Matt Bartoldus matt@gdssecurity.com



Similar documents
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

elearning for Secure Application Development

Secure Code Development

Building Security into the Software Life Cycle

ISSECO Syllabus Public Version v1.0

Integrating Security Testing into Quality Control

Secure Development LifeCycles (SDLC)

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Application Security in the Software Development Lifecycle

Agile Development for Application Security Managers

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Agile and Secure: Can We Be Both?

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

05.0 Application Development

Building Security Into The Software Life Cycle

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

Two Approaches to PCI-DSS Compliance

The Top Web Application Attacks: Are you vulnerable?

Development Processes (Lecture outline)

Secure Development Lifecycle. Eoin Keary & Jim Manico

Enterprise Application Security Program

Successful Strategies for QA- Based Security Testing

Seven Practical Steps to Delivering More Secure Software. January 2011

Security Metrics Rehab. Breaking Free from Top X Lists, Cultivating Organic Metrics, & Realizing Operational Risk Management

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

safe and sound processing online card payments securely

Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden

Getting Started with Web Application Security

Adopting Agile Testing

Ed Adams, CEO Security Innovation. Dr. Larry Ponemon Ponemon Institute ISACA Webinar Program ISACA. All rights reserved.

Magento Security and Vulnerabilities. Roman Stepanov

Agile Training and Certification Options. David Hicks

San Francisco Chapter. Cassius Downs Network Edge LLC

Secure Web Applications. The front line defense

Adobe Systems Incorporated

How to Build a Trusted Application. John Dickson, CISSP

A6- Sensitive Data Exposure

PCI DSS Investing wisely...

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Cyber Security & Data Privacy. January 22, 2014

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

New IBM Security Scanning Software Protects Businesses From Hackers

Essential IT Security Testing

Agile and Secure: OWASP AppSec Seattle Oct The OWASP Foundation

Software Security: State of the Practice. Diana Kelley Partner SecurityCurve

Using Free Tools To Test Web Application Security

Project Management Agile Experience Report

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance

Better Software Though Expertise, Collaboration & Automation. BDD, DevOps and Testing

How To Understand And Understand The Security Of A Web Browser (For Web Users)

Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May Belfast

Smart (and safe) Lighting:

How To Ensure That Your Computer System Is Safe

Leveraging OWASP to Reduce Web App Data Breach Risk

SecurityMetrics Vision whitepaper

Automotive Suppliers and Cybersecurity

Learning objectives for today s session

Enterprise Security Architecture

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

CFIR - Finance IT 2015 Cyber security September 2015

Cloud Security Fails & How the SDLC could (not?) have prevented them

Enterprise Computing Solutions

Balancing the Hybrid Development Process. The role of the Business Analyst

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

Reducing Application Vulnerabilities by Security Engineering

Who Doesn t Want to be Agile? By: Steve Dine President, Datasource Consulting, LLC 7/10/2008

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

Software Application Control and SDLC

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

SECURITY AND RISK MANAGEMENT

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Please include the job reference quoted (and for LinkedIn adverts refer to the employer job ID) in the subject heading and cover letter.

Vulnerability management lifecycle: defining vulnerability management

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

Secure Software Begins in the Development Process

Application Security Testing. Generic Test Strategy

Web Application Security

A Strategic Approach to Web Application Security

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Information Security Risk Management

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

The Different Mindset of Security Testing

The monsters under the bed are real World Tour

Effective Software Security Management

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Agile Security Successful Application Security Testing for Agile Development

Making your web application. White paper - August secure

Software Testing Trends in Australia and Beyond

Improving RoI by Using an SDL

Using Simulation to teach project management skills. Dr. Alain April, ÉTS Montréal

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Transcription:

Matt Bartoldus matt@gdssecurity.com Security in the SDLC: It Doesn t Have To Be Painful 2010 Gotham Digital Science, Ltd

Introduction o Me o Who Are You? Assessment (Penetration Tester; Security Auditors) Developer IT Architect Management Application Owner Consultant (2 or more above) Other 2

Agenda o Information Security Industry It is all so very young! o The Building Blocks o Business Case o People, Process, Technology o Frameworks o How? o Problems You Will Create The above to include war stories, examples, trivia, things to look out for and other random things 3

Young Discipline in a Young Industry o BS7799 came out mid-90s o Shifting Focus within Industry PBX to Infrastructure to Database/Application hacking o PCI-DSS CISP 2001 mention of change control as a best practice item PCI-DSS v1.2 late 2008 Requirement 6 4

Common Excuses No Time No Skills No Budget Translation Business reasons for security have not been defined and/or communicated (or communicated well enough)! Example Spend 60,000 to encrypt our laptops please? 5

Business Case- Drivers o Relatively Same Drivers Across Industries Compliance PCI-DSS, SOX, DPA, etc Protection Brand/reputation; from criminals (cyber-crime) Governance Function of good corporate governance; enterprise risk management 6

Business Case- Quality What is Quality? Subjective Depends on context ISO 9001 "Degree to which a set of inherent characteristics fulfills requirements." Six Sigma "Number of defects per million opportunities." Quality Assurance Prevention of defects Quality Control Detection of defects 7

