© 2012 Security Compass inc. 1 Application Security ISO Tak Chijiiwa, CISSP, CSSLP Principal Consultant, Security Compass Copyright 2012.

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

Massachusetts Digital Government Summit October 19, 2009 IT Management Frameworks An Overview of ISO 27001:2005.
Cloud computing security related works in ITU-T SG17
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
ANSI/ASQ E Overview Gary L. Johnson U.S. EPA
Technical update on ISO 9001:2015 Colin MacNee Duncan MacNee Limited
Chapter 10 Accounting Information Systems and Internal Controls
KDP-1: Integrate supply chain knowledge into secure solutions concepts Evaluate supply chain threats with respect to the set of possible solutions under.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Security Controls – What Works
ISO/IEC Winnie Chan BADM 559 Professor Shaw 12/15/2008.
ISO Current status of development
1 Certification Chapter 14, Storey. 2 Topics  What is certification?  Various forms of certification  The process of system certification (the planning.
EEN [Canada] Forum Shelley Borys Director, Evaluation September 30, 2010 Developing Evaluation Capacity.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
TEMPUS ME-TEMPUS-JPHES
RC14001 ® Update GPCA Responsible Care Committee September 23, 2013.
ISO 9001:2015 Revision overview - General users
Institutionalizing the GHG Protocol Kevin Boehmer, Canadian Standards Association Mark Barthel, British Standards Institution WBCSD/WRI Side Event - The.
Fraud Prevention and Risk Management
Opportunities & Implications for Turkish Organisations & Projects
Information Technology Service Management
OHT 2.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 Software Quality assurance (SQA) SWE 333 Dr Khalid Alnafjan
ISO 9001:2015 Revision overview December 2013
ISO 9001:2015 Revision overview - General users
Introduction to ISO International Organization for Standardization (ISO) n Worldwide federation of national standards bodies from over 100 countries,
Continual Service Improvement Process
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition Chapter 7 Software Supporting Processes and Software Reuse.
Software Quality Assurance Lecture 4. Lecture Outline ISO ISO 9000 Series of Standards ISO 9001: 2000 Overview ISO 9001: 2008 ISO 9003: 2004 Overview.
Introduction In 1992, the Committee Of Sponsoring Organizations of the Treadway Commission (COSO) published Internal Control-Integrated Framework (1992.
Module N° 8 – SSP implementation plan. SSP – A structured approach Module 2 Basic safety management concepts Module 2 Basic safety management concepts.
Presented by : Miss Vrindah Chaundee
Introduction to the ISO series ISO – principles and vocabulary (in development) ISO – ISMS requirements (BS7799 – Part 2) ISO –
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
© 2011 Underwriters Laboratories Inc. All rights reserved. This document may not be reproduced or distributed without authorization. ASSET Safety Management.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
ISO 9001:2008 to ISO 9001:2015 Summary of Changes
April_2010 Partnering initiatives at country level Proposed partnering process to build a national stop tuberculosis (TB) partnership.
Standards Certification Education & Training Publishing Conferences & Exhibits 1Copyright © 2006 ISA ISA-SP99: Security for Industrial Automation and Control.
WEC MADRID 18 TH MARCH 2004 ASTRAZENECA’S APPROACH TO SUPPLIER RISK MANAGEMENT.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
International Atomic Energy Agency Roles and responsibilities for development of disposal facilities Phil Metcalf Workshop on Strategy and Methodologies.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
ISO Current status of development ​ ​ ISO development process ​1​1.
ISO. What is a standard? Standards are written guidelines which help to do things, or make things, more efficiently or more safely. Standards are written.
Cloud Computing and Standards - A Regulator’s View OASIS International Cloud Symposium 11 October 2011 Steven Johnston, CISSP Senior Security and Technology.
1 ISO/PC 283/N 197 ISO Current status of development November 2015.
ISA99 - Industrial Automation and Controls Systems Security
RMC Auditor Workshop Charleston, SC July 2015 Registration Management Committee Company Confidential RMC Auditor Workshop Charleston, SC
SE513 Software Quality Assurance Lecture12: Software Reliability and Quality Management Standards.
Information Security tools for records managers Frank Rankin.
Dr. Trevor Smith Chair ISO/TC 176 Quality Management & Quality Assurance Worldwide Quality Director Global Manufacturing & Logistics Eastman Kodak Company.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
UNIT V QUALITY SYSTEMS.
Information Technology Service Management
Outcome TFCS-11// February Washington DC
UNIT-6 SOFTWARE QUALITY ASSURANCE
Setting Actuarial Standards
Quality management standards
Outcome TFCS-11// February Washington DC
Cyber-security and IEC International Standards
Alignment of Part 4B with ISAE 3000
Communication and Consultation with Interested Parties by the RB
OECD good practices for setting up an RIA system Regional Capacity-Building Seminar on Regulatory Impact Assessment Istanbul, Turkey 20 November 2007.