How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
|
|
|
- Darleen Audra Pierce
- 10 years ago
- Views:
Transcription
1 How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation
2 Presentation Agenda Rationale For Building Secure Software Compliance, cyber-threats, defect management costs, analysts Avenues to the Software Security Initiative Step 1: From Info-Sec to App-Sec and Step 2: From App-Sec to Software-Sec Step 3: From tactical activities to strategic plans Software Security Initiative Roadmap Software security maturity, S-SDLCs, Metrics & Measurements Questions & Answers OWASP 2
3 The Rationale for Building Secure Software Some good reasons: Compliance with technology security standards requires either secure code reviews or deployment of WAF (e.g. PCI-DSS section 6.6) Data breaches exploit vulnerabilities in applications with root causes in unsecure software Secure code reviews increase the level of software security assurance Cheaper to fix bugs then patching Fixing security bugs eliminates most of application security issues OWASP 3
4 Factors Pointing To Fixing Insecure Software Go Fix Security Bugs!?? OWASP 4
5 What PCI-DSS Compliance say? [PCI-DSS] 6 Develop and Maintain Secure Systems and Applications All vulnerabilities must be corrected. The application must be re-evaluated after the corrections. The application firewall must detect and prevent web based attacks such as cross site scripting and SQL injection. [PCI-DSS] 11 Regularly Test Security Systems and Processes [PCI-DSS] External application layer penetration test. For web applications, the tests should include, at a minimum, the following vulnerabilities: OWASP T10 OWASP 5
6 What Data Breaches Stats Say? OWASP 6
7 Which Vulnerabilities Are Most Exploited? (WHID) SOURCE: Breach Security The WHID 2009, August 2009 OWASP 7
8 What the experts say? 75% of security breaches happen at the application - Gartner Over 70 percent of security vulnerabilities exist at the application layer, not the network layer Gartner If only 50 percent of software vulnerabilities were removed prior to production costs would be reduced by 75 percent - Gartner 92 % of reported vulnerabilities are in applications not in networks - NIST The cost of fixing a bug in the field is $30,000 vs. $5,000 during coding - NIST OWASP 8
9 What do you say? What is Your Company Culture? OWASP 9
10 What we covered so far.. Rationale For Building Secure Software Compliance, cyber-threats, defect management costs, analysts Avenues to the Software Security Initiative Step1: From Info-Sec to App-Sec and Step 2: From App-Sec to Software-Sec Step 3: From tactical activities to strategic plans Software Security Initiative Roadmap Software security maturity, S-SDLCs, Metrics & Measurements Questions & Answers OWASP 10
11 Step 1: From Information Security To Application Security Provision Applications Security In Compliance With Information Security Standards, Processes and IS Risk Management Protection of Confidentiality, Integrity and Availability leads to enforcement of application security controls (e.g. encryption, auditing and logging, authentication, authorization) Validate that are no gaps in implementation of security lead to vulnerability assessments High and Medium risk vulnerabilities remediated before are released in the production environment lead to risk mitigation, acceptance, transfer OWASP 11
12 Step 2: From Application Security to Software Security Assessments Manual Penetration Testing Manual Code Review Automated Vulnerability Scanning Automated Static Code Analysis OWASP 12
13 Step 3 : From Tactical To Strategic Activities From: Reactive Security, Pen Tests, Catch and Patch To: Issue Analysis, Risk Analysis, Holistic Security OWASP 13
14 Examples of Vulnerability Management Metrics Process Metrics Is code validated against security coding standards? Is design of developers trained, using organizational security best practice technology, architecture and processes Management Metrics % of applications rated business-critical that have been security tested % of projects that where developed with the SDL % of security issues identified by lifecycle phase % of issues whose risk has been accepted % of security issues being fixed Average time to correct vulnerabilities Business impact of critical security incidents. OWASP 14
15 Software Security Engineering & Risk Management OWASP 15
16 Systemic Solution To Unsecure Software: People, Process and Technology Train developers with software security Implement secure coding standards and design patterns Deploy software security assessment and management tools OWASP 16
17 What we covered so far.. Rationale For Building Secure Software Compliance, cyber-threats, defect management costs, analysts Avenues to the Software Security Initiative Step1: From Info-Sec to App-Sec and Step 2: From App-Sec to Software-Sec Step 3: From tactical activities to strategic plans Software Security Initiative Roadmap Software security maturity, S-SDLCs, Metrics & Measurements Questions & Answers OWASP 17
