Developers and the Software Supply Chain. Andy Chou, PhD Chief Technology Officer Coverity, Inc.
|
|
|
- Everett Richardson
- 9 years ago
- Views:
Transcription
1 Developers and the Software Supply Chain Andy Chou, PhD Chief Technology Officer Coverity, Inc.
2 About Andy CTO at Coverity since 2010 Co-founder at Coverity, 2003 From five guys in a garage to 280 employees worldwide PhD, Computer Science, Stanford University, 2003 Various roles: VP Engineering, Chief Scientist, Chief Architect, Product Manager, Security Research Director 2
3 This Talk is About Three Things 1. A developer perspective on the Software Supply Chain. 2. Static Analysis: what it s good at, and what it s not. 3. Shared experience of how to do the heavy lifting of Building It Right. 3
4 Software is Eating the World - Marc Andreessen Health Financial Automotive Software Communications Mobile Enterprise SCM / Logistics 81% of business leaders believe technology is a fundamental element of their business model Over 60 million tablets and 175 million smart phones will be in the workplace by the end of 2012 By 2016, open source software will be included in mission-critical applications within 99% of Global 2000 enterprises 4
5 Supply Chain Code Flow Producer Delivery Δ Δ Δ Δ Consumer Commercial developer Open source developer System Integrator Consultant IT department Appsec team Third party assessor User Developer! 5
6 Security Checkpoint Model Producer Checkpoint Delivery Consumer NIST SP Static Analysis Dynamic Analysis Simulations White/grey/black box testing Fuzz testing Pen testing Signing Development process inspection 6
7 Security Checkpoint Model Producer Checkpoint Delivery Consumer NIST SP Static Analysis Dynamic Analysis Simulations White/grey/black box testing Fuzz testing Pen testing Signing Development process inspection 7
8 More Complex Supply Chain A Hard Problem... Producer Consumer 8
9 More Complex Supply Chain Not any easier... Producer Producer Consumer Open Source 9
10 Static Analysis Core Technology Code Defects char *p Static Analysis Verification Engine true p = 0 true... if (x == 0) false p = foo() if(x!= 0) false s=*p return 10
11 Static Analysis Characterization Static Analysis (SA) inspects software artifacts (1) to identify defects without execution. Ranges in complexity from text pattern matching to full formal verification. Only SA has all of these desirable characteristics: Automatic Objective Scales to large code bases (>10MLOC) Coverage of every line of code Repeatable and deterministic 11
12 Static Analysis Drawbacks False Positives (FP): reported issues that turn out to be incorrect False negatives (FN): real defects that were not identified FN FP Real Defects Static Analysis Findings 12
13 Checkpoint Use Case Problems Producer Delivery Consumer Reject SA Defects Caught defects pre-accept Provided feedback to Producer False positives Highly inefficient looping cycle Source code access restrictions Strong incentive to accept defects 13
14 False Positives Producer Delivery Consumer SA Reject Issues Defects False Positives??? 14
15 False Positives False positives are hard to triage without understanding the code. Bugs get fixed. False positives accumulate. Over time, FP rate approaches 100%. False positives can be tracked, but it can become difficult to manage over many products and many versions. Defects Issues False Positives??? 15
16 Inefficient Looping cycle Each time defects go back to the developer, it causes a new testing cycle. This is likely to conflict with the developer s next release development and planning. This increases resistance to patching. Each consumer may have a different process or tool for review, leading to overlapping yet inconsistent results. Producer Reject Delivery Defects SA 16
17 Source code access Without source code, it is very difficult to triage correctly. It is exceedingly difficult to get most development organizations to give up their code. Even with the code, most consumers of software would not be able to understand the code well enough to triage defects correctly. 17
18 Organizational Incentives Developers are pressured by their organizations to deliver more, faster. Managers and Executives care about predictable delivery of differentiating features to market. Quality, Security, and many other attributes of software are not as easily measured as other attributes. 18
19 Straw Poll of Top Development Concerns Time to market, reduce cycle time Quality - Usability, Maintainability, Scalability, Security - CWE 25, OWASP 10 Development talent - Evaluating, Visibility Compliance - various standards Cost - Reduce development cost Open Source - Managing Quality and Security Cloud - Develop and testing applications Supply chain - quality and security
