IT-Risk-Management. Secure Software Design Secure Development Lifecycle

Size: px
Start display at page:

Download "IT-Risk-Management. Secure Software Design Secure Development Lifecycle"

Transcription

1 IT-Risk-Management V13: Secure Software Design Secure Development Lifecycle R. Grimm Institut für Wirtschafts- und Verwaltungsinformatik Universität Koblenz R. Grimm 1 / Content 1. SDL Concept Secure Development Lifecycle SDL Phases and Practices OWASP Open Web Application Security Project Agile Secure Software Development Other Software and System Design Methods R. Grimm 2 /63 Seite 1 1

2 2 Microsoft Security Development Lifecycle Quoted from: MS SDL: Simplified Implementation of the Microsoft SDL. Updated November 4, [ ] R. Grimm 3 /63 SDL Applicability Software design in these application areas: Secure software development not orgs see ISO 27001, or BSI-Grundschutz not certification see Common Criteria not functional development see software engineering Business Sensitive data Internet [MS DSL, Nov 2010, p. 5] R. Grimm 4 /63 Seite 2

3 3 Three SDL Core Concepts Education Continuous process improvement Accountability [MS DSL, Nov 2010, p. 3] R. Grimm 5 /63 MS SDL Capability Areas and Levels of Maturity 5 Capability Areas (cf., 7 Phases) Figure 1. SDL Optimization Model with capability and maturity levels [MS DSL, Nov 2010, p.5] R. Grimm 6 /63 Seite 3

4 4 SDL Roles Advisors, Experts External Consulting Auditing Team Champions Internal Project Team [MS DSL, Nov 2010, p. 5-6] R. Grimm 7 /63 MS SDL Lifecycle Phases Figure 2: The Microsoft Security Development Lifecycle Simplified [MS DSL, Nov 2010, p. 6] R. Grimm 8 /63 Seite 4

5 5 SDL Process Illustration [MS DSL, Nov 2010, Appendix, p. 17] R. Grimm 9 /63 Content 1. SDL Concept Secure Development Lifecycle 2. SDL Phases and Practices 3. OWASP Open Web Application Security Project 4. Agile Secure Software Development 5. Other Software and System Design Methods R. Grimm 10 /63 Seite 5

6 6 Pre-SDL Requirements SDL Phases and Practices SDL Practice 1: Training Requirements Phase One: Requirements SDL Practice 2: Security Requirements SDL Practice 3: Quality Gates/Bug Bars SDL Practice 4: Security and Privacy Risk Assessment Phase Two: Design SDL Practice 5: Design Requirements SDL Practice 6: Attack Surface Reduction SDL Practice 7: Threat Modeling [MS DSL, Nov 2010, pp. 7-12] R. Grimm 11 /63 SDL Phases and Practices Phase Three: Implementation SDL Practice 8: Use Approved Tools SDL Practice 9: Deprecate Unsafe Functions SDL Practice 10: Static Analysis Phase Four: Verification SDL Practice 11: Dynamic Program Analysis SDL Practice 12: Fuzz Testing SDL Practice 13: Threat Model and Attack Surface Review Phase Five: Release SDL Practice 14: Implement Incident Response Plan SDL Practice 15: Final Security Review SDL Practice 16: Release/Archive After Release: Response: Execute Incident Response Plan [MS DSL, Nov 2010, pp. 7-12] R. Grimm 12 /63 Seite 6

7 7 Pre-SDL Requirements: Basic Security Training SDL Practice 1: Training Requirements Basics: Secure design Threat Modelling Secure Coding Security Testing Privacy [MS DSL, Nov 2010, pp. 7-8] R. Grimm 13 /63 Pre-SDL Requirements: Advanced Security Training SDL Practice 1: Training Requirements Advanced: Advanced security design and architecture Trusted user interface design Security vulnerabilities in detail Implementing custom threat mitigations [MS DSL, Nov 2010, pp. 7-8] R. Grimm 14 /63 Seite 7

8 8 SDL Practice 1, Basic Training Secure Design Secure Design Attack surface reduction Defense in depth Principle of least privilege Secure defaults [MS DSL, Nov 2010, pp. 7-8] R. Grimm 15 /63 SDL Practice 1, Basic Training Threat Modelling Threat modeling (*): Overview of threat modeling Design implications of a threat model Coding constraints based on a threat model (*) For a deeper insight, see: John B. Dickson, CISSP, Denim Group: Threat Modeling Categorizing the nature and severity of system vulnerabilities [24 March 2015] R. Grimm 16 /63 Seite 8

9 9 Dickson, Threat Modelling Covers Assets, Threats, Vulnerabilities Threats against Networks (e.g. spoofed packets) Hosts (e.g. buffer overflows, illicit paths) Applications (e.g. SQL injection, XSS, input tampering) Identify, classify, rate threats STRIDE Classification Scheme (Microsoft) DREAD Rating Scheme (Microsoft) [Dickson, Threat Modelling] R. Grimm 17 /63 STRIDE (Threat Modelling) STRIDE Classification Scheme (Microsoft) Threats: Spoofing Identity Tampering with Data Repudiation Information Disclosure Denial of Service Elevation of Privilege Requirements: Originality Integrity Non-Repudiation Confidentiality Availability Least Privilege [Dickson, Threat Modelling, p. 13] R. Grimm 18 /63 Seite 9

