Copyright © 2016, Cigital So you’ve purchased a SAST tool? Brenton Kohler Copyright © 2016, Cigital.

Slides:



Advertisements
Similar presentations
HP Quality Center Overview.
Advertisements

Building an Effective SDLC Program: Case Study Guy Bejerano, CSO, LivePerson Ofer Maor, CTO, Seeker Security.
CWE-732 Incorrect Permission Assignment for Critical Resource
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Using the Cloud and SaaS to Secure the SDLC. About Me Andy Earle HP/Fortify – Security Solutions Architect / Presales Engineer – Sell, deliver solutions.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Software Confidence. Achieved. Deployment of a Code Analysis Methodology Critical Discussion Towards a Roadmap for Success John Steven Software Security.
Continuous Auditing. Items to be discussed include: Developing a Continuous Auditing Program Continuous Auditing Process Benefits of Continuous Auditing.
April 6, 2009 Ted Lesher - NexPrise, Inc..  Introduction/NexPrise Background  What is Software as a Service and how can it benefit my school?  Data.
CONTINUOUS INTEGRATION, DELIVERY & DEPLOYMENT ONE CLICK DELIVERY.
TEAM FOUNDATION SERVER (TFS) By Sunny Niranjana Devi. M.
Futurestate IT Confidential APPLICATION COMPATIBILITY AND CURRENCY MANAGEMENT™ John Doe Partner Company.
Red Lizard Software Creators of Code Confidence..
Security Overview for Microsoft Infrastructures Fred Baumhardt and James Noyce Infrastructure Solutions and Security Solutions Teams Microsoft Security.
CSCE 548 Code Review. CSCE Farkas2 Reading This lecture: – McGraw: Chapter 4 – Recommended: Best Practices for Peer Code Review,
Mark Aslett Microsoft Introduction to Application Compatibility.
An Ad Hoc Writable Rule Language for White-Box Security Scanners Author:Sebastian Schinzel Referent:Prof. Dr. Alexander del Pino Korreferent:Prof. Dr.
Continuous Integration and Code Review: how IT can help Alex Lossent – IT/PES – Version Control Systems 29-Sep st Forum1.
Formal Methods in Software Engineering
Static Analysis James Walden Northern Kentucky University.
CSCE 548 Building Secure Software. CSCE Farkas2 Reading This lecture: – McGraw: Chapter 1 – Recommended: CyberInsecurity: The Cost of Monopoly,
Blending Automated and Manual Testing Making Application Vulnerability Management Pay Dividends.
Using MS Excel to validate & load your data into Oracle EBS.
Delivered by: Matthew Zito, Chief Scientist 156 5th Avenue Penthouse New York, NY P: The Database Diet.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Cruise Training Introduction of Continuous Integration.
Screening activities Mike E. Farrell James E. Bartlett and Ghislaine C.Y. Gillessen Munich, January 2014.
Connect with life Tejasvi Kumar Developer Technology Specialist | Microsoft India
Parasoft : Improving Productivity in IT Organizations David McCaw.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
1 Punishment Through Continuous Delivery If it hurts, do it more often…
Checkmarx choose what developers use. About us o Founded in 2006 o Enterprise Grade Static and Interactive Application Security Testing Solutions o Hundreds.
Managed IT Services JND Consulting Group LLC
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Continuous Delivery and Quality Monitoring 1 iCSC2016, Kamil Henryk Król, CERN Continuous Delivery and Quality Monitoring Kamil Henryk Król CERN Inverted.
SAST is MUST About Me Moni (Moshe) many years in IT totally ignorant of risk posed by code. Checkmarx director of sales for.
Application Communities
Continuous Delivery and Quality Monitoring
Don’t Forget Security When Delivering Software
Presented by Rob Carver
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Customer Guide to Limited-Time Offer
OWASP Static Analysis (SA) Track Goals, Objectives, and Track Roadmap
WEBINAR The Total Economic Impact Of Software-As-A-Service
Compliance with hardening standards
Continuous Delivery of Infrastructure with Chef and DSC
Managing your IT Environment
Active Cyber Security, OnDemand
Your Chance to Get It Right Five Keys to Building AppSec into DevOps
Microsoft Ignite /22/2018 3:27 PM BRK2121
Secure Software Development: Theory and Practice
MANAGING APPLICATION SECURITY
Configuration Management with Azure Automation DSC
Speaker’s Name, SAP Month 00, 2017
Is your deployment in pants-down mode?
Automating Security Operations using Phantom
Herding Cats and Security Tools
DAT381 Team Development with SQL Server 2005
Business Intelligence & Analytics
Agile testing for web API with Postman
Nero Blanco Service Offering – Disaster Recovery as a Service
Delivering Business Value Faster
Using Employee Development in ADP Workforce Now
BMC Automation Portal Update
Service management system at cloud
SDLC (Software Development Life Cycle)
Capitalize on Your Business’s Technology
SSDT, Docker, and (Azure) DevOps
Michael Stephenson Microsoft MVP - Azure
Samir Behara, Senior Developer, EBSCO
Presentation transcript:

Copyright © 2016, Cigital So you’ve purchased a SAST tool? Brenton Kohler Copyright © 2016, Cigital

What’s all this SAST? Static Application Security Testing o Vulnerability discovery without executing code rrelation_works.html?lang=en DAST & SAST SQLi XSS Path Traversal Buffer overflow Response Splitting SAST Poor cypto implementation Issues in dead/unused code Hard coded secrets Vulnerabilities in code that's not externally exposed DAST Environment issues Server configurations Patch and version issues Session management problems Run time privilege issues

Copyright © 2016, Cigital Who’s doing it?

