How We Got Here PC and Internet changed the rules –Viruses, information sharing, “outside” and “inside” indistinguishable –Vulnerability research for.

Slides:



Advertisements
Similar presentations
SDL in an Agile World MSSD-3 третья по счету конференция, посвященная всестороннему обсуждению популярной и важной темы – минимизация уязвимостей программного.
Advertisements

AGILE DEVELOPMENT Outlines : Quick Look of agile development Agility
Provide a platform built on security, privacy, and trust Maintain an evergreen service Offer highly configurable and scalable services.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
© 2008 All Right Reserved Fortify Software Inc. Hybrid 2.0 – In search of the holy grail… A Talk for OWASP BeNeLux by Roger Thornton Founder/CTO Fortify.
USING EMET TO DEFEND AGAINST TARGETED ATTACKS PRESENTED BY ROBERT HENSING – SENIOR CONSULTANT – MICROSOFT CORPORATION MICHAEL MATTES – SENIOR CONSULTANT.
Engineering Secure Software. The Power of Source Code  White box testing Testers have intimate knowledge of the specifications, design, Often done by.
Now Bill Gates writes “Trustworthy Computing” memo early 2002 “Windows security push” for Windows Server 2003 Security push.
12 November 2009 Bryan Sullivan Senior Security Program Manager, Microsoft SDL.
Walter Bodwell Planigle. An Introduction – Walter Bodwell 18 years in software First did agile at a startup in 1999 Went back to waterfall (after acquisition)
Tom Sheridan IT Director Gas Technology Institute (GTI)
W5HH Principle As applied to Software Projects
Tableau Visual Intelligence Platform
Chapter 8 Managing IT Project Delivery
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
U-Mail System Design Specification Joseph Woo, Chris Hacking, Alex Benson, Elliott Conant, Alex Meng, Michael Ratanapintha April 28,
Tableau Visual Intelligence Platform
SCC EHR Workshop for Contractors: Implementation Considerations May 25, 2011.
Formality, Agility, Security, and Evolution in Software Development Cody Ronning 2/16/2015.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
QWise software engineering – refactored! Testing, testing A first-look at the new testing capabilities in Visual Studio 2010 Mathias Olausson.
WINDOWS 10 What’s New? What’s Different?. Who Are We? Cody Pierson Marketing Manager Prophet Business Group Tim Robinson IT Manager Prophet Business Group.
Software Assurance Session 15 INFM 603. Bug hunting vs. vulnerability spotting Bugs are your code not behaving as you designed it. Many can be found by.
資工 4A 陳怡秀 Microsoft Visual Studio’s Journey to Continuous Delivery.
The Trustworthy Computing Security Development Lifecycle Steve Lipner Director of Security Engineering Strategy Security Business and Technology Unit.
Raven Services Update December 2003 David Wallis Senior Systems Consultant Raven Computers Ltd.
2007 Microsoft Office System Overview 2007 Microsoft Office System Overview Elizabeth Caley Senior Product Manager Microsoft Canada.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Adam L. Jacobs, CISSP Principal Program Manager, Oracle 15/16 November 2005 Why is Commercial Software So Vulnerable (and How Can We Fix It)?
Project Tracking. Questions... Why should we track a project that is underway? What aspects of a project need tracking?
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Development Lifecycle: Changing the Software Development Process to build in Security from the start Eric Bidstrup Ellen Cram Kowalczyk Security.
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
Thoughts on Firewalls: Topologies, Application Impact, Network Management, Tech Support and more Deke Kassabian, April 2007.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
From Quality Control to Quality Assurance…and Beyond Alan Page Microsoft.
Software Assurance Session 13 INFM 603. Bugs, process, assurance Software assurance: quality assurance for software Particularly assurance of security.
Unit 2 (task 28) In this PowerPoint I will tell you about 7 important IT job roles and if a candidate might want one what he would have to do to get one.
An Agile Method for E-Service Composition Author : Pouya Fatehi, Seyyed Mohsen Hashemi Department of Computer Software, Science and Research Branch, Islamic.
3/30/04 16:14 1 Lessons Learned CERES Data Management Presented to GIST 21 “If the 3 laws of climate are calibrate, calibrate, calibrate, then the 3 laws.
Mike Hindmarsh Improving Chronic Illness Care California Chronic Care Learning Communities Initiative Collaborative February 2, 2004 Oakland, CA Clinical.
Security Development Life Cycle Baking Security into Development September 2010.
An Introduction to Software Engineering (Chapter 1 from the textbook)
1 Software Engineering and Security DJPS April 12, 2005 Professor Richard Sinn CMPE 297: Software Security Technologies.
Anubha Gupta | Software Engineer Visual Studio Online Microsoft Corp. Visual Studio Enterprise Leveraging modern tools to streamline Build and Release.
WATERFALL DEVELOPMENT MODEL. Waterfall model is LINEAR development lifecycle. This means each phase must be completed before moving onto the next!!! WHAT.
Chapter 9 – Software Evolution 1Chapter 9 Software evolution.
Extreme programming (XP) Variant of agile Takes commonsense practices to extreme levels © 2012 by Václav Rajlich1.
CS223: Software Engineering Lecture 2: Introduction to Software Engineering.
Phoenix Scrum User Group Simplifying Scrum Online May 21 st 2009.
It’s tough out there … Software delivery challenges.
What Causes Software Vulnerabilities? _____________________ ___________ ____________ _______________   flaws in developers own code   flaws resulting.
Final Fantasy ½: IOC Overview Team Q CSE 403 Winter ‘03 I’ve got something special for you.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
Cloud Computing Security With More Than 50 Years Of Security And Enterprise Experience Cloud Raxak Automating Cloud Security. Cloud Raxak automates and.
Internal developer tools and bug tracking Arabic / Hebrew Windows 3.1Win95 Japanese Word, OneNote, Outlook
Software Development. The Software Life Cycle Encompasses all activities from initial analysis until obsolescence Analysis of problem or request Analysis.
Software Development.
Progile Automated Verification Engineer • PAVE •
Wael Ellithy, Ph.D. Arx ICT
Client Management Managing Client Expectations
The Microsoft® Security Development Lifecycle (SDL)
Always up to date Latest productivity and security capabilities
SharePoint Project Management Simplified
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
The role of the test organization in a Security Sensitive project
Security in the Real World – Plenary Day One
Steve Lipner Executive Director, SAFECode 16 May 2019
Presentation transcript:

How We Got Here PC and Internet changed the rules –Viruses, information sharing, “outside” and “inside” indistinguishable –Vulnerability research for reputation Vulnerability research led to security response process –Fix the problems when they’re found “Secure Windows Initiative” to make software secure –Assigned three program managers to review Windows –Evolved to training and “bug bashes”

How We Got Here Thought we’d done “better” with XP, and then… –Code Red –Nimda –UPNP From: Bill Gates Sent: Thursday, 18, 2002 Subject: Trustworthy Computing As I've talked with customers over the last year - from individual consumers to big enterprise customers - it's clear that everyone recognizes that computers play an increasingly important and useful role in our lives. At the same time, many of the people I talk to are concerned about the security of the technologies they depend on…

How We Got Here: The Security Push Security push –Team-wide stand-downs and training –Threat model, review code, run tools, conduct tests, modify defaults –(Relatively) quick way to significant improvement –Immature and ad hoc processes “Security science” –Identify and remove new classes of vulnerabilities Security “audit” –Independent review – what did the push miss?

Getting Widespread Buy-in Security pushes were an “obviously” necessary response… Security pushes achieved rapid improvements (some dramatic) but… Leverage comes from early (design time) focus on security Ongoing attacks demonstrated continued need Executive buy-in was surprisingly easy –Everyone understood what bad things could happen –Security pushes had accomplished enough to allow us to claim we could do this

The Classic SDL at Microsoft Ongoing Process Improvements Technology and Process EducationAccountability

“Security is everyone’s job” – but have to know what to do Training was an initial focus – even before the SDL Security push taught us what we could – and could not – expect development teams to do – experiences with –Threat modeling –Penetration testing –Code review Focus on deterministic requirements – avoid “I wouldn’t have designed it that way…” Focus on tools – an excellent way to scale Scaling for Success

Managing Change The first (2004) iteration of the SDL was pretty rough –Developed rapidly based on security push lessons Initial updates at 6-month intervals –Responses to new threats –New application classes (online services, Modern apps) –New requirements and techniques (e.g. banned APIs, fuzzers) Since SDL v4 (October 2007), annual updates –More time for tool development –More time for beta and feedback –More time for usability Every update receives both broad and senior review

Automation and Tools At Microsoft today, the SDL requires three classes of tools –Automated tools to help find (and remove or mitigate) security problems –Automated tools to help product teams record and track their compliance with the SDL –Automated tools to help the MSEC PM (security advisor) help the product teams We started with only the first (problem finders) All three are critical to our implementation of the SDL – and we changed our release cadence largely in recognition of this fact

Realistic Roles and Requirements Not every engineer is a security expert Security experts are a scarce resource Security requirements are as clear as possible –Run this tool –Look for this pattern in this code –Build this kind of test and fix the errors it finds Avoid mandating security expert involvement Some good requirements may not be “ready for prime time”

Minimize Interference The SDL tells product teams how to improve security –Started with focus on large boxed products – Windows, Office, SQL Intent was to allow product teams flexibility – for everything but security Agile SDL took us several tries to get “right” Product teams integrate SDL in their own ways

SDL Impact Vulnerability counts have dropped – independent longitudinal study Office 2003 – 126 Exploitable Vulnerabilities Office 2010 – 7 Exploitable Vulnerabilities 30% decline in the exploitability of vulnerabilities in all Microsoft products Exploitability of low complexity vulnerabilities has decreased year on year since inception of SDL Reduce vulnerabilities, limit exploitability and severity

Who Needs the SDL?

Adapting the SDL to Organizations Beyond Microsoft Non-proprietary Scalable to organizations of any size Platform agnostic Based on the SDL process used at Microsoft

Who Uses the SDL? Short answer: we don’t know everyone You have to click through a EULA to download the tools, but you don’t have to register so… We have worked with some large organizations on adopting and adapting the SDL – some public and some not

SDL Portal SDL Blog SDL Process on MSDN (Web) us/library/cc aspx Simplified Implementation of the Microsoft SDL Resources