10 10 DREAD (Threat Modelling) DREAD Rating Scheme (Microsoft) Impact: Damage Potential Reproducibility Exploitability Affected Users Discoverability Value: How bad can an exploit hurt? How reliably can the flaw be exploited? How easy is the flaw to exploit? How many users can be impacted by an exploit? How visible is the vulnerability? The final rating scores DREAD is the average of all scores. [Dickson, Threat Modelling, p. 17] R. Grimm 19 /63 DREAD (Threat Modelling): Impact and Value! DREAD Rating Scheme (Microsoft) Impact: Damage Potential Reproducibility Exploitability Affected Users Discoverability Value: How bad can an exploit hurt? How reliably can the flaw be exploited? How easy is the flaw to exploit? How many users can be impacted by an exploit? How visible is the vulnerability? The final rating scores DREAD is the average of all scores. R.G.: Compare these questions with the risk of potential damage Risk = Σ((Damage Value) x (Probability of Damage Event)) R. Grimm 20 /63 Seite 10

11 11 SDL Practice 1, Basic Training Secure Coding Buffer overruns (for applications using C and C++) Integer arithmetic errors (for applications using C and C++) Cross-site scripting (for managed code and Web applications) SQL injection (for managed code and Web applications) Weak cryptography [MS DSL, Nov 2010, pp. 7-8] R. Grimm 21 /63 SDL Practice 1, Basic Training Secure Testing Differences between security testing and functional testing Risk assessment Security testing methods [MS DSL, Nov 2010, pp. 7-8] R. Grimm 22 /63 Seite 11

12 12 SDL Practice 1, Basic Training Privacy Types of privacy-sensitive data Privacy design best practices Risk assessment Privacy development best practices Privacy testing best practices [MS DSL, Nov 2010, pp. 7-8] R. Grimm 23 /63 Phase One: Requirements and Practices SDL Practice 2: Security Requirements SDL Practice 3: Quality Gates/Bug Bars SDL Practice 4: Security and Privacy Risk Assessment [MS DSL, Nov 2010, pp. 8-9] R. Grimm 24 /63 Seite 12

13 13 SDL Practice 2, Security Requirements Security and privacy requirements To be stated in the beginning of the project Specification of minimum security requirements for the application to run in its planned operational environment Specification and deployment of a security vulnerability/work item tracking system [MS DSL, Nov 2010, p. 8] R. Grimm 25 /63 SDL Practice 3, Quality Gates/Bug Bars Quality gates and bug bars = minimum acceptable levels of security and privacy quality e.g., all compiler warnings must be triaged and fixed prior to code check-in Quality gates for each development phase Compliance with quality gates checked by Final Security Review (FSR, see below SDL 15). [MS DSL, Nov 2010, p. 8] R. Grimm 26 /63 Seite 13

14 14 SDL Practice 4, Security and Privacy Risk Assessment Security and Privacy impact rating (high, moderate, low) To answer these questions: 1. Which portions of the project will require threat models before release? 2. Which portions of the project will require security design reviews before release? 3. Which portions of the project (if any) will require penetration testing by a mutually agreed upon group that is external to the project team? 4. Are there any additional testing or analysis requirements the security advisor deems necessary to mitigate security risks? 5. What is the specific scope of the fuzz testing requirements? [MS DSL, Nov 2010, p. 9] R. Grimm 27 /63 Phase Two: Design SDL Practice 5: Design Requirements SDL Practice 6: Attack Surface Reduction SDL Practice 7: Threat Modeling [MS DSL, Nov 2010, pp. 9-10] R. Grimm 28 /63 Seite 14

15 15 SDL Practice 5, Design Requirements To be stated in the beginning of the project Before coding!! 1. Security and privacy concerns in functional design ( secure features ) Examples: separation of duty, least privilege, robust implementation Specify how to deploy the feature or function in a secure fashion 2. Security and privacy functional design ( security features ) Examples: access control, authentication methods, content encryption Specify the intended use of a security feature or function [MS DSL, Nov 2010, pp. 9-10] R. Grimm 29 /63 SDL Practice 6, Attack Surface Reduction Associated with threat modeling, see SDL 7 All means of reducing risk by giving attackers less opportunity to exploit vulnerabilities Shutting off or restricting access to system service, applying the principle of least privilege employing layered defenses wherever possible [MS DSL, Nov 2010, p. 10] R. Grimm 30 /63 Seite 15

16 16 SDL Practice 7, Threat Modeling Team exercise Structured document for discussion Structured security analysis task performed during the software design stage To address: security implications of designs in the context of their planned operational environments security issues at the component or application level Uses STRIDE classification and DREAD rating (see above, SDL 1 and Dickson Threat Modelling ) [MS DSL, Nov 2010, pp. 10] R. Grimm 31 /63 Phase Three: Implementation SDL Practice 8: Use Approved Tools SDL Practice 9: Deprecate Unsafe Functions SDL Practice 10: Static Analysis of source code, with tools to be augmented with human (manual) code review [MS DSL, Nov 2010, pp ] R. Grimm 32 /63 Seite 16

