Survey on Application Security Programs and Practices
|
|
|
- Suzanna Richard
- 10 years ago
- Views:
Transcription
1 Survey on Application Security Programs and Practices A SANS Analyst Survey Written by Jim Bird and Frank Kim Advisor: Barbara Filkins February 2014 Sponsored by Hewlett-Packard, Qualys and Veracode 2014 SANS Institute
2 Executive Summary This is the SANS Institute s second survey on application security programs and practices. In this year s survey, we wanted to uncover answers to the following questions: How widespread are application security programs, and how mature are the programs that are in place today? How effective are these programs? What practices and tools are organizations relying on the most today, and what are they finding the most useful? How is secure coding training for developers being done, and how effective is this training? How are people justifying spending on Appsec, and where are they spending most of their efforts? Does this spending align with organizational risk? What will the future of Appsec look like? Are organizations planning to invest more in Appsec? And what programs or technologies are on their future roadmaps? We asked some of the same questions in our first survey on application security practices, 1 just in a different way. Some of the trends we identified include the following: There was a significant improvement in the number of organizations implementing application security programs and practices. The percentage of organizations that have an active Appsec program increased from 66% last year to 83% this year and many of the organizations that do not have a program in place yet are at least following some kind of ad hoc security practices. Organizations continue to rely heavily on dynamic testing, vulnerability scanning and penetration testing to find security vulnerabilities. Organizations are testing more frequently. In this year s survey, more than onethird are doing continuous, ongoing security testing of their applications, whereas only 23% indicated doing so in our 2012 survey. The primary focus of most Appsec programs continues to be web applications, because this is where organizations see the highest security risks. Organizations continue to face the same kinds of challenges in getting management buy-in for application security programs. But the leading inhibitor for putting effective Appsec programs in place is now a shortage of application security skills, whereas in last year s survey, the leading inhibitor was management buy-in and funding. In this year s survey, organizations also ranked technical resources to maintain security in production as their fourth most difficult problem
3 Survey Participants The 488 respondents to this survey represented a broad range of industries. In this year s survey, financial services (17%), government (15%), other (13%) and high-tech firms (9%) led the way; similarly, in last year s survey, financial services and government were tied at 17% each and high-tech followed the other category. Although not the next in terms of representation, it is noteworthy that 6% of respondents came from application development houses. Figure 1 illustrates the diversity of the industries represented in this survey. What is your organization s primary industry? 39 % Percentage of respondents from organizations with 1,000 or fewer employees Figure 1. Industries Represented in the Survey Application security is a consideration for every organization, regardless of size. Small and mid-size organizations and large enterprises were all included in the survey, as illustrated in Figure 2. How many people work at your organization, either as employees or consultants? Figure 2. Sizes of Organizations 2
4 Survey Participants (CONTINUED) One-quarter of the respondents worked in very large enterprises of more than 15,000 people, and almost 39% were from organizations with 1,000 or fewer people, lending a representative sampling of organizational size to the survey results. We also asked participants to identify the principal role they play in their organization (whether as a consultant or an employee). Most respondents were from the security community, as shown in Figure 3. What is your primary role in the organization? 44 % Percentage of respondents who are security analysts or security managers Figure 3. Participant Roles Security analysts or security managers made up 44% of the sample. Software developers (developers, engineers, architects and testers) accounted for 12%, and IT managers and executives also accounted for 12%. IT operations was also well represented, with 14% of the respondents in system admin or network engineering. Approximately 28% of the respondents are in a management or executive role. 3
5 Applications in Your Organizations To further refine our understanding of survey responses, we wanted to know how big the application development teams were in our responding organizations. Figure 4 shows the number of developers employed by responding organizations. What is the size of your application development team in your organization? 30 % Percentage of respondents with development teams of fewer than 25 developers Figure 4. Size of Application Development Teams Although 10% of respondents had software development organizations with more than 2,000 developers, 30% of development teams were small, with fewer than 25 developers and 6% of respondents had no developers at all, relying completely on third parties for software development. There seems to be a distinction between the practices for designing and developing applications. Although most organizations design their systems internally, either using their own employees (75%) or consultants (38%), fewer use internal employees (52%) or consultants (33%) to develop the applications after design, as shown in Figure 5. 4