Security Defect? My application is vulnerable to SQL Injection which allows an anonymous attacker the ability to pull down the contents of the backend database without authentication. So what? Is this vulnerability a defect? Quality Issue? Requirements met? 8

Business Case Translate Technical Risk to Business Risk Business Risk Cross-Site Request Forgery (CSRF) Mission-critical application downtime Compromised data, customer or cardholder records Session Hijack Translation Via Context Compliance failure leading to penalties and fines Loss of revenue Legal liability Exposed intellectual property Open Redirect Loss of consumer confidence Insecure Data Storage 9

Business Case - Customer Expectations The pricing for my application is as follows: 19.99 for the Application 29.99 for the Application + reliability 39.99 for the Application + reliability + performance 49.99 for the application + reliability + performance + security 10

Building Block - Standard Approach to IT Delivery People The right set of skills (information security) Process Industry proven processes Technology Industry leading tools and research 11

Building Block Technology Technology Technology is used to automate processes, provide efficiency and cost savings, and drive innovation. However Technology is useless if PEOPLE do not know how to use Technology can be dangerous if PEOPLE use incorrectly The benefits of using technology can be wasted if not part of a PROCESS 12

Building Block - People People Building Software Design Architecture Development Testing Project Management Project Risk Project Costing Information Security Secure Design Security Architect Secure Development Security Testing Project Management Risk Assessment Resource Allocation 13

Building Block - Process Process Systems Development Development methodologies Waterfall RUP Agile Development Activities Planning Design Develop Test Release Information Security (Infosec) Infosec Methodologies??? Infosec Activities Risk Analysis Threat Modelling/Assessment Testing 14

Development Method Independent Security is independent of development methodologies whether using Agile, RUP, Waterfall, Scrum, RAD, Iterative, etc 15

Building Block Framework (Approach) 16

Motivation for a framework approach o Changing an organisation is difficult Simple, well-defined, measurable preferred over complex o Application security is a result of many activities Combination of people, process, and automation o There is no single formula for all organisations Business risk from software depends on the nature of the business o An assurance program must be built over time Organisations can t change overnight. Use a phased approach. 17

Questions from Business» What does it look like?» How can we understand and manage this?» Do we have enough resources / skills to do this?» How does this fit in with the Security function, shouldn t they do it?» We are used to security projects that implement tools or systems but now we need to change our processes?» Isn t there an established method or model for all this? 18

So what is this discipline called?» Software Assurance» BSA Business Software Assurance» SSA - Software Security Assurance» SDL Security Development Lifecycle» SDLC to confuse everyone» ssdlc secure Software Development Lifecycle» SPLC Secure Project Lifecycle» CLASP - Comprehensive, Lightweight Application Security Process» 7 Touchpoints» SSF System Security Framework 19

Business Functions and Security Practices o Using OpenSAMM as a framework for security in software development o Security Practices that are the independent silos for improvement that map underneath the Business Functions of software development. 20

Security within a Generic Development Project 21

Security Testing Lifecycle Ref: Ireland, Andrew Software Testing Life-Cycle 22

Process Output Example: Compliance Business Function Security Practice Objective Activity Output It s not the tool that enables compliance, it is the process in which the tool is used 23

How? Use Building Blocks Business Case Get funding, management commitment People, Process and Technology Skills Integrate into Existing Processes Framework Use to Measure over time Put into Business Context Enable comparison 24

How? Security Skills Security professionals are overwhelmed Organisations must learn to bridge the gap The business is overwhelmed by security Where are your information security skills? 25

How? Security Skills Security skills are deployed into the business The business embeds security activities and skills 26

How? Augment Processes Embed security into existing business processes We don t have a formal process, how can we embed security into something we don t have? You are DOING something.. so embed security as part of that DOING something! 27

How? Plan and Measure Use activities to make a plan Start with a current state Even if you think you know document it Draw up a plan Measure at milestones Measure Define metrics based on plan Example: Use CMMI-ish ratings for activities (a la COBIT) 0 -Nonexistent 1- Ad-hoc 2- Repeatable 3- Defined Process 4 -Managed and Measurable 5- Optimised 28

Problems You Will Create More defects How will this be perceived by management? How will these be managed? Who will prioritise remediation? When will remediation be done? Developer morale (don t beat anyone up) 29

Problems You Will Create Skills gap It will become apparent where your security skills are (or are not) Never a good time for training Consultants are a very costly long term option That ONE security person can not be involved with everything! There is a difference between a breaker and a fixer 30

Problems You Will Create Resource gap Actually the case anyway, but will be further highlighted Convincing senior management to invest more Now that more is understood about your vulnerabilities, it can not be ignored.. but it can be considered and eventually managed 31

Problems You Will Create Political minefields Some organisations don t manage change very well Middle managers Managing perceptions and pushback 32

33 3 3

About Gotham Digital Science o Gotham Digital Science (GDS) is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management. GDS clients number among the largest financial services institutions and software development companies in the world. o Offices in London and New York City 34