Building Security Into The Software Life Cycle



Similar documents
Building Security into the Software Life Cycle

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Application Security in the Software Development Lifecycle

Key Components of a Risk-Based Security Plan

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

ESKISP Manage security testing

A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

The Value of Vulnerability Management*

Software Security Engineering: A Key Discipline for Project Managers

The Security Development Lifecycle. Steven B. Lipner, CISSP Senior Director Security Engineering Strategy Microsoft Corp.

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

State of Oregon. State of Oregon 1

September 2005 Report No FDIC s Information Technology Configuration Management Controls Over Operating System Software

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

Security Touchpoints When Acquiring Software. Dr Carsten Huth Nadim Barsoum Dawid Sroka

Cutting Edge Practices for Secure Software Engineering

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Matt Bartoldus

Comparison of Secure Development Frameworks for Korean e- Government Systems

Secure Programming Lecture 9: Secure Development

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

In Building Security In, Gary McGraw proposes three pillars to use throughout the lifecycle: I: Applied Risk Management

New IBM Security Scanning Software Protects Businesses From Hackers

A Survey on Requirements and Design Methods for Secure Software Development*

How To Protect Your Data From Attack

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Leveraging OWASP to Reduce Web App Data Breach Risk

NIST National Institute of Standards and Technology

HP Fortify application security

The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach

Development Processes (Lecture outline)

THE TOP 4 CONTROLS.

Taxonomic Modeling of Security Threats in Software Defined Networking. Jennia Hizver PhD in Computer Science

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Cyber Security nei prodotti di automazione

How To Manage A System Vulnerability Management Program

Software Testing Lifecycle

RETHINKING CYBER SECURITY

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Metrics that Matter Security Risk Analytics

Patch and Vulnerability Management Program

Looking at the SANS 20 Critical Security Controls

Performing Effective Risk Assessments Dos and Don ts

Microsoft Services Premier Support. Security Services Catalogue

Management (CSM) Capability

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Course 6426: Configuring and Troubleshooting Identity & Access Solutions With Windows Server 2008 Active Directory Page 1 of 6

Reducing Application Vulnerabilities by Security Engineering

Maximizing Configuration Management IT Security Benefits with Puppet

Seven Practical Steps to Delivering More Secure Software. January 2011

! Resident of Kauai, Hawaii

HP Fortify Software Security Center

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

IT Risk Management: Guide to Software Risk Assessments and Audits

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.

How To Monitor Your Entire It Environment

Application Security Center overview

Secure Development LifeCycles (SDLC)

Application Security Manager ASM. David Perodin F5 Engineer

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING

Security Information Management (SIM)

Measuring Software Security

Hosts HARDENING WINDOWS NETWORKS TRAINING

Vulnerability management lifecycle: defining vulnerability management

Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC

Secure Development Lifecycle. Eoin Keary & Jim Manico

Cyber attack on Twitter, 250,000 accounts hacked

Datacenter Management Optimization with Microsoft System Center

The Value of Automated Penetration Testing White Paper

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Understanding Vulnerability Management Life Cycle Functions

Big Data, Big Risk, Big Rewards. Hussein Syed

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance

Security Testing for Web Applications and Network Resources. (Banking).

Transcription:

Building Security Into The Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services a Division of McAfee Email: marco.morana@foundstone.com

Outline» Glossary» Application Security Risks» Software Security and Application Security» Costs and Return Of Security Investment (ROSI)» Software Security Development Life Cycle (S-SDLC)» Process Models and Frameworks» Business Risks, Technical Risks and Strategies» Summary» Resources 2

Glossary» Information Security Risks: the probability that a particular threat-source will exercise a particular information system vulnerability and the resulting impact if this should occur (NIST publication 800-27)» Software Security: a way to defend against software exploits by building software to be secure (McGraw Exploiting Software)» Application Security: a way to defend against software exploits in a post-facto way after deployment is complete (McGraw Exploiting Software)» Return Of Security Investment in Security (ROSI): The total amount of money that an organization is expected to save in a year by implementing a security control (Microsoft Security Risk Management Guide) 3