6 Applications in Your Organizations (CONTINUED) What resources do you primarily utilize for the design and development of your aplications? Figure 5. Resources Responsible for Application Design and Development Only 18% of respondents hire third-party firms to complete their application design work, and 22% hire third parties to do their development work. A full 41% of respondents also rely on commercial off the shelf (COTS) applications, and just under 24% of firms rely on open source software. 5
7 Applications in Your Organizations (CONTINUED) Application Development Priorities Where are organizations spending most of their development dollars? Web applications and business-critical apps, which are often the same, (both at 67%) stand well above the others as recipients of development dollars, as shown in Figure 6. Where are most of your software development/it resources being spent? 67 % Figure 6. Software Development Percentage of responding organizations spending most of their development on web applications and business-critical apps Mobile applications (28%) are becoming a major focus for organizations, ahead of spending on legacy apps (25%). Application Security Risks In last year s survey, we asked what kinds of applications posed the biggest security risks to an organization. In order, the results were: Customer-facing web apps (by far the highest risk) Internal web apps Mobile apps Legacy apps and CRM/databases (usually accessed through Web and mobile channels) 6
8 Applications in Your Organizations (CONTINUED) This year s survey didn t distinguish between types of web apps, but it s clear that the highest security risk continues to come from web applications, with 38% selecting this as their biggest application risk area, and business-critical applications (19%), as shown in Figure 7. Which of these pose the biggest security risk to your organization? 38 % Percentage of respondents who see web applications as their highest application security risk Figure 7. Application Security Risks Mobile risk has slipped in the ranking, with only 6% feeling that to be their biggest risk; only 7% see cloud-based services as a major security risk. Organizations also continue to downplay the risks of working with third parties, whether COTS providers (8%) or outsourced development organizations (3%). 7
9 Application Security Programs We wanted to know how many Appsec programs are in place, how long they have been in place, how administrators justify their programs, and what practices and tools people rely on the most. Maturity of Appsec Programs Almost 74% have programs that have been in place for at least one year, and more than one-third (37%) have programs that have been running for more than five years (see Figure 8). How long has your organization been practicing application security, or how long has your application security program been in place? Figure 8. Maturity of Appsec Programs Even in organizations that don t have a formal program today, most (79% of those without a formal program) are following ad hoc Appsec practices. The number of organizations with an active Appsec program has increased significantly over the past year. Table 1 shows how the maturity of programs has changed since our 2012 survey. Table 1. Growth in Appsec Programs How Long Has Your Appsec Program Been in Place? No formal program 34.3% 16.9% Less than 1 year 9.8% 9.0% 1 to 5 years 32.9% 36.7% More than 5 years 22.9% 37.3% 8
10 Application Security Programs (CONTINUED) Justification of Appsec Program Support Earlier this year, John Pescatore at the SANS Institute analyzed the different approaches and tools that organizations can use to secure management support and funding for an application security program. He reported the following options: 2 Using a publicized incident to illustrate risk/benefit Managing regulatory pull meeting regulatory requirements such as PCI, NIST, HIPAA, FDA and NERC Taking advantage of industry governance standards (ITIL, COBIT and ISO 27034) Capability Maturity Models (Cigital s BSIMM or OWASP s OpenSAMM) Industry benchmarking Our survey results quantify the use of these options. Organizations are taking proactive and reactive approaches to justifying application security spending, as illustrated in Figure 9. How do you justify funding for your Appsec program? Figure 9. Justifications for Appsec Spending 2 9
11 Application Security Programs (CONTINUED) Risk analysis based on industry benchmarks is used to justify spending by 43% of organizations, and 21% benchmark spending to justify their programs. Reactive approaches include justifying spending in response to audit findings (39%), a security incident (26%) and customer demands (25%). Responding to customer demands is a driver that we identified in last year s survey: Organizations, especially large enterprises, are being pushed more by their customers, and are, in turn, pushing their software and software-as-a-service (SaaS) suppliers to implement responsible Appsec programs. Costs for Appsec programs are being included in general IT security programs 33% of the time, in regulatory compliance programs 31% of the time, and in specific IT programs or project budgets 27% of the time. Only 17% of Appsec costs are included in software quality spending. Most of the justifications for Appsec spending are focused on security, compliance and risk management not on enabling the business or supporting the business strategy. Spending on application security programs will continue to lag until the information security team can make an explicit connection not just to incidents and hacking or staying up-to-date on compliance requirements, but also to enabling business strategy and meeting customer demands. Support of Appsec Programs On the whole, Appsec initiatives seem to be aligned with where organizations are spending development and IT dollars and to where organizations see the greatest risk. The priorities for Appsec security spending are highlighted in Figure 10 and align closely with development spending (Figure 6) and perceived risks (Figure 7). 10
