Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services roblab@microsoft.com



Similar documents
ensuring security the way how we do it

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Web App Security Audit Services

Threat Modeling. Deepak Manohar

Preliminary Course Syllabus

Effective Software Security Management

McAfee Certified Assessment Specialist Network

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Juniper Networks Secure

New IBM Security Scanning Software Protects Businesses From Hackers

Operating System Security

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Five Steps to Achieve Risk-Based Application Security Management Make application security a strategically managed discipline

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

SAFECode Security Development Lifecycle (SDL)

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Protecting Your Organisation from Targeted Cyber Intrusion

locuz.com Professional Services Security Audit Services

Web application security: automated scanning versus manual penetration testing.

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

Attack Vector Detail Report Atlassian

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Introduction: 1. Daily 360 Website Scanning for Malware

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Simple Steps to Securing Your SSL VPN

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Application Security Testing

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Application Intrusion Detection

Securing the Cloud Infrastructure

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Cyber R &D Research Roundtable

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

How To Perform An External Security Vulnerability Assessment Of An External Computer System

Integrating Barracuda Web Application Firewall

Strategic Information Security. Attacking and Defending Web Services

WEB 2.0 AND SECURITY

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Penetration Testing Service. By Comsec Information Security Consulting

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

Seven Practical Steps to Delivering More Secure Software. January 2011

Software Development: The Next Security Frontier

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

How To Ensure That Your Computer System Is Safe

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Sample Report. Security Test Plan. Prepared by Security Innovation

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Now Is the Time for Security at the Application Level

Certification Report

SAST, DAST and Vulnerability Assessments, = 4

Web Engineering Web Application Security Issues

"Practical Security Testing for Web Applications"

Vulnerability Management

SETLabs Briefings ENTERPRISE ARCHITECTURE & BUSINESS COMPETITIVENESS VOL 2 NO 4. Oct Dec Threat Modeling in Enterprise Architecture Integration

Security Think beyond! Patrick Hildenbrand, SAP HANA Platform Extensions June 17, 2014

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

IT Security & Compliance. On Time. On Budget. On Demand.

External Supplier Control Requirements

Secure Development Lifecycle. Eoin Keary & Jim Manico

Application Firewall Overview. Published: February 2007 For the latest information, please see

Countering Insider Threats Jeremy Ho

Web Application Security

WHITEPAPER. Nessus Exploit Integration

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

APIs The Next Hacker Target Or a Business and Security Opportunity?

Web Application Security

Application Security in the Software Development Life Cycle (SDLC) White Paper

AN OVERVIEW OF VULNERABILITY SCANNERS

Integrated Threat & Security Management.

elearning for Secure Application Development

Chapter 4 Application, Data and Host Security

Proven LANDesk Solutions

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

The Security Development Lifecycle

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

The Key to Secure Online Financial Transactions

Transcription:

Microsoft Security Development Lifecycle for IT Rob Labbé Application Consulting and Engineering Services roblab@microsoft.com

The Reasons for Secure Software There are many threats to data and systems Data can be stolen by attackers Data can be corrupted by viruses Data can be lost or corrupted by employees IT Systems can be used by attackers To send Spam, viruses, or launch other attacks from IT Systems can be crashed by attackers

Application Layer = Weak Point Attackers target the weakest point. The OS Layer and Network layer are too hard now On Average over 70% of IT security budget is spent on Infrastructure, yet over 75% of attacks happen at the Application level According to Microsoft research, only 1/3 of developers are confident that they write secure code The focus must be on hardening the application layer

Reasons for IT Security Card Services - A Real World Example $10 Million a month in revenue Processed credit cards for American Express, Master Card, and VISA They Lost 40 Million records to hacking Government imposed heavy fines Subject to audits every 6 months for 20 years Amex, Master Card and Visa dropped them A $10 Million a month company destroyed

Hackers are very smart

We need better security

Implement an SDL Implement an SDL to build security into your development process Train your developers in secure coding techniques Incorporate Threat Modeling, Secure Code Review, Security Focused Testing into the process

Purpose of the SDL Inventory and assess applications Identify and ensure resolution of security/privacy vulnerabilities found in those applications Enable Application Risk Management: Strategic Tactical Operational Legal

The SDL is NOT Optional At Microsoft all line-of-business application teams must go through SDL-IT, All shrink-wrapped products must go through the SDL If they fail to do so, they cannot go into production Enforcement of the SDL-IT process attributes to it s success

Visibly Measure the Process Have internally visible score cards Have contests to see if you can find bugs and offer prizes Offer incentives to teams with the best security records (no cheating!)

SDL aligns with SDLC SDLC Envision Design Develop / Purchase Test Release / Sustainment SDL-IT Application Entry / Risk Threat Model / Design Review Internal Review Pre-Production Post- Production

Application Entry / Risk App Entry Internal Review Post-Production Threat Model / Design Review Pre-Production Objective: Application Inventory Determine Application Risk Categorization High Risk Security/Privacy Release Medium Risk Security/Privacy Release Low Risk Security/Privacy Release

Threat Model / Design Review App Entry Internal Review Post-Production Threat Model / Design Review Pre-Production Objective: Threat modeling provides a consistent methodology for objectively evaluating threats to applications. Review application design to verify compliance with security standards and best practices Verify application meets application principles Confidentiality Integrity Authentication Authorization Availability Non-repudiation

Internal Review App Entry Internal Review Post-Production Threat Model / Design Review Pre-Production Review security checklist/policy site Team conducts self code review and attack and penetration testing

Pre-Production App Entry Internal Review Post-Production Threat Model / Design Review Pre-Production Objective: Low Risk Applications Host Level Scan Windows IIS SQL High/Medium Risk Applications Host Level Scan White Box Code Review

White Box Code Review Process Application team provides source code Analysts review application code uncovering security vulnerabilities Vulnerabilities logged in bug database Application team required to address all sev 1 bugs prior to going into production

Some common attack patterns white box review may reveal Cross-Site Script Vulnerabilities SQL Injection Buffer Overflow Poor Authorization Controls Secrets Stored In Clear Text

Post-Production App Entry Internal Review Post-Production Threat Model / Design Review Pre-Production Objective: High/Medium/Low Risk Applications Host Level Scan Windows IIS SQL

Conclusion The need for security is obvious, we have to protect the company and our customers To do that we need Management Support Secure Development Life Cycles Developers trained in secure development A Security First attitude!

Conclusions Continuous improvement of the process Invest time in upfront activities: Threat Modeling Design Reviews A holistic view People Process Process: Security cannot be an afterthought Tools It may seem hard to get started ask for help! People: Providing guidance on secure application development Tools: Providing the most innovative tools

Call To Action Implement a Secure Development Lifecycle Create more secure and reliable software Build Trust!

Resources ACE Team Blog: http://blogs.msdn.com/ace_team/default.aspx Threat Modeling Tool http://go.microsoft.com/fwlink?linkid=77002 Threat Modeling Blog: http://blogs.msdn.com/threatmodeling/ Rob Labbé s Blog: http://blogs.msdn.com/roblabbe/default.aspx

2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.