Navigating the world of application security can be complex and challenging. That's why we have gathered some key insights from our customers and experts at Security Journey to create a guide to help you get started with your secure coding training program.
Remember that every organization is different, and you can adapt these recommendations to meet your specific needs. This article will talk you through the key steps of building the ideal secure coding training program, for more detailed advice, you can download the guide here.
Step 1: Start By Planning Your Secure Coding Training Program
Focusing on one or two program goals can help you measure key performance indicators and better determine the success of your program.
We usually see three main program goals from our clients:
Step 2: Pulling Secure Coding Baseline Data
If you don’t collect data before starting your secure coding training program, you won’t be able to measure the success of your program accurately.
Key Metrics to Collect:
- Total Vulnerabilities
- Critical and High Vulnerabilities
- Types of Security Tickets
- Number of Security Tickets
- Remediation Time on Security Tickets
- Severity of Tickets (Critical vs Low)
- Cost to Remediate Vulnerabilities
Step 3: Internal Communications for Your Secure Coding Training Program
Open and thorough communications will help you achieve internal buy-in for your new program and keep your learners engaged throughout the training process:
- Create and Deliver an Executive Presentation to the Leadership Team
- Share a Summary of this Presentation at Your Company Town Hall
- Announce the Training Program in a Live Discussion with Learners
- Program Kick-Off Event
- Keep Up with Email and Slack Notifications
When you’re ready to start your secure coding training program, start with a fun kick-off event to spark interest, identify potential champions, and leave everyone buzzing about security.
Step 4: Selecting Your Training Paths
Security Journey offers a wide array of training content for everyone within your SDLC. Through video and hands-on lesson modalities, you can find content based on language, topic, role, compliance, and more.
- Meeting Regulatory Compliance - Start with a compliance content refresh every year, then focus on progressive language-specific content and critical threats to your product in the second half of the year.
- Creating a Proactive Program—Focus on moving from foundational through advanced training content that is role-specific or language-specific for the learner. Then, include content covering the OWASP Top 10 and critical threats to your product.
- Recovering from an Incident or Vulnerability—Focus on your product's top threats and vulnerabilities while broadening your developer's skillsets through progressive learning.
With continuous secure coding training paths, you can meet your organization's immediate needs and broaden your team's skills for long-term benefits to product security.
Step 5: Incorporating Tournaments For Engagement
We recommend running tournaments at least every 6 months to keep your learners engaged. You can use tournaments for many functions, including:
- To kick off a new program
- To assess learners’ knowledge
- To help learners apply their knowledge
- In support of Cybersecurity Awareness Month
Helpful Blog Post: Driving Engagement with Secure Coding Training Tournaments: 3 Tips for Success
Step 6: Appoint Your Security Champions
A Security Champion helps raise awareness and promote security best practices within their team or organization. They don't necessarily need to be security experts themselves, but they play a crucial role in bridging the gap between security professionals and development teams.
Helpful Podcast: The Recipe for Success with Security Champions Programs
Step 7: Measuring Your Secure Coding Training Program
Accurately measuring your program's success is crucial to its long-term success. Admins should be able to track critical metrics easily through advanced reporting features on the secure coding training platform.
Measurable knowledge gain is one way to prove your program’s effectiveness and value. At Security Journey, we call this knowledge gain learning swing. The Security Journey learning swing is measured by “before and after” learner self-assessment on an individual lesson basis. Using a five-point scale, learners rate their knowledge of the topic before and after they complete each lesson. The difference between the before and after ratings is the learning swing. Learning swing can be expressed numerically or as a percentage increase.
Compare this data to your initial baseline measurements every six months to evaluate the program's overall impact. This analysis will highlight trends, inform necessary adjustments, and demonstrate the program's value to stakeholders.