12 Application Security Programs (CONTINUED) What application categories does your application security program primarily focus on? Most organizations are focusing their Appsec programs where it makes the most sense today, on where they are spending most of their development dollars. Web applications Business-critical applications Mobile applications Legacy applications Figure 10. Appsec Spending Priorities Most organizations are focusing their Appsec programs where it makes the most sense today, on where they are spending most of their development dollars: web apps (80%) and business-critical apps (72%), which are often the same. But they are also trying to keep pace with emerging threats. While only 27% of development/it resources are being spent on developing mobile apps, 35% of organizations are focusing their Appsec attention on mobile security issues; and application security focus on cloud implementations (23%) matches the amount of development and other IT resources spent in this area (19%). Cloud applications Third-party applications (commercial off the shelf [COTS]) Open-source applications Embedded applications, such as those in cars, medical devices and phones Other However, even though 23% of respondents rely heavily on third-party software products and services (COTS, cloud-based services and open source software), they are not taking enough responsibility for ensuring the security of third-party solutions. Only 23% of security programs include COTS. The same is true for cloud services, and only 14% focus on open source software. 11
13 Application Security Programs (CONTINUED) This situation should improve as the security industry continues to highlight the risks of relying on outsource and third-party providers and the open source community to police themselves. For example, a recent study conducted by Sonatype and Aspect Security 3 on the use of open source software found that more than 50% of Global 500 organizations are using open source code with known security vulnerabilities. In 2013, OWASP added the use of insecure third-party software components to the OWASP Top 10 risk list, 4 a widely used application security risk management tool. The Financial Services Information Sharing and Analysis Center (FS-ISAC) 5 published a set of guidelines that banks and other organizations can use to assess the application security programs of their software and software service providers, and SAFECode and the Cloud Security Alliance 6 released a new set of guidelines for securing cloud applications
14 Assessing Appsec Tools and Practices Organizations are using multiple technologies and services in the attempt to protect their applications. In last year s survey, we found that the technologies or practices most used by organizations in their security programs were (in order of use): static analysis testing, dynamic analysis testing, pen testing, third-party assessments, application firewalls and virtual patching. This year we asked organizations to rate which Appsec tools and practices they found the most useful. The tools and practices that ranked the highest include application penetration testing, testing with dynamic analysis (DAST) or vulnerability scanning tools, and using application firewalls to detect or block attacks, as shown in Figure 11. What security practices do you wrap around your applications? Please rate how helpful they are. Organizations are using multiple technologies and services in the attempt to protect their applications. Penetration Testing Dynamic analysis (vulnerability scanning) Application firewalls Secure coding standards and review Compliance reviews/audits Intrusion prevention Secure development lifecycle training for developers Secure libraries/frameworks Security assessment of third-party software/services Secure system operations/devops Static analysis (source or binary) Virtual patching Threat modeling Other Figure 11. Effective Appsec Security Practices But organizations are not getting as much value as they should out of other practices, especially virtual patching, secure Devops, static analysis (SAST) and threat modeling. 13
15 Assessing Appsec Tools and Practices (CONTINUED) Virtual Patching Virtual patching builds on the effective use of application firewalls, as well as application security testing, and requires the close coordination of Infosec and Operations. It involves setting up an application firewall in blocking mode, testing and finding vulnerabilities in an online application, taking the testing results and creating signatures or rules for the firewall to block attacks against these vulnerabilities, and implementing these rules in production. Virtual patching is intended to be a temporary solution until the development team can fix the code or for use when the organization doesn t have access to the code (for example, patching a security vulnerability in commercial thirdparty software). But it s time-consuming and difficult to scale, even when using dynamic testing tools and firewalls that are designed to work together. Secure System Operations/Devops With continued adoption of Agile development and the demand for faster timeto-delivery, we expect more organizations to take up Devops practices such as infrastructure as code and Continuous Delivery or Continuous Deployment, which build on standardized configuration management for infrastructure and applications, automated deployment and fast feedback loops between operations and development. Security checks and balances can and should be built into all of the steps involved, from automated security testing in Continuous Integration through to deployment checks and run-time security self-tests (following the example of Netflix s Simian Army). 