Agile Security Successful Application Security Testing for Agile Development
|
|
|
- Leon Hancock
- 10 years ago
- Views:
Transcription
1 WHITE PAPER Agile Security Successful Application Security Testing for Agile Development Software Security Simplified
2 Abstract It is an imperative to include security testing in application development. Yet, with Agile s fast pace, and lean concepts, it easy to see how many organizations would simply consider testing for application security defects to be too costly in terms of both time and resources. The reasons behind these beliefs are concerns over the cost of the tooling versus the benefit, the cost of deployment and training of the tools, the inability for these tools to fit into Agile development processes, and the objections of developers who must become proficient in the use of the tools. This paper addresses these concerns and describes methods that utilize Veracode s Security Review and methodologies for security testing that succeed in the Agile world. Introduction As competitive and economic pressures cause business cycles to shorten, the need to deliver quality software at a much faster rate increases. Over the past decade this pressure has been the force behind the shift from the traditional waterfall development approach (with its sequential, orderly phases and milestones) to the Agile development methodology, utilizing extreme Programming (XP), Scrum, or other project management and development methods associated with the Agile Development Movement. These patterns and practices seek to implement the principles placed forward in the Agile Manifesto, which defines software development practices that promote highly iterative development, open collaboration, good- enough design and documentation, lean and minimal process and tools and fearless process adaptability throughout the product lifecycle. The strength of Agile is that it can save organizations significant amounts of development time and money, while still allowing them to deliver high-quality software. There is the perception today that these Agile methods do not embrace secure code and coding practices, and to some extent, historically, security has not been given the attention it needs when developing software with Agile methods. With Agile s fast pace, it s easy to see how many organizations would simply consider testing for application security defects to be too costly in terms of both time and resources. But in reality, since Agile methods focus on rapidly creating features that satisfy the customers needs, and security is a customer need, it is important that it not be overlooked. In today s highly interconnected world, where there are strong regulatory and privacy requirements to protect private data, security must be treated as a high customer priority. Additionally, the financial cost of not including security testing within an Agile, or any, methodology can far outweigh the short-term benefits of not including it. Producing insecure software dramatically raise the costs of correction. According to the National Institute of Standards and Technology (NIST), it is 6.5 times more expensive to find and fix any flaw in development than during design, 15 times more in testing, and 100 times more in production. The cost to find security flaws using traditional testing is even much higher since you are not testing what the application does but what it unintentionally allows. The real cost of insecure software today comes from data loss, process interruption, and brand damage from criminal attacks, and they are far more consequential today than ever. The danger today is not only a single incursion that steals data, but a single incursion where malware is left behind and thefts can continue across a much larger period of time or a process can be interrupted at the attacker s will. Leaving one hole in only one application can quickly result in disaster. Lack of application security testing also jeopardizes compliance with federal regulations such as HIPPA, PCI, and Sarbanes-Oxley (each of which has hefty fines for electronic data breaches). 1
3 It s obvious that application security cannot be ignored, even with the adoption of Agile development practices. It is an imperative to include security testing as part of your development. With the knowledge that you have real costs and a customer imperative for the inclusion of application security testing in your delivery, how do you incorporate it into your Agile methodology? More importantly, how can you accomplish it without incurring more costs than you are attempting to save with the adoption of an Agile development process, and how do you keep from grinding deliveries to a halt on what is supposed to be Agile development? Staying Lean: The real cost of ownership in an Agile world The issues that are encountered in the adoption of application security testing in an Agile approach, if not understood, can cause increased time and cost, anathemas to very essence of what Agile proposed to do for organizations. This is discovered from the start in the selection of the application security analysis capability for the organization. There are several to choose from and while all can provide benefit, they have to be rated in how they fit in terms of what the organization is attempting to do by being Agile. Anything that blocks progress or slows down development cycles is counter to the principles of Agile development. Additionally, time and people cost money, so the selection of application security analysis must include what the cost of ownership will be - the calculation of the total cost in terms of money, time and people to acquire, implement, train, rollout throughout the enterprise, and maintain this capability within the organization. The first decision point will be whether or not to do anything in-house, or outsource the security testing to independent third