17 17 Phase Four: Verification SDL Practice 11: Dynamic Program Analysis SDL Practice 12: Fuzz Testing SDL Practice 13: Threat Model and Attack Surface Review [MS DSL, Nov 2010, p. 11] R. Grimm 33 /63 SDL Practice 11, Dynamic Program Analysis Run-time verification of software programs Monitor application behavior for security problems, e.g. memory corruption user privilege issues Use tools, e.g. AppVerifier of SDL [MS DSL, Nov 2010, p. 11] R. Grimm 34 /63 Seite 17

18 18 SDL Practice 12, Fuzz Testing A specialized form of dynamic analysis Provoke program failure by deliberately introducing malformed or random data Examples: Buffer overflows Fake identities Wrong formats Sudden interruptions Cross site scripting more [MS DSL, Nov 2010, p. 11] R. Grimm 35 /63 SDL Practice 13, Threat Model and Attack Surface Review Compare Implementation with Design (SDL 6 and 7) Compliance of implementation with design, incl. all changes All attack vectors are reviewed and mitigated [MS DSL, Nov 2010, p. 11] R. Grimm 36 /63 Seite 18

19 19 Phase Five: Release SDL Practice 14: Incident Response Plan SDL Practice 15: Final Security Review (FSR) SDL Practice 16: Release/Archive [MS DSL, Nov 2010, pp ] R. Grimm 37 /63 SDL Practice 14, Incident Response Plan To identify: A sustained engineering (SE) team for engineering, marketing, communications, and management to act as points of first contact in a security emergency On-call contacts with decision-making authority 24/7 Security servicing plans for code inherited from other groups within your organization Security servicing plans for licensed third-party code including file names, versions, source code, third-party contact information, and contractual permission to make changes [MS DSL, Nov 2010, p. 11] R. Grimm 38 /63 Seite 19

20 20 SDL Practice 15, FSR Final Security Review FSR includes examination of threat models exception requests tool output and performance against the previously determined quality gates or bug bars FSR results in one of three different outcomes: Passed FSR Passed FSR with exceptions FSR with escalation [MS DSL, Nov 2010, p. 12] R. Grimm 39 /63 SDL Practice 16, Release/Archive Archive all data necessary to perform post-release servicing tasks, incl.: Source code, binaries Private symbols Threat models Documentation Emergency response plans License and servicing terms for any third-party software To be certified by security advisor (using FSR, see SDL 15) [MS DSL, Nov 2010, p. 12] R. Grimm 40 /63 Seite 20

21 21 Additional (optional) Security Activities Manual Code Review Penetration Testing Vulnerability Analysis of Similar Applications [MS DSL, Nov 2010, pp ] R. Grimm 41 /63 Root Cause Analysis Other Process Requirements Upon discovery of a previously unknown vulnerability Identify root cause, incl. human error, tool failure, and policy failure Periodic Process Updates [MS DSL, Nov 2010, p. 13] R. Grimm 42 /63 Seite 21

22 22 Application Security Verification Process Simulation by a realistic application scenario Realistic with respect to the security and privacy requirements of the organization the functional and technical requirements of the application under development the application s operational context Security advisors check the appropriateness of the scenario and data the appropriateness of behavior, e.g. only authorized personnel can use the application strong separation between roles [MS DSL, Nov 2010, pp ] R. Grimm 43 /63 Content 1. SDL Concept Secure Development Lifecycle 2. SDL Phases and Practices 3. OWASP Open Web Application Security Project 4. Agile Secure Software Development 5. Other Software and System Design Methods R. Grimm 44 /63 Seite 22

23 23 OWASP The Open Web Application Security Project OWASP is a worldwide non-profit organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. [ R. Grimm 45 /63 OWASP Projects OWASP Developer Guide 2005/2014 OWASP Application Security Verification Standard OWASP Code Review Guide OWASP Testing Guide [ R. Grimm 46 /63 Seite 23

24 24 The OWASP Developer Guide 2014 The Developer Guide 2014 is a "first principles" book it's not specific to any one language or framework, as they all borrow ideas and syntax from each other. There are highly specific issues in different languages, such as PHP configuration settings or Spring MVC (*) issues, but we need to look past these differences and apply the basic tenets of secure system engineering to application security. (*) Spring MVC ( Model-View-Controller ): Java framework for the development of dynamic Web applications [ ] R. Grimm 47 /63 Major Themes of Developer Guide 2014 Developing Software includes: Foundation Architecture Design Build Configure Operate Modern Web Applications include Ajax and RESTful (*) API Mobile Applications (*) Representational State Transfer (REST): an architectural style, light-weight SOAP, clean HTTP [ ] R. Grimm 48 /63 Seite 24

