
Sign up to save your podcasts
Or


President/CEO of Celerity Technical Services, Inc.
Judy Neher is an agile trainer and coach, passionately transforming government software teams from traditional development practices to agile practices for the last 12 years.
Judy has over 27 years of experience with the Intelligence Community as a mathematician, computer scientist, traditional software manager, and ultimately, as an agile coach, trainer and leader.
Abuser stories take the concept of user stories and flips it on its side so we start thinking from a hacker’s perspective. Instead of looking at who are our users, we look at who are our adversaries. Who wants access to our data, who wants access to our systems, and what is their motivation?
Abuser stories allow us to put the bad guy hat on to help us identify potential security gaps and other risks. It allows us to look at our systems from an attacker’s perspective.
An example of a typical user story might be: “As a Facebook user I want to be able to log into Facebook so that I can get access to my profile.” That story inherently has a lot of places were a hacker would want to gain access.
We can take this user story and look at it from an attacker’s point of view. An abuser story might be “As an attacker I want to be able to get a user password so that I can access their personal data.” This approach allows us to understand where we might introduce vulnerabilities into our system by implementing a simple login story. It allows us to identify potential threats and understand how to address those threats.
Abuser stories also help us understand the threat and how to prioritize features to address those threats based on the potential risk.
Abuser stories will go on the product backlog along with your other user stories. As were defining our features, we’re looking at the security around those features and were able to prioritize the security around those features based on the threat. If the threat is likely to happen and will have a high impact, the abuser stories will be prioritized higher.
Acceptance criteria
We can include security needs in a variety of ways. Security concerns can be addressed as part of user story, as part of your definition of done, or as part of the acceptance criteria in a user story.
Judy advises including security professionals in your story refinement sessions to help you identify specific security needs and perhaps brainstorm some of the abuser stories. Story demos are also a great place to include security professionals to provide feedback on potential threats and risks.
Due to the lack of availability of security professionals, everyone on the team needs be responsible for system security. Security cannot be an afterthought. That’s where abuser stories can help you to think differently about potential threats.
Abuser stories in practice
The use of personas for potential internal and external attackers can also help you discover and address threats.
Do you have any tips address system security? Have you used any of the techniques Judy mentioned? Please share your experience and comments in the section below.
To get more valuable content to enhance your skills and advance your career, you can subscribe on iTunes.
Also, reviews on iTunes are highly appreciated! I read each review and it helps keep me motivated to continue to bring you valuable content each week.
The post MBA043: Abuser Stories – Think Like a Bad Guy appeared first on Mastering Business Analysis.
By Dave Saboe, CBAP, PMP, CSM | Certified Business Analysis Professional | Agile Coach4.7
8282 ratings
President/CEO of Celerity Technical Services, Inc.
Judy Neher is an agile trainer and coach, passionately transforming government software teams from traditional development practices to agile practices for the last 12 years.
Judy has over 27 years of experience with the Intelligence Community as a mathematician, computer scientist, traditional software manager, and ultimately, as an agile coach, trainer and leader.
Abuser stories take the concept of user stories and flips it on its side so we start thinking from a hacker’s perspective. Instead of looking at who are our users, we look at who are our adversaries. Who wants access to our data, who wants access to our systems, and what is their motivation?
Abuser stories allow us to put the bad guy hat on to help us identify potential security gaps and other risks. It allows us to look at our systems from an attacker’s perspective.
An example of a typical user story might be: “As a Facebook user I want to be able to log into Facebook so that I can get access to my profile.” That story inherently has a lot of places were a hacker would want to gain access.
We can take this user story and look at it from an attacker’s point of view. An abuser story might be “As an attacker I want to be able to get a user password so that I can access their personal data.” This approach allows us to understand where we might introduce vulnerabilities into our system by implementing a simple login story. It allows us to identify potential threats and understand how to address those threats.
Abuser stories also help us understand the threat and how to prioritize features to address those threats based on the potential risk.
Abuser stories will go on the product backlog along with your other user stories. As were defining our features, we’re looking at the security around those features and were able to prioritize the security around those features based on the threat. If the threat is likely to happen and will have a high impact, the abuser stories will be prioritized higher.
Acceptance criteria
We can include security needs in a variety of ways. Security concerns can be addressed as part of user story, as part of your definition of done, or as part of the acceptance criteria in a user story.
Judy advises including security professionals in your story refinement sessions to help you identify specific security needs and perhaps brainstorm some of the abuser stories. Story demos are also a great place to include security professionals to provide feedback on potential threats and risks.
Due to the lack of availability of security professionals, everyone on the team needs be responsible for system security. Security cannot be an afterthought. That’s where abuser stories can help you to think differently about potential threats.
Abuser stories in practice
The use of personas for potential internal and external attackers can also help you discover and address threats.
Do you have any tips address system security? Have you used any of the techniques Judy mentioned? Please share your experience and comments in the section below.
To get more valuable content to enhance your skills and advance your career, you can subscribe on iTunes.
Also, reviews on iTunes are highly appreciated! I read each review and it helps keep me motivated to continue to bring you valuable content each week.
The post MBA043: Abuser Stories – Think Like a Bad Guy appeared first on Mastering Business Analysis.

32,246 Listeners

153,989 Listeners

1,643 Listeners

0 Listeners