Implementing Trustworthiness – Building and Delivering Secure Software Glenn Pittaway – Trustworthy Computing (TwC), Microsoft Corporation MSSD-3 — третья.

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

SDL in an Agile World MSSD-3 третья по счету конференция, посвященная всестороннему обсуждению популярной и важной темы – минимизация уязвимостей программного.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
More CMM Part Two : Details.
12 November 2009 Bryan Sullivan Senior Security Program Manager, Microsoft SDL.
ITIL: Service Transition
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Stephen S. Yau CSE , Fall Security Strategies.
Purpose of the Standards
Security Assessments FITSP-M Module 5. Security control assessments are not about checklists, simple pass-fail results, or generating paperwork to pass.
Control environment and control activities. Day II Session III and IV.
Complying With The Federal Information Security Act (FISMA)
Codex Guidelines for the Application of HACCP
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Test Organization and Management
Security Assessments FITSP-A Module 5
 Protect customers with more secure software  Reduce the number of vulnerabilities  Reduce the severity of vulnerabilities  Address compliance requirements.
Security Development Lifecycle: Changing the Software Development Process to build in Security from the start Eric Bidstrup Ellen Cram Kowalczyk Security.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Microsoft Security Development Lifecycle
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Georgia Institute of Technology CS 4320 Fall 2003.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Security Development Life Cycle Baking Security into Development September 2010.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
What Causes Software Vulnerabilities? _____________________ ___________ ____________ _______________   flaws in developers own code   flaws resulting.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
How We Got Here PC and Internet changed the rules –Viruses, information sharing, “outside” and “inside” indistinguishable –Vulnerability research for.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Overview MRD Enterprise MRD Process
Security Development Lifecycle (SDL) Overview
CS457 Introduction to Information Security Systems
ITIL: Service Transition
An Overview on Risk Management
CPA Gilberto Rivera, VP Compliance and Operational Risk
Software Quality Control and Quality Assurance: Introduction
Cybersecurity - What’s Next? June 2017
Chapter 24: Architecture Competence
Security Standard: “reasonable security”
Information Technology Sector
Identify the Risk of Not Doing BA
Lecture 17 ATAM Team Expertise
TechStambha PMP Certification Training
Service Organization Control (SOC)
The Microsoft® Security Development Lifecycle (SDL)
Description of Revision
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Engineering Processes
An Urgent National Imperative
Project Management Process Groups
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Cybersecurity ATD technical
IS Risk Management Framework Overview
IBM GTS Storage Security and Compliance overview.
The role of the test organization in a Security Sensitive project
Engineering Processes
IT Management Services Infrastructure Services
{Project Name} Organizational Chart, Roles and Responsibilities
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Implementing Trustworthiness – Building and Delivering Secure Software Glenn Pittaway – Trustworthy Computing (TwC), Microsoft Corporation MSSD-3 — третья по счету конференция, посвященная всестороннему обсуждению популярной и важной темы – минимизация уязвимостей программного обеспечения при его разработке.

Goals Provide an understanding of the Microsoft view of security “trustworthiness” Position Microsoft’s secure development efforts against its software integrity work Help you understand how to measure your current secure development stance, and how to improve it Provide an understanding of the “Simplified SDL” Provide an overview of resources available

What is “Trustworthiness”?

Trustworthiness Trustworthy, adj. Worthy of trust or confidence; reliable Oxford English Dictionary Military IT Financial Consumer Cybercrime Cyber Warfare Cyber Espionage Industrial The assurance needed to establish trust depends on the perception of threatThe priority given to different threats will also depend on that perceptionThe measures needed to address the predominant threats are wide ranging

Requirement: Trusted Products Concerns: Economic National Security Public Safety Dependence on Foreign Sources Reciprocity Government & Critical Infrastructure Supply Chain Complexity

Government & Critical Infrastructure Supply Chain Complexity

Where are you now, and how do you improve? The SDL Optimization Model

SDL Optimization Model A technical road map designed to help those responsible for implementing the Security Development Lifecycle understand the state of their current practices and move their organizations towards full adoption of the SDL Organizational Maturity

Simplified SDL

What is the Simplified SDL? A minimum threshold for SDL compliance at the “Advanced” maturity level as defined in the Optimization Model A concise statement of –The roles and responsibilities for individuals involved in the application development process –Mandatory security activities –Optional security activities –The application security verification process