25 25 A Guide to Building Secure Web Applications and Services, 2005 (1) Within OWASP, Free Software Foundation, Black Hat Edition 2.0, July 27, 2005 Chapters (I): Web Applications Security Architecture and Design Policy Frameworks Incl. Development Methodology, Coding Standards, Secure Code Control Security Coding Principles incl. Asset Classification, Security Architecture, Security Principles Threat Risk Modelling incl. Microsoft Threat Modelling Process (STRIDE/DREAD), Risk Modelling, Other Modelling Systems R. Grimm 49 /63 A Guide to Building Secure Web Applications and Services, 2005 (2) Free Software Foundation, Black Hat Edition 2.0, July 27, 2005 Chapters (II): Handling E-Commerce Payments Phishing Web Services Authentication Authorization Session Management Data Validation Interpreter Injection Canonicalization, Locale and Unicode Error Handling, Auditing and Logging R. Grimm 50 /63 Seite 25

26 26 A Guide to Building Secure Web Applications and Services, 2005 (3) Free Software Foundation, Black Hat Edition 2.0, July 27, 2005 Chapters (III): File System Buffer Overflows Administrative Interfaces Cryptography Configuration Incl. platforms, default passwords, secure strings, encrypted data, database security Maintenance Denial of Service Attacks GNU Free Documentation License PHP Guidelines incl. Cross-Site Scripting, SQL-, Code-, Command-Injection R. Grimm 51 /63 Content 1. SDL Concept Secure Development Lifecycle 2. SDL Phases and Practices 3. OWASP Open Web Application Security Project 4. Agile Secure Software Development 5. Other Software and System Design Methods R. Grimm 52 /63 Seite 26

27 27 Agile Secure Software Development In a Presentation Feb 3, 2014, at Fraunhofer SIT, Darmstadt, Lotfi Othmane (Technische Universiteit Eindhoven) asks: Is it possible to develop secure software using the agile software development approach? R. Grimm 53 /63 What is Agile Software Development? Created in February 2001, in Utah, USA by 17 developers [ The approach has four values: 1. Individuals and interactions over processes and tools 2. Working software over comprehensive documentation 3. Customer collaboration over contract negotiation 4. Responding to change over following a plan Known methods: Scrum and XP R. Grimm 54 /63 Seite 27

28 28 L. Othmane s Answer: Yes, we can It is possible to develop secure software using the agile software development life-cycle Solution: Use security assurance cases to trace the impacts of software changes on the security of the software Integrate security engineering activities into the agile development life-cycle [Othmane, Feb 2014, #21] R. Grimm 55 /63 Use security assurance cases Related to User story Change Verify Software component Evaluate Security assessment technique Generate User stories and security policies are added as the software evolves Security countermeasure Mitigated by Related to Justifies Argument Supports Security evidence Threat Compose Security Claim (Goal) Violated by Describe Specify decomposition approach Security policy Context Strategy [Othmane, Feb 2014, #11] R. Grimm 56 /63 Seite 28

29 29 Security engineering activities (top line) integrated in agile development life-cycle (bottom) agile development life-cycle [Othmane, Feb 2014, #18] R. Grimm 57 /63 Content 1. SDL Concept Secure Development Lifecycle 2. SDL Phases and Practices 3. OWASP Open Web Application Security Project 4. Agile Secure Software Development 5. Other Software and System Design Methods R. Grimm 58 /63 Seite 29

30 30 Other Software and System Design Methods Secure IT Systems: Security Requirements Engineering Secure Software Following Common Criteria: Requirements and Evaluation Phases Secure Organizations Following ISO 27001, IT-Grundschutz Requirements, Installation, Responsibilities, Verification see [Bodden et mult alt. 2012] R. Grimm 59 /63 Security Requirements Engineering Part of Requirements Engineering Subject to research, e.g.: International Workshop Series "RE - Requirements Engineering", newest: RE'14-22nd IEEE International Requirements Engineering Conference, August, Karlskrona, Sweden Phase of Secure System Design, Requirements Implementation Configuration Evaluation e.g., Microsoft SDL Phase 2, see above e.g., Common Criteria: Security Problem Definition, Security Objectives, Security Requirements of a Protection Profile or of a Security Target Methodology under Research, e.g., Simic-Draws, D. et mult.alt. (2013): Holistic and Law Compatible IT Security Evaluation. In IJISP, 7/3, 2013, e.g., Bräunlich, K.; and Grimm, R. (2013): A Formal Model for the Requirement of Verifiability in Electronic Voting by means of a Bulletin Board. In: VoteID 2013, July 2013, University of Surrey, Guildford, UK. R. Grimm 60 /63 Seite 30

31 31 Secure Software: Common Criteria Internationally standardized methodology for the specification of security requirements and for the evaluation of implemented security functions Specification of values, threats and security objectives Security functional requirements in protection profiles: statement of requirements in security targets: products to be evaluated No guide for security design Mapping of security measures on security requirements Assurance levels w.r.t. the strength of measures the quality of evaluation R. Grimm 61 /63 Secure Organizations: Information Security Management Systems (ISMS) ISO/IEC Requirements for ISMS ISO/IEC Code of practice of ISMS ISO/IEC Information security risk management ISO/IEC Requirements for auditing and certification of ISMS IT-BASIC Protection ( BSI Grundschutz ) Check list for the security of the IT building blocks in an organization Both for improving the security, and for security evaluation/certification R. Grimm 62 /63 Seite 31