7 Static Analysis While Infosec can run a dynamic scan or pen test on the system and pass the results back to development to be fixed, SAST (scanning source code or binaries for common security vulnerabilities and bug patterns) requires more hands-on involvement from developers because it works directly on the code. Developers have to assist with setup, take the time to review and understand what the tools find and then weed through all of the false positives before they can begin triage, fix bugs and roll out patches. Although suppliers continue to improve the speed and accuracy of SAST tools and make them easier to use, developers need security training or expert help to understand what the tools are telling them, which vulnerabilities are important, why they need to be fixed and how to fix them. Developers and managers need to be convinced that all of this is worth their time. Although bridging the gap between Infosec and development teams and getting developers to use static analysis testing effectively can take time and effort, it can also pay dividends by providing a much faster feedback loop. By running static analysis checks frequently, developers can find out quickly when they have made a mistake and they can fix the problem while they are still working on the code, rather than waiting days or weeks or months for the results of a penetration test. Finally, the cost of static analysis tools is an issue for many organizations. Good commercial tools are expensive and are generally out of the reach of all but large enterprises, which account for only 25% of the respondents to this survey
16 Assessing Appsec Tools and Practices (CONTINUED) Threat Modeling Static analysis testing is one way that organizations can solve security problems early in development. Threat modeling is another. More than 75% of the organizations surveyed design applications in-house. However, only a small percentage of them do threat modeling or find it useful. Threat modeling understanding and managing security threats in application architecture and design through a structured process that involves developers and security experts working together demands a significant commitment from the development organization. The shortage of application security skills noted earlier is also a major limiting factor here. It is difficult to find security engineers who understand application design and architecture and application architects who understand security risks in application design. Organizations need less-expensive alternatives to threat modeling in order to identify and manage application security risks up front. Most enterprises whose main business is not selling software or SaaS cloud services should at least focus on higher-level strategic threat modeling to understand what threat actors will likely target the organization and which applications are likely to be the targets of attack. They can then use this information to prioritize Appsec initiatives across the application portfolio and to build a business case for funding them. Smaller software development organizations, especially Agile development teams, should adopt lighter weight, incremental approaches to add security risk and threat analysis into architecture and design. Threat modeling, as it is commonly described, 8 is a formal, document-heavy security walkthrough of system design artifacts and does not work well for teams following Agile development practices, where design details are worked out iteratively and incrementally and the design is always in flux. Dr. Gary McGraw, for one, has recently outlined a simpler, more scalable method for application risk assessment called a Security Architecture Survey. 9 As he points out, although this kind of analysis is less comprehensive and less robust than more formal techniques, organizations are more likely to do it because this analysis is much less expensive and more scalable
17 Application Testing We asked our respondents how frequently they assess the security of their businesscritical applications that were in production. Figure 12 shows the frequency of testing reported in this survey. In general, how frequently do you assess the security of your business-critical applications that are in production? The frequency at which organizations are doing security testing has increased significantly over the past year. Figure 12. Frequency of Testing The frequency at which organizations are doing security testing has increased significantly over the past year, as illustrated in Table 2, which shows our 2012 survey results compared to the 2014 results. Table 2. Comparison of Testing Results Frequency of Security Testing for Applications in Production No security testing done 13.5% 2.7% Only when applications are updated, patched or changed 21.3% 10.1% Every year 14.3% 19.5% Every three months 18.0% 12.1% Once a month 9.5% 8.1% Ongoing, continuous testing 23.3% 35.6% Only a small percentage of the organizations surveyed are not doing application security testing today (2.7%). More organizations are taking advantage of automated testing tools and practices and SaaS testing services to do ongoing, continuous testing. This is especially important where development teams are adopting Agile development methods to make continuous incremental changes to software. 16
