Security Touchpoints When Acquiring Software. Dr Carsten Huth Nadim Barsoum Dawid Sroka
|
|
|
- Constance Gray
- 10 years ago
- Views:
Transcription
1 Security Touchpoints When Acquiring Software Dr Carsten Huth Nadim Barsoum Dawid Sroka
2 2 Topics Context Problem Definition SDLC and Security Touchpoints Acquisition Process Conclusions
3 3 Acknowledgement A substantial part of the research for this presentation was carried out as part of EBS Protect.on Security Improvement Programme (SIP) Application Security. It is planned to train employees at E.ON in matters of Security Touchpoints When Acquiring Software.
4 CONTEXT AND PROBLEM DEFINITION
5 5 Context: Today s Landscape of SW Development & Acquisition Develop vs. acquire software Systems as a combination of acquired and developed components Open Source components The possibilities depend upon the acquisition type: Commercial off-the-shelf (COTS) Made-to-order Forced upon due to merger/acquisition or reorganization Obtained for free (normally open source)
6 6 Defining the Problem Questions: Why are we acquiring software? Address a business need Why don t we develop it? Cost vs. Benefit How do we ensure that acquired software is secure? Security Touchpoints when acquiring software
7 SDLC AND SECURITY TOUCHPOINTS
8 How does security factor into the acquisition process? Requirements Analysis Design Construction Integration & Test Software Development Life Cycle Systems Assurance Software Assurance in Planning Acquisition Process Contracting Monitoring & Acceptance Follow-on Source: Software Assurance in Acquisition and Contract Language, U.S. Department of Homeland Security 8
9 Context/Comparison: What does it take to develop secure software? Code review Architectural risk analysis Penetration testing Risk-based security tests Abuse cases Security requirements Security operations Source: Gary McGraw: Building Security In Seven Touchpoints for Software Security 9
10 Acquirer Requirement and Use Cases Test And Test Results Feedback From The Field Architecture and Design Test Plan Supplier Code Source: Gary McGraw: Building Security In Seven Touchpoints for Software Security 10
11 Abuse Cases Security Requirements Risk Analysis Penetration Testig Security Operations Acquirer Requirement and Use Cases Test And Test Results Feedback From The Field Architecture and Design Test Plan Supplier Risk-based Security Tests Code Revie w Code Acquisition Process Planning Contracting Monitoring & Acceptance Follow-on Source: Gary McGraw: Building Security In Seven Touchpoints for Software Security 11
12 Assurance Cases / Risk-Based Security Tests Design and Architecture Review Sun- Setting Security Operations Accept -ance Criteria Deliver -ables Schedule Milestones Contract Evaluate Proposals Issue RFP RFP 12 Monitoring & Acceptance Follow-on Contracting Planning Acquisition Process Supplier Evaluation Criteria Acquisition Strategy & Plan Supplier Selection & Inquiry Initial Risk Assessment Security Require -ments Short -List Suppliers Code Review (SAST) Pen- Testing (DAST) Pen- Testing (DAST)
13 13 Security Touchpoints for Acquiring Software Acquisition Type: Touchpoint: Security Requirements Abuse Cases Architectural Risk Analysis Security Tests Code Review Penetration Testing Security Operations COTS - Define security requirements (function and nonfunctional) - May not find exact fit of features Largely similar to Software Development Made to order / custom software - Define security requirements (function and nonfunctional) Largely Similar to software - Can dictate features to develop Largely similar Development to Software Development - Acquirer can develop abuse cases Vendor can be requested to cooperate and include abuse cases in test case scenarios - Acquirer may only have limited view of internal architecture of the software Vendor can be requested to submit security design and architecture documents for review - Acquirer may be involved in SDLC and given option to request architectural change as needed Vendor can be requested to submit security design and architecture documents for review Potentially security tests can be run on an evaluation version of the software. Otherwise the vendor can be requested to provide evidence of such testing Consider requesting to provide results of 3 rd party code review Acquirer does not have access to source code, but supplier can be required to provide evidence of code review results Acquirer does not have access to source code, but supplier Possibly can be required negotiate to provide evidence access of code to review results source code for direct - Can possibly negotiate access to source code for direct assessment assessment Depends on type of software: - Web client, fat client, service, mobile device, - Hosting: Hosted by Vendor or Acquirer? - Example 1: web client, hosted by Acquirer: If Acquirer has access to an evaluation version of the software, a penetration test can and should be performed - Example 2: Service, hosted by Vendor: Pen testing can only be done in agreement with Vendor, evidence of pen testing can be shared with Acquirer, or pen testing can be carried by a trusted third party Characteristic: Acquirer cannot make changes to the software. Therefore security vulnerabilities need patch management. - Bound to the mitigation schedule followed by the vendor. (Patch management, Service Level Agreements (SLAs)) - Defined support terms - Service Level Agreement (SLA)
14 ACQUISITION PROCESS PLANNING
15 15 Acquisition Process: Planning Planning Acquisition Process Contracting Monitoring & Acceptance Follow-on Determine the need for a new software solution Develop the security requirements of the system Set an acquisition strategy or plan Define evaluation criteria and plan Inquire about suppliers
16 16 Needs Determination and System Profiling What is the purpose of the software, what will it serve? How does the acquired software treat the problem? How much will it be exposed to threats? How widespread will it be? Who is liable in case of an exploit causing damage?