20 One of the Many Ways to Drive a Release Development start Feature Freeze Integration Freeze Release Freeze GA Issues: Feature Development W/o a clear metric for quality of features at FF, it is impossible to predict how long it will take to stabilize the release Features are complete 1 st round of QA Integration complete 2 st round of QA As a result, product is shipped when the GA date comes Final E2E QA
21 What s Wrong With This Picture? Producer Consumer Power to fix code. Accountable for broken software. Culture is the hardest, most important problem of all. 21
22 Only Developers Can be Highly Effective with Static Analysis 22
23 Developer-Centric Assurance Model Policy SA Producer Delivery Consumer Assurance Evidence Defects addressed in the inner loop of development 23
24 Static Analysis is in the SDL Every-sprint practices are developer processes SA is here. 24
25 for good reasons. Developers have the source code. (1) Developers can triage defects: they know the code. (2) Developers can fix defects. (3) Incentives Adoption Alignment Effort Resistance 25
26 The Developer s World A million-line program has ~20M characters (1M lines 20 characters/line), or about 40 novels 26
27 Code hardens over time and becomes harder to change 27
28 What developers need from a SA tool Accuracy. Few false positives. Clarity. Precise explanation of defect. What is it? Where is it? Depth. It needs to beat doing something else. Remediation. How do I fix it? Speed. Find defects while the code is still fresh in the mind. Scalability. Millions to tens of millions of lines of code. Workflow. Developers work in teams. 28
29 What you get out of a good SA deployment New developers learn faster. Grade A developers become more mindful of their code. We came to fix bugs; we stayed to become better software developers Grade B developers stop making the same mistakes. Grade C developers fix defects. Grade D developers are uncovered. 29
30 Getting the Most Effectiveness Out of SA Use it for what it s good at. Don t use it for what it s not good at. At first, focus on bottom-up adoption and integration. 30
31 Integration into SDLC High Static Analysis Deployment Maturity Model Level 1 Critical defects identified and addressed, no new defects introduced Level 2 Coverity integrated with existing development tools Level 3 Gates in release/ operational acceptance process Level 4 Coverity integrated into the desktop/ide Level 5 All legacy defects eliminated, build fails if new defects are introduced Adoption High 31 Confidential: For Coverity and Partner use only. Copyright Coverity, Inc., 2012
32 How Static Analysis Tools are Developed Analyze code We pray your code works like this code. Test for scalability+ more Refinement for every defect type Triage Most time consuming. Invent new algorithms Think real hard The easy problems are NP-complete. 32
33 How Static Analysis Tools are Developed Repeat for 30-60MLOC of open source code and a few commercial partners. Analyze code Most algorithms in academic papers only work for LOC. Test for scalability+ more Refinement for every defect type Triage Common real-world code idioms are baked in. If we know about them. Invent new algorithms Think real hard 33
34 Your Code Hasn t Been Through This Refinement Process. 34
35 Defect Density (defects / kloc) Open Source vs Commercial Defect Density (2012) Commercial (260 Projects, 381 MLOC) Open Source (118 Projects, 68 MLOC) Under 100K 100K - 500K 500K - 1M Over 1M Code base size (LOC) 35
36 Issues detected Analysis of Android Gingerbread (11735 issues total) Android Component 36
37 CWE Top 25: The Right Stuff. 37
38 CWE Top 25: What is SA Good At? 38
39 CWE Top 25: What You Need Brains For. 39
40 CWE Top 25: What Can Be Scanned 40
41 CWE Top 25: For Hired Guns. 41
42 SA for C/C++ Embedded Software 42
43 SA for Java Web Application 43
44 CWE Top 25 Static Analysis Focus Lists C/C++ embedded: 1. Buffer overflow 2. Buffer size 3. Integer overflow 4. Format string 5. Command injection 6. Hard-coded credentials 7. Path traversal 8. Dangerous functions Java web app: 1. SQL Injection 2. Command Injection 3. Cross-site Scripting 4. Hard-coded credentials 5. Path traversal 6. Dangerous functions 7. Open redirect 44
45 How to Create Your Own Focus List Learn what Static Analysis is good at. Learn what languages and technologies are used by your development team. Subset the CWE 25 by what is applicable to your system, and what SA is good at detecting. Make sure you get adoption! Fix rate is everything. Review the list as SA improves or your technologies or risks change. 45