parties who will perform manual penetration testing. While these are valuable services and can be helpful in an overall security plan, outsourced testing requires too much time to be feasible in Agile development where entire development cycles and releases are measured in weeks. In-house tools have their benefits, but most of these tools carry with them unforeseen costs. Use of an in-house tool incurs total cost of ownership issues that has to be considered. Many of these tools involve protracted amounts of time to install, configure the tooling to get it to a point of returning actionable security flaws back to the development team. The tools become yet another tool to add into the tool chain to be configured and run, at a time when the organization is attempting to be lean. Most of these in-house tools require developer training in how to use the tools, and even much more training in how to configure the tool to provide results back that are not noisy results that are full of expected defects that are not really defects, called false positives. Most in-house security testing tools focus on the analysis of the available source code, which is yet another limitation that can increase overall cost. The world of application development today includes code acquired from many sources open source, shared and purchased. This third-party software of unknown pedigree (sometimes referred to as SOUP) cannot be fully tested in the applications using source code analysis tools and leaves areas of the application open to potential security flaws. Finally, these tools require training for the administration of the tool, adding to the responsibilities of the development organization that can add to resource loading or inefficiency. The costs of installation and deployment of the tool sadly does not diminish with scale. The installation and setup and care and feeding of the tool is an additional cost in time and people for each new application team throughout the enterprise that wishes to adopt application security analysis. There is another way one that combines the value of independent verification and integration with Agile development practices but without the deficiencies and excessive cost of ownership of in-house tools. This is the Veracode solution: A cloud based service that is invoked when the Agile team wishes and that can be integrated with the IDEs, defect tracking, and build systems the team has chosen. In this approach there is no installation, no setup, 2
4 no tool training for developers, no learning curve to determine false positives. There is no tool to incorporate into a build cycle, no lengthy in-house analysis to wait for that slows down the Agile process. The Veracode approach performs static and dynamic analysis on the binary application that is built and uploaded into its secure cloud hosted platform and is analyzed and returned with the most accurate results in the industry, usually within 24 hours. The cloud based approach also allows the addition of application security testing without the need to add additional hardware to provide for the extra processing power needed to perform the analysis in-house. Accuracy is especially worth emphasizing as a key component to success in Agile development. Noisy assessments cause developers to waste time in the determination of what is actually a real defect, limiting what can be accomplished in their development cycle. Veracode s accuracy comes from two areas. The first is Veracode s patented static binary analysis technology that verifies the final integrated application i.e. the binary or bytecode. The Agile team simply uploads the executables to the Veracode platform and the analysis is performed in the cloud. This form of security testing represents the most accurate form of security testing available. Binary or bytecode is the truest representation of final application. It is what the machine executes and what gets attacked, not the source code. It can test all the code, even the SOUP code from the included open source and other components that were not available for source code checking. By verifying the application code at the same level that it is attacked, Veracode s static binary analysis technology ensures that critical threats and vulnerabilities are detected. The second benefit of the static binary analysis is that the assessment of the application in its final form also allows for lower false negative and false positive rates than alternatives. Veracode s false positive rate is often 100% lower than source code scanning technologies that tend to be noisy. Additionally, the analysis and assessment is performed with the latest and best data on the identity and discovery of attacks and vulnerabilities that the industry has to offer. The cloud-based solution always is providing the most up to date version of the analysis, as opposed to an installed tool that may be several or many months old between versions of delivered updates from the vendor. Staying Agile: Security analysis in the Agile process The rapid acquisition and deployment of a capability such as Veracode s is only truly beneficial if it can become part of the organizations defined Agile process. Any tool that requires the development team to dramatically modify their process defeats the lean and Agile goal of the team. The key to success is the in the seamless integration of application security into an Agile, or any defined, development process. There are several methods defined that help organizations adopt an Agile approach to development. In our examples we will use Scrum. Scrum (sometimes seen spelled as SCRUM) has been used to develop complex products since the early 1990s. Scrum is grounded in empirical process control theory, and employs an iterative, incremental approach to optimize predictability and control risk. A Scrum approach consists of a Team or set of Teams designed to optimize flexibility and productivity; to this end, they are self-organizing, they are cross-functional, and they work in iterations. The Team consists of developers with all the skills to turn the product requirements into a potentially releasable piece of the product. 3