17 17 Identify Security Category Typical questions for a risk analysis: What is the value of the system? What software/data assets need to be protected to sustain the system? What are the potential adverse conditions to be prevented and managed? What is the impact of software unpredictability? How do security controls mitigate identified risks? How is residual risk determined and managed? - Determine impact of a breach of - Confidentiality - Integrity - Availability - Determine the Security Category / Risk Rating of the system
18 18 Develop Security Requirements Security Category will guide security requirements identification Define terminology to provide for common understanding Define levels of confidentiality, integrity and availability Establish a criteria to identify criticality of security concerns Build assurance cases SQUARE Methodology Identify acceptance criteria Identify and review system architecture Refer to regulations and organizational policies
19 19 Identify Software Alternatives Risk treatment: Accept Mitigate Avoid Transfer or share COTs Tradeoffs when mitigating risk Risk reduction vs. Increased costs vs. Decreased operational effectiveness Custom Mobile Open Source
20 20 Create Acquisition Plan Roles and responsibilities Involve personnel with significant software security experience in all acquisition stages State the expertise required and the specific involvement Roadmap for completing actions and milestones Allow for the time needed to complete security tests Special considerations in the purchase and implementation of software Define required qualifications of vendor or supplier Plan for independent testing, instead of relying too much on existing certifications or attestations, which possibly resulted from security testing a different version or configuration
21 21 Request For Proposal Considerations Identify: Request for Proposal content and format Statement of Work expectations and attachments Technical evaluation criteria and plan Incentives and penalties Deliverables Contractor monitoring and project indicators Risks pertaining to selected vendor strategy e.g. vendor unfamiliar with legacy interface Plan process for evaluating responses to RFP
22 ACQUISITION PROCESS CONTRACTING
23 23 Acquisition Process: Contracting Planning Acquisition Process Contracting Monitoring & Acceptance Follow-on Issue Solicitation/RFP Evaluate Proposals Finalize Contract
24 24 Issue Solicitation/RFP and Evaluate Proposals The Request for Proposals should include the following: Work statement Terms and conditions Instructions to suppliers Certifications Prequalification Subject Matter Experts (SMEs) should evaluate each proposal along with the evidence provided to support answers to the due diligence questionnaire Sample questionnaire: Software Assurance Due Dilligence Questionnaires:
25 Due Diligence Questionnaires Help evaluate criteria Evidence should be requested or on-site follow-up reviews should verify the answers Help address following concerns: Organizational history Foreign interests and influences Security track record Financial history and status Individual malicious behavior Software security training and awareness Software history and licensing Development process management Software development facility Concept and planning Design Software development Component assembly Testing (supply-side) Installation and acceptance Software change management Build-in software defenses Assurance claims and evidence Software manufacture and packaging Support Operating environment for services Security monitoring Timeliness of vulnerability mitigation Service confidentiality policies Perform for short listed suppliers Software Supply Chain Risk Management & Due-Diligence
26 Software Assurance Risks Evaluating Suppliers Source: Software Assurance in Acquisition: Mitigating Risks to the Enterprise - SwAinAcquisition%20MitigatingRisks%20to%20Enterprise.pdf 26
27 Contracting Touchpoints Vendor to deliver appropriate documentation Secure defaults and configurations Terms for updates and new releases Conditions for requested modifications and functional changes Security vulnerabilities resolution (0-days) and turn-around Access to source code (agreement) Modification of source code and willingness of vendor to participate Agree on possible future migration to other platforms Vendor must support migration effort even if to another product Vendor to grant access to new supplier for migration effort Warranties Software performs according to requirements Software does not contain undisclosed features or security holes Expedited response in case of failure 27