18 Making the Case for Software Security Make executives aware of how software security effort compares to everyone else s Assess capabilities and make them visible Point to goals and activity needs to reach them Provide the context for software security activities Use available metrics to articulate software security needs/opportunities Analyze vulnerability assessment processes and data Point to software security root causes Identify historical vulnerability gaps and trends Prepare a plan for software security improvements OWASP
19 What Your Defect Management Metrics Say? Most of my vulnerabilities Process are Metrics coding and design Is code validated issuesagainst security coding standards? business-critical that have But are mostly Is design been security tested found during of developers trained, using % of projects that where pen test in UAT organizational security best developed with the SDL practice technology, % of security issues identified architecture and processes by lifecycle phase Management Metrics % of applications rated % of issues whose risk has been accepted % of security issues being fixed Average time The to correct cost of fixing vulnerabilitiesthem in UAT is Business impact 10 of X during critical coding security incidents. (unit tests) OWASP 19
20 Prepare a Roadmap For Software Security 1. Assess the maturity of the organization software security development processes, people and tools 2. Define the software security process: security enhanced SDLCs, frameworks and checkpoints 3. Start software security engineering push 1. Security Requirements 2. Secure Design and Threat Modeling 3. Secure Coding Guidelines and Security Code Review 4. Security Testing 5. Secure Deployment 4. Collect defect and vulnerability metrics 5. Optimize and improve software security processes OWASP 20
21 Software Security Mapped to CMM Initial to Repeatable: From CMM Level 1 to Level 2 Penetrate and patch ad-hoc approach Some applications undergo penetration tests before production release and every year after release Defined to Managed: From CMM Level 2 to Level 3 Vulnerability assessments are tracked and managed Source code is reviewed for security Penetration tests validate issues dealt with earlier in the SDLC with source code analysis Managed to Optimizing: From CCM Level 4 to Level 5 Software risks assessed in each phase of the SDLC Risk metrics and measurements are used for improving security engineering and risk management processes OWASP 21
22 Capability Maturity Models (CMM) OWASP 22
23 Software Security Maturity Models: SAMM, BSIMM OWASP 23
24 Code Review Activities And Capability Levels: BSIMM I am here OWASP 24
25 Software Security Maturity Curve Software Security Capability Level Software Security Risks Identified and Managed At Different Checkpoints During the SDLC Vulnerability Assessments Source Code Analysis Secure Coding Standards Before Product Release Ethical Hacking Secure Code Reviews on existing Applications Catch & Patch CMM Level 1 Initial (Ad Hoc) Improve Coverage of Software Security Risk Assessments, Identify Gaps and Opportunities CMM Level 2 Repeatable (Reactive Processes) CMM Level 3 Defined (Proactive) CMM Level 4 Managed (Product Driven) CMM Level 5 Optimizing (Service Driven) Time OWASP 25
26 Pre-requisite for Software Security Initiative: Hiring The Right People OWASP 26
27 Security-enhanced lifecycle process (S-SDLC) models: MS-SDL, Cigital TP and CLASP OWASP 27
28 Application Threat Modeling I. Phishing, II. Privacy Violations, III. Financial Loss IV. Identity Theft V. System Compromise, Data Alteration, Destruction VI. Reputation loss Insecure Transit URL Parameter Tampering XSS, XFS, SQL Injection, Weak AUTHN AUTHZ Flaws Forceful browsing Information Disclosure Via errors & Files Injection flaws CSRF, Weak Session Mgmt, Weak business rule and authorization Malicious file execution Insecure Object reference Broken Authentication/ AuthZ Lack of Synch Session Management Broken Authentication, Connection with DB PWD in clear Insecure Storage, poor or non-existent cryptographic controls Insecure Storage, poor or non-existent cryptographic controls OWASP 28
29 Application Security Defect Tracking and Metrics Define where and how security metrics is collected Tracking security defects throughout the SDLC Report the root causes: requirements, design, code, application Report the type of the issues, the severity and whether has been fixed or no Metrics What lifecycle stage are most flaws originating in? What security mechanisms/controls are we having trouble implementing? What security vulnerabilities are we having trouble fixing? OWASP 29
30 Vulnerability Root Cause Analysis The source of vulnerabilities can be lack of requirements, design flaw, coding error, misconfiguration Root causes are identified with different assessments and support focused remediation, risk prioritization and tracking: Security Design Flaws Introduced because of errors in design Can be identified with threat modeling and manual code reviews Security Coding Bugs Coding errors that result in vulnerabilities Can be identified with secure code reviews and/or tools OWASP 30
