OpenSAMM Software Assurance Maturity Model



Similar documents
Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May Belfast

Managing Web & Application Security with OWASP bringing it all together. Tobias Gondrom (OWASP Project Leader)

Tobias Gondrom (OWASP Global Board Member)

How We Implemented Security in Agile for 20 SCRUMs- and Lived to Tell

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Integrating Web Application Security into the IT Curriculum

Web Application Security Roadmap

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Points of View. CxO s point of view. Developer s point of view. Attacker s point of view

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Secure Development LifeCycles (SDLC)

Adobe Systems Incorporated

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

How To Protect A Web Application From Attack From A Trusted Environment

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Leveraging OWASP to Reduce Web App Data Breach Risk

elearning for Secure Application Development

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Web Application Firewalls: When Are They Useful? OWASP AppSec Europe May The OWASP Foundation

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

How To Protect Your Data From Attack

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

(WAPT) Web Application Penetration Testing

From the Bottom to the Top: The Evolution of Application Monitoring

OWASP Top Ten Tools and Tactics

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

SAST, DAST and Vulnerability Assessments, = 4

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Learning objectives for today s session

Using Free Tools To Test Web Application Security

Reducing Application Vulnerabilities by Security Engineering

NSFOCUS Web Vulnerability Scanning System

How to Build a Trusted Application. John Dickson, CISSP

Session 3: Security in a Software Project

Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

SANS Top 20 Critical Controls for Effective Cyber Defense

The AppSec How-To: Achieving Security in DevOps

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

HP Application Security Center

WebGoat for testing your Application Security tools

Application Security Testing

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

The Web AppSec How-to: The Defenders Toolbox

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

ModSecurity The Open Source Web Application Firewall

Web Application Penetration Testing

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

ensuring security the way how we do it

Security Testing for Developers using OWASP ZAP

DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, The OWASP Foundation

Web Application Security

Concierge SIEM Reporting Overview

Web Intrusion Detection with ModSecurity. Ivan Ristic

Secure Web Development Teaching Modules 1. Threat Assessment

F5 Silverline Web Application Firewall Onboarding: Technical Note

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Magento Security and Vulnerabilities. Roman Stepanov

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

Where every interaction matters.

Beyond ISO Intel's Product Security Maturity Model (PSMM)

Vulnerability Management

Information Technology Policy

Don t Write Your Own Security Code The Enterprise Security API Project OWASP. The OWASP Foundation

Enterprise Security API (ESAPI) Java Java User Group San Antonio. Jarret Raim June 3 rd, 2010

What Do You Mean My Cloud Data Isn t Secure?

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Guidelines for Web applications protection with dedicated Web Application Firewall

Web Engineering Web Application Security Issues

Sichere Software- Entwicklung für Java Entwickler

The AppSec How-To: 10 Steps to Secure Agile Development

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

! Resident of Kauai, Hawaii

The Security Development Life Cycle

Achieving PCI Compliance Using F5 Products

Application Security Manager ASM. David Perodin F5 Engineer

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Application Security 101. A primer on Application Security best practices

Bust a cap in a web app with OWASP ZAP

Rational AppScan & Ounce Products

Network Test Labs (NTL) Software Testing Services for igaming

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Interactive Application Security Testing (IAST)

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

hyperguard Defining a dwaf to secure cloud applications By Alexander Meisel, CTO and Co-Founder

FortiWeb 5.0, Web Application Firewall Course #251

Essential IT Security Testing

Transcription:

Libre Software Meeting Brussels 10-July-2013 The OWASP Foundation http://www.owasp.org Open Software Assurance Maturity Model Seba Deleersnyder seba@owasp.org OWASP Foundation Board Member OWASP Belgium Chapter Leader project co-leader

The OWASP Foundation http://www.owasp.org OWASP World OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security visible so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a notfor-profit charitable organization that ensures the ongoing availability and support for our work.

Databases Legacy Systems Web Services Directories Human Resrcs Billing The web application security challenge Network Layer Application Layer APPLICATION ATTACK Firewall Your security perimeter has huge holes at the application layer Custom Developed Application Code App Server Web Server Hardened OS Firewall You can t use network layer protection (firewall, SSL, IDS, hardening) to stop or detect application layer attacks

Build in software assurance proactive reactive security requirements / threat modeling coding guidelines code reviews static test tools security testing dynamic test tools vulnerability scanning - WAF Design Build Test Production Secure Development Lifecycle () 4

We need a Maturity Model An organization s behavior changes slowly over time Changes must be iterative while working toward long-term goals There is no single recipe that works for all organizations A solution must enable riskbased choices tailored to the organization Guidance related to security activities must be prescriptive A solution must provide enough details for nonsecurity-people Overall, must be simple, welldefined, and measurable OWASP Software Assurance Maturity Model () https://www.owasp.org/index.php/category:software_assurance_maturity_model

Security Practices From each of the Business Functions, 3 Security Practices are defined The Security Practices cover all areas relevant to software security assurance Each one is a silo for improvement

Under each Security Practice Three successive Objectives under each Practice define how it can be improved over time This establishes a notion of a Level at which an organization fulfills a given Practice The three Levels for a Practice generally correspond to: (0: Implicit starting point with the Practice unfulfilled) 1: Initial understanding and ad hoc provision of the Practice 2: Increase efficiency and/or effectiveness of the Practice 3: Comprehensive mastery of the Practice at scale

Per Level, defines... Objective Activities Results Success Metrics Costs Personnel Related Levels