28 Example: OWASP Secure Software Contract Annex The OWASP has developed a contract annex for custom made software Sample paragraphs: (c) Design Developer agrees to provide documentation that clearly explains the design for achieving each of the security requirements. In most cases, this documentation will describe security mechanisms, where the mechanisms fit into the architecture, and all relevant design patterns to ensure their proper use. The design should clearly specify whether the support comes from custom software, third party software, or the platform. (e) Security Analysis and Testing Developer will perform application security analysis and testing (also called "verification") according to the verification requirements of an agreed-upon standard (such as the OWASP Application Security Verification Standard (ASVS)). The Developer shall document verification findings according to the reporting requirements of the standard. The Developer shall provide the verification findings to Client. (f) Secure Deployment Developer agrees to provide secure configuration guidelines that fully describe all security relevant configuration options and their implications for the overall security of the software. The guideline shall include a full description of dependencies on the supporting platform, including operating system, web server, and application server, and how they should be configured for security. The default configuration of the software shall be secure. Source: _Contract_Annex 28
29 ACQUISITION PROCESS MONITORING AND ACCEPTANCE
30 30 Acquisition Process: Monitoring & Acceptance Planning Acquisition Process Contracting Monitoring & Acceptance Follow-on Establish work schedule Implement change control Review and accept deliverables
31 31 Establish Work Schedule & Implement Change Control Schedule should include specific timelines for meeting or delivering the security requirements The change control procedures should ensure that security requirements are not compromised when changes are made
32 32 Review and Accept Deliverables Deliverables other than the software can be: documentation test cases and results Acceptance criteria should be: explicit measurable included in the terms and conditions Examples of acceptance criteria: The Supplier shall demonstrate that all application software is fully functional when residing on the operating system and on middleware platforms used by the Acquirer in its production environment, configured as noted above. The Supplier shall NOT change any configuration settings when providing software updates unless specifically authorized in writing by the Acquirer. SMEs to review each software deliverable and analyze test results produced by the supplier or independent tester to ensure that security requirements are met This can be DAST or manual penetration of testing of the application
33 33 3 rd party Certifications for Security Testing Industry reputation is supplier known for this type of testing? Methodology how does supplier propose to perform the required tests? Relevance is the supplier able to collect and digest the security requirements relevant for your systems and identify relevant security issues? References Can supplier furnish references of other clients in your industry? Competence is the supplier able to securely process and maintain information about our system? Reports? Results? Do they practice due diligence? Common services Static Application Security Testing Dynamic Application Security Testing Security Architecture and Design Reviews
34 ACQUISITION PROCESS FOLLOW-ON
35 35 Acquisition Process: Follow-on Planning Acquisition Process Contracting Monitoring & Acceptance Follow-on Maintain the software Dispose of or decommission the software
36 36 Maintain the Software Prepare for the long run: changes of the software, its configuration or its context may invalidate assumptions made for security requirements Configuration control Upgrades and patches Support Operational security Security vulnerabilities found in operation Identify severity of vulnerabilities SLA terms for handling critical issues
37 37 Dispose of or Decommission the Software Safe and secure retirement of software Related data should also be securely destroyed migrated archived
38 RECAP AND CONCLUSIONS