18 Developer Appsec Training Training in secure software development ranked low in the list of practices that organizations find useful. Figure 13 shows the distribution of secure code training programs. Choose the option that best describes your secure code training program. 26 % Approximate percentage of organizations with an ongoing secure coding training program that was working well or was mandated Figure 13. Use of Secure Code Training Programs Slightly fewer than 26% of organizations had ongoing secure coding training programs that were working well or were mandated for all development. But almost half of organizations (41%) have programs that are not consistently implemented or are not consistently being followed, and another 27% did not train developers in secure coding at all. 17
19 Application Security Challenges Now and the Future In rating the effectiveness of their organization s Appsec programs, approximately 28% felt that their programs were exceptional (3%) or above average (25%). The majority of respondents felt that their programs needed improvement (54%) or even complete rework (10%), as shown in Figure 14. How would you rate your organization s current application security program? Figure 14. Effectiveness of Current Appsec Programs Breaches Caused by Application Vulnerabilities The lack of effective Appsec programs is highlighted by the number of organizations that experienced security breaches as a result of application vulnerabilities in the last 18 months. As shown in Figure 15, 29% of responding organizations experienced at least one security breach as a result of application vulnerabilities in the last 18 months, with 14% experiencing 3 5 breaches and 3% experiencing at least 10 breaches. 18
20 Application Security Challenges Now and the Future (CONTINUED) Has your organization experienced one or more security breaches as a result of application vulnerabilities in the last 18 months? No not that we are aware of Yes at least one breach Yes three to five breaches Yes at least 10 breaches Yes more than 10 breaches Figure 15. Security Breaches as a Result of Application Vulnerabilities Most of these breaches were reported by larger organizations. Because of their size, they offer a much larger attack surface, they are generally more interesting targets to nonopportunistic hackers, and they have the resources to detect breaches and to determine the root cause. More small organizations may have been breached because of a software vulnerability without being aware of it, as shown in Figure 16. Number of Breaches Suffered by Size of Organization Fewer than ,000 1,001-5,000 5,001-10,000 10,001-15,000 More than 15,000 Yes, we ve experienced more than 10 breaches Yes, we ve detected at least 10 breaches Yes, we ve experienced a few (3-5 breaches) Yes, we ve experienced one breach No, we re not aware of any application-based attacks 0% 5% 10% 15% 20% Figure 16. Number of Breaches Suffered by Size of Organization 19
21 Application Security Challenges Now and the Future (CONTINUED) Challenges to Implementing an Effective Appsec Program Many large enterprises (38%) do not have sufficient control over their application portfolios and cannot identify all of the applications that they need to secure. And organizations continue to struggle with creating an effective bridge between security and in-house, outsourced and third-party development (34%). Figure 17 illustrates the results. What are the biggest challenges in implementing your application security program? the number one challenge facing most organizations this year, edging out lack of funding and management buy-in, is a lack of Appsec security skills to develop organizational programs and secure production systems. Figure 17. Implementation Challenges Testing makes up the backbone of many application security programs today. The good news is that testing getting access to the tools and resources to do security testing for new applications and for legacy applications is not holding organizations back. But the number one challenge facing most organizations this year, edging out lack of funding and management buy-in, is a lack of Appsec security skills to develop organizational programs and secure production systems (46%). 20
22 Application Security Challenges Now and the Future (CONTINUED) Plans for Spending on Appsec Although lack of funding or management buy-in is the second largest challenge facing organizations, the picture may be improving. Respondents indicated that their organizations, in general, expect to spend more on Appsec in the coming year (see Figure 18). How do you expect your application security spending to change in the next year? 58 % Percentage of respondents expecting to spend more on Appsec programs in the coming year More than half (58%) of responding organizations expect to spend more money on their Appsec programs over the next year: almost 38% expect to spend a bit more; almost 21% expect to spend a lot more. Only a very small percentage (3%) will spend less, and 29% expect no change in funding. Future Ideas and Roadmap Figure 18. Appsec Spending Finally we asked respondents to list future plans, ideas and technologies that they are looking at to improve their Appsec programs. Most organizations have no clear next steps on the future roadmap. Some are looking at application security practice maturity models like Cigital s Build Security in Maturity Model (BSIMM), 10 OWASP s OpenSAMM 11 or Application Security Verification Standard (ASVS) 12 as guidelines. A few are evaluating advanced intrusion prevention systems and cloud-based security offerings. Others are investigating how to use Big Data analytics to support their application security initiatives. But most organizations are not looking beyond their current set of ideas and tools. They still have a lot of work ahead of them