46 Security is a Multidimensional Space No state of the art tool today covers everything well Depth of Analysis Context aware Remediation Model library View technologies Framework support Interprocedural C# Javascript Java SQLI XSS Command Path Injection Traversal CWE25/OWASP10 Coverage Language Coverage Python 46 Confidential: For Coverity and Partner use only. Copyright Coverity, Inc., 2013
47 What Can be Accomplished - CERN 47
48 Getting it Right! How to Talk to Developers. Search for Coverity Security Library Free, BSD-licensed remediation library for XSS. An exemplar. 48
49 Help developers get it done. What you want to get done. How to get it right. Code!!! 49
50 Help developers get it done. Developers don t care about how the attack works. Speak in their native language code. Generic advice is no good it needs to be specific to the programming language and technology they use. E.g. How to avoid Hibernate HQL injection in Java. We need to do a better job reaching them where they are: StackOverflow, github, google search. 50
51 Technologies on the Horizon 51
52 Stimuli Response Black-Box Testing Tests are constructed w/o insight and access to application internals. When is it done? Test SW Application Component 3 Leaf G Leaf H Leaf J User Input User Output Component 1 Component 2 Leaf A Leaf B Leaf C Leaf D Leaf E Leaf F 52 For Coverity and Partner use only. Copyright Coverity, Inc., 2012
53 Change Impact Analysis Change impact analysis enables understanding of the effect of a given code change beyond the place in the code where the change occurs f34 f25 f15 Foo f90 f34 Example: changing the behavior of a function might affect the behavior of other functions that call it Impacted code f56 f f33... f77... f76 f89 f23... f54 f32 f67 Less obvious example: changing the type hierarchy might change the resolution of virtual methods, resulting in a change of behavior where those methods are called Changed code... Change ripple Legacy code 53 For Coverity and Partner use only. Copyright Coverity, Inc., 2012
54 Test Advice / Prioritization Test Advice Actionable work items to address risk due to inadequate testing Test Policy Evaluation Critical code analysis Change impact analysis Test execution analysis Customized Test Policy Test Monitoring Code Ownership and Change History Static Code Analysis 54 For Coverity and Partner use only. Copyright Coverity, Inc., 2012
55 SwA is a Process, Not a Push Button or Checkbox Today we re noticing specific vulnerabilities, but we ll never Build It Right unless we go deeply into development, understand it, and enact change from within the system. To really do SwA well requires deep insight into the processes, people, tools, skills, and especially culture of the organization producing the software. Developers play a key role, and we need to show them how to develop software right. Not merely point out what s wrong. 55
56 Questions
57 Thank You Dr. Andy Chou
58 Level 1 Centralized Build Analysis Improved process efficiency Identify & address most critical defects Memory Corruption Security Flaws Memory Leaks Crash causing defects Ensure no new defects are introduced Baseline code base Track & maintain code quality Notifications/alerts to developer/manager 58 Confidential: For Coverity and Partner use only. Copyright Coverity, Inc., 2012
59 Level 1 Centralized Analysis Process Automated daily or weekly build Assigned to relevant developers Check in Check in Check in Defects New defects Requirements definition Develop features Business Process Modeling Review defects Prioritize actions Make fixes Track progress Find & fix Check in Central source control management system or continuous integration server Defects
60 Level 2 Integrated into SDLC Integration with core development tools Improve developer productivity Notification via defect tracking systems SCM integration 1 Source file with defect 2 SCM query returns last person to edit the file 3 Owner automatically assigned to the defect #include stdio.h int main () { char * C = 0; *c = a ; Source Code Repository Latest rev: psmithers
61 Level 3 Governance/Quality Assurance Gates in release/operational acceptance process No new defects, legacy defects trend lower CCM and technical debt do not increase Validate that code has met your code governance goals before it is promoted to the next stage in the lifecycle
62 Level 4 Developer desktop analysis Integration via the IDE Identify & fix defects while working on code Development Environment Code Check-in Nightly build Fix defects locally on the developer machine Require clean code before check-in Continuous Integration/Nightly build
