Proposed Cyber Test and Evaluation Process across the Software Development Lifecycle



Similar documents
Overview TECHIS Carry out risk assessment and management activities

ESKISP Manage security testing

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

A Comprehensive Cyber Compliance Model for Tactical Systems

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Patch and Vulnerability Management Program

Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper

Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services

Reducing Application Vulnerabilities by Security Engineering

Guidelines for Cybersecurity DT&E v1.0

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

ESKISP Direct security testing

Access FedVTE online at: fedvte.usalearning.gov


Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security

Cyber Security Risk Management: A New and Holistic Approach

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Software Application Control and SDLC

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Practical Applications of Software Security Model Chris Nagel

Effective Software Security Management

MIS Systems & Infrastructure Lifecycle Management 1. Week 13 April 14, 2016

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Bellevue University Cybersecurity Programs & Courses

Bank of America Security by Design. Derrick Barksdale Jason Gillam

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Threat Modeling. Deepak Manohar

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

Proposed Cybersecurity T&E Process

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

ESKISP Conduct security testing, under supervision

Security aspects of e-tailing. Chapter 7

Cisco Master Security Specialization Practice Areas Summary. June 2015

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

Learning objectives for today s session

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

Overview TECHIS Carry out security testing activities

Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

The AppSec How-To: Achieving Security in DevOps

Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva

Application Security in the Software Development Lifecycle

Get Confidence in Mission Security with IV&V Information Assurance

Building Assurance Into Software Development Life- Cycle (SDLC)

Creating Value through Innovative IT Auditing

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

WebGoat for testing your Application Security tools

Secure Development Lifecycle. Eoin Keary & Jim Manico

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

White Paper Strengthening Information Assurance in Healthcare

How To Ensure Your Software Is Secure

Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC

Cyber R &D Research Roundtable

Continuous Delivery and Risk Management

PENETRATION TESTING GUIDE. 1

Software Engineering Framing DoD s Issues

Taxonomic Modeling of Security Threats in Software Defined Networking. Jennia Hizver PhD in Computer Science

Certified Information Security Manager (CISM)

AGIL JA, ABER SICHER? , ANDREAS FALK, 34. SCRUM TISCH

NWEN405: Security Engineering

Cybersecurity Throughout DoD Acquisition

Seven Practical Steps to Delivering More Secure Software. January 2011

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

G-Cloud Pricing. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

Amadeus Shaping the future of travel

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

Technology Risk Management

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Software Development: The Next Security Frontier

ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel

Leveraging OWASP to Reduce Web App Data Breach Risk

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Policy on Information Assurance Risk Management for National Security Systems

Introduction to network penetration testing

A Sumo Logic White Paper. Sumo Logic Security Model. Secure by Design

Information Security Risk and Compliance Series Risking Your Business

Cisco Master Security Specialization Practice Areas Summary. February 2016

2012 Application Security Gap Study: A Survey of IT Security & Developers

Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services

Transcription:

Proposed Cyber Test and Evaluation Process across the Software Development Lifecycle Carolyn R. Keith MSIA, CISSP-ISSEP, CISA, CTEP November 2013 ITEA 30th Annual Symposium

Introduction DDT&E suggestion Shift-Left for Cyber Security Testing Current cyber threat requires better and cheaper security solutions Response Move initial Cyber Security Testing activities earlier in the Software Development Life Cycle (SDLC) Test Cyber Security throughout the entire SDLC

DOD Acquisition Life Cycle 3

Security Testing Functionality requirements Initial user interface Technology platform selection Technical architecture Project plan Detailed specifications Finalize user interface Application architecture System interface design Test plans Installation on production Production testing Transition to operations Post deployment support Maintain Plan Deploy Design Develop Application code development System interface design Integration with existing apps Unit and integration testing OPERATIONAL TESTING (OT) SECURITY TESTING System testing User interface testing Installation staging environment DEVELOPMENTAL TESTING (DT) 4

Issue Cost of Fixing Vulnerabilities Later Stage Critical Bugs Identified Cost of Fixing 1 Bug Cost of Fixing All Bugs Cost of Fixing Vulnerabilities Early Stage Critical Bugs Identified Cost of Fixing 1 Bug Cost of Fixing All Bugs Requirements $139 Requirements $139 Design $455 Design $455 Coding $977 Coding 150 $977 $146,550 Testing 50 $7,136 $356,800 Testing 50 $7,136 $356,800 Maintenance 150 $14,102 $2,115,300 Maintenance $14,102 Total 200 $2,472,100 Total 200 $503,350 Source: www.cert.org 5

Response Pre-Milestone A Perform a Security Risk Assessment Conduct Threat Modeling Execute a Tabletop Contingency Exercise Execute a Hypothetical Penetration/Exploitation Exercise 6

Response (continued) Pre-Milestone B Add Granular Security Requirements to Critical Design Documents Conduct Hack the Design reviews 7

Response (continued) Pre-Milestone C Perform Code Reviews Earlier and Continuously Apply STIG and Current Information Assurance Vulnerability Management (IAVM) Notice Requirements to the Code and Applications Incorporate Vulnerability Scanning and Security Fix or Mitigation Activities Initiate Penetration Activities Earlier Change the mindset - Authorization to Operate (ATO) is not the end of operational security, it is the beginning 8

Response (continued) Deployment Phase Continue to apply STIGs and IAVM notices Perform final Code Review Continue Vulnerability Scanning Execute a full Penetration/Exploitation Test Maintenance Phase Continue to apply STIGs and IAVM notices Continue Vulnerability Scanning Execute random, unannounced Penetration/Exploitation Tests 9

Proposed Schedule Historical Schedule Summary Activity Plan Design Develop Deploy Maintain Security Risk Assessment Threat Modeling Security Penetration Exercise Contingency Tabletop Exercise Security Design Security Code Reviews Implement STIGs and IAVAs Vulnerability Scanning and Security Reviews Risk Assessment Threat Modeling Security Penetration Exercise Contingency Tabletop Exercise Security Design Security Code Reviews Implement STIGs and IAVAs Vulnerability Scanning and Security Reviews 10

Questions 11

12