QA for the Internet Of Things

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

Leverage MarkITS for agile solutions delivery that balances strategic thinking with tactical execution for “Business & Technology Convergence” MarkITS.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
© 2008 All Right Reserved Fortify Software Inc. Hybrid 2.0 – In search of the holy grail… A Talk for OWASP BeNeLux by Roger Thornton Founder/CTO Fortify.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
© 2014 VMware Inc. All rights reserved. BlazeMeter Load Testing Solution with vCloud Air High-level Overview Jan 2015.
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Computer Science 162 Section 1 CS162 Teaching Staff.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
The Integration Story: Rational Quality Manager / Team Foundation Server / Quality Center Introductions This presentation will provide an introduction.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
© 2012 WIPRO LTD | 1 Test Strategy Pattern Venkatesh D Rao Sr. Consultant.
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
Development Testing – Is It Worth It? Arthur Hicken September 2012.
codeBeamer ALM by Intland Software
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
System Management for Virtualization and Automation in a Dynamic Data Center SVM’08 Munich Karsten Beins, Sen. Director Infrastructure Technology.
© 2013 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Achievement of an Integrated Applications Environment Enterprise.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
1 GE Fanuc ©2008 GE Fanuc Intelligent Platforms All Rights Reserved Proficy* DataMart v1.0 Barry Lynch Product Manager GE Fanuc Software Puts the “E” in.
TeamCluster Project Real time project management solutions Harry Hvostov April 27, 2002.
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Network security Product Group 2 McAfee Network Security Platform.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Enterprise Cloud Computing
Compuware Corporation Deliver Reliable Applications Faster Dave Kapelanski Automated Testing Manager.
1 confidential | ©2015 Sabre GLBL Inc. All rights reserved. Implementing Kanban at Different Levels During Agile Adoption Krishnakumar C Principal Agile.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Simplifying Cloud Connectivity for Your Clients Presenter: Tom SharkeyTom Sharkey December 8,
© 2016 LDRA Ltd The FACE Conformance Verification Matrix in Practice.
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Checkmarx choose what developers use. About us o Founded in 2006 o Enterprise Grade Static and Interactive Application Security Testing Solutions o Hundreds.
1 CONFIDENTIAL Maintainable Apps Apps are for business not for developers JANUARY 1, 2015.
IXIA + FIREEYE SECURITY BATTLECARD
CompSci 280 S Introduction to Software Development
Effective Performance Testing in Agile and DevOps
Avenues International Inc.
Organizations Are Embracing New Opportunities
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
CIM Modeling for E&U - (Short Version)
All-Inclusive Testing in API Management
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Security Engineering.
CSCE 548 Secure Software Development Test 1 Review
Software engineering – 1
Speaker’s Name, SAP Month 00, 2017
Frequently asked questions about software engineering
E2E Testing in Agile – A Necessary Evil
Enterprise Cloud SERVICE MANAGEMENT OPERATIONS MANAGEMENT
Transforming IT Management
Healthcare Cloud Security Stack for Microsoft Azure
Winter 2016 (c) Ian Davis.
Prashant Palvai & Group Project Manager
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Healthcare Cloud Security Stack for Microsoft Azure
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Quality Assurance for Component-Based Software Development
Utilizing the Network Edge
Modernizing Risk Management to Support Evolution of IT
ONAP Architecture Principle Review
Presentation transcript:

QA for the Internet Of Things Andrey Madan Sr. Solution Architect TCQAA, Minneapolis April 13, 2017

Agenda Intro Why IoT? Why learn from IT? Why learn from Safety Critical Embedded? IoT Security Amazon Alexa - demo Questions and answers

Short intro: Andrey Madan Novosibirsk State University: Physics / CompSci Graduated from Purdue in both BS and MS in Computer Science Medtronic – Firmware Development / Test Automation: ~10 years Parasoft – Solution Architect / Product Manager: ~4 years Live in Maple Grove, MN Wife + two children + one dog © 2017 Parasoft Corporation Perfecting Software

Already on the Market - IoT And wearables of course, but that not really the market. Iiot is really the thing – scada

6/29/2019

Why QA matter in IoT? Connected “things” become integral part of our LIFE Basic Human Needs: Safety & Security -> Quality 6/29/2019

Trends in Safety Critical and Embedded Increasing complexity of embedded systems Connectivity is a game changer New trends emerge in automotive, medical, … Software = 21% of vehicle value Automotive software market = $10.1B by 2020 6/29/2019

