 Recap HPE Discover 2022 October 16, 2022 Making App Modernization Easier with HPE and vFunction October 16, 2022 The Insider Threat Problem: Your biggest threat may... October 16, 2022 Accelerate and Automate SAP HANA Security Compliance with... October 16, 2022