Copyright © 2016, Cigital Who’s doing it? ActivityObserved (78) CR 1.1 – Use a top N bugs list18 CR 1.2 –SSG performs ad hoc reviews 53 CR 1.4 – Use automated tools55 CR 1.5 – Mandatory code reviews 24 CR 1.6 – Use centralized reporting 27 CR 2.2 – Enforce coding standards 7 CR 2.5 – Assign tool mentors20 CR 2.6 – Customize the rules16 CR 3.2 – Build a factory3 CR 3.3 – Eradicate specific bugs 5 CR 3.4 – Malicious Code Detection 3

Copyright © 2016, Cigital Why does the industry just buy tools? It’s easy (relatively) But then, a wall is hit. “The tool is noisy” “The tool slows down my developer workflow”

Copyright © 2016, Cigital Benefits “Move left” in the SDLC Enable developers to change behavior Provide code-level feedback to aid developers in remediation Enforce secure coding standards

Copyright © 2016, Cigital SAST Truths Tools out of the box have lots of false positives and false negatives Deployment model matters. Each model requires more investment than tool purchase to gain any real values. We must build people and process around the technology for a mature program.

Copyright © 2016, Cigital The Three Tiers of SAST Tier 1 Prevention Tier 2 Detection Tier 3 Assurance In-IDE SAST Automated Used by developers day- to-day Identify and fix issues before code check-in In the build process Automated Ran on every build Issues identified before deployment Delivered by security expert Deeper manual review automated with automation for coverage Annual / Biennial based on risk classification Ensure security vulnerabilities are being identified and fixed

Copyright © 2016, Cigital Deployment models Central Service Bureau Scanning Factory Build integration [East coast] Central Service bureau [Mid west] On-demand SaaS [West coast] Build Integration / Continuous Integration (CI)

Copyright © 2016, Cigital Deployment Models – Build Integration Pros: Fast Works closer to developer workflow Cons: Heavy upfront setup for each project On-boarding of each application Developers get results directly/Self-reporting

Copyright © 2016, Cigital Deployment Models – Scanning Factory Pros: Scales security team Security SME reviewing final results Application expert working with SAST tool directly Cons: Resource limitations – security expertise Licensing cost Self-reporting

Copyright © 2016, Cigital Deployment Models – Service Bureau Pros: Limited noise Security SME on every review Lowest licensing cost Cons: Slowest model for delivery Resource limitations – security team Application contextual knowledge lost

Copyright © 2016, Cigital How to do it right Make sure you purchase the correct tool o Deployment models – Desktop, standalone, build integration, SaaS. o Language support – Java,.NET, PHP, JavaScript, SQL, etc. o Integration options – DAST, defect tracking, reporting. Onboard applications o Scan and Triage o Assign on-going tool mentors Mature over time o Customize rulepacks to meaningful findings o Automate where possible

Copyright © 2016, Cigital Onboarding Set expectations Start with the application you know best or most responsive development team Build the application with the SAST tool o Ensure with the development team you have the full project o Resolve all dependencies Triage the results

Copyright © 2016, Cigital Rulepack Customization – it’s a must! Multiple rule packs, change them over time o Example: Top N bug list of the organization and update the rule pack to help eradicate bugs. (CR 1.1, 3.3) Tier 1 Prevention Rule pack Tier 2 Detection Rule pack Tier 3 Assurance Rule pack Low # of rules Highest criticality vulnerability Highest accuracy rules Middle # of rules A little more permissive as far as criticality More permissive in terms of accuracy Loud and noisy rule pack Allow SME to sort through Provide relevant findings back to development teams directly.

Copyright © 2016, Cigital ActivityJust buying a tool Successfully Deploying CR 1.1 – Use a top N bugs list CR 1.2 –SSG performs ad hoc reviews CR 1.4 – Use automated tools ✓ CR 1.5 – Mandatory code reviews CR 1.6 – Use centralized reporting CR 2.2 – Enforce coding standards CR 2.5 – Assign tool mentors CR 2.6 – Customize the rules CR 3.2 – Build a factory CR 3.3 – Eradicate specific bugs CR 3.4 – Malicious Code Detection What have we accomplished? ActivityJust buying a tool Successfully Deploying CR 1.1 – Use a top N bugs list ✓ CR 1.2 –SSG performs ad hoc reviews CR 1.4 – Use automated tools ✓ ✓ CR 1.5 – Mandatory code reviews ✓ CR 1.6 – Use centralized reporting CR 2.2 – Enforce coding standards ✓ CR 2.5 – Assign tool mentors CR 2.6 – Customize the rules ✓ CR 3.2 – Build a factory CR 3.3 – Eradicate specific bugs ✓ CR 3.4 – Malicious Code Detection

Copyright © 2016, Cigital Some thoughts The big SAST tools are powerful “There is no silver bullet” – Gary McGraw o A holistic approach to application security is required Cost to remediate increases the longer a bug remains undiscovered Qualify, Implement, Mature People, Process, aaaaaand Technology