32 32 Secure Organizations: Standards for the usage of IT CoBIT Control Objectives for Information and Related Technology ITIL IT Infrastructure Library Binding contracts of a an IT service with its users/customers E.g., Change Management, Security Management, IDW PS 330 Institute of certified public accountants (Wirtschaftsprüfer) Final check of information technology in use of the audited firm [For details of CoBIT, ITIL, and IDW, see references list] R. Grimm 63 /63 Questions to check your knowledge 1. List and explain shortly the core concepts of SDL. (three) 2. List and explain shortly the phases of SDL. (seven, related to five capability areas) 3. Explain the SDL practices of quality gates. (SDL 3) 4. Explain the difference between security features and secure features. Give examples. (SDL 5) 5. Explain the STRIDE and DREAD schemes of threat modelling. (SDL 7) 6. What does fuzz testing do? Give examples. (SDL 12) 7. In which situation is root cause analysis required, and what does it do? (SDL Other Process Requirements) 8. Which main activities does Lotfi Othmane (TU Eindhoven, 2014) suggest to enable agile secure software development? R. Grimm 64 /63 Seite 32

33 33 References (1, Software Development) Eric Bodden et mult. alt. (2013): Entwicklung sicherer Software durch Security bydesign. Fraunhofer SIT Technical Reports SIT-TR Microsoft Security Development Lifecycle (SDL): Simplified Implementation of the Microsoft SDL. Updated November 4, 2010, [24 March 2015] Microsoft: Security development lifecycle (sdl) process guidance version 4.1aa, April b20353f97122 [24 March 2015] Howard, Michael and Steve Lipner: The Security Development Lifecycle. Microsoft Press, John B. Dickson, CISSP, Denim Group: ThreatModeling Categorizing the nature and severity of system vulnerabilities. [24 March 2015] OWASP, The Open Web Application Security Project: OWASP Developer Guide [25 March 2015] OWASP: A Guide to Building Secure Web Applications and Web Services. Editors: A. Wiesmann, M. Curphey, A. v.d. Stock, R. Stirbei. 2.0 Black Hat Edition, 27 July [ ] Sven Türpe (2012): Point-and-shoot security design: can we build better tools for developers? NSPW 2012, pp Lotfi Othmane, TU Eindhoven (2014): Extending the Agile Development Life-cycle to Develop Secure Software. Presentation Feb 3, 2014, at Fraunhofer SIT, Darmstadt. The Agile Software Development Manifesto [24 March 2015] R. Grimm 65 /63 References (2, System and Organization Security) BSI Bundesamt für Sicherheit in der Informationstechnik (2014): IT-Grundschutz-Kataloge. 14. Ergänzungslieferung, 2014 (PDF, ca. 14 MB). [ ] BSI (2008): BSI-Standard 100-2: IT-Grundschutz-Vorgehensweise, Version 2.0. Bundesanzeiger-Verlag, Köln, Institut für Wirtschaftsprüfer (2002): IDW PS 330 Abschlussprüfung bei Einsatz von Informationstechnologie, WPg 21/2002, S ff., FN-IDW 11/2002, S. 604 ff. Verlautbarungen IDW Prüfungsstandards [ ] ISO/IEC 27001:2013: Information technology - Security techniques - Information security management systems - Requirements. [ ] ITIL The IT Infrastrucure Library. see also Dazu BSI (2005): ITIL und Informationssicherheit. Möglichkeitenund Chancendes Zusammenwirkensvon IT-Sicherheitund IT-Service-Management. Studie des BSI, 32 Seiten, 2005, [ ] Common Criteria (2006): Common Criteria and Common Evaluation Methodology v2.3, also registered as ISO/IEC 15408:2005. And: Common Criteria and Common Evaluation Meth-odology Version 3.1 Release 2. [ ] COBIT 5 (April 2012): Control Objectives for Information and Related Technology. A Business Framework for the Governance and Management of Enterprise IT. [ ] R. Grimm 66 /63 Seite 33

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat

More information

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to

More information

The Security Development Lifecycle. OWASP 24 June 2010. The OWASP Foundation http://www.owasp.org

The Security Development Lifecycle. OWASP 24 June 2010. The OWASP Foundation http://www.owasp.org The Security Development Lifecycle 24 June 2010 Steve Lipner Senior Director of Security Engineering Strategy Trustworthy Computing Microsoft Corporation SLipner@microsoft.com +1 425 705-5082 Copyright

More information

The Security Development Lifecycle

The Security Development Lifecycle The Security Development Lifecycle Steven B. Lipner Director of Security Engineering Strategy Security Business and Technology Unit Microsoft Corporation Context and History 1960s penetrate and patch 1970s

More information

SAFECode Security Development Lifecycle (SDL)

SAFECode Security Development Lifecycle (SDL) SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training

