Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers



Similar documents
Vulnerability Management in an Application Security World. AppSec DC November 12 th, The OWASP Foundation

Rolling out an Effective Application Security Assessment Program. Jason Taylor, CTO

Application Security 101. A primer on Application Security best practices

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May Belfast

APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL

Your world runs on applications. Secure them with Veracode.

The Next Generation of Security Leaders

Survey on Application Security Programs and Practices

Agile and Secure: OWASP AppSec Seattle Oct The OWASP Foundation

Domain 1 The Process of Auditing Information Systems

Security Automation in Agile SDLC Real World Cases

UIIPA - Security Risk Management. June 2015

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

Third Party Security: Are your vendors compromising the security of your Agency?

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

Achieving SOX Compliance with Masergy Security Professional Services

Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?

Vulnerability Management

CloudCheck Compliance Certification Program

Information & Asset Protection with SIEM and DLP

Cybersecurity Awareness for Executives

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Pentests more than just using the proper tools

5 Partner Benefits and Requirements Benefits Requirements... 8

Pentests more than just using the proper tools

Integrated Threat & Security Management.

Services Providers. Ivan Soto

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

From Chaos to Clarity: Embedding Security into the SDLC

Accenture and Software as a Service: Moving to the Cloud to Accelerate Business Value for High Performance

How to ensure control and security when moving to SaaS/cloud applications

THE BLUENOSE SECURITY FRAMEWORK

10 Smart Ideas for. Keeping Data Safe. From Hackers

State of Oregon. State of Oregon 1

Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013

Cloud Infrastructure Security

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

IoT & SCADA Cyber Security Services

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

How To Improve Your Business

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

FERPA: Data & Transport Security Best Practices

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

5 Things to Look for in a Cloud Provider When it Comes to Security

Beyond BOM 101: Next Generation Bill of Materials Management whitepaper

MIS Systems & Infrastructure Lifecycle Management 1. Week 13 April 14, 2016

The Way to SOA Concept, Architectural Components and Organization

CONSULTANTS TO THE INSURANCE INDUSTRY IT DEVELOPMENT QA TESTING CEDERIGHT REINSURANCE STAFF AUGMENTATION

Asset management guidelines

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Enterprise Application Security Program

The expression better, faster, cheaper THE BUSINESS CASE FOR PROJECT PORTFOLIO MANAGEMENT

arenasolutions.com Whitepaper Has Your BOM Solution Bombed? Next Generation Bill of Materials Management

Strategic Sourcing & B2B E Commerce Solutions for ASEAN Purchasing Professionals. Bill Kohnen

Managing Web & Application Security with OWASP bringing it all together. Tobias Gondrom (OWASP Project Leader)

Interactive Application Security Testing (IAST)

EMA Services for IT Vendors

Italy. EY s Global Information Security Survey 2013

Why You Need to Test All Your Cloud, Mobile and Web Applications

Case Study. SNW Asset Management. (866)

Guideline on Implementing Cloud Identity and Access Management

How To Understand The Benefits Of Cloud Computing

Columbia University Web Security Standards and Practices. Objective and Scope

WHITE PAPER TAKING THE NEXT STEP IN CTRM CLOUD SOLUTIONS

Cloud Security Fails & How the SDLC could (not?) have prevented them

Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist

Accenture Technology Consulting. Clearing the Path for Business Growth

Securely Outsourcing to the Cloud: Five Key Questions to Ask

Software Code Quality Checking (SCQC) No Clearance for This Secret: Information Assurance is MORE Than Security

OpenSAMM Software Assurance Maturity Model

BSM for IT Governance, Risk and Compliance: NERC CIP

How to Build a Trusted Application. John Dickson, CISSP

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Transcription:

Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers Dan Cornell OWASP AppSec DC 2010 November 11 th, 2010

Overview The Problem Information Gathering Application Scoring Risk Rank & Tradeoff Analysis Discussion Conclusion, Next Steps, and Q&A 1

Some Key Questions for Today s Session Where do you start? What applications represent the biggest risk? What attributes make applications more or less risky? What are the most cost-effective way to manage the risk of inherited applications? What approaches might work for your organization? 2

Desired Outcomes Understand risk-based options for managing the security of inherited applications Develop a framework for ranking risks with specific applications Understand some of the decision-making factors that come into play when risk-ranking applications Apply one tactic from what you learn today next week at your organization 3

Personal Background Denim Group CTO Developer by background Java,.NET, etc 4

Denim Group Background Professional services firm that builds & secures enterprise applications Secure development services: Secure.NET and Java application development Post-assessment remediation Secure web services Application security services include: External application assessments Code reviews Software development lifecycle development (SDLC) consulting Classroom and e-learning instruction for developers 5

What you Don t know CAN Hurt You Passion: Get security professionals to ask a better set of questions Today s presentation focuses on helping you increase your IQ in the arena of software portfolio risk 6

Background the Current State of Affairs Creating meaningful enterprise-wide software security initiatives is hard The vast majority of info regarding software security focuses on testing software writing more secure code or SDLC process improvement Most organizations have hundreds or thousands of legacy applications that work! They represent money already spent ROI? They are viewed part of the plumbing by management The codebases can be millions of lines of code Industry is focused on web applications Other software risks must be taken into consideration Web services, mobile applications, SaaS, certain desktop applications 7