What is at risk? Target Applications At Risk 92% of reported vulnerabilities are in applications not in networks Server Applications 36% 41% Network Protocol Stack Other Communication Protocol 15% 3% 2% 2% 1% Hardware Operating System Source: NIST Non Server Applications 4

How we approach risk? Application Security Issue-based, short-term approach * Penetrate and Patch * Threat Modeling * Code Reviews Software Security Holistic, long-term approach * Root Cause Analysis * Organizational Change 5

What are the costs? Application Security Costs:» Defect Management: 5 defects/kloc, $ 30,000/KLOC (Business week)» Patch Management: 1000 servers, $ 300,000 to test and deploy a patch (Gartner)» Loss of productivity due of loss of service: $ 500 ML lost from DoS attack (Microsoft) Software Security Costs:» Unbudgeted time to fix security problems:1000 man-hours (Microsoft)» Cost of training software developers in security: $100 Million (Microsoft)» Inadequate software testing costs: $3.3 billion (NIST) 6

When we do address the problem?» Today most people test after software is built! 7

ROSI = [( RiskExposure % RiskMitigated ) SolutionCo st ]/( SolutionCo st ) When is more cost effective to build security in?» Assume the following data from a study (IBM): - Secure Software Engineering Expense Per Phase - Number of Security Defects found Per Phase - Percentage of Vulnerabilities Fixed» The Return Of Security Investment (ROSI) in dollar savings for every $ 100,000 spent is: - $ 21,000 when defects are fixed and identified during design - $ 15,000 when defects are fixed during implementation - $ 12,000 when defects are fixed during tests 8

Software Risk Management and Secure Software Development Life Cycles (S-SDLC) 9

How do we get there? 1. Adopt an activity driven approach 2. Document security activities derived by best practices 3. Define dependencies and prerequisites 4. Define entry scenarios for the activities 5. Define strategic and tactical tracks for the activities 6. Define the roadmaps for software security 7. Position the activities with respect to different SDLC methodologies 10

Security-Enhancing Lifecycle Process Models 1. Enhance security through a repeatable and measurable process 2. Provide guidance on secure software activities 3. Provide secure software development reviews 4. Include tactical resources 5. Provision the use of automation tools 6. Suggest roles for conducting the activities 7. Integrate with foundational software development activities 11

Security Enhancing Process Models» Microsoft s Trustworthy Computing Security Development Lifecycle 12

Security Enhancing Process Models» Comprehensive Lightweight Application Security Process (CLASP) 13

Security Enhancing Process Models» Gary McGraw Touch-Point Model 14

Security Enhancing Process Models» SEI Team Software Process for Secure Software Development 15

Software Security Frameworks 16

Business Risks, Technical Risks and Strategies» Business Risk Factors: - Business impact - Value of the assets - Information risk management» Technical Risks Factors: - Technical impacts - Value of data - Software risks associated to threats and vulnerabilities» Risk Remediation Strategies: - Cost to fix vulnerabilities vs. cost of exploitation - Translate technical risks to business risks - Assess, evaluate and prioritize by business impact 17

In Summary 1. Make the initial business case - Costs - Return Of Security Investment (ROSI) 2. Adopt a formal process to build security into the SDLC - Security Enhancing Process Models - Software Security Frameworks 3. Have a plan for the implementation - Tactical and strategic plans - Roadmaps: short term and long term 4. Integrate Software Security with Information Security Risks - Assess business impacts - Factor technical and business impacts in overall risks 5. Review the business case and commit to it - Measure overall risk and decide strategies - Commit people, process and technology 18

Questions? 19

Foundstone Links» Foundstone Software Application Security Services (SASS) www.foundstone.com/sass» Foundstone Resources www.foundstone.com/resources.overview.htm Thank you for listening! 20