More information

Microsoft SDL: Agile Development

Microsoft SDL: Agile Development Microsoft SDL: Agile Development June 24, 2010 Nick Coblentz, CISSP Senior Security Consultant AT&T Consulting Nick.Coblentz@gmail.com http://nickcoblentz.blogspot.com http://www.twitter.com/sekhmetn Copyright

More information

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN Threat Modeling Frank Piessens (Frank.Piessens@cs.kuleuven.be ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process

More information

Software Development: The Next Security Frontier

Software Development: The Next Security Frontier James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas jmolini@microsoft.com http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization

More information

Security Testing. How security testing is different Types of security attacks Threat modelling

Security Testing. How security testing is different Types of security attacks Threat modelling Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making

More information

Mobile Application Threat Analysis

Mobile Application Threat Analysis The OWASP Foundation http://www.owasp.org Mobile Application Threat Analysis Ari Kesäniemi Nixu Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under

More information

elearning for Secure Application Development

elearning for Secure Application Development elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security

More information

Web Application Security

Web Application Security Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4

More information

Web Application Remediation. OWASP San Antonio. March 28 th, 2007

Web Application Remediation. OWASP San Antonio. March 28 th, 2007 Web Application Remediation OWASP San Antonio March 28 th, 2007 Agenda Introduction The Problem: Vulnerable Web Applications Goals Example Process Overview Real World Issues To Address Conclusion/Questions

More information

90% of data breaches are caused by software vulnerabilities.

90% of data breaches are caused by software vulnerabilities. 90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with

More information

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006 Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From

More information

DEVELOPING SECURE SOFTWARE

DEVELOPING SECURE SOFTWARE DEVELOPING SECURE SOFTWARE A FOUNDATION FOR CLOUD AND IOT SECURITY Eric Baize @ericbaize Senior Director, Product Security Office EMC Corporation Chairman of SAFECode CSA EMEA Congress November 2015 1

More information

The Security Development Lifecycle. Steven B. Lipner, CISSP SLipner@microsoft.com Senior Director Security Engineering Strategy Microsoft Corp.

The Security Development Lifecycle. Steven B. Lipner, CISSP SLipner@microsoft.com Senior Director Security Engineering Strategy Microsoft Corp. The Security Development Lifecycle Steven B. Lipner, CISSP SLipner@microsoft.com Senior Director Security Engineering Strategy Microsoft Corp. 2 Overview Introduction A look back Trustworthy Computing

More information

Software Security Touchpoint: Architectural Risk Analysis

Software Security Touchpoint: Architectural Risk Analysis Software Security Touchpoint: Architectural Risk Analysis Gary McGraw, Ph.D. Chief Technology Officer, Cigital Founded in 1992 to provide software security and software quality professional services Recognized

More information

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007 Agile and Secure Can We Be Both? Chicago OWASP June 20 th, 2007 The Agile Practitioner s Dilemma Agile Forces: Be more responsive to business concerns Increase the frequency of stable releases Decrease

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Web application testing

Web application testing CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration

More information

Threat Modeling Smart Metering Gateways

Threat Modeling Smart Metering Gateways Threat Modeling Smart Metering Gateways Armin Lunkeit OpenLimit SignCubes GmbH Berlin, Germany armin.lunkeit@openlimit.com Tobias Voß Sankt Augustin, Germany tobias.voss@softscheck.com Hartmut Pohl Sankt

More information

Agile and Secure: OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/

Agile and Secure: OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/ Agile and Secure: Can We Be Both? OWASP AppSec Seattle Oct 2006 Dan Cornell, OWASP San Antonio Leader Principal, Denim Group Ltd. dan@denimgroup.com (210) 572-4400 Copyright 2006 - The OWASP Foundation

More information

ensuring security the way how we do it

ensuring security the way how we do it ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working

More information

89 Fifth Avenue, 7th Floor New York, NY 10003 www.theedison.com 212.367.7400 White Paper

89 Fifth Avenue, 7th Floor New York, NY 10003 www.theedison.com 212.367.7400 White Paper 89 Fifth Avenue, 7th Floor New York, NY 10003 www.theedison.com 212.367.7400 White Paper Microsoft Security Development Lifecycle Adoption: Why and How September 2013 Printed in the United States of America

More information

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright

More information

Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda

Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security

More information

Application Intrusion Detection

Application Intrusion Detection Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction

More information

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Integrating Security into the Application Development Process Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Agenda Seek First to Understand Source Code Security AppSec and SQA Analyzing

More information

ISSECO Syllabus Public Version v1.0

ISSECO Syllabus Public Version v1.0 ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to

More information

Building Security into the Software Life Cycle

Building Security into the Software Life Cycle Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about

More information

Threat modeling. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2011

Threat modeling. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2011 Threat modeling Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Threats Threat = something bad that can happen Given an system or product what are the threats against

More information

Development Processes (Lecture outline)

Development Processes (Lecture outline) Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development

More information

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute

More information

Ivan Medvedev Principal Security Development Lead Microsoft Corporation

Ivan Medvedev Principal Security Development Lead Microsoft Corporation Ivan Medvedev Principal Security Development Lead Microsoft Corporation Session Objectives and Takeaways Session Objective(s): Give an overview of the Security Development Lifecycle Discuss the externally

More information

Introduction to Information Security

Introduction to Information Security Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit

More information

Application Security Testing

Application Security Testing Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the

More information

Vulnerability Management in an Application Security World. January 29 th, 2009

Vulnerability Management in an Application Security World. January 29 th, 2009 Vulnerability Management in an Application Security World OWASP San Antonio January 29 th, 2009 Agenda Background A Little Bit of Theatre You Found Vulnerabilities Now What? Vulnerability Management The

More information

Microsoft STRIDE (six) threat categories

Microsoft STRIDE (six) threat categories Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007

More information

Vulnerability Management in an Application Security World. AppSec DC November 12 th, 2009. The OWASP Foundation http://www.owasp.