39 39 Recap Acquisition or develop is a business driven cost benefit decision. The Acquisition process includes business criteria (performance, stability) as well as security criteria This presentation outlines the security touch points in the acquisition process to highlight where security expertise is required in the acquisition process and where security practices should be applied Acquisition process is very much a part of the System Development Lifecycle Software Development Lifecycle Security Touch Points apply according to strategy Acquisition Phases include: Planning, Contracting, Monitoring & Acceptance and Follow-on For each of the above phases contract is key document to ensure vendor commitment before, during and after acquisition
40 Conclusions Apply touchpoints for building secure software to the software acquisition process (e.g. abuse cases, architectural risk analysis, security requirements, ) Use risk-driven process in selecting software suppliers Questionnaire for COTS and custom software Require security testing (SAST, DAST) of software to be acquired Ensure security reports are periodically submitted for review and that identified risks are treated Introduce security-focused terms and conditions into acquisition contract Consider contracting touchpoints and OWASP Secure Software Contract Annex 40
41 41 How much have we developed this topic? Fragments/parts of the process exist but no best practice recommendation for the whole process of security touchpoints Recognised the overlaps in acquisition and development with regards to security Hope to build a gauge system that can help easily identify aspects to consider for the different system development scenarios
42 Sources 1. Software Assurance in Acquisition: Mitigating risks to the Enterprise - Mary Linda Polydys and Stan Wisseman 2. An Investigation of Build vs. Buy Decision for Software Acquisition by Small to Medium Enterprises - Farhad Daneshgar, Lugkana Worasinchai and Graham Low 3. Development and Acqusition Federal Financial Institutions Examination Council 4. Arguing Security - Creating Security Assurance Cases - Charles B. Weinstock, Howard F. Lipson, and John Goodenough 5. Software Acquisition Planning Guidelines Software Engineering Institute (SEI) 6. Software Supply Chain Risk Management & Due-Diligence (Software Assurance Pocket Guide Series: Acquisition & Outsourcing, Volume II Version 1.2, June 16, 2009) 7. Adapting the SQUARE Method for Security Requirements Engineering to Acquisition- Nancy R. Mead - SEI 8. Security Quality Requirements Engineering (SQUARE) Methodology - Nancy R. Mead et. Al Carnegie Melon - SEI 9. Developing a Product Line Acquisition Strategy for a DoD Organization: A Case Study - John K. Bergey et al 10. The DoD Acquisition Environment and Software Product Lines - John K. Bergey et al 42
43 43 Thank you! Questions? Carsten Huth: Nadim Barsoum: Dawid Sroka:
Software Assurance in Acquisition and Contract Language
Software Assurance in Acquisition and Contract Language Acquisition & Outsourcing, Volume I Version 1.1, July 31, 2009 Software Assurance (SwA) Pocket Guide Resources This is a resource for getting started
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
Reducing risks in the Software Acquisition Life Cycle
Reducing risks in the Software Acquisition Life Cycle Stan Wisseman 6 December 2007 Agenda Buyers vs. Sellers Need for enhancing acquisition process with SwA considerations DHS SwA Initiative Overview
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Infrastructure Information Security Assurance (ISA) Process
Infrastructure Information Security Assurance (ISA) Process Handbook AS-805-B March 2005 Transmittal Letter A. Explanation. As part of the Postal Service s efforts to enhance security across all technology
Supply-Chain Risk Management Framework
Supply-Chain Risk Management Framework Carol Woody March 2010 Scope of SEI Work Context Significantly reduce the risk (any where in the supply chain) that an unauthorized party can change the behavior
Cutting Edge Practices for Secure Software Engineering
Cutting Edge Practices for Secure Software Engineering Kanchan Hans Amity Institute of Information Technology Amity University, Noida, 201301, India [email protected] Abstract Security has become a high
Commercial Software Licensing
Commercial Software Licensing CHAPTER 11: Software Prepared by DoD ESI January 2013 Chapter Overview The government uses three primary agreement types for services: Fixed Price (FP). T&M (Time and Materials).
Request for Proposal for Application Development and Maintenance Services for XML Store platforms
Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...