5 Scrum teams work in iterations that are time-boxed: Scrum employs time boxes to create regularity. Daily Scrum Meeting Product Backlog Sprint Backlog 24 HOURS Potentially Shippable Product Increment 2 4 WEEKS The heart of Scrum is a Sprint, which is an iteration of usually a 2-6 week period of time that is consistent throughout a development effort. All Sprints use the same approach, and all Sprints deliver an increment of the final product that is potentially releasable. The adoption of application security analysis and assessment usually occurs in one of two ways in a Scrum approach: the Security Sprint or the Every-Sprint approach. The Security Sprint approach The security Sprint is a common approach for the inclusion of application security into the agile Scrum model. Organizations such as The Open Web Application Security Project (OWASP) has identified and discussed the concept of Security Sprints as part of its recommended approaches to application security. In the Security Sprint approach, periodic Sprints are performed focused exclusively on security. As with any Sprint, they are the implementation of User generated stories that drive development. In a Security Sprint the stories are developed and implemented just like any other stories allowing the other steps in a Sprints such as Test-Driven Development, Unit test, Continuous reviews and integration are all the same: the only difference is that the implemented stories are security related. Examples of the type of stories that are implemented in a Security Sprint would include Intrusion Detection, Logging, Authentication and Authorization, and Error Handling. Some technical risks, such as XSS, also need to be identified as a Story. 4
6 Password Security Story User Login Story User Profile Story Security Sprint In the Security Sprint approach with Veracode, the team would utilize Veracode s Security Review at the start of the Sprint, with the current build and upload of that build to the cloud-based analysis and assessment. The returned assessment is then used as the basis of the backlog for that Sprint. Since the analysis returned likely contains more identified defects and vulnerabilities than were identified as the user stories implemented and supported by the Sprint, the Sprint identified defects become the essential Sprint backlog work items for the Sprint. If there are too many identified, then the cross-functional team must prioritize which stories are to implemented and corrected, with the rest put into Product back log for another Sprint. The Every-Sprint approach The other Sprint approach is referred as the every-sprint approach. This is the recommended approach for the adaptation of agile to methodologies such as the Microsoft Security Development Lifecycle (SDL). It is also the method that is utilized by the Veracode Development team in their implementation of Scrum used in the delivery of Veracode SecurityReview. In the every-sprint approach, security requirements and user stories are categorized by frequency of completion. The first category consists of the requirements and stories that are so essential to security that no software should ever be released without these requirements being met. Whether a team s Sprint is two weeks or two months long, every security requirement in the every-sprint category must be completed in each and every Sprint, or the Sprint is deemed incomplete, and the software cannot be released. An example of this, from the Veracode engineering approach, is that XSS detection, along with any defect detected from the PCI/SANS top 25 /OWASP top 10 is considered an every-sprint must fix requirement. The remaining category consists of requirements or stories that are not so critical as to be mandated for each Sprint. This category is called the bucket category. The key is to establish the every-sprint and bucket rankings. Once the rankings are established then they are applied every Sprint. In the Veracode Sprint, which is 6 weeks in duration, the first three weeks are focused on coding, with a code complete at the end of the third week. At this junction, the new baseline applications are uploaded and analyzed. The returned analysis result is considered part of the three-week testing cycle, and vulnerabilities and defects identified are corrected and tested as part of the Sprint. Bucket category issues are worked on a time basis. 5
7 Staying Relevant: Agile Developers need Agile tools The Agile manifesto declares: Individuals and interactions over processes and tools. This statement doesn t mean you can forget your tools. It s really about making sure that any tool brought in helps facilitate the interactions between team members. The problem is that many of the current security tools in the market today have been designed by and for people with traditional development models in mind. Many actually hinder the process by following a waterfall like model of isolating code and code changes so they can analyze them. The Scrum teams should be able to function together and in parallel, while integrating work together on a regular basis. Whether you re moving through a 6-week Scrum Sprint, or using continuous integration and automated tests your security tools should support the model and other developer tools that make your team most productive. The addition of application security testing should not require your team to change how they interact with their code, how they identify and work defects or how they interact with software configuration management (SCM) tools. Whether the defined tool chain is Microsoft Visual Studio based, using Team Server, or Java tooling using