31 Examples of Application Security Metrics Process Metrics Is a SDL is used are security gates enforced? Is code validated against security standards? Security posture of a new application before delivery Security Officers Sign Off? Test For Security Vulnerabilities Executed? All high risk issues closed? Risk assessments completed? % of developers trained, using organizational security best practice technology, architecture and processes Management Metrics % of applications rated business-critical that have been security tested % of projects that where developed with the SDL % of security issues identified by lifecycle phase % of issues whose risk has been accepted % of security issues being fixed Average time to correct vulnerabilities Business impact of critical security incidents. OWASP 31
32 Examples of Software Security Metrics: OWASP T10 Security Metrics The Latest From Metric 2.0, Korelogic: OWASP 32
33 Security Metrics Goals The Good and The Bad Good: if goals when are SMART that is Specific, Measurable, Attainable, Realistic, Traceable and Appropriate Example: reducing the overall number of vulnerabilities by 30% by fixing all low hanging fruits with source code analysis during construction Bad: if the goals justify the means to obtain the goals OWASP 33
34 Ensure Support For The Initiative Moving Forward Tie the metrics to the business cases and support the project stakeholders agendas: Developer Leads: show that developers are getting better to write secure software Project Managers: shows hat projects are on schedule and moving on target and testing cycles for vulnerabilities are shorter translating in cost savings Information Security Officers: show that we are getting better on reporting compliance and manage risk reduction OWASP 34
35 In summary.. Rationale For Building Secure Software Compliance, cyber-threats, defect management costs, analysts Avenues to the Software Security Initiative Step1: From Info-Sec to App-Sec and Step 2: From App-Sec to Software-Sec Step 3: From tactical activities to strategic plans Software Security Initiative Roadmap Software security maturity, S-SDLCs, Metrics & Measurements Questions & Answers OWASP 35
36 Q U E S T I O N S A N S W E R S OWASP 36
37 Thanks for listening, further references Applied Software Measurement: Assuring Productivity and Quality Measurement-Assuring-Productivity/dp/ PCI-Data Security Standard (PCI DSS) ds/pci_dss.shtml A CISO s Guide to Application Security _pdfs/a%20ciso's%20guide%20to%20application%2 0Security.pdf OWASP 37
38 Further references con t Gartner 2004 Press Release 1.html Software Assurance Maturity Model The Software Security Framework (SSF) SEI Capability Maturity Model Integration CMMi The Microsoft Security Development LifeCycle OWASP 38
39 Further references con t The Seven Touchpoints of Software Security OWASP CLASP ASP_Project ITARC Software Security Assurance Internet Crime Compliant Center OWASP 39
40 Further references con t OWASP Education Module Embed within SDLC Embed_within_SDLC Producing Secure Software With Software Security Enhanced Processes Mag-16.pdf Security Flaws Identification and Technical Risk Analysis Through Threat Modeling Mag-17.pdf OWASP 40
Building Security Into The Software Life Cycle
Building Security Into The Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services a Division of McAfee Email: [email protected] Outline» Glossary»
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Application Security Guide For CISOs
Application Security Guide For CISOs Version 1.0 (November 2013) Project Lead and Main Author Marco Morana Co-authors, Contributors and Reviewers Tobias Gondrom, Eoin Keary, Andy Lewis, Stephanie Tan and
Software Application Control and SDLC
Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Secure Code Development
ISACA South Florida 7th Annual WOW! Event Copyright Elevate Consult LLC. All Rights Reserved 1 Agenda i. Background ii. iii. iv. Building a Business Case for Secure Coding Top-Down Approach to Develop
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Integrating Security Testing into Quality Control
Integrating Security Testing into Quality Control Executive Summary At a time when 82% of all application vulnerabilities are found in web applications 1, CIOs are looking for traditional and non-traditional
White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers
White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.
Enterprise Application Security Program
Enterprise Application Security Program GE s approach to solving the root cause and establishing a Center of Excellence Darren Challey GE Application Security Leader Agenda Why is AppSec important? Why
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
Tobias Gondrom (OWASP Global Board Member)
Tobias Gondrom (OWASP Global Board Member) OWASP World OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security
Matt Bartoldus [email protected]
Matt Bartoldus [email protected] Security in the SDLC: It Doesn t Have To Be Painful 2010 Gotham Digital Science, Ltd Introduction o Me o Who Are You? Assessment (Penetration Tester; Security Auditors)
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
FERPA: Data & Transport Security Best Practices
FERPA: Data & Transport Security Best Practices April 2013 Mike Tassey Privacy Technical Assistance Center FERPA and Data Security Unlike HIPAA and other similar federal regulations, FERPA does not require
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.