CONTENTS. List of Tables List of Figures
Prelims 13/3/06 9:11 pm Page iii CONTENTS List of Tables List of Figures ix xi 1 Introduction 1 1.1 The Need for Guidance on ERP System Validation 1 1.2 The Need to Validate ERP Systems 3 1.3 The ERP Implementation
From Chaos to Clarity: Embedding Security into the SDLC
From Chaos to Clarity: Embedding Security into the SDLC Felicia Nicastro Security Testing Services Practice SQS USA Session Description This session will focus on the security testing requirements which
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
The Security Development Lifecycle
The Security Development Lifecycle Steven B. Lipner Director of Security Engineering Strategy Security Business and Technology Unit Microsoft Corporation Context and History 1960s penetrate and patch 1970s
Building Security Into The Software Life Cycle
Building Security Into The Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services a Division of McAfee Email: [email protected] Outline» Glossary»
Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007
Agile and Secure Can We Be Both? Chicago OWASP June 20 th, 2007 The Agile Practitioner s Dilemma Agile Forces: Be more responsive to business concerns Increase the frequency of stable releases Decrease
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs
Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains
Contracting Guidelines with EHR Vendors
Doctors Office Quality - Information Technology (DOQ-IT) Project Contracting Guidelines with EHR Vendors In general, if a contract is presented to your group from a software company, it will be written
National Information Assurance Certification and Accreditation Process (NIACAP)
NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
How To Ensure Security In A System
Software Assurance vs. Security Compliance: Why is Compliance Not Enough? Carol Woody, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2012 Carnegie Mellon University
Software Application Control and SDLC
Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to
Cloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
Software as a Service: Guiding Principles
Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially
New Zealand Company Six full time technical staff Offices in Auckland and Wellington
INCREASING THE VALUE OF PENETRATION TESTING ABOUT YOUR PRESENTER Brett Moore Insomnia Security New Zealand Company Six full time technical staff Offices in Auckland and Wellington Penetration Testing Web
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING Katie Moussouris Senior Security Strategist Microsoft Security Response Center http://twitter.com/k8em0 (that s a zero) Session ID: ASEC-T18
IT Audit and Compliance
Problem IT Audit and Compliance IT audit is about the formal verification and validation of the quality and effectiveness of IT controls to support the overall business control objectives. From a security
Agenda. Agenda. Security Testing: The Easiest Part of PCI Certification. Core Security Technologies September 6, 2007
Security Testing: The Easiest Part of PCI Certification Core Security Technologies September 6, 2007 Agenda Agenda The PCI Standard: Security Basics and Compliance Challenges Compliance + Validation =
Project Knowledge Areas
From Houston S: The Project Manager s Guide to Health Information Technology Implementation. Chicago: HIMSS; 2011; pp 27 39. This book is available on the HIMSS online bookstore at www. himss.org/store.
STS Federal Government Consulting Practice IV&V Offering
STS Federal Government Consulting Practice IV&V Offering WBE Certified GSA Contract GS-35F-0108T For information Please contact: [email protected] 2007 by STS, Inc. Outline Background on STS What is IV&V?
Three Critical Success Factors for PCI Assessment. Seth Peter NetSPI April 21, 2010
Three Critical Success Factors for PCI Assessment Seth Peter NetSPI April 21, 2010 Introduction Seth Peter NetSPI Chief Technology Officer and Founder 15 year history of application, system, and network
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
Colorado Department of Health Care Policy and Financing
Colorado Department of Health Care Policy and Financing Solicitation #: HCPFRFPCW14BIDM Business Intelligence and Data Management Services (BIDM) Appendix B BIDM Project Phases Tables The guidelines for
3 rd Party Vendor Risk Management
3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced
RFP # 21732 Library System Attachment #2 Implementation Services and Project Plan Questionnaire
Each question should be answered fully and concisely. Implementation Services 1. How many total employees in your firm are dedicated to providing implementation services for the proposed Library System?
Applying CMMI SM In Information Technology Organizations SEPG 2003
Applying CMMI SM In Information Technology Organizations Mark Servello, Vice President Jim Gibson, Senior Consultant ChangeBridge, Incorporated Page 1 Portions Copyright 2002 Carnegie Mellon University
CITY UNIVERSITY OF HONG KONG. Information System Acquisition, PUBLIC Development and Maintenance Standard
CITY UNIVERSITY OF HONG KONG Development and Maintenance Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information Officer in
FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB 2014-05. Cyber Risk Management Guidance. Purpose
FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB 2014-05 Cyber Risk Management Guidance Purpose This advisory bulletin provides Federal Housing Finance Agency (FHFA) guidance on cyber risk management.
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
Software Security Engineering: A Key Discipline for Project Managers
Software Security Engineering: A Key Discipline for Project Managers Julia H. Allen Software Engineering Institute (SEI) Email: [email protected] Sean Barnum Cigital Robert J. Ellison SEI Gary McGraw Cigital
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
Information Technology Project Oversight Framework
i This Page Intentionally Left Blank i Table of Contents SECTION 1: INTRODUCTION AND OVERVIEW...1 SECTION 2: PROJECT CLASSIFICATION FOR OVERSIGHT...7 SECTION 3: DEPARTMENT PROJECT MANAGEMENT REQUIREMENTS...11
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Secure Development LifeCycles (SDLC)
www.pwc.com Feb 2014 Secure Development LifeCycles (SDLC) Bart De Win Bart De Win? 15+ years of Information Security Experience Ph.D. in Computer Science - Application Security Author of >60 scientific
Application of software product quality international standards through software development life cycle
Central Page 284 of 296 Application of software product quality international standards through software development life cycle Mladen Hosni, Valentina Kirinić Faculty of Organization and Informatics University
Developing CMMI in IT Projects with Considering other Development Models
Developing CMMI in IT Projects with Considering other Development Models Anahita Ahmadi* MSc in Socio Economic Systems Engineering Organizational Process Development Engineer, International Systems Engineering
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Information Technology Services Project Management Office Operations Guide
Information Technology Services Project Management Office Operations Guide Revised 3/31/2015 Table of Contents ABOUT US... 4 WORKFLOW... 5 PROJECT LIFECYCLE... 6 PROJECT INITIATION... 6 PROJECT PLANNING...