Eclipse as the IDE, Subversion and JIRA, or if the development team is using Bugzilla and Emacs, the addition of an application security assessment tool should not require developers to use yet another IDE to work the defects, or change how they work day to day that would defeat many of the agile principles for being fast, lean and productive. Many of the security tools available in the market today require special, unique additional IDE environments that developers must use to view the identified defects, and use yet another additional interface to track the progress of the fixes. Developers do not want yet another tool to learn and use, and most want as few tools as possible to get their job accomplished. Many see additional tools as a hindrance. Input from Build Server Hudson Cruise Control Maven Veracode Cloud Based Security Assessment Distribute Results To Defect Tracking JIRA Bugzilla Publish Results to Developer IDE Eclipse Visual Studio Emacs The Veracode approach is designed to be tool chain agnostic, open, and not to require any changes to the tool chain. Veracode s cloud based analysis provides API integrations into the popular tools used by agile teams, from Emacs, Visual Studio and Eclipse IDE, Build systems such as Hudson and Cruise Control, and Defect and Change Management tools such as JIRA and Bugzilla. 6
8 The integration points to the cloud are both input and output. Integration into the Agile teams build system such as Hudson allows the newly created binary to be uploaded to the Veracode cloud based system where it is analyzed. The results of the analysis can then be published back out to the team, into existing Defect Tracking systems such as JIRA and Bugzilla, and also into what the developers IDE of choice is, including Visual Studio and Eclipse. The strength of this approach removes any impedance mismatch between tools that can slow the progress or impede the interaction between team members. The team uses the tool chain it has already been comfortable using. All of these steps and decisions lead up to what you are trying to enable Agile Developers finding, fixing and limiting security problems in their code and coding practices. But attacks continuously evolve problems like Cross Site Scripting (XSS), Insecure Direct Object Reference, Broken Authentication and Session Management, Injection Flaws, Cross Site Request Forgery (CSRF), Failure to Restrict URL Access, Malicious File Execution and Information Leakage and Improper Error Handling were not even thought about several years ago, and new attacks are constantly surfacing. Developers must understand the attacks and controls to properly mitigate the threats, because ultimately, everyone on the team responsible for security. Therefore, all developers should have training and an understanding of application security. If an Agile developer s precious training time is dedicated to becoming versed in using a tool and understanding how to wade through the data to find the flaws and not waste time on the false positives, they are not becoming security experts or secure developers. Secure developers come from being certified in secure development practices and writing secure code in the first place, which is what Veracode elearning service provides. Developers are provided with a path to understanding how NOT to keep making the same mistake from Sprint to Sprint and helps the development organization establish secure coding and coding practices. Summary Secure software comes from independently verifying final, integrated applications created by secure or insecure development as completely, accurately, and affordably as possible. The perception today that Agile methods cannot or do not embrace secure code and coding practices and application security testing is, in fact, false. The Veracode cloud based application security analysis is not only capable, but actually superior in its incorporation and use in Agile development. The objections and concerns raised concerning the total cost of acquisition and use of traditional in-house tools are mitigated by the cloud-based solution. The concern over the cost of additional human resource with added training and assessment time is mitigated through the unparalleled accuracy of the Veracode binary analysis solution. The concern that an application security tool cannot fit into an Agile process has been shown to be unfounded as presented by the examples of types of Scrum Sprints that actually utilize Veracode SecurityReview. Any objections from developers over the use of new and additional interfaces or tools are mitigated through the open extensible API integration capability provided by Veracode SecurityReview. Finally, developer training is focused on becoming a certified secure developer not a tool expert. 7
9 WHITE PAPER Software Security Simplified Veracode, Inc. 4 Van de Graaff Drive Burlington, MA Tel Fax Veracode, Inc. All rights reserved. ABOUT VERACODE Veracode is the world s leader in cloud-based application risk management. Veracode SecurityReview is the industry s first solution to use patented binary code analysis, dynamic web assessments, and partner or Veracode delivered manual penetration testing, combined with developer e-learning and access to open source security ratings to independently assess and manage application risk across internally developed applications and third-party software without exposing a company s source code. Delivered as a cloud-based service, Veracode provides the simplest, most complete, and most accurate way to implement security best practices, reduce operational cost and comply with internal security policies or external standards such as OWASP Top 10, CWE/SANS Top 25 and PCI. WP/AS/ 0610
White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers
White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.
Your world runs on applications. Secure them with Veracode.