Vulnerability Management in an Application Security World. AppSec DC November 12 th, 2009. The OWASP Foundation http://www.owasp. Vulnerability Management in an Application Security World AppSec DC November 12 th, 2009 Dan Cornell Global Membership Committee Denim Group dan@denimgroup.com (210) 572-4400 Twitter: @danielcornell The

More information

Secure Development Lifecycle. Eoin Keary & Jim Manico

Secure Development Lifecycle. Eoin Keary & Jim Manico Secure Development Lifecycle Jim Manico @manicode OWASP Volunteer Global OWASP Board Member OWASP Cheat-Sheet Series Manager VP of Security Architecture, WhiteHat Security 16 years of web-based, database-driven

More information

Juniper Networks Secure

Juniper Networks Secure White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3

More information

How to Build a Trusted Application. John Dickson, CISSP

How to Build a Trusted Application. John Dickson, CISSP How to Build a Trusted Application John Dickson, CISSP Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers Denim Group, Ltd.

More information

Application Code Development Standards

Application Code Development Standards Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards

More information

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group, Secure and Resilient Software Development Mark S. Merkow Lakshmikanth Raghavan CRC Press Taylor& Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Group, an Informs

More information

MICROSOFT SECURITY DEVELOPMENT LIFECYCLE (SDL)

MICROSOFT SECURITY DEVELOPMENT LIFECYCLE (SDL) MICROSOFT CORPORATION MICROSOFT SECURITY DEVELOPMENT LIFECYCLE (SDL) Version 3.2 The Microsoft Security Development Lifecycle (SDL) is an industry-leading software security assurance process. A Microsoftwide

More information

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products? Privacy Transparency What does privacy at Microsoft mean? Are you using my data to build advertising products? Where is my data? Who has access to my data? Compliance What certifications and capabilities

More information

WHITEPAPER Executive Summary Fortify Software WWW.FORTIFY.COM

WHITEPAPER Executive Summary Fortify Software WWW.FORTIFY.COM Optimizing the Microsoft SDL for Secure Development Fortify Solutions to Strengthen and Streamline a Microsoft Security Development Lifecycle Implementation Executive Summary Developing secure software

More information

Understanding and evaluating risk to information assets in your software projects

Understanding and evaluating risk to information assets in your software projects Understanding and evaluating risk to information assets in your software projects ugh.. what a mouthful Dana Epp Windows Security MVP Who am I? Microsoft Windows Security MVP Information Security Professional

More information

Secure Development LifeCycles (SDLC)

Secure Development LifeCycles (SDLC) www.pwc.com Feb 2014 Secure Development LifeCycles (SDLC) Bart De Win Bart De Win? 15+ years of Information Security Experience Ph.D. in Computer Science - Application Security Author of >60 scientific

More information

Strategic Information Security. Attacking and Defending Web Services

Strategic Information Security. Attacking and Defending Web Services Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP dgreen@securityps.com Introduction About Security PS Application Security Assessments

More information

A Practical Approach to Threat Modeling

A Practical Approach to Threat Modeling A Practical Approach to Threat Modeling Tom Olzak March 2006 Today s security management efforts are based on risk management principles. In other words, security resources are applied to vulnerabilities

More information

DISTRIBUTED SYSTEMS SECURITY

DISTRIBUTED SYSTEMS SECURITY DISTRIBUTED SYSTEMS SECURITY Issues, Processes and Solutions Abhijit Belapurkar, Yahoo! Software Development India Pvt. Ltd., India Anirban Chakrabarti, Infosys Technologies Ltd., India Harigopal Ponnapalli,

More information

Columbia University Web Security Standards and Practices. Objective and Scope

Columbia University Web Security Standards and Practices. Objective and Scope Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements

More information

Cyber R &D Research Roundtable

Cyber R &D Research Roundtable Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes

More information

white SECURITY TESTING WHITE PAPER

white SECURITY TESTING WHITE PAPER white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...

More information

SAST, DAST and Vulnerability Assessments, 1+1+1 = 4

SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges

More information

JVA-122. Secure Java Web Development

JVA-122. Secure Java Web Development JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard

More information

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered

More information

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder mohamed.abomhara@uia.no Winter School in Information Security, Finse May

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft sarbari@electrosoft-inc.com 703-437-9451 ext 12 The Foundation

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Cyber Security & Data Privacy. January 22, 2014

Cyber Security & Data Privacy. January 22, 2014 Cyber Security & Data Privacy January 22, 2014 Today s Presenters Bob DiBella Director of Product Management Aclara Technologies Srinivasalu Ambati Application Architect, Consumer Engagement Aclara Technologies

More information

Functional vs. Load Testing

Functional vs. Load Testing Best Practices in Performance & Security Testing March 26, 2009 CVN www.sonata-software.com Functional vs. Load Testing Functional test Objective Functionality Example Do business processes function properly

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

SAP Security Recommendations December 2011. Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1.

