The Security Development Lifecycle. Steven B. Lipner, CISSP SLipner@microsoft.com Senior Director Security Engineering Strategy Microsoft Corp.



Similar documents
The Security Development Lifecycle

The Security Development Lifecycle. OWASP 24 June The OWASP Foundation

Ivan Medvedev Principal Security Development Lead Microsoft Corporation

PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft

MICROSOFT SECURITY DEVELOPMENT LIFECYCLE (SDL)

Software Development: The Next Security Frontier

Vulnerability Management in Software: Before Patch Tuesday KYMBERLEE PRICE BUGCROWD

How To Perform An External Security Vulnerability Assessment Of An External Computer System

Agile and Secure: Can We Be Both?

Secure Development LifeCycles (SDLC)

Software Application Control and SDLC

The SDL Progress Report. Progress reducing software vulnerabilities and developing threat mitigations at Microsoft

Operating System Security

Computer Security: Principles and Practice

Secure Programming Lecture 9: Secure Development

In Building Security In, Gary McGraw proposes three pillars to use throughout the lifecycle: I: Applied Risk Management

SAFECode Security Development Lifecycle (SDL)

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

-.% . /(.0/ ) 53%/( (01 (%((. * 7071 (%%2 $,( . 8 / 9!0/!1 . # (3(0 31.%::((. ;.!0.!1 %2% . ".(0.1 $) (%+"",(%$.(6

Building Security into the Software Life Cycle

90% of data breaches are caused by software vulnerabilities.

Microsoft SDL: Agile Development

Goals. Understanding security testing

Implementing Security Update Management

Module 1: Introduction to Designing Security

Building Security Into The Software Life Cycle

Integrating Web Application Security into the IT Curriculum

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

Agile and Secure: OWASP AppSec Seattle Oct The OWASP Foundation

ABB s approach concerning IS Security for Automation Systems

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

ISSECO Syllabus Public Version v1.0

IT-Risk-Management. Secure Software Design Secure Development Lifecycle

Technical Note. CounterACT: Powerful, Automated Network Protection Inside and Out

Hosts HARDENING WINDOWS NETWORKS TRAINING

Introduction to Microsoft Security Development Lifecycle (SDL) Threat Modeling

Securing Your Network Environment. Software Distribution & Patch Management

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Developing Secure Software in the Age of Advanced Persistent Threats

Application Security Testing

Security Development Lifecycle for Agile Development

Developing secure software A practical approach

Certification Report

Revision History Revision Date Changes Initial version published to

Security within a development lifecycle. Enhancing product security through development process improvement

Rolling out an Effective Application Security Assessment Program. Jason Taylor, CTO

Strategic Information Security. Attacking and Defending Web Services

Software Security Touchpoint: Architectural Risk Analysis

Penetration Testing Windows Vista TM BitLocker TM

System Requirements for Microsoft Dynamics NAV 2013 R2

Testing Control Systems

Adobe Systems Incorporated

Keeping Up To Date with Windows Server Update Services. Bob McCoy, CISSP, MCSE Technical Account Manager Microsoft Corporation

Cutting Edge Practices for Secure Software Engineering

Enterprise Application Security Program

Securing the Cloud Infrastructure

Acano solution. Security Considerations. August E

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

! Resident of Kauai, Hawaii

Seven Practical Steps to Delivering More Secure Software. January 2011

How To Protect Your Data From Attack

Passing PCI Compliance How to Address the Application Security Mandates

Security Considerations for the Spiral Development Model

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Secure Development Lifecycle. Eoin Keary & Jim Manico

Windows Server Virtualization & The Windows Hypervisor

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

A Survey on Requirements and Design Methods for Secure Software Development*

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services

Software Assurance: An Overview of Current Industry Best Practices

Operational security for online services overview

Vulnerability management lifecycle: defining vulnerability management

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

Network Test Labs (NTL) Software Testing Services for igaming

Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden

Designing and Coding Secure Systems

2015 Vulnerability Statistics Report

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

WHITEPAPER. Nessus Exploit Integration

ISA Security Compliance Institute ISASecure IACS Certification Programs

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

Transcription:

The Security Development Lifecycle Steven B. Lipner, CISSP SLipner@microsoft.com Senior Director Security Engineering Strategy Microsoft Corp.

2 Overview Introduction A look back Trustworthy Computing and security pushes The Security Development Lifecycle Training Tools Results What next?