63 Level 5 - Coverity Clean Achieve Coverity Clean Legacy defects are eliminated Builds are failed if new defects are introduced Minimize late stage defects & churn from re-testing. Product ships with no critical defects Coverity used for testing all Life Critical software systems that are embedded in pacemaker devices. Zero Defect policy where all critical defects are prevented from making it to production. Major US Hospital Cardiac Rhythm Division 63 Confidential: For Coverity and Partner use only. Copyright Coverity, Inc., 2012
64 Scan project 64 Confidential: For Coverity and Partner use only. Copyright Coverity, Inc., 2012
How To Improve Your Software
Driving Quality, Security and Compliance in Third- Party Code Dave Gruber Director of Product Marketing, Black Duck Keri Sprinkle Sr Product Marketing Manager, Coverity Jon Jarboe Sr Technical Marketing
Detecting Critical Defects on the Developer s Desktop
Detecting Critical Defects on the Developer s Desktop Seth Hallem CEO Coverity, Inc. Copyright Coverity, Inc. 2006. All Rights Reserved. This publication, in whole or in part, may not be reproduced, stored
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Ivan Medvedev Principal Security Development Lead Microsoft Corporation
Ivan Medvedev Principal Security Development Lead Microsoft Corporation Session Objectives and Takeaways Session Objective(s): Give an overview of the Security Development Lifecycle Discuss the externally
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
How To Ensure That Your Computer System Is Safe
Establishing a Continuous Process for PCI DSS Compliance Visa, MasterCard, American Express, and other payment card companies currently require all U.S. merchants accepting credit card payments to comply
Linux Kernel. Security Report
Linux Kernel Security Report September 25 Authors: Andy Chou, Bryan Fulton and Seth Hallem Coverity has combined two years of analysis work carried out in a commercial setting at Coverity with four years
Security Automation in Agile SDLC Real World Cases
Security Automation in Agile SDLC Real World Cases Ofer Maor Director of Security Strategy, Synopsys AppSec California, January 2016 Speaker Security Strategy at Synopsys Founder of Seeker / Pioneer of
Coverity White Paper. Effective Management of Static Analysis Vulnerabilities and Defects
Effective Management of Static Analysis Vulnerabilities and Defects Introduction According to a recent industry study, companies are increasingly expanding their development testing efforts to lower their
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,
Secure and Resilient Software Development Mark S. Merkow Lakshmikanth Raghavan CRC Press Taylor& Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Group, an Informs
Levels of Software Testing. Functional Testing
Levels of Software Testing There are different levels during the process of Testing. In this chapter a brief description is provided about these levels. Levels of testing include the different methodologies
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Secure Development LifeCycles (SDLC)
www.pwc.com Feb 2014 Secure Development LifeCycles (SDLC) Bart De Win Bart De Win? 15+ years of Information Security Experience Ph.D. in Computer Science - Application Security Author of >60 scientific
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Application Security Testing How to find software vulnerabilities before you ship or procure code
Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security
Centralized Secure Vault with Serena Dimensions CM
Centralized Secure Vault with Serena Dimensions CM A single artifact repository for development, quality and operations SOLUTION BRIEF Why Security and Software engineering We re a bank not a startup,
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
Effective Management of Static Analysis Vulnerabilities and Defects
Effective Management of Static Analysis Vulnerabilities and Defects Best Practices for Both Agile and Waterfall Development Environments Matthew Hayward, Director of Professional Services, Coverity Introduction
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Development Testing for Agile Environments
Development Testing for Agile Environments November 2011 The Pressure Is On More than ever before, companies are being asked to do things faster. They need to get products to market faster to remain competitive
A Test Suite for Basic CWE Effectiveness. Paul E. Black. [email protected]. http://samate.nist.gov/
A Test Suite for Basic CWE Effectiveness Paul E. Black [email protected] http://samate.nist.gov/ Static Analysis Tool Exposition (SATE V) News l We choose test cases by end of May l Tool output uploaded
Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper
Integrating Application Security into the Mobile Software Development Lifecycle WhiteHat Security Paper Keeping pace with the growth of mobile According to the November 2015 edition of the Ericsson Mobility