23 Conclusion Organizations are continuing to invest more in application security. Last year more than one-third of those surveyed did not have an Appsec program in place. More than 80% have formal programs in place, and most of these organizations are doing something about Appsec now or are planning to implement a program in the coming year. More organizations will spend more on application security next year (more than 58% plan to increase spending in the next 12 months.) So far, however, most of these programs are not proving to be effective. Almost twothirds of respondents said that their programs needed to be improved, including 10% who said their programs needed a complete overhaul. Almost 29% of the organizations surveyed had experienced one or more security breaches due to an application security vulnerability in the last 18 months, and some (4%) experienced 10 or more breaches. Organizations continue to rely heavily on looking for security vulnerabilities after the fact (using black box dynamic testing and vulnerability scanning tools and services, as well as pen testing) and blocking these vulnerabilities with application firewalls and intrusion prevention systems. The good news is that organizations are taking advantage of better tools and online services to test their applications for security vulnerabilities much more frequently, even testing continuously, which could dramatically shorten vulnerability windows if developers can fix the bugs when they are found. The bad news is that organizations are not attacking the root cause of application security problems stopping developers from writing insecure software in the first place. Developers continue to create security holes because they don t understand enough about secure design, threat modeling and secure coding practices. Developers aren t taking enough advantage of static analysis tools to catch security bugs early (when they are less costly to repair), while they are still working on the code, because they don t understand what the tools are telling them. They aren t leveraging security libraries and the security features of their frameworks to reduce risks and costs because they and their managers don t know that it is important. A lack of knowledge and skills is holding back Appsec programs today, and it is preventing organizations from making real progress in Appsec in the future. The number one obstacle to success reported in this year s survey is a shortage of skilled people, part of a bigger problem facing the IT security industry in general, as recent studies by Forrester Research 13 and (ISC)2 14 show. Training and education are needed to address this skills shortage not just training more Infosec and Appsec specialists, but training developers and managers, too. Fewer than one-quarter of respondents have training programs that are ongoing and working well, and secure coding training ranks low in the list of practices that organizations depend on in their Appsec programs today. This needs to change. There aren t any next generation tools or other silver bullets on the horizon that will solve the problem of secure software. Writing secure software is about fundamentals: thoughtful design, careful coding, disciplined testing and informed and responsible management. The sooner that organizations understand this and start doing it the sooner they will solve their security problems
24 About the Authors Jim Bird is an application development manager and CTO with more than 25 years of experience in software engineering, with a special focus on high-integrity and highreliability systems. Jim is currently the co-founder and CTO of a major US-based institutional trading service, where he is responsible for managing the company s technology organization and information security programs. Jim has worked as a consultant to IBM and to major stock exchanges and banks globally. He was also the CTO of a technology firm (now part of NASDAQ OMX) that built custom IT solutions for stock exchanges and national clearinghouses in more than 30 countries. Jim is an active contributor to OWASP, helps out with the SANS Appsec blog and blogs on Agile software development, project management and application security topics at Building Real Software. Frank Kim is a security leader with more than 16 years of experience in information security, risk management and enterprise IT. He has a passion for developing security strategies and building teams focused on practical solutions to business risks. He currently serves as the curriculum lead for application security at the SANS Institute and is the author of the Secure Coding in Java course. Frank is a popular public speaker and has presented at security, software development and leadership events around the world. Sponsors SANS would like to thank this paper s sponsors: 23
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Application Security 101. A primer on Application Security best practices
Application Security 101 A primer on Application Security best practices Table of Contents Introduction...1 Defining Application Security...1 Managing Risk...2 Weighing AppSec Technology Options...3 Penetration
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
Your world runs on applications. Secure them with Veracode.
