Software Assurance Maturity Model

Slides:



Advertisements
Similar presentations
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Advertisements

Software Assurance Maturity Model
Course: e-Governance Project Lifecycle Day 1
Quality Management System SEETHARAM- Quality Assurance
Practical Uses of Software Measurement for Process Improvement January 10, V1.0 Larry Dribin, Ph.D
Security Controls – What Works
Stepan Potiyenko ISS Sr.SW Developer.
By Collin Smith COBIT Introduction By Collin Smith
©2009 Gotham Digital Science, LLC Software Assurance with SAMM 21 Sept 2009, SOURCE Barcelona Matt Bartoldus
The Information Systems Audit Process
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
The Software Product Life Cycle. Views of the Software Product Life Cycle  Management  Software engineering  Engineering design  Architectural design.
project management office(PMO)
Handouts Software Testing and Quality Assurance Theory and Practice Chapter 11 System Test Design
19 March 2008Corruption Risk Mapping1 Corruption risk mapping Towards an Integrity risk map for the Hungarian public sector.
ISO 9001 Auditing Practices Group
Consultancy.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
The Evergreen, Background, Methodology and IT Service Management Model
Measuring Security Best Practices with OpenSAMM Alan Jex SnowFROC 2013.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software System Engineering: A tutorial
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
CS4723 Software Validation and Quality Assurance Lecture 15 Advanced Topics Test Plans and Management.
Module N° 8 – SSP implementation plan. SSP – A structured approach Module 2 Basic safety management concepts Module 2 Basic safety management concepts.
1 A Survey of Unit Testing Practices Prof. Per Runeson – Lund University Per Beremark – SPIN-syd.
Software process improvement Framework for SPI SPI support groups, maturity and immaturity models Assessment and gap analysis Education and training Selection.
CS 3610: Software Engineering – Fall 2009 Dr. Hisham Haddad – CSIS Dept. Chapter 2 The Software Process Discussion of the Software Process: Process Framework,
Fifth Lecture Hour 9:30 – 10:20 am, September 9, 2001 Framework for a Software Management Process – Life Cycle Phases (Part II, Chapter 5 of Royce’ book)
Software Assurance Maturity Model Pravir Chandra OpenSAMM Project Lead
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
Getting to Grips with CobiT – Enterprise Architecture, a conseptual approach to IT Covernance or how to understand the difference between IT Governance.
The Marketing Plan. Executive Summary  This is at the beginning of the marketing plan and is an overview of the entire marketing plan  It briefly addresses.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Advanced Software Engineering Dr. Cheng
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
Bob Jones EGEE Technical Director
Interset Support Overview March 2017
Implementing SMS in Civil Aviation: the Canadian Perspective
Software Risk Management
PLANNING, MATERIALITY AND ASSESSING THE RISK OF MISSTATEMENT
Software Configuration Management (SCM)
Chapter 1: Introduction to Systems Analysis and Design
Data Architecture World Class Operations - Impact Workshop.
DT249/4 Information Systems Engineering Lecture 0
How to Develop and Instill a Future Focus in a Team
ServiceNow Implementation Knowledge Management
Engineering Processes
Chapter 1 (pages 4-9); Overview of SDLC
Secure Coding: SDLC Integration Sixfold Path
Title By Name(s) CS 478 Network Security
Gathering Systems Requirements
Title By Name(s) CS 478 Network Security
COSO I COSO II. Meycor COSO, a Comprehensive Solution for Enterprise Risk Management (ERM)
Project Management Chapter 11.
ISO 9001 Auditing Practices Group
The control environment
IS 2620: Developing Secure Systems
ISO 9001 Auditing Practices Group
IBM GTS Storage Security and Compliance overview.
Engineering Processes
Stewardship in biotechnology
Gathering Systems Requirements
Investing in Data Management Capabilities
ISO 9001 Auditing Practices Group
System Safety Regulation
Chapter 1: Introduction to Systems Analysis and Design
Awareness and Auditor training kit
Presentation transcript:

Software Assurance Maturity Model Tampa OWASP, May 20, 2009.

