Presented by Rob Carver

Slides:



Advertisements
Similar presentations
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Advertisements

Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
CSCE 522 Building Secure Software. CSCE Farkas2 Reading This lecture – McGraw: Ch. 3 – G. McGraw, Software Security,
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
OWASP APPSEC, 2013 JEREMIAH GROSSMAN Founder and THE REAL STATE OF WEBSITE SECURITY and THE TRUTH ABOUT ACCOUNTABILITY and “BEST-PRACTICES.”
8/27/20151NeST Controlled. 2 Communication Transportation Education Banking Home Applications.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Test Organization and Management
Information Systems Security Computer System Life Cycle Security.
CLEANROOM SOFTWARE ENGINEERING.
A Framework for Automated Web Application Security Evaluation
 Protect customers with more secure software  Reduce the number of vulnerabilities  Reduce the severity of vulnerabilities  Address compliance requirements.
CSCE 548 Secure Software Development Test 1 Review.
CSCE 548 Code Review. CSCE Farkas2 Reading This lecture: – McGraw: Chapter 4 – Recommended: Best Practices for Peer Code Review,
Version 02U-1 Computer Security: Art and Science1 Penetration Testing by Brad Arkin Scott Stender and Gary McGraw.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
This chapter is extracted from Sommerville’s slides. Textbook chapter
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Chapter 3: Software Project Management Metrics
Chapter 1: Fundamental of Testing Systems Testing & Evaluation (MNN1063)
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Testing Process
1 Object-Oriented Analysis and Design with the Unified Process Figure 13-1 Implementation discipline activities.
OWASP ASVS Levels1234 Tools Manual Test and Review Manual Design Review At higher levels in ASVS,the use of tools is encouraged. But to be effective,the.
This chapter is extracted from Sommerville’s slides. Textbook chapter 22 1 Chapter 8 Validation and Verification 1.
By Ramesh Mannava.  Overview  Introduction  10 secure software engineering topics  Agile development with security development activities  Conclusion.
USDA 2016 Financial Management Training Transforming Shared Services Change Management Presented by Ron Gros.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Systems Security
Society for Maintenance and Reliability Professionals (SMRP)
Software Reviews Ashima Wadhwa.
OIT Security Operations
Enterprise Resource Planning
Configuration Management
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
Software Quality Control and Quality Assurance: Introduction
Manuel Brugnoli, Elisa Heymann UAB
OWASP Static Analysis (SA) Track Goals, Objectives, and Track Roadmap
Software Security Testing
Compliance with hardening standards
Chapter 18 Maintaining Information Systems
Overview – SOE PatchTT December 2013.
Leverage What’s Out There
^ About the.
Security Engineering.
MANAGING APPLICATION SECURITY
CSCE 548 Secure Software Development Test 1 Review
Chapter 21 Software Quality Assurance
Speaker’s Name, SAP Month 00, 2017
Chapter 21 Software Quality Assurance
Engineering Processes
Software Quality Engineering
Lecture 09:Software Testing
Secure Coding: SDLC Integration Sixfold Path
Requirements Driven Testing
Herding Cats and Security Tools
How to Mitigate the Consequences What are the Countermeasures?
Software Process Models
Lesson 1 Understanding Software Quality Assurance
Test Case Test case Describes an input Description and an expected output Description. Test case ID Section 1: Before execution Section 2: After execution.
Software Testing “If you can’t test it, you can’t design it”
Chapter 2: The Database Development Process
Human Computer Interaction Lecture 14 HCI in Software Process
Chapter 7 Software Testing.
Our Process CMSC 345, Version 1/04.
OU BATTLECARD: Oracle Utilities Learning Subscription
Presentation transcript:

Presented by Rob Carver Secure Coding 201 Presented by Rob Carver

Bugs and Flaws Bugs Flaws Software Defects as a result of written code. Flaws Software Architecture Integration Architecture Infrastructure Architecture

Threat & Vulnerability Management

Secure Software Development Lifecycle (SSDLC)

Plan PenTest SCR Secure Code Review % Bugs introduced in this phase % Bugs found in this phase $ Cost to repair bug in this phase $16,000 $1,000 $100 $250 $25 85% Percentage of Bugs and Flaws Code Build Test Release Plan PenTest Everyone wants to create more secure software, but: developers aren’t security experts and security teams find flaws too late in the SDLC Secure Code Review helps developers find and fix software security defects early in the SDLC SCR *Integrating corrective action into the developers native environment is key (today)

Actionable guidance for fixing security bugs Not only finds problems, but shows the right way to fix it. Contextual Guidance and examples specific to the programming language Customizable Incorporate company-specific custom rules. Validated Guidance based on real-world security experience. Just-in-time analysis Contextual and actionable guidance Error detection as the developer codes

Source Code Review and Organization Specific Metrics LEVEL RATING OPEN VULN COUNT DESCRIPTION Prod (95 apps) Pre-Prod (77 apps) 5 Critical 52 17 Attacker can assume remote root or remote administrator roles. Exposes entire host to attacker; backend database, personally identifiable records, credit card data. Full read and write access, remote execution of commands 4 High 63 110 Attacker can assume remote user only, not root or admin. Exposes internal IP addresses, source code. Partial file-system access (full read access without full write access) 3 Medium 94 71 Exposes security settings, software distributions and versions, database names 2 Low 60 53 Exposes precise versions of applications. Sensitive configuration information may be used to research potential attacks against host 1 Note --- General information may be exposed to attackers, such as developer comments

Application Vulnerability Trending

Software Security Training for Every Role

Software Security Satellite Training Program Yellow Belt eLearning (CBT) Activity Foundations of Software Security OWASP Top 10 Advanced Training (ILT) Static Analysis Application On-Boarding (1 app) Advanced Practices Green Belt Defensive Programming (for relevant language) Software Security Requirements Attack & Defense Threat Modeling Security Testing Defensive Programming ILT Threat Modeling ILT Brown Belt Contribute to Threat Models Black Belt Serve on standards Build re-usable IP to prevent risk Teach and influence peers Certification Level Progression Implement static analysis coverage enhancements Combining CBT, ILT, and practice adoption within a progressive program is an effective implementation strategy

BSIMM: Software Security Measurement Real data from (78) real initiatives 161 measurements 21 (4) over time McGraw, Migues, & West

Who gets measured by the BSIMM?

A Software Security Framework

BSIMM: A Software Security Framework

BSIMM: Measurement is Benchmarking

Earth (78)

BSIMM6 Score Distrobution

No Special Snowflakes!

BSIMM by the Numbers

The Vendor BSIMM (vBSIMM)

Questions?