Application Risk Management Solutions Your world runs on applications. Secure them with Veracode. Software Security Simplified Application security risk is inherent in every organization that relies on
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
The AppSec How-To: Achieving Security in DevOps
The AppSec How-To: Achieving Security in DevOps How do you integrate security within a Continuous Deployment (CD) environment - where every 5 minutes a feature, an enhancement, or a bug fix needs to be
Appropriate Software Security Control Types for Third Party Service and Product Providers
White Paper Third Party Software Security Working Group Appropriate Software Security Control Types for Third Party Service and Product Providers Third Party Software Security Working Group 1 2 Third Party
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
How To Improve Security In An Organization
Protecting the organization against the unknown A new generation of threats February 2014 Contents Scope of the research 3 Research methodology 3 Aims of the research 3 Summary of key findings 4 IT security
Application Security Center overview
Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &
BIG SHIFT TO CLOUD-BASED SECURITY
GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
HP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Cloud Computing. Exclusive Research from
2014 Cloud Computing Exclusive Research from Cloud Computing Continues to Make Inroads Companies are expanding their use of cloud as they work through implementation and organizational challenges Cloud
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL
APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL Charles Henderson Trustwave SpiderLabs Session ID: Session Classification: SPO2-W25 Intermediate AGENDA One size rarely fits all Sizing up an application
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Cyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
Enterprise Data Governance
DATA GOVERNANCE Enterprise Data Governance Strategies and Approaches for Implementing a Multi-Domain Data Governance Model Mark Allen Sr. Consultant, Enterprise Data Governance WellPoint, Inc. 1 Introduction:
AUTOMATED PENETRATION TESTING PRODUCTS
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for an automated penetration testing product and demonstrate
Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper
Integrating Application Security into the Mobile Software Development Lifecycle WhiteHat Security Paper Keeping pace with the growth of mobile According to the November 2015 edition of the Ericsson Mobility
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
HP and netforensics Security Information Management solutions. Business blueprint
HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
case study Coverity Maintains Software Integrity of Sun Microsystems Award-Winning Storage Products
case study Coverity Maintains Software Integrity of Sun Microsystems Award-Winning Storage Products 25% of the defects identified by Coverity would have stalled a product launch and delayed time to market
Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute
Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute 1 Executive Summary The Ponemon Institute recently conducted a cybersecurity
Software Application Control and SDLC
Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to
IBM Rational AppScan: enhancing Web application security and regulatory compliance.
Strategic protection for Web applications To support your business objectives IBM Rational AppScan: enhancing Web application security and regulatory compliance. Are untested Web applications putting your
Enabling Continuous Delivery by Leveraging the Deployment Pipeline
Enabling Continuous Delivery by Leveraging the Deployment Pipeline Jason Carter Principal (972) 689-6402 [email protected] Pariveda Solutions, Inc. Dallas,TX Table of Contents Matching
Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC
From Security Assessment to Vulnerability Remediation: The Realities of Deploying a Cloud-Based Application Risk Management Solution Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC Setting the
Improve Your Business Through Best Practice IT Management. A White Paper Prepared for Kaseya September 2007
A White Paper Prepared for Kaseya September 2007 Table of Contents Executive Summary...1 Introduction...1 The Role of Best Practices in Managing IT Services...1 Profitability...1 Reliability...2 Best Practices
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers Dan Cornell OWASP AppSec DC 2010 November 11 th, 2010 Overview The Problem Information Gathering Application Scoring Risk Rank
Cloud Infrastructure Security Management
www.netconsulting.co.uk Cloud Infrastructure Security Management Visualise your cloud network, identify security gaps and reduce the risks of cyber attacks. Being able to see, understand and control your
Making HR Simpler. A Guide to HR Software in the Cloud
Making HR Simpler A Guide to HR Software in the Cloud Index Introduction 3 Everyone Wins 4 What is the Cloud and where does SaaS fit in? 4 What are the benefits? 5 Food For Thought 7 Questions to Ask 8
Maximize the synergies between ITIL and DevOps
BEST PRACTICES WHITE PAPER Maximize the synergies between ITIL and DevOps By Anthony Orr, Director of Service Management, Office of the CTO, BMC Software TABLE OF CONTENTS EXECUTIVE SUMMARY...............................................