Managing business infrastructure White paper Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities. September 2008 2 Contents 2 Overview 5 Understanding
Managing Web & Application Security with OWASP bringing it all together. Tobias Gondrom (OWASP Project Leader)
Managing Web & Application Security with OWASP bringing it all together Tobias Gondrom (OWASP Project Leader) OWASP World OWASP is a worldwide free and open community focused on improving the security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
Secure Development LifeCycles (SDLC)
www.pwc.com Feb 2014 Secure Development LifeCycles (SDLC) Bart De Win Bart De Win? 15+ years of Information Security Experience Ph.D. in Computer Science - Application Security Author of >60 scientific
Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden
Starting your Software Security Assurance Program May 21, 2015 ITARC, Stockholm, Sweden Presenter Max Poliashenko Chief Enterprise Architect Wolters Kluwer, Tax & Accounting Max leads the Enterprise Architecture
2012 Application Security Gap Study: A Survey of IT Security & Developers
2012 Application Gap Study: A Survey of IT & s Research sponsored by Innovation Independently Conducted by Ponemon Institute LLC March 2012 1 2012 Application Gap Study: A Survey of IT & s March 2012 Part
How To Ensure That Your Computer System Is Safe
Establishing a Continuous Process for PCI DSS Compliance Visa, MasterCard, American Express, and other payment card companies currently require all U.S. merchants accepting credit card payments to comply
From Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. [email protected] +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,
Secure and Resilient Software Development Mark S. Merkow Lakshmikanth Raghavan CRC Press Taylor& Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Group, an Informs
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
SQuAD: Application Security Testing
SQuAD: Application Security Testing Terry Morreale Ben Whaley June 8, 2010 Why talk about security? There has been exponential growth of networked digital systems in the past 15 years The great things
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006
Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From
Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis
Integrating Security into the Application Development Process Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Agenda Seek First to Understand Source Code Security AppSec and SQA Analyzing
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited
Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running
Overview of the Penetration Test Implementation and Service. Peter Kanters
Penetration Test Service @ ABN AMRO Overview of the Penetration Test Implementation and Service. Peter Kanters ABN AMRO / ISO April 2010 Contents 1. Introduction. 2. The history of Penetration Testing
Preventive Approach for Web Applications Security Testing OWASP 10/30/2009. The OWASP Foundation http://www.owasp.org
Preventive Approach for Web Applications Security Testing 10/30/2009 Luiz Otávio Duarte Ferrucio de Franco Rosa Walcir M. Cardoso Jr. Renato Archer Information Technology Center Brazilian Ministry of Science
PCI DSS Overview and Solutions. Anwar McEntee [email protected]
PCI DSS Overview and Solutions Anwar McEntee [email protected] Agenda Threat environment and risk PCI DSS overview Who we are Solutions and where we can help Market presence High Profile Hacks in
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
SECURITY AND RISK MANAGEMENT
SECURITY AND RISK MANAGEMENT IN AGILE SOFTWARE DEVELOPMENT SATURN 2012 Conference (#SATURN2012) Srini Penchikala (@srinip) 05.10.12 #WHOAMI Security Architect @ Financial Services Organization Location:
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
Database Security & Auditing
Database Security & Auditing Jeff Paddock Manager, Enterprise Solutions September 17, 2009 1 Verizon 2009 Data Breach Investigations Report: 285 million records were compromised in 2008 2 Agenda The Threat
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]
Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
Application Security 101. A primer on Application Security best practices
Application Security 101 A primer on Application Security best practices Table of Contents Introduction...1 Defining Application Security...1 Managing Risk...2 Weighing AppSec Technology Options...3 Penetration
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. http://www.owasp.
Architectural Design Patterns for SSO (Single Sign On) Design and Use Cases for Financial i Web Applications Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. OWASP Copyright The OWASP Foundation Permission
TEAM Academy Catalog. 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 www.securityinnovation.com
TEAM Academy Catalog 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 TEAM ACADEMY OVERVIEW 2 Table of Contents TEAM Academy Overview... 4 TEAM Professor Overview... 4 Security Awareness and
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services [email protected]
Microsoft Security Development Lifecycle for IT Rob Labbé Application Consulting and Engineering Services [email protected] The Reasons for Secure Software There are many threats to data and systems
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Ed Adams CEO Security Innovation. John Kirkwood CISO Security Innovation. 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved.
Mapping Application Security to Compliance Ed Adams CEO Security Innovation John Kirkwood CISO Security Innovation Agenda About Security Innovation Security Drivers and Industry Data Aligning software
Survey on Application Security Programs and Practices
Survey on Application Security Programs and Practices A SANS Analyst Survey Written by Jim Bird and Frank Kim Advisor: Barbara Filkins February 2014 Sponsored by Hewlett-Packard, Qualys and Veracode 2014
Five Steps to Achieve Risk-Based Application Security Management Make application security a strategically managed discipline
IBM Security Thought Leadership White Paper Five Steps to Achieve Risk-Based Application Security Management Make application security a strategically managed discipline July 2015 2 Five Steps to Achieve
Web Engineering Web Application Security Issues
Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend
APPLICATION THREAT MODELING
APPLICATION THREAT MODELING APPENDIX PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS Marco M. Morana WILEY Copyrighted material Not for distribution 1 2 Contents Appendix process for attack simulation
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