Introduction Who am I? What are we doing here? What am I talking about ?

Open SAMM – Executive Brief The Software Assurance Maturity Model (SAMM) is an open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization. The resources provided by SAMM will aid in: Evaluating an organization’s existing software security practices Building a balanced software security assurance program in well-defined iterations Demonstrating concrete improvements to a security assurance program Defining and measuring security-related activities throughout an organization

SAMM Overview

Governance The Strategy & Metrics (SM) Practice is focused on establishing the framework within an organization for a software security assurance program.

Governance The Policy & Compliance (PC) Practice is focused on understanding and meeting external legal and regulatory requirements while also driving internal security standards to ensure compliance in a way that’s aligned with the business purpose of the organization.

Governance The Education & Guidance (EG) Practice is focused on arming personnel involved in the software life-cycle with knowledge and resources to design, develop, and deploy secure software.

Construction The Threat Assessment (TA) Practice is centered on identification and understanding the project-level risks based on the functionality of the software being developed and characteristics of the runtime environment.

Construction The Security Requirements (SR) Practice is focused on proactively specifying the expected behavior of software with respect to security.

Construction The Secure Architecture (SA) Practice is focused on proactive steps for an organization to design and build secure software by default.

Verification The Design Review (DR) Practice is focused on assessment of software design and architecture for security-related problems.

Verification The Code Review (CR) Practice is focused on inspection of software at the source code level in order to find security vulnerabilities.

Verification The Security Testing (ST) Practice is focused on inspection of software in the runtime environment in order to find security problems.

Deployment The Vulnerability Management (VM) Practice is focused on the processes within an organization with respect to handling vulnerability reports and operational incidents.

Deployment The Environment Hardening (EH) Practice is focused on building assurance for the runtime environment that hosts the organization’s software.

Deployment The Operational Enablement (OE) Practice is focused on gathering security critical information from the project teams building software and communicating it to the users and operators of the software.

So how do we use this ? Conduct Assessments Create Score Cards Lightweight Detailed Conduct Assessments Gap Analysis Show Improvement Current Progress Create Score Cards Set Metrics Roadmap Building Your Program

Assessment Worksheets Example shows just Governance Similar to other self audits for things such as PCI Very basic, doesn’t involve testing

Lightweight Assessment The assessment worksheets for each Practice are evaluated and scores are assigned based on answers. This type of assessment is usually sufficient for an organization that is trying to map their existing assurance program into SAMM and just wants to get a quick picture of where they stand. Complete Worksheet, assign score per practice.

Detailed Assessment After completion of the assessment worksheets, additional audit work is performed to check the organization to ensure the Activities prescribed by each Practice are in place. Additionally since each Practice also specifies Success Metrics, that data should be collected to ensure that the organization is performing as expected.

Score Cards Used to show gaps in the current program Show current vs. proposed progress Interim scorecards can be used to show current status.

Example Score Card Example to the right shows the level of each Program at the start of the phase, and the current level of the program. A lot of information about change in Software Assurance in a simple graphic.

Build your Program Roadmap A roadmap is a phased plan for achieving Objectives for each security Function Use Scorecard to see what Practices need improvement Create Phased roadmap to improve the practices that YOU feel need the most improvement Take small steps, apply the activities and success metrics to make small improvements Redo scorecards often to check progress

Roadmap Example In the sample on the right in Phase 1, several Functions are moved from 0 to 1 In Phase 2, some are further advanced from 1 to 2, some remain at 1, and others are moved from 0 to 1 SAMM includes case studies with specific details on implementation

Summary Model to measure maturity of your software assurance program. Based on 4 Business Functions Governance Construction Verification Deployment Looks kind of like a SDLC doesn’t it ? Can be light weight or in depth, simple or complex. Provides estimates of man hours, who should be involved, success metrics, activities.

More Info http://www.owasp.org/index.php/SAMM http://www.opensamm.org/ https://lists.owasp.org/mailman/listinfo/samm http://www.owasp.org/index.php/CLASP

Questions ? OMG! BOMB