Coverity White Paper. Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing
Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing The Stakes Are Rising Security breaches in software and mobile devices are making headline news and costing companies
Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services [email protected]
Microsoft Security Development Lifecycle for IT Rob Labbé Application Consulting and Engineering Services [email protected] The Reasons for Secure Software There are many threats to data and systems
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Secure Programming with Static Analysis. Jacob West [email protected]
Secure Programming with Static Analysis Jacob West [email protected] Software Systems that are Ubiquitous Connected Dependable Complexity U Unforeseen Consequences Software Security Today The line between
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Coverity Scan. Big Data Spotlight
Coverity Scan Big Data Spotlight Coverity Scan Service The Coverity Scan service began as the largest public-private sector research project in the world focused on open source software quality and security.
How to Avoid an Attack - Security Testing as Part of Your Software Testing Process
How to Avoid an Attack - Security Testing as Part of Your Software Testing Process Recent events in the field of information security, which have been publicized extensively in the media - such as the
Comparing the Effectiveness of Penetration Testing and Static Code Analysis
Comparing the Effectiveness of Penetration Testing and Static Code Analysis Detection of SQL Injection Vulnerabilities in Web Services PRDC 2009 Nuno Antunes, [email protected], [email protected] University
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006
Turning the Battleship: How to Build Secure Software in Large Organizations Dan Cornell May 11 th, 2006 Overview Background and key questions Quick review of web application security The web application
Latest Trends in Testing. Ajay K Chhokra
Latest Trends in Testing Ajay K Chhokra Introduction Software Testing is the last phase in software development lifecycle which has high impact on the quality of the final product delivered to the customer.
The AppSec How-To: 10 Steps to Secure Agile Development
The AppSec How-To: 10 Steps to Secure Agile Development Source Code Analysis Made Easy 10 Steps In Agile s fast-paced environment and frequent releases, security reviews and testing sound like an impediment
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Controlling Risk Through Software Code Governance
Controlling Risk Through Software Code Governance July 2011 Catastrophic Consequences Today s headlines are filled with stories about catastrophic software failures and security breaches; medical devices
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
SWASCAN ALL in ONE. SWASCAN Web Application SWASCAN Network SWASCAN Code Review
SWASCAN ALL in ONE SWASCAN Web Application SWASCAN Network SWASCAN Code Review SWASCAN at a Glance The first Cloud Suite Security Platform The right way to manage the Security Risk, both for web and mobile
Key Benefits of Microsoft Visual Studio Team System
of Microsoft Visual Studio Team System White Paper November 2007 For the latest information, please see www.microsoft.com/vstudio The information contained in this document represents the current view
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
Using Static Code Analysis Tools for Detection of Security Vulnerabilities
Using Static Code Analysis Tools for Detection of Security Vulnerabilities Katerina Goseva-Popstajanova & Andrei Perhinschi Lane Deptartment of Computer Science and Electrical Engineering West Virginia
Secure Development Lifecycle. Eoin Keary & Jim Manico
Secure Development Lifecycle Jim Manico @manicode OWASP Volunteer Global OWASP Board Member OWASP Cheat-Sheet Series Manager VP of Security Architecture, WhiteHat Security 16 years of web-based, database-driven
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
White Paper 6 Steps to Enhance Performance of Critical Systems
White Paper 6 Steps to Enhance Performance of Critical Systems Despite the fact that enterprise IT departments have invested heavily in dynamic testing tools to verify and validate application performance
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
! Resident of Kauai, Hawaii
SECURE SDLC Jim Manico @manicode! OWASP Volunteer! Global OWASP Board Member! Manager of several OWASP secure coding projects! Security Instructor, Author! 17 years of web-based, databasedriven software
Finding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.
