Key Considerations for Application Security & Agile SCRUM Team Composition

Before going into the SCRUM team composition in relation with application security, it can be worth while knowing what are key aspects of secured application development practices:

  1. Security awareness training
  2. Threat modeling
  3. Secured coding practices
  4. Secured code reviews
  5. Security testing

Achieving the state of secured application development practices is one of the toughest challenges for most SCRUM MASTERS to crack. For achieving secured application development, different alternatives could be explored to build the team, depending on software development methodology including agile and non agile methodologies. For agile development based on SCRUM model, following alternatives can be explored:

  • Security Officer/Adviser/Architect: The role of the security adviser is to counsel various SCRUM teams to consider aspects of security during requirement analysis, design & development and testing phases. His key contribution lies in the doing threat modeling for every sprint (& releases) where he helps team identify threats, vulnerabilities and come up with remediation measures (controls). He also helps identifies various tools & frameworks from time-to-time to perform security related analysis. He also takes part in regular security related training for various different SCRUM teams from time-to-time. Following can be different considerations for considering security architect for SCRUM teams:
    1. Security adviser for each team: For a larger SCRUM team consisting of 20 or more developers, this is a viable option. There should be minimum one person in the team who can guide team on different areas as mentioned above.
    2. Security adviser for a set of teams: In case there are SCRUM teams of average size 5-6 developers, it may be a good idea to have one security adviser for 3-4 teams
  • Security Testing Team Members: Every SCRUM team can have at least one person aware of security testing methodologies and framework. He can take part in writing security related test case scenarios and execute those tests as required. The security adviser/architect helps the security related professional to identify tools & frameworks to do his tasks from time-to-time.
Ajitesh Kumar

I have been recently working in the area of Data analytics including Data Science and Machine Learning / Deep Learning. I am also passionate about different technologies including programming languages such as Java/JEE, Javascript, Python, R, Julia, etc, and technologies such as Blockchain, mobile computing, cloud-native technologies, application security, cloud computing platforms, big data, etc. I would love to connect with you on Linkedin. Check out my latest book titled as First Principles Thinking: Building winning products using first principles thinking.

Recent Posts

Creating a RAG Application Using LangGraph: Example Code

Retrieval-Augmented Generation (RAG) is an innovative generative AI method that combines retrieval-based search with large…

1 day ago

Building a RAG Application with LangChain: Example Code

The combination of Retrieval-Augmented Generation (RAG) and powerful language models enables the development of sophisticated…

2 days ago

Building an OpenAI Chatbot with LangChain

Have you ever wondered how to use OpenAI APIs to create custom chatbots? With advancements…

3 days ago

How Indexing Works in LLM-Based RAG Applications

When building a Retrieval-Augmented Generation (RAG) application powered by Large Language Models (LLMs), which combine…

1 week ago

Retrieval Augmented Generation (RAG) & LLM: Examples

Last updated: 25th Jan, 2025 Have you ever wondered how to seamlessly integrate the vast…

1 week ago

What are AI Agents? How do they work?

Artificial Intelligence (AI) agents have started becoming an integral part of our lives. Imagine asking…

4 weeks ago