Panel: SwA Practices - Getting to Effectiveness in Implementation



Similar documents
Developing Secure Software in the Age of Advanced Persistent Threats

SAFECode Security Development Lifecycle (SDL)

Certified Information Security Manager (CISM)

ISE Northeast Executive Forum and Awards

The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.

DEVELOPING SECURE SOFTWARE

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

PCI DSS READINESS AND RESPONSE

Software Assurance: An Overview of Current Industry Best Practices

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

The Value of Vulnerability Management*

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Vendor Risk Management Financial Organizations

Adding a Security Assurance Dimension to Supply Chain Practices

The Security Development Lifecycle. Steven B. Lipner, CISSP Senior Director Security Engineering Strategy Microsoft Corp.

Complete Website Security

Software Application Control and SDLC

Cyber R &D Research Roundtable

How RSA has helped EMC to secure its Virtual Infrastructure

Software Development: The Next Security Frontier

HP Application Security Center

Addressing Cyber Security in Oracle Utilities Applications

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

PCI Compliance in Multi-Site Retail Environments

Editor Stacy Simpson, SAFECode. Contributors

Security and Privacy

EMC HYBRID CLOUD FOR SAP

1 Introduction Product Description Strengths and Challenges Copyright... 5

HP Fortify application security

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Defending against modern threats Kruger National Park ICCWS 2015

Principles for Software Assurance Assessment. A Framework for Examining the Secure Development Processes of Commercial Technology Providers

McAfee Database Security. Dan Sarel, VP Database Security Products

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Goals. Understanding security testing

Ed Adams CEO Security Innovation. John Kirkwood CISO Security Innovation ISACA Webinar Program ISACA. All rights reserved.

Critical Controls for Cyber Security.

W16 INTEGRATING SECURITY INTO THE DEVELOPMENT LIFECYCLE. Ryan English SPI Dynamics Inc BIO PRESENTATION 6/28/2006 3:00 PM

locuz.com Professional Services Security Audit Services

IBM Security Strategy

<Insert Picture Here> How to protect sensitive data, challenges & risks

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

What is Management Responsible For?

Taking Information Security Risk Management Beyond Smoke & Mirrors

Microsoft Services Premier Support. Security Services Catalogue

ISSECO Syllabus Public Version v1.0

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

Security Controls What Works. Southside Virginia Community College: Security Awareness

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA

Cenzic Product Guide. Cloud, Mobile and Web Application Security

State of South Carolina Policy Guidance and Training

Big Data, Big Risk, Big Rewards. Hussein Syed

RSA Archer Risk Intelligence

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Italy. EY s Global Information Security Survey 2013

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Defending Against Data Beaches: Internal Controls for Cybersecurity

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

Inadequacies of Current Risk Controls for the Cloud

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright Security Compass. 1

SECURITY AND RISK MANAGEMENT

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative

Building Security into the Software Life Cycle

Network Test Labs (NTL) Software Testing Services for igaming

PCI DSS. Payment Card Industry Data Security Standard.

Barracuda Web Site Firewall Ensures PCI DSS Compliance

CloudCheck Compliance Certification Program

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Security within a development lifecycle. Enhancing product security through development process improvement

Application Security Testing

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Building More Secure Commercial Software: The Trustworthy Computing Security Development Lifecycle

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Application Security 101. A primer on Application Security best practices

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Data Governance Update. BOE workshop January 30, 2014

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

How to Secure Your Environment

Cyber Security key emerging risk Q3 2015

SAP Product and Cloud Security Strategy

Cybersecurity: What CFO s Need to Know

Building a Corporate Application Security Assessment Program

Avoiding the Top 5 Vulnerability Management Mistakes

Criticial Need for Stronger Network Security. QualysGuard SaaS-based Vulnerability Management for Stronger Security and Verification of Compliance

DoD Strategy for Defending Networks, Systems, and Data

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

The Next Generation of Security Leaders

On Demand Penetration Testing Applications Networks Compliance.

Transcription:

Panel: SwA Practices - Getting to Effectiveness in Implementation (EMC s Evolution of Product Security Assurance) Dan Reddy, CISSP, CSSLP EMC Product Security Office Software Assurance Forum Gaithersburg, MD September 29, 2010 1

The Evolution of Product Security Assurance 2000 - Beyond 2004 - Beyond 2010 - Beyond External Drivers Hackers / worms exploits un-patched systems Zero-day attacks Compliance (SOX) Foreign influence / Malicious code insertion GRC / Vendor compliance Procurement criteria Industry response EMC response Patch and scan Responsible disclosure guidelines Penetration testing Vulnerability response policy (2004) & EMC Product Security Response Center Trustworthy computing Coding standard EMC Product Security Policy(2005) EMC acquires RSA (2006) EMC Security Dev. Lifecycle(2007) Product supply chain integrity Assurance claims Security metrics SAFECode Source code protection standard(2009) Measurability Coding standard Behind the pack Moving ahead Industry leader 2

EMC s Approach to Deliver a Secure Information Infrastructure Customer Operations Assurance Secure Serviceability Vulnerability Response Recognized 3rd Party Certifications Technology Common Security Platform Standard-based Enforce Controls, Report & Audit Process Security Development Lifecycle People Security Trained Engineering Policy Product Security Policy ONE EMC SECURITY RSA EMC Storage Resource Management Content Management Virtualization Cloud Computing 3

Policy: EMC Product Security Policy (v.2) 4

Process: EMC Product Security Development Lifecycle (SDL) Basic Principles Current Product Release 1 Complete a security assessment against the 80 criteria of Product Security Policy Current Security Assess. Leverage SDL resources to build a product security plan that addresses security gaps Non-Compliant Partial Compliance Not Applicable Compliant 2 Next Product Release Perform security assessment before release & follow risk management practices under TCE oversight Integrate SDL activities in standard product development process 3 4 EMC TCE Executive Management Product Security Office Threat modeling methodology Source code scanning tool Security testing tools Security training curriculum Common Security Toolkit 5

Our Work to Date Security Secure Software Development Training ASSURANCE Authenticity Integrity Software Integrity Best Practices Software Integrity Controls in Supply Chain 11

EMC/RSA Approach to Measuring Product Security and Organization Maturity PRODUCT SECURITY POLICY Maintained by RSA / Sets EMC-wide standards for product Architecture & Design Standards 3A, Network security Data security Cryptography and key management Serviceability Secure design principles KEY METRICS security Coding Standards Input validation Injection protection Directory traversal protection Web and C/ C++ coding standards Handling secrets PRODUCT GAPS PRODUCT RISK (4 levels) Process (Security Dev. Lifecycle) Requirements Threat modeling Code review / scanning Security testing Source code supply chain Documentation Assessment Vulnerability response PROCESS GAPS ORG MATURITY (4 levels) Lessons learned Use organization maturity to set organization adoption roadmaps 1) Vulnerability resp. 2) Assessment 3) Commercial testing 4) Threat modeling 5) Full process Be prescriptive with functional standards Use metrics as management tools Executive dashboards Cost avoidance per gap 7

THANK YOU 8