Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Advertisements

The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Using the Cloud and SaaS to Secure the SDLC. About Me Andy Earle HP/Fortify – Security Solutions Architect / Presales Engineer – Sell, deliver solutions.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Confidence. Achieved. Deployment of a Code Analysis Methodology Critical Discussion Towards a Roadmap for Success John Steven Software Security.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
April 14, 2008 Secure Coding Faculty Workshop Web Application Security: Exercise Development Approaches James Walden
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
© 2008 IBM Corporation ® Atlas for Lotus Connections Unlock the power of your social network! Customer Overview Presentation An IBM Software Services for.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Visual Studio 2005 Team System Winning the testing space with advanced testing tools Eric Adams Program Manager Visual Studio 2005 Team System Microsoft.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Sudesh Krishnamoorthy Developer Technology Specialist | Microsoft |
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © 2016, Cigital So you’ve purchased a SAST tool? Brenton Kohler Copyright © 2016, Cigital.
Planning Engagement Kickoff
Bringing Dynamism to OPNFV
Presented by Rob Carver
5/9/2018 9:30 AM BRK2215 Deliver better experiences with SharePoint Patterns and Practices Community Solutions Mike Ammerlaan Product Marketing Manager,
Office 365 FastTrack Planning Engagement Kickoff
OWASP Static Analysis (SA) Track Goals, Objectives, and Track Roadmap
Instructional slide to Partner: REMOVE BEFORE PRESENTING TO CUSTOMER
SAP ABAP Online Training
^ About the.
8/8/ :43 PM THR3079 Moving from application automation to true DevOps by including the database Tom Austin Head of Pre Sales Engineering © Microsoft.
Business System Development
Description of Revision
Marketing automation is a very active segment of the CRM software market. Not only are new vendors entering the market, but existing market leaders are.
Systems Engineering Tool for Intelligent Transportation
OWASP Application Security Verification Standard 2009
Thursday’s Lecture Chemistry Building Musspratt Lecture Theatre,
11/29/2018 2:52 AM MDC317A Continuous Delivery - The Agile End to End Story for Developers & IT Pros! Morgan Webb Technical © 2013.
Introducing ISTQB Agile Foundation Extending the ISTQB Program’s Support Further Presented by Rex Black, CTAL Copyright © 2014 ASTQB 1.
DAT381 Team Development with SQL Server 2005
OWASP Application Security Verification Standard
Desktop App Assure Service Microsoft Representative Name June 7, 2019
{Project Name} Organizational Chart, Roles and Responsibilities
OWASP Application Security Verification Standard
OWASP Application Security Verification Standard
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP OWASP Static Analysis (SA) Track Goals, Objectives, and Track Roadmap Mike Ware Cigital mware at cigital dot com 4/8/09

OWASP 2 OWASP SA Track: Goals  Cover the ins and outs of Static Analysis  Who, What, When, Where, How, Why  Provide hands-on experience using commercially available tools  Provide hands-on tool customization guidance  Provide guidance on organizational adoption and integration of SA into your SDLC

OWASP 3 OWASP SA Track: Delivery Approach  Vendor supported sessions  Participants will use full tool version during hands-on sessions  LiveCD will have all necessary material pre-installed for *use in the lab*  Both lecture style presentations and hands-on labs  Lecture content will be as tool agnostic as possible  Hands-on labs will focus on understanding how to reach a tool’s full potential  Will strive to record sessions but may not always be possible

OWASP OWASP SA Track Roadmap 4 Intro To Static Analysis Tool Assisted Code Reviews Tool Adoption and Deployment Fortify SCAOunce Labs Customization Lab Fortify SCA Customization Lab Ounce Labs SESSIONTOPIC 1 Lecture 2 hours Lab w/ Expert 2-3 hours Lab w/ Expert 3 hours Lab w/ Expert 3 hours Lecture 2-3 hours

OWASP Session 1: Intro to Static Analysis (SA)  Objectives: Be able to answer  What purpose do SA tools serve?  What benefits are reaped for DEV and SEC?  How do SA tools work?  What are the inputs?  What insecure coding patterns do SA tools target?  What are the outputs?  What can/can’t SA do?  How does SA find common problems (e.g., XSS, SQL Injection) vs. DA (dynamic analysis)?  How do SA tools fit in a development process?  Who runs the tool?  When is the tool run?  What happens after the tool is run? 5

OWASP Session 2: Tool Assisted Code Reviews  Objectives  Knowledge: “security expert in a box”  Understand a tool’s vulnerability taxonomy  Understand a tool’s analysis engine  Scanning  Learn how to execute scans (against WebGoat)  Learn what scanning options are available  As a code review facilitator  Become familiar with a tool’s interface  Learn how to triage tool findings  Learn about a tool’s reporting features  Customizations  Learn what options are available for customizing tools 6

OWASP Sessions 3 and 4: Customization Labs  Separate sessions for each tool  Session 3: Fortify SCA  Session 4: Ounce Labs  Objectives  Learn how to identify or disqualify candidate rules  Learn about a tool’s customization features  How are customizations applied by the tool’s analysis engine?  Write custom rules to:  Achieve better accuracy –Decrease false positives, increase true positives  Achieve better vulnerability coverage –Find vulnerabilities uncovered during manual code reviews  Enforce example corporate coding standards  Identify an organization’s top problems  Learn how to test the accuracy of rules 7

OWASP Session 5: Tool Adoption and Deployment  Objectives  How do I select a tool?  How should I integrate a tool into my SDLC?  Initial Goals and Challenges  Roles and Responsibilities  Advantages and Disadvantages of Deployment Scenarios –Effort and Costs  Discuss how to deal with tool advances when adopting and deploying  Discuss lessons learned in effectively leveraging SA within software process ecosystems  Continuous integration  Combining analysis techniques 8

OWASP OWASP SA Track Contacts  Curriculum content to be sent out to mailing list soon  If you have questions, feedback, or suggestions for curriculum, please contact one of us:  Eric Dalci: edalci at cigital dot com  Mike Ware: mware at cigital dot com 9