SDL Applicability Applications exhibiting one or more of the following characteristics should be subject to the SDL: –Deployed in a business or enterprise environment –Processes personally identifiable information (PII) or other sensitive information –Communicates regularly over the Internet or other networks

SDL Roles and Responsibilities A centralized, internal advisory group is preferable Reviewer/Advisory Roles –Provide security and privacy oversight, have the authority to accept or reject security and privacy plans from a project team. –Security Advisor/Privacy Advisor - filled by subject-matter experts (SMEs) from outside the project team, fulfills two sub-roles: Auditor - monitoring each phase of the development process and attest to successful completion security requirements Expert - providing verifiable subject-matter expertise in security. –Combination of Advisory Roles - the security advisor role may be combined with the role of privacy advisor if possible Team Champions –Should be filled by SMEs from the project team –Responsible for negotiation, acceptance, and tracking of minimum security and privacy requirements and maintaining clear lines of communication with advisors and decision makers –Security Champion/Privacy Champion - responsible for coordinating and tracking security issues for the project, reporting it to the security advisor and to other relevant parties

Assess organizational knowledge – establish training program as necessary Establish training criteria –Content choices - covering secure design, development, test and privacy Establish minimum training frequency –Employees must attend n classes per year Establish minimum acceptable group training thresholds –Organizational training targets (e.g. 80% of all technical personnel trained prior to product RTM) Pre-SDL Requirement: Security Training

Opportunity to consider security at the outset of a project Establish Security Requirements –One time, project wide requirements – security leads identified, security bug tracking process mandated, architectural requirements set given the planned operational environment Create Quality Gates / Bug Bars –Minimum performance and quality criteria for each stage and for the project as a whole, Security and Privacy Risk Assessment –Risk assessment performed to determine critical components for the purposes of deep security and privacy review Phase One: Requirements

Define and document security architecture, identify security critical components Establish Design Requirements –Required activities which include creation of design specifications, analysis of proposed security technologies (e.g. crypto requirements) and reconciliation of plans against functional specs. Analyze Attack Surface –Defense in depth strategies employed – use of layered defenses used to mitigate severity. Threat Modeling –Structured, component-level analysis of the security implications of a proposed design. Phase Two: Design

Determine processes, documentation and tools necessary to ensure secure development Use approved tools –Approved list for compilers, security test tools, switches and flags; enforced project wide. Deprecate Unsafe Functions –Prohibition of unsafe functions, APIs, when using native (C/C++) code. Static Code Analysis –Scalable in-depth code review, augmentation by other methods as necessary to address weaknesses in static analysis tools. Phase Three: Implementation

Verification of SDL security and privacy activities performed earlier in the process Dynamic Analysis –Runtime verification and analysis of programs to identify critical security problems Fuzz Testing –Specialized dynamic analysis technique used to deliberately cause program failure by injection of random, deliberately malformed inputs. Attack Surface / TM review –Re-review of attack surface and threat models when the program is “code complete” to ensure security assumptions and mitigations specified at design time are still relevant. Phase Four: Verification

Satisfaction of clearly defined release criteria – consistent with organizational policy Incident Response Plan –Creation of a response plan that outlines engineering, management and “on-call” contacts, security servicing plans for all code, including 3rd party artifacts. Final Security Review –Deliberate examination of all security and privacy activities conducted during development Release Archive –SDL compliance certification and archival of all information and data necessary for post-release servicing of the software. Phase Five: Release

“Plan the work, work the plan…” Execute Incident Response Plan –Performance of activities outlined in response plan created during Release phase Other non-development, post-release process requirements –Root cause analysis of found vulnerabilities: Is it a human, process, or automation failure? Addressed immediately and tagged for inclusion in next revision of SDL Post-SDL Requirement: Response

Security Development Lifecycle We evaluate threats within software development model and focus on areas of significant risk (e.g., people, process, technology) Resulting Control Categories –Proof of Identity –Access Management –Development Process Controls –Build Process Controls –Malware Scanning –Code Signing Software Integrity (Risk Based Approach) Software Integrity (Risk Based Approach)

SDL Portal SDL Blog SDL Process on MSDN (Web) us/library/cc aspx Simplified Implementation of the Microsoft SDL SAFECode s/SAFECode_Supply_Chain0709.p df Open Group OTTF Resources

Thank you Спасибо за внимание