Application Risk Management Solutions Your world runs on applications. Secure them with Veracode. Software Security Simplified Application security risk is inherent in every organization that relies on
IT Risk Management: Guide to Software Risk Assessments and Audits
IT Risk Management: Guide to Software Risk Assessments and Audits Contents Overview... 3 Executive Summary... 3 Software: Today s Biggest Security Risk... 4 How Software Risk Enters the Enterprise... 5
Development Testing for Agile Environments
Development Testing for Agile Environments November 2011 The Pressure Is On More than ever before, companies are being asked to do things faster. They need to get products to market faster to remain competitive
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Agile Development for Application Security Managers
Agile Development for Application Security Managers www.quotium.com When examining the agile development methodology many organizations are uncertain whether it is possible to introduce application security
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
Better Software Though Expertise, Collaboration & Automation. BDD, DevOps and Testing
Better Software Though Expertise, Collaboration & Automation BDD, DevOps and Testing CONTENTS 1 MAGENTYS... 3 2 TESTING SERVICES... 4 2.1 Test Automation... 5 2.1.1 Test Automation Framework and Automated
Application Security 101. A primer on Application Security best practices
Application Security 101 A primer on Application Security best practices Table of Contents Introduction...1 Defining Application Security...1 Managing Risk...2 Weighing AppSec Technology Options...3 Penetration
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
White Paper. Understanding NIST 800 37 FISMA Requirements
White Paper Understanding NIST 800 37 FISMA Requirements Contents Overview... 3 I. The Role of NIST in FISMA Compliance... 3 II. NIST Risk Management Framework for FISMA... 4 III. Application Security
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Microsoft SDL: Agile Development
Microsoft SDL: Agile Development June 24, 2010 Nick Coblentz, CISSP Senior Security Consultant AT&T Consulting [email protected] http://nickcoblentz.blogspot.com http://www.twitter.com/sekhmetn Copyright
Secure Development Lifecycle. Eoin Keary & Jim Manico
Secure Development Lifecycle Jim Manico @manicode OWASP Volunteer Global OWASP Board Member OWASP Cheat-Sheet Series Manager VP of Security Architecture, WhiteHat Security 16 years of web-based, database-driven
VOLUME 4. State of Software Security Report. The Intractable Problem of Insecure Software
VOLUME 4 State of Software Security Report The Intractable Problem of Insecure Software December 7, 2011 Executive Summary The following are some of the most significant findings in the Veracode State
www.testing-solutions.com TSG Quick Reference Guide to Agile Development & Testing Enabling Successful Business Outcomes
www. TSG Quick Reference Guide to Agile Development & Testing Enabling Successful Business Outcomes What is Agile Development? There are various opinions on what defines agile development, but most would
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007
Agile and Secure Can We Be Both? Chicago OWASP June 20 th, 2007 The Agile Practitioner s Dilemma Agile Forces: Be more responsive to business concerns Increase the frequency of stable releases Decrease
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
Software Development In the Cloud Cloud management and ALM
Software Development In the Cloud Cloud management and ALM First published in Dr. Dobb's Journal, February 2009: http://www.ddj.com/development-tools/212900736 Nick Gulrajani is a Senior Solutions Architect
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
Lean Software Development and Kanban
1 of 7 10.04.2013 21:30 Lean Software Development and Kanban Learning Objectives After completing this topic, you should be able to recognize the seven principles of lean software development identify
Agile and Secure: OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/
Agile and Secure: Can We Be Both? OWASP AppSec Seattle Oct 2006 Dan Cornell, OWASP San Antonio Leader Principal, Denim Group Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation
Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper
Integrating Application Security into the Mobile Software Development Lifecycle WhiteHat Security Paper Keeping pace with the growth of mobile According to the November 2015 edition of the Ericsson Mobility
Secure Code Development
ISACA South Florida 7th Annual WOW! Event Copyright Elevate Consult LLC. All Rights Reserved 1 Agenda i. Background ii. iii. iv. Building a Business Case for Secure Coding Top-Down Approach to Develop
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
Sometimes: 16 % Often: 13 % Always: 7 %
SCRUM AT RIIS A Standish study found that only 20% of features in a typical system were used often or always and 45% of features were never used at all. The ability to embrace change is critical to reducing
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Enterprise Application Security Program
Enterprise Application Security Program GE s approach to solving the root cause and establishing a Center of Excellence Darren Challey GE Application Security Leader Agenda Why is AppSec important? Why
Simply Sophisticated. Information Security and Compliance
Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Agile and Secure: Can We Be Both?