SAP Security Recommendations December 2011. Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1. SAP Security Recommendations December 2011 Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1.0 Secure Software Development at SAP Table of Contents 4

More information

Security aspects of e-tailing. Chapter 7

Security aspects of e-tailing. Chapter 7 Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing

More information

Information Systems Security

Information Systems Security Information Systems Security Lecture 4: Security Engineering Prof. Dr. Christoph Karg Aalen University of Applied Sciences Department of Computer Science 11.10.2015 Learning Objective Learning Objective

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

Pentests more than just using the proper tools

Pentests more than just using the proper tools Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security

More information

Building More Secure Commercial Software: The Trustworthy Computing Security Development Lifecycle

Building More Secure Commercial Software: The Trustworthy Computing Security Development Lifecycle Building More Secure Commercial Software: The Trustworthy Computing Development Lifecycle Steven B. Lipner Microsoft Corporation With the growth of the Internet as a vehicle for commercial, governmental,

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

Attack Vector Detail Report Atlassian

Attack Vector Detail Report Atlassian Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes cdavies@atlassian.com The Attack Vector Details report provides details of vulnerability

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Pentests more than just using the proper tools

Pentests more than just using the proper tools Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications

More information

Threat Modelling for Web Application Deployment. Ivan Ristic ivanr@webkreator.com (Thinking Stone)

Threat Modelling for Web Application Deployment. Ivan Ristic ivanr@webkreator.com (Thinking Stone) Threat Modelling for Web Application Deployment Ivan Ristic ivanr@webkreator.com (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /

More information

Cutting Edge Practices for Secure Software Engineering

Cutting Edge Practices for Secure Software Engineering Cutting Edge Practices for Secure Software Engineering Kanchan Hans Amity Institute of Information Technology Amity University, Noida, 201301, India khans@amity.edu Abstract Security has become a high

More information

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

Vulnerability Management in an Application Security World. March 16 th, 2009

Vulnerability Management in an Application Security World. March 16 th, 2009 Vulnerability Management in an Application Security World OWASP Minneapolis / St. Paul March 16 th, 2009 Agenda Background A Little Bit of Theatre You Found Vulnerabilities Now What? Vulnerability Management

More information

PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft

PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft Agenda Security Development Lifecycle Initiative Using PI to Protect Critical Infrastructure Hardening Advice for the PI

More information

Threat Modeling. 1. Some Common Definition (RFC 2828)

Threat Modeling. 1. Some Common Definition (RFC 2828) Threat Modeling Threat modeling and analysis provides a complete view about the security of a system. It is performed by a systematic and strategic way for identifying and enumerating threats to a system.

More information

8070.S000 Application Security

8070.S000 Application Security 8070.S000 Application Security Last Revised: 02/26/15 Final 02/26/15 REVISION CONTROL Document Title: Author: File Reference: Application Security Information Security 8070.S000_Application_Security.docx

More information

Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current

More information

Open Web Application Security Project Open source advocacy group > web security Projects dedicated to security on the web

Open Web Application Security Project Open source advocacy group > web security Projects dedicated to security on the web Presented by: Mike Grima Open Web Application Security Project Open source advocacy group > web security Projects dedicated to security on the web 1 OWASP Top 10 OWASP Testing Framework (Testing Guide)

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft sarbari@electrosoft-inc.com 703-437-9451 ext 12 The Foundation

More information

Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services roblab@microsoft.com

Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services roblab@microsoft.com Microsoft Security Development Lifecycle for IT Rob Labbé Application Consulting and Engineering Services roblab@microsoft.com The Reasons for Secure Software There are many threats to data and systems

More information

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright 2015. Security Compass. 1

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright 2015. Security Compass. 1 LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3 Copyright 2015. Security Compass. 1 CONTENTS WHY SECURITY COMPASS...3 RECOMMENDED LEARNING PATHs...4 TECHNICAL LEARNING PATHS...4 BUSINESS / SUPPORT

More information

Web Application Security Considerations

Web Application Security Considerations Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute

More information

Adobe Systems Incorporated

Adobe Systems Incorporated Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities

More information

Threat Modeling. Deepak Manohar

Threat Modeling. Deepak Manohar Threat Modeling Deepak Manohar Outline Motivation Past Security Approaches Common problems with past security approaches Adversary s perspective Vs Defender s perspective Why defender s perspective? Threat

More information

Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 sales@redhawksecurity.com 866-605- 6328 www.redhawksecurity.

Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 sales@redhawksecurity.com 866-605- 6328 www.redhawksecurity. Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July

More information

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP) Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage

More information

Software Application Control and SDLC

Software Application Control and SDLC Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to

More information

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that

More information