Similarities between Enterprise IT and Embedded/IoT Functionalities spanning across many layers Open Architecture 24x7 Connectivity Constant Security threat

What can Embedded learn from IT? Enterprise IT solved the problems … Connected embedded systems resemble architectures known in IT Complexity stemming from interconnections shifts the gravity in testing Embedded Left-focus strategy no longer optimal

What can IT learn from Safety Critical Industry? 6/29/2019

Development Testing Practices Static Analysis Code Reviews System Reviews Unit Testing Requirement Traceability to both Code and Test Runtime Analysis Negative and boundary condition testing Test Environment Validation 6/29/2019

Meet in the middle? Focus on rapid development Embedded development Enterprise IT development Focus on defect prevention and early detection Unit Testing, Software Coding Guidelines Minimize testing fully assembled integrated systems Avoid debugging of integrated systems Focusing on compliance, not speed Focus on rapid development Volume of code too large to widely apply unit testing Automated component/API level testing Testing and debugging integrated solutions

Testing Strategy is the key The right granularity of Unit/Component/API tests Solidifying automation at the message layer Gaining access to fresh, realistic, and credible test data Accessing the distributed environment in order to test continuously

Strategies Measure, correlate and optimize your testing activities Test anytime, anywhere with a Virtual Test Bed for entire system Test for security vulnerabilities at every stage

Measure, correlate and optimize your tests Assess the quality of functionalities deployed in multiple layers Automated API tests executed against each layer Reasonable structure of requirements Mapping tests to requirements Understanding tests results in context of requirements

Measure, correlate and optimize your tests Combining code coverage with structured tests Using code coverage to assess the testing process Avoiding weak links in the functionality Coverage tools supporting multiple technologies Assess impact of change in the code base

Granular individual test coverage

Aggregated test coverage

Traceability back to requirements resources.sei.cmu.edu/library/asset-view.cfm?assetid=428589

IoT Security 6/29/2019

Shift left security testing Penetration Testing vs Security Policy Late cycle, disconnected from dev, costly, cannot test ’every combination’ .. Security needs to be integrated into earlier stages of the SDLC Leverage functional tests to drive to security vulnerability testing Reduce the cost of late cycle detection Trace to the business cases that are impacted Trace to the underlying code and identify the root causes Move from ‘detection’ to ‘prevention’ = policy © 2017 Parasoft Corporation Perfecting Software

IoT Software Security Software security is the idea of engineering software so that it continues to function correctly under malicious attack. Although the notion of protecting software is an important one, it’s just plain easier to protect something that is defect-free than something riddled with vulnerabilities. (Gary McGraw, Cigital) https://buildsecurityin.us-cert.gov/resources/building-security-in/software-security https://buildsecurityin.us-cert.gov/resources/building-security-in/software-security

Security Standards MISRA C SANS/CERT OWASP Top 10 DISA STIG CWE

The IoT Hall-of-shame http://codecurmudgeon.com http://bit.ly/iotshame

Virtual Test Bed Service Virtualization Test anytime, anywhere Simulated dev / test environment Eliminate testing bottlenecks Test real-world behavior beyond mocks and stubs Test anytime, anywhere Full control of the behavior; functional, data, performance, network Locally on the desktop + shared server environments Dynamically reconfigure via thin-client + automation workflows Leverage Azure/AWS for on-demand scaling © 2017 Parasoft Corporation Perfecting Software

Test at scale with no hardware Performance problems found late in the cycle costly to fix Time between defect introduction and detection = too great Non-functional requirement … not the focus of a ‘sprint’ Challenge Disconnect between functional and performance tests Infrastructure unavailable or not scalable Solution Reuse functional tests Service virtualize the ‘performance characteristics’ Continuously validate the non-functional requirement

Amazon Alexa demo 6/29/2019

Service virtualization for IoT 6/29/2019

Summary Learn from IT industry Learn from Safety Critical and Embedded Automated API Testing – stable, maintainable Agile development – predictability of delivery Service Virtualization – virtual test bed Automated Security Testing – ‘detection’ drives ‘prevention’ Learn from Safety Critical and Embedded Standards Prevention Vs Detection Testing in Isolation (Unit/Component) Test, Requirement and Code Traceability – know what gets impacted by change Learn from and apply strategies to tame the complexity explosion of embedded systems

Andrey Madan andrey.madan@parasoft.com THANK YOU Q&A Andrey Madan andrey.madan@parasoft.com