Agile and Secure: Can We Be Both? OWASP AppSec Seattle Oct 2006 Keith Landrus Director of Technology Denim Group Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation Permission
The Security Development Lifecycle. OWASP 24 June 2010. The OWASP Foundation http://www.owasp.org
The Security Development Lifecycle 24 June 2010 Steve Lipner Senior Director of Security Engineering Strategy Trustworthy Computing Microsoft Corporation [email protected] +1 425 705-5082 Copyright
Agile Software Development Methodologies and Its Quality Assurance
Agile Software Development Methodologies and Its Quality Assurance Aslin Jenila.P.S Assistant Professor, Hindustan University, Chennai Abstract: Agility, with regard to software development, can be expressed
! Resident of Kauai, Hawaii
SECURE SDLC Jim Manico @manicode! OWASP Volunteer! Global OWASP Board Member! Manager of several OWASP secure coding projects! Security Instructor, Author! 17 years of web-based, databasedriven software
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Evaluating IaaS security risks
E-Guide This expert tip examines the risks organizations need to be aware of when evaluating IaaS solutions, and highlights the key architectural and process components of access management services that
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
WhiteHat Security White Paper. Evaluating the Total Cost of Ownership for Protecting Web Applications
WhiteHat Security White Paper Evaluating the Total Cost of Ownership for Protecting Web Applications WhiteHat Security October 2013 Introduction Over the past few years, both the sophistication of IT security
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
How Silk Central brings flexibility to agile development
How Silk Central brings flexibility to agile development The name agile development is perhaps slightly misleading as it is by its very nature, a carefully structured environment of rigorous procedures.
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006
Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
How To Protect Your Data From Attack
Integrating Vulnerability Scanning into the SDLC Eric Johnson JavaOne Conference 10/26/2015 1 Eric Johnson (@emjohn20) Senior Security Consultant Certified SANS Instructor Certifications CISSP, GWAPT,
Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard
Partner Addendum Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified
Agile So)ware Development
Software Engineering Agile So)ware Development 1 Rapid software development Rapid development and delivery is now often the most important requirement for software systems Businesses operate in a fast
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,
Secure and Resilient Software Development Mark S. Merkow Lakshmikanth Raghavan CRC Press Taylor& Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Group, an Informs
Governments information technology
So l u t i o n s Blending Agile and Lean Thinking for More Efficient IT Development By Harry Kenworthy Agile development and Lean management can lead to more cost-effective, timely production of information
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Enterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Agile Requirements Definition and Management (RDM) How Agile requirements help drive better results
Thought Leadership: Requirements Definition and Management Agile Requirements Definition and Management (RDM) How Agile requirements help drive better results Jason Moccia One of the myths of Agile software
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
A Viable Systems Engineering Approach. Presented by: Dick Carlson ([email protected])
A Viable Systems Engineering Approach Presented by: Dick Carlson ([email protected]) Philip Matuzic ([email protected]) i i Introduction This presentation ti addresses systems engineering
Agile and lean methods for managing application development process
Agile and lean methods for managing application development process Hannu Markkanen 24.01.2013 1 Application development lifecycle model To support the planning and management of activities required in
D25-2. Agile and Scrum Introduction
D25-2 Agile and Scrum Introduction How to Use this Download This download is an overview of a discussion Intertech has with clients on Agile/Scrum This download has an overview of Agile, an overview of
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
SCRUM BODY OF KNOWLEDGE (SBOK Guide)
A Guide to the SCRUM BODY OF KNOWLEDGE (SBOK Guide) 2013 Edition A Comprehensive Guide to Deliver Projects using Scrum TABLE OF CONTENTS TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Overview of Scrum...
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
IBM Innovate 2011. AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC [email protected] Application Security & Compliance
IBM Innovate 2011 Bobby Walters Consultant, ATSC [email protected] Application Security & Compliance AppScan: Introducin g Security, a first June 5 9 Orlando, Florida Agenda Defining Application Security
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
Penta Security 3rd Generation Web Application Firewall No Signature Required. www.gasystems.com.au
Penta Security 3rd Generation Web Application Firewall No Signature Required www.gasystems.com.au 1 1 The Web Presence Demand The Web Still Grows INTERNET USERS 2006 1.2B Internet Users - 18% of 6.5B people
Five Best Practices of Vendor Application Security Management
Five Best Practices of Vendor Application Security Management Table of Contents Executive Summary...1 Managing Risk in the Software Supply Chain...1 Challenges with Securing Vendor Software...3 Taking
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
Product Stack and Corporate Overview
Product Stack and Corporate Overview October 2010 Laszlo Szalvay VP of the Worldwide Scrum Business CollabNet s Scrum Business Line is dedicated to Scrum and extreme programming (XP) as a means to an end
Five Steps to Secure Outsourced Application Development
Five Steps to Secure Outsourced Application Development Contents Executive Summary... 3 Software: Today s Biggest Security Risk... 4 Offshore Development Trends... 5 Five Key Steps... 6 Step 1 Risk Assessment
