OWASP Static Analysis (SA) Track Goals, Objectives, and Track Roadmap

Slides:



Advertisements
Similar presentations
Testing and Quality Assurance
Advertisements

HP Quality Center Overview.
© 2008 All Right Reserved Fortify Software Inc. Hybrid 2.0 – In search of the holy grail… A Talk for OWASP BeNeLux by Roger Thornton Founder/CTO Fortify.
Using the Cloud and SaaS to Secure the SDLC. About Me Andy Earle HP/Fortify – Security Solutions Architect / Presales Engineer – Sell, deliver solutions.
Engineering Secure Software. The Power of Source Code  White box testing Testers have intimate knowledge of the specifications, design, Often done by.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Software Confidence. Achieved. Deployment of a Code Analysis Methodology Critical Discussion Towards a Roadmap for Success John Steven Software Security.
Centers for IBM e-Business Innovation :: Chicago © 2005 IBM Corporation IBM Project October 2005.
Static Analysis for Dynamic Assessments Greg Patton | September 2014.
April 14, 2008 Secure Coding Faculty Workshop Web Application Security: Exercise Development Approaches James Walden
Web Application Security Testing Automation.. Copyright © 2008 Deloitte Touche Tohmatsu. All rights reserved.1 What types of automated testing are there?
© 2008 IBM Corporation ® Atlas for Lotus Connections Unlock the power of your social network! Customer Overview Presentation An IBM Software Services for.
Visual Studio 2005 Team System Winning the testing space with advanced testing tools Eric Adams Program Manager Visual Studio 2005 Team System Microsoft.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
BSBPMG404A Apply Quality Management Techniques Apply Quality Management Techniques Project Quality Processes C ertificate IV in Project Management
Lecture 10 More Innovation SE3821 Software Requirements and Specification Dr. Rob Hasker (based on slides by Dr. Brad Dennis)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Visual Studio 2005 Team System: Enabling Better Software Through Testing Tejasvi Kumar Technology Specialist - VSTS Microsoft Corporation
T EST T OOLS U NIT VI This unit contains the overview of the test tools. Also prerequisites for applying these tools, tools selection and implementation.
How We Got Here PC and Internet changed the rules –Viruses, information sharing, “outside” and “inside” indistinguishable –Vulnerability research for.
Verification vs. Validation Verification: "Are we building the product right?" The software should conform to its specification.The software should conform.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © 2016, Cigital So you’ve purchased a SAST tool? Brenton Kohler Copyright © 2016, Cigital.
Planning Engagement Kickoff
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Bringing Dynamism to OPNFV
Presented by Rob Carver
Water and people in a changing world
5/9/2018 9:30 AM BRK2215 Deliver better experiences with SharePoint Patterns and Practices Community Solutions Mike Ammerlaan Product Marketing Manager,
Office 365 FastTrack Planning Engagement Kickoff
Instructional slide to Partner: REMOVE BEFORE PRESENTING TO CUSTOMER
Chapter 8 – Software Testing
SAP ABAP Online Training
^ About the.
8/8/ :43 PM THR3079 Moving from application automation to true DevOps by including the database Tom Austin Head of Pre Sales Engineering © Microsoft.
Business System Development
Bridging the Gap From On-Premises to the Cloud
IS442 Information Systems Engineering
Description of Revision
Marketing automation is a very active segment of the CRM software market. Not only are new vendors entering the market, but existing market leaders are.
Systems Engineering Tool for Intelligent Transportation
Microsoft Cloud Adoption Workshop
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
OWASP Application Security Verification Standard 2009
11/29/2018 2:52 AM MDC317A Continuous Delivery - The Agile End to End Story for Developers & IT Pros! Morgan Webb Technical © 2013.
TechEd /4/2018 3:19 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Tech Ed 2004 © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express.
Introducing ISTQB Agile Foundation Extending the ISTQB Program’s Support Further Presented by Rex Black, CTAL Copyright © 2014 ASTQB 1.
LO2 - Be Able to Design IT Systems to Meet Business Needs
DAT381 Team Development with SQL Server 2005
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Core Competencies of a World Class Customer Advisory Board
OWASP Application Security Verification Standard
The Basics of Information Systems
Forum on Application Compatibility for Windows “Longhorn”
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
White Box testing & Inspections
Chapter 7 Software Testing.
Desktop App Assure Service Microsoft Representative Name June 7, 2019
The Basics of Information Systems
{Project Name} Organizational Chart, Roles and Responsibilities
Jamie Cool Program Manager Microsoft
Co-production: Enablement Tracking & Reporting
Bridging the ITSM Information Gap
OU BATTLECARD: Oracle Data Integrator
OWASP Application Security Verification Standard
OWASP Application Security Verification Standard
OU BATTLECARD: WebLogic Server 12c
Presentation transcript:

OWASP Static Analysis (SA) Track Goals, Objectives, and Track Roadmap Mike Ware Cigital mware at cigital dot com 4/8/09

Cover the ins and outs of Static Analysis OWASP SA Track: Goals Cover the ins and outs of Static Analysis Who, What, When, Where, How, Why Provide hands-on experience using commercially available tools Provide hands-on tool customization guidance Provide guidance on organizational adoption and integration of SA into your SDLC Tool adoption: - who runs the tool (central team or DEV), when is the tool run (coding time, build time, major milestone), what happens after the tool is run

OWASP SA Track: Delivery Approach Vendor supported sessions Participants will use full tool version during hands-on sessions LiveCD will have all necessary material pre-installed for *use in the lab* Both lecture style presentations and hands-on labs Lecture content will be as tool agnostic as possible Hands-on labs will focus on understanding how to reach a tool’s full potential Will strive to record sessions but may not always be possible

OWASP SA Track Roadmap SESSION TOPIC Lecture 2 hours Lab w/ Expert Intro To Static Analysis 1 Tool Assisted Code Reviews 2 Fortify SCA Ounce Labs Customization Lab 3 Fortify SCA Customization Lab 4 Ounce Labs Tool Adoption and Deployment 5

OWASP SA Track Contacts Curriculum content to be sent out to mailing list soon If you have questions, feedback, or suggestions for curriculum, please contact one of us: Eric Dalci: edalci at cigital dot com Mike Ware: mware at cigital dot com

Session 1: Intro to Static Analysis (SA) Objectives: Be able to answer What purpose do SA tools serve? What benefits are reaped for DEV and SEC? How do SA tools work? What are the inputs? What insecure coding patterns do SA tools target? What are the outputs? What can/can’t SA do? How does SA find common problems (e.g., XSS, SQL Injection) vs. DA (dynamic analysis)? How do SA tools fit in a development process? Who runs the tool? When is the tool run? What happens after the tool is run?

Session 2: Tool Assisted Code Reviews Objectives Knowledge: “security expert in a box” Understand a tool’s vulnerability taxonomy Understand a tool’s analysis engine Scanning Learn how to execute scans (against WebGoat) Learn what scanning options are available As a code review facilitator Become familiar with a tool’s interface Learn how to triage tool findings Learn about a tool’s reporting features Customizations Learn what options are available for customizing tools

Sessions 3 and 4: Customization Labs Separate sessions for each tool Session 3: Fortify SCA Session 4: Ounce Labs Objectives Learn how to identify or disqualify candidate rules Learn about a tool’s customization features How are customizations applied by the tool’s analysis engine? Write custom rules to: Achieve better accuracy Decrease false positives, increase true positives Achieve better vulnerability coverage Find vulnerabilities uncovered during manual code reviews Enforce example corporate coding standards Identify an organization’s top problems Learn how to test the accuracy of rules

Session 5: Tool Adoption and Deployment Objectives How do I select a tool? How should I integrate a tool into my SDLC? Initial Goals and Challenges Roles and Responsibilities Advantages and Disadvantages of Deployment Scenarios Effort and Costs Discuss how to deal with tool advances when adopting and deploying Discuss lessons learned in effectively leveraging SA within software process ecosystems Continuous integration Combining analysis techniques