Security Work in Sprints | Vulnerability Tracking
Security work competes with features for sprint capacity. GitScrum integrates security tasks with 15-25% allocation, vulnerability labels, and risk-based prioritization.
6 min read
Security work often competes with feature delivery for sprint capacity, creating tension between protection and progress. GitScrum helps teams integrate security tasks into regular sprints, track vulnerability remediation, and maintain visibility into security posture without derailing feature development.
Security Work Categories
| Category | Priority | Sprint Treatment |
|---|---|---|
| Critical vulnerability | P0 - Immediate | Drop everything |
| High-risk issue | P1 - This sprint | Reserved capacity |
| Proactive improvement | P2 - Planned | Normal prioritization |
| Security tech debt | P3 - Backlog | When capacity allows |
| Compliance requirement | Deadline-driven | Planned milestone |
Security in Sprint Planning
SPRINT CAPACITY ALLOCATION
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β TYPICAL SPRINT BREAKDOWN β
β β
β Feature Development: 60-70% β
β βββ New features β
β βββ Feature improvements β
β β
β Security Work: 15-25% β
β βββ Vulnerability fixes β
β βββ Security improvements β
β βββ Dependency updates β
β βββ Security testing β
β β
β Other: 10-15% β
β βββ Bug fixes β
β βββ Technical debt β
β βββ Process improvements β
βββββββββββββββββββββββββββββββββββββββββββββββββββ
SECURITY SPRINT BUFFER:
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β Reserve 20% of security capacity for: β
β β’ Critical vulnerabilities discovered mid-sprintβ
β β’ Urgent dependency updates β
β β’ Security incidents β
β β
β If unused: pull from security backlog β
βββββββββββββββββββββββββββββββββββββββββββββββββββ
Security Backlog Structure
SECURITY BACKLOG ORGANIZATION
Labels:
βββ [security-critical] - Exploitable, immediate fix
βββ [security-high] - Significant risk
βββ [security-medium] - Moderate risk
βββ [security-low] - Minor issues
βββ [security-proactive] - Improvements
βββ [security-compliance] - Regulatory
Task Categories:
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β 1. VULNERABILITY REMEDIATION β
β Tasks from security scans, pen tests β
β Clear severity and remediation deadline β
β β
β 2. SECURITY FEATURES β
β New security capabilities β
β MFA, encryption, audit logs β
β β
β 3. HARDENING β
β Proactive security improvements β
β Header configuration, CSP, etc. β
β β
β 4. DEPENDENCY UPDATES β
β Security patches in dependencies β
β Regular update cycle β
β β
β 5. COMPLIANCE β
β Regulatory requirements β
β Deadline-driven work β
βββββββββββββββββββββββββββββββββββββββββββββββββββ
Vulnerability Task Template
SECURITY VULNERABILITY TASK
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β Title: [CVE-2024-XXXX] SQL Injection in Search β
β Labels: [security-critical] [backend] [api] β
β β
β SEVERITY: Critical (CVSS 9.8) β
β SOURCE: Penetration test finding β
β DEADLINE: 48 hours from discovery β
β β
β VULNERABILITY DETAILS: β
β Location: /api/search endpoint β
β Type: SQL Injection β
β Impact: Data exfiltration, privilege escalationβ
β Exploitability: Low complexity, no auth needed β
β β
β REMEDIATION: β
β 1. Parameterize query in search.service.ts β
β 2. Add input validation β
β 3. Implement WAF rule (temporary) β
β β
β VERIFICATION: β
β β Fix implemented and reviewed β
β β Pen test re-validated β
β β Security team approved β
β β Deployed to production β
β β Monitoring in place β
β β
β DISCLOSURE: β
β Internal only / Customer notification required β
βββββββββββββββββββββββββββββββββββββββββββββββββββ
Security in Definition of Done
SECURITY ACCEPTANCE CRITERIA
FOR ALL FEATURES:
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β β No new security vulnerabilities introduced β
β β Security tests passing β
β β Dependency scan clean β
β β Sensitive data handling reviewed β
βββββββββββββββββββββββββββββββββββββββββββββββββββ
FOR AUTHENTICATION/AUTHORIZATION FEATURES:
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β β Security review completed β
β β Threat model updated β
β β Audit logging implemented β
β β Rate limiting in place β
β β Session management verified β
βββββββββββββββββββββββββββββββββββββββββββββββββββ
FOR DATA HANDLING FEATURES:
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β β Data classification confirmed β
β β Encryption requirements met β
β β Access controls implemented β
β β Data retention policy applied β
β β Privacy requirements satisfied β
βββββββββββββββββββββββββββββββββββββββββββββββββββ
Security Metrics Dashboard
SECURITY HEALTH METRICS
VULNERABILITY MANAGEMENT:
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β Open Vulnerabilities: β
β Critical: 0 (target: 0, SLA: 24h) β β
β High: 3 (target: <5, SLA: 7 days) β β
β Medium: 12 (target: <20, SLA: 30 days)β β
β Low: 45 (target: <100, SLA: 90 days) β β
βββββββββββββββββββββββββββββββββββββββββββββββββββ
REMEDIATION VELOCITY:
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β Mean time to remediate (by severity): β
β Critical: 18 hours (SLA: 24h) β β
β High: 4 days (SLA: 7 days) β β
β Medium: 21 days (SLA: 30 days) β β
β Low: 65 days (SLA: 90 days) β β
βββββββββββββββββββββββββββββββββββββββββββββββββββ
SECURITY DEBT:
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β Total security debt items: 28 β
β Addressed this quarter: 15 β
β New this quarter: 8 β
β Trend: Decreasing β β
βββββββββββββββββββββββββββββββββββββββββββββββββββ
Best Practices
Anti-Patterns
β Security work only when breached
β "We'll fix it later" for vulnerabilities
β No dedicated security capacity
β Security as blocker vs collaborator
β Ignoring dependency updates
β Security requirements added post-development