IBM Innovate 2011. AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC [email protected] Application Security & Compliance
IBM Innovate 2011 Bobby Walters Consultant, ATSC [email protected] Application Security & Compliance AppScan: Introducin g Security, a first June 5 9 Orlando, Florida Agenda Defining Application Security
NETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES
NETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES September, 2015 Derek E. Brink, CISSP, Vice President and Research Fellow IT Security and IT GRC Report Highlights p2 p4 p6 p7 SMBs need to adopt a strategy
Achieve Economic Synergies by Managing Your Human Capital In The Cloud
Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid
How to Justify Your Security Assessment Budget
2BWhite Paper How to Justify Your Security Assessment Budget Building a Business Case For Penetration Testing WHITE PAPER Introduction Penetration testing has been established as a standard security practice
Avoiding the Top 5 Vulnerability Management Mistakes
WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability
Simply Sophisticated. Information Security and Compliance
Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns
Agile and Secure: OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/
Agile and Secure: Can We Be Both? OWASP AppSec Seattle Oct 2006 Dan Cornell, OWASP San Antonio Leader Principal, Denim Group Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation
TALENT OPTIMIZATION. Transforming HR and Human Capital Management for Business Growth
TALENT OPTIMIZATION Transforming HR and Human Capital Management for Business Growth TALENT OPTIMIZATION Transforming HR and Human Capital Management for Business Growth THE TALENT OPTIMIZATION OBJECTIVE
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
Agile Security Successful Application Security Testing for Agile Development
WHITE PAPER Agile Security Successful Application Security Testing for Agile Development Software Security Simplified Abstract It is an imperative to include security testing in application development.
White. Paper. Rethinking Endpoint Security. February 2015
White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
See what cloud can do for you.
See what cloud can do for you. Uncomplicating cloud business Table of contents Introduction 3 Why cloud is relevant for your business? 4 What is changing? 4 Why organizations are moving to cloud 5 What
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
Minimizing code defects to improve software quality and lower development costs.
Development solutions White paper October 2008 Minimizing code defects to improve software quality and lower development costs. IBM Rational Software Analyzer and IBM Rational PurifyPlus software Kari
GOVERNANCE MOVES BIG DATA FROM HYPE TO CONFIDENCE
GOVERNANCE MOVES BIG DATA FROM HYPE TO CONFIDENCE By Elliot King, Research Analyst Produced by Unisphere Research, a Division of Information Today, Inc. June 2014 Sponsored by 2 TABLE OF CONTENTS Introduction
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
Moving to the Cloud? DIY VS. MANAGED HOSTING
Moving to the Cloud? DIY VS. MANAGED HOSTING 12 Factors To Consider And Why You Should Be Looking for a Managed Hosting Provider For Your Site or Application as You Move to the Cloud Your site or application
October 7, 2011. Presented to. The PMI Washington DC Chapter. Pedro Agosto. Director of Client Services, XA Systems, LLC. pedro.agosto@xasystems.
October 7, 2011 Presented to The PMI Washington DC Chapter By Pedro Agosto Director of Client Services, XA Systems, LLC [email protected] Introduction Re-evaluating IT Services Today s Challenges
Crossing the DevOps Chasm
SOLUTION BRIEF Application Delivery Solutions from CA Technologies Crossing the DevOps Chasm Can improved collaboration and automation between Development and IT Operations deliver business value more