3 Introduction SLipner@microsoft.com Microsoft employee for 6+ years 35+ years in security Mathematical models A1 systems Firewalls Patents in system and network security Learned from my (and industry s s mistakes)

4 A Look Back Security integrated into Windows NT Microsoft Security Response Team Secure Windows Initiative (SWI) team Each OS release placed more emphasis on security And then there was 2001 Code Red Nimda UPNP

5 Trustworthy Computing Deliver products and services that customers can rely on Integrate trust into Microsoft culture

6 urity ushes Sec P Make significant security improvement Jumpstart Trustworthy Computing Apply (then) current understanding of security best practices.net Framework Windows Server 2003 Office 2003 SQL Server 2000 SP3 Exchange 2000 SP3

7 Building a Process Security Audit introduced with Windows Server 2003 How good a job did we do? Through 2003, SWI team Provided training Supported security pushes Conducted audits By late 2003, time to formalize

8 The Security Development Lifecycle

9 Security Engineering Framework SD 3 + Communications Secure by Design Secure by Default Secure in Deployment Communications Threat Modeling Code Inspection Security Testing Reduce attack surface area Unused features off by default Least privilege Prescriptive Guidance Security Tools Enterprise Management Clear security commitment Full member of the security community Microsoft Security Response Center

10 Security Development Lifecycle Tasks and Processes Security Kickoff & Register with SWI Security Training Security Design Best Practices Security Arch & Attack Surface Review Threat Modeling Use Security Development Tools & Security Best Dev & Test Practices Create Security Docs and Tools For Product Prepare Security Response Plan Security Push Pen Testing Final Security Review Security Servicing & Response Execution Requirements Design Implementation Verification Release Support & Servicing

11 Key Components of the SDL Threat modeling Enumerate external entities, processes, stores, flows Identify threats STRIDE Determine risks Plan mitigations security features and code quality Development best practices Banned APIs Static analysis SAL Annotation

12 Key Components of the SDL Fuzz testing Supply well-formed random input; investigate failures Applies to file parsers, RPC, ActiveX controls Tools Static analysis and fuzz testing must be automated Other tools developed as needed some weapons grade Improves efficiency and consistency

13 Final Security Review (FSR) Successor to 2002-3 audit From a security viewpoint, is this software ready to deliver to customers? Did the team meet the SDL requirements? How secure is this software? NOT penetrate and patch If FSR finds a pattern of vulnerabilities, revisit earlier phases and address root causes (e.g., improve training, enhance tools) don t t just fix the bugs and ship!

14 Maintaining the SDL SDL is NOT static! Respond to new threats Exploit new tools, techniques, processes SDL updated on a six-month cycle Proposal (with costs and benefits) Beta Final review and release Proposed updates reviewed broadly by Microsoft security and engineering teams

15 SDL: Education and Training Knowledge of security is not the norm among developers/college graduates Microsoft operates its own training program Basics of Secure Software Design, Development, and Test Introduction to Fuzz Testing Threat Modeling Security Design and Architecture - Time Tested Design Principles Implementing Threat Mitigations Introduction to SDL and the FSR Process Security Tools Overview Security Code Reviews Network Fuzz Testing Security for Upper Management Vista Security Features Classes of Security Defects Defects in Detail Attack Surface Analysis and Reduction Exploit Development Defect Estimation and Management Introduction to Cryptography Security Response

16 SDL Tools Visual Studio 2005 Native code static analysis (/analyze aka PREfast) Safe CRT libraries Managed code static analysis (FXCop) Code Access Security/Least Privilege (.Net) /GS improvements Testing tools (AppVerifier) Unit/Stress testing framework Full integrated solutions in VS Team System Stand alone versions available shortly More info: http://msdn.microsoft.com/library/en- us/dnvs05/html/vs05security.asp

17 Results 16 93 Service Pack 3 3 59 17 2003 Bulletins in Bulletins since period prior TwC release to release SQL Server 2000 SP3 released 1/17/2003 8 Released 11/29/2000 1111 Days After Product Release * As of May 9, 2006 Released 09/28/2003 Released Released 05/31/2001 11/17/2003 Bulletins 904 Days After Product Release

Results 18 We actually consider Microsoft to be leading the software [industry] now in improvements in their security development life cycle [SDL]. John Pescatore Vice President and Distinguished Analyst Gartner, Inc (From CRN, Feb 13 th 2006)

19 What Next? Making the SDL available to the community Howard/Lipner book a first step Additional tools, training, partners to follow Continuing to improve the SDL Process improvements More and better tools Blocking new classes of vulnerabilities and exploits Working to improve the Common Criteria security evaluation scheme

20 Summary SDL has proven effective at improving software security Key success factors Executive commitment Education and training Continuous improvement Process is widely applicable to software development teams

21 2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.

22 Emulating the SDL Get management support Build a core security team Including a security response center) Define your SDL process Select your initial tools Train your people Learn from your mistakes Update your products and your processes