Key Facts 66% have adopted a risk-based approach to remediation of application vulnerabilities 71% have an executive or team with primary ownership and accountability for application security 66% have defined communications channels between security, operations, and development teams Source: Securing Your Applications: Three Ways to Play, Aberdeen Group, August 2010 8

Goal for Our Model Transparent Decisions and calculations should be explainable Adaptable Not every organization has the same drivers, goals or resources Practical Get something that works and iterate 9

Methodology Steal steal steal! Andrew Jacquith s Application Insecurity Index (AII) from his book Security Metrics Nick Coblentz s blog posts on the topic Other example spreadsheets, etc Simplify simplify simplify! Great is the enemy of the good enough Any information collected should provide value Work in progress Test with organizations Repeat 10

Step 1: Develop Initial Criteria Business Importance Risk Assessment Risk 11

Step 2 Information Gathering Build a Portfolio of Applications Public-facing web sites Customer-facing web applications Partner-facing web applications Internal- or partner-facing web services Customer Relationship Management (CRM) systems Financial applications Green screen mainframe applications Software as a Service (SaaS) applications 12

Step 2 Information Gathering (Continued) Collect Background Information Development Details Vendor (if any) Audience Hosting Details Assess the Data Type (CCs, PII, ephi, etc) Compliance Requirements Determine the Scale Lines of Code Dynamic Pages Concurrent Users User Roles 13

Step 2 Information Gathering (Continued) Assess the Underlying Technology Infrastructure (OS, hardware, etc) Platform (.NET, Java, PHP, etc) Versions Assess the Security State Assessment Activity (type, date, etc) Vulnerabilities (high, medium, low) Protection (IDS/IPS, WAF) 14

Step 3 Application Scoring Business Importance Risk Business Function (customer interface, internal but public-facing, departmental use only) Access Scope (external, internal) Data Sensitivity (customer data, company confidential, public) Availability Impact (serious, minor, minimal, or no reputation damage) 15

Step 3 Application Scoring (Continued) Technology Risk Authentication (methods, enforcement) Data Classification (formal approach or not) Input / Output Validation (structured or not) Authorization Controls (resource checks in place or not) Security Requirements (explicitly documented or not) Sensitive Data Handling (controls in place like encryption or not) User Identity Management (procedures in place for account creation, access provisioning, and change control or not) Infrastructure Architecture (network segmentation, patching) 16

Step 3 Application Scoring (Continued) Assessment Risk Technical Assessment (assessment activity, vulnerabilities still present) Regulatory Exposure (unknown, subject to regulation) Third-Party Risks (outsourced development, SaaS hosting, etc) 17

Step 4: Determine Assessment Approach Currently using OWASP Application Security Verification Standard (ASVS) Determine what you consider to be a Critical, High, Medium, Low Determine what assessment approach/standard you want to use 18

Results Comparison Let s analyze our results Apply quantitative decision-making analysis concepts Want to understand what level of effort addresses the highest amount of risk Tradeoff analysis 19

Evaluation Pros Provides for a structured approach Calculations are observable Standards can be set for specific organizations Cons Can seem like a lot of data to collect Technology Risk is hard to get at a proper level of granularity Excel spreadsheet combines data and code Needs work for dealing with cloud stuff 20

So where do you go from here? 21

Example Artifacts Application Tracking and Risk-Ranking Spreadsheet What are the applications? What are their characteristics? How do they rank against one another? Risk-Ranking Planning Spreadsheet Which applications are critical, high, medium or low? How are you going to deal with each application? 22

Potential Follow-up Options End of Life Remediate Potential Testing Approaches Tailoring to Documented Risk Work identified list from top to bottom Application Security Verification Standard (ASVS) Levels of application-level security verification that increase in breadth and depth as one moves up the levels Verification requirements that prescribe a unique white-list approach for security controls Reporting requirements that ensure reports are sufficiently detailed to make verification repeatable, and to determine if the verification was accurate and complete. 23

What you can do now! Collect or scrub your initial application inventory Develop relationships with 3 rd parties who can help you through the identification process Find a peer that is conducting the same risk ranking Familiarize yourself with OWASP OpenSAMM and OWASP ASVS 24

Conclusion Managing the security of inherited applications can present the most severe headaches for someone building a software security program A risk-based approach is really the only economically feasible approach given the size/complexity of the problem Understanding certain attributes of inherited applications is critical to applying a risk-based management approach 25

Resources Web Application Security Portfolios, ISSA Journal, May 2009, Coblentz, Nick. Open Web Application Security Project Open Software Assurance Maturity Model, www.owasp.org Open Web Application Security Project Application Security Verification Standard, www.owasp.org How-to-Guide for Software Security Vulnerability Remediation, Dan Cornell, Denim Group, October 2010 Cloud Security Alliance Securing your Applications, Aberdeen Group, Brink, Derek, August 2010 26

Contact Dan Cornell dan@denimgroup.com (210) 572-4400 www.denimgroup.com blog.denimgroup.com Twitter: @danielcornell Email me for a copy of the example Excel spreadsheet 27