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org
SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management
Procedure for Assessment of System and Software
Doc. No: STQC IT/ Assessment/ 01, Version 1.0 Procedure for Assessment of System and Software May, 2014 STQC - IT Services STQC Directorate, Department of Electronics and Information Technology, Ministry
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Services Providers. Ivan Soto
SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed
ISEB MANAGER S CERTIFICATE IN ITIL INFRASTRUCTURE MANAGEMENT. Guidelines for candidates who are taking the ICT Infrastructure Examination
ISEB MANAGER S CERTIFICATE IN ITIL INFRASTRUCTURE MANAGEMENT Guidelines for candidates who are taking the ICT Infrastructure Examination This qualification is based on ITIL Infrastructure Management as
Capability Maturity Model Integrated (CMMI)
When the Outcome Matters Capability Maturity Model Integrated (CMMI) Configuration Management Considerations Gerard Dache [email protected] 703-560-9477 Agenda SEI Overview Capability Maturity Models
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems
Introduction to Risk Management for Software Projects. Peter Kolb. Distributed and Outsourced Software Engineering, - 1 - ETH Zurich
Introduction to Risk Management for Software Projects Peter Kolb Distributed and Outsourced Software Engineering, - 1 - ETH Zurich Purpose of Presentation To provide an Overview of the Risk Management
Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon
Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon Request for Proposal P a g e 2 Table of Contents 1.
Publication 805-A Revision: Certification and Accreditation
Postal Bulletin 22358 (3-7-13) Policies, Procedures, and Forms Updates Publication 805-A Revision: Certification and Accreditation Effective immediately, the January 2013 edition of Publication 805-A,
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.
Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop
Put into test the security of an environment and qualify its resistance to a certain level of attack.
Penetration Testing: Comprehensively Assessing Risk What is a penetration test? Penetration testing is a time-constrained and authorized attempt to breach the architecture of a system using attacker techniques.
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
ITIL Introducing service design
ITIL Introducing service design The objectives of service design The main objective of the service design stage can be defined as: The design of appropriate and innovative IT services, including their
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
Application Management Services (AMS)
Contents 1. AMS : An Overview 2. AMS : Models 3. Delivery Organization 4. Processes & Tools 5. Transition Methodology 6. Pricing Application Management Services (AMS) Enterprise Application Services Capability
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
Adding a Security Assurance Dimension to Supply Chain Practices
Adding a Security Assurance Dimension to Supply Chain Practices John Whited, CISSP, CSSLP Randall Brooks, CISSP, CSSLP Raytheon Company Session ID: GRC-401 Session Classification: Intermediate Agenda What
Project Management Plan for
Project Management Plan for [Project ID] Prepared by: Date: [Name], Project Manager Approved by: Date: [Name], Project Sponsor Approved by: Date: [Name], Executive Manager Table of Contents Project Summary...
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
Security Patch Management
The knowledge behind the network. Security Patch Management By Felicia M. Nicastro Senior Network Systems Consultant International Network Services Security Patch Management March 2003 INS Whitepaper 1
How To Implement Itil V3
2009 NMCI Conference: Implementing ITIL Session 1: ITSM Process ITSM COE Agenda Background ITSM Overview ITIL and Service Delivery Adopting ITIL to NGEN SE&I Activities 2 Background Develop Government
Appendix A-2 Generic Job Titles for respective categories
Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide
RFP Attachment C Classifications
RFP 1. Applications IT Architect Analyzes and designs the architecture for software applications and enhancements, including the appropriate application of frameworks and design patterns and the interrelationships
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
OUTSOURCING DUE DILIGENCE FORM
OUTSOURCING DUE DILIGENCE FORM SERVICE TO BE OUTSOURCED 1. Type of service to be outsourced: Accounting/Finance: Compliance Consulting: Legal Services: Administrative Functions: Information Technology:
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