Strategy & Metrics 9

Policy & Compliance 1

Education & Guidance D B T P 1

Education & Guidance Give a man a fish and you feed him for a day; Teach a man to fish and you feed him for a lifetime. Chinese proverb Resources: OWASP Top 10 OWASP Education WebGoat https://www.owasp.org/index.php/category:owasp_top_ten_project https://www.owasp.org/index.php/category:owasp_education_project https://www.owasp.org/index.php/category:owasp_webgoat_project

OWASP Cheat Sheets https://www.owasp.org/index.php/cheat_sheets

Threat Assessment 1

Security Requirements D B T P 1

Secure Coding Practices Quick Reference Guide Technology agnostic coding practices What to do, not how to do it Compact, but comprehensive checklist format Focuses on secure coding requirements, rather then on vulnerabilities and exploits Includes a cross referenced glossary to get developers and security folks talking the same language https://www.owasp.org/index.php/owasp_secure_coding_practices_-_quick_reference_guide

Secure Architecture 1

Authenticator User AccessController AccessReferenceMap Validator Encoder HTTPUtilities Encryptor EncryptedProperties Randomizer Exception Handling Logger IntrusionDetector SecurityConfiguration D B T P The OWASP Enterprise Security API Custom Enterprise Web Application Enterprise Security API Existing Enterprise Security Services/Libraries https://www.owasp.org/index.php/category:owasp_enterprise_security_api

Design Review 1

Code Review 2

Code Review SDL Integration: Multiple reviews defined as deliverables in your SDLC Structured, repeatable process with management support Reviews are exit criteria for the development and test phases Resources: OWASP Code Review Guide https://www.owasp.org/index.php/category:owasp_code_review_project

Code review tooling Code review tools: OWASP LAPSE (Security scanner for Java EE Applications) MS FxCop / CAT.NET (Code Analysis Tool for.net) Agnitio (open source Manual source code review support tool) https://www.owasp.org/index.php/owasp_lapse_project http://www.microsoft.com/security/sdl/discover/implementation.aspx http://agnitiotool.sourceforge.net/

Security Testing 2

Security Testing SDL Integration: Integrate dynamic security testing as part of you test cycles Derive test cases from the security requirements that apply Check business logic soundness as well as common vulnerabilities Review results with stakeholders prior to release Resources: OWASP ASVS OWASP Testing Guide https://www.owasp.org/index.php/category:owasp_application_security_verification_standard_project https://www.owasp.org/index.php/owasp_testing_project

Security Testing Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications Provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually Features: Intercepting proxy Automated scanner Passive scanner Brute force scanner Spider Fuzzer Port scanner Dynamic SSL Certificates API Beanshell integration https://www.owasp.org/index.php/owasp_zed_attack_proxy_project

Vulnerability Management 2

Environment Hardening D B T P 2

Web Application Firewalls Malicious web traffic Legitimate web traffic Port 80 Web client (browser) Network Firewall Web Application Firewall Web Server ModSecurity: Worlds No 1 open source Web Application Firewall www.modsecurity.org HTTP Traffic Logging Real-Time Monitoring and Attack Detection Attack Prevention and Just-in-time Patching Flexible Rule Engine Embedded Deployment (Apache, IIS7 and Nginx) Network-Based Deployment (reverse proxy) OWASP ModSecurity Core Rule Set Project, generic, plug-n-play set of WAF rules https://www.owasp.org/index.php/category:owasp_modsecurity_core_rule_set_project

Operational Enablement D B T P 2

150+ OWASP Projects PROTECT Tools: AntiSamy Java/:NET, Enterprise Security API (ESAPI), ModSecurity Core Rule Set Project Docs: Development Guide,.NET, Ruby on Rails Security Guide, Secure Coding Practices - Quick Reference Guide DETECT Tools: JBroFuzz, Lice CD, WebScarab, Zed Attack Proxy Docs: Application Security Verification Standard, Code Review Guide, Testing Guide, Top Ten Project LIFE CYCLE, WebGoat, Legal Project

Get started Step 1: questionnaire as-is Step 2: define your maturity goal Step 3: define phased roadmap

Conducting assessments includes assessment worksheets for each Security Practice

Assessment process Supports both lightweight and detailed assessments

Creating Scorecards Gap analysis Capturing scores from detailed assessments versus expected performance levels Demonstrating improvement Capturing scores from before and after an iteration of assurance program build-out Ongoing measurement Capturing scores over consistent time frames for an assurance program that is already in place

Roadmap templates To make the building blocks usable, defines Roadmaps templates for typical kinds of organizations Independent Software Vendors Online Service Providers Financial Services Organizations Government Organizations Tune these to your own targets / speed

Resources www.opensamm.org Presentations Tools Assessment worksheets / templates Roadmap templates Scorecard chart generation Translations (Spanish / Japanese) mappings to ISO/EIC 27034 / BSIMM 3

Critical Success Factors Get initiative buy-in from all stakeholders Adopt a risk-based approach Awareness / education is the foundation Integrate security in your development / acquisition and deployment processes Provide management visibility 3

Project Roadmap Build the community: List of adopters Workshops at AppSecEU and AppSecUSA V1.1: Incorporate tools / guidance / OWASP projects Revamp wiki V2.0: Revise scoring model Model revision necessary? (12 practices, 3 levels,...) Application to agile Roadmap planning: how to measure effort? Presentations & teaching material 3

Get involved Use and donate back! Attend OWASP chapter meetings and conferences Support OWASP become personal/company member https://www.owasp.org/index.php/membership

Q&A

Global AppSec EMEA 2013 Aug. 20, 2013 - Aug. 23, 2013 Hamburg, Germany

BeNeLux 2013 28-29 november 2013 One day of trainings One day conference The Netherlands - Amsterdam 42

Thank you @sebadele seba@owasp.org seba@deleersnyder.eu www.linkedin.com/in/sebadele