Finding Your Way in Testing Jungle A Learning Approach to Web Security Testing. Research Questions Why is it important to improve website security? What techniques are already in place to test security?
case study Coverity Maintains Software Integrity of Sun Microsystems Award-Winning Storage Products
case study Coverity Maintains Software Integrity of Sun Microsystems Award-Winning Storage Products 25% of the defects identified by Coverity would have stalled a product launch and delayed time to market
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
SAP Security Recommendations December 2011. Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1.
SAP Security Recommendations December 2011 Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1.0 Secure Software Development at SAP Table of Contents 4
Minimizing code defects to improve software quality and lower development costs.
Development solutions White paper October 2008 Minimizing code defects to improve software quality and lower development costs. IBM Rational Software Analyzer and IBM Rational PurifyPlus software Kari
Software Code Quality Checking (SCQC) No Clearance for This Secret: Information Assurance is MORE Than Security
Software Code Quality Checking (SCQC) No Clearance for This Secret: Information Assurance is MORE Than Security Nominee International Security Executives (ISE ) Information Security Project of the Year
"Practical Security Testing for Web Applications"
T10 Track 5/7/2009 11:15:00 AM "Practical Security Testing for Web Applications" Presented by: Rafal Los Hewlett-Packard Application Security Center Presented at: 330 Corporate Way, Suite 300, Orange Park,
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
2012 Application Security Gap Study: A Survey of IT Security & Developers
2012 Application Gap Study: A Survey of IT & s Research sponsored by Innovation Independently Conducted by Ponemon Institute LLC March 2012 1 2012 Application Gap Study: A Survey of IT & s March 2012 Part
Copyrighted www.eh1infotech.com +919780265007, 0172-5098107 Address :- EH1-Infotech, SCF 69, Top Floor, Phase 3B-2, Sector 60, Mohali (Chandigarh),
Content of 6 Months Software Testing Training at EH1-Infotech Module 1: Introduction to Software Testing Basics of S/W testing Module 2: SQA Basics Testing introduction and terminology Verification and
Adaptive Automated GUI Testing Producing Test Frameworks to Withstand Change
Adaptive Automated GUI Testing Producing Test Frameworks to Withstand Change Abstract Although QA and Development managers may see many challenges in creating an automated GUI testing framework, it is
Fuzzing in Microsoft and FuzzGuru framework
Fuzzing in Microsoft and FuzzGuru framework OWASP-IL May-2007 John Neystadt [email protected] Lead Program Manager Forefront Edge, Microsoft Agenda Overview Introduction to Fuzzing FuzzGuru Architecture
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
Serena Dimensions CM. Develop your enterprise applications collaboratively securely and efficiently SOLUTION BRIEF
Serena Dimensions CM Develop your enterprise applications collaboratively securely and efficiently SOLUTION BRIEF Move Fast Without Breaking Things With Dimensions CM 14, I am able to integrate continuously
Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis
Integrating Security into the Application Development Process Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Agenda Seek First to Understand Source Code Security AppSec and SQA Analyzing
The Security Development Lifecycle
The Security Development Lifecycle Steven B. Lipner Director of Security Engineering Strategy Security Business and Technology Unit Microsoft Corporation Context and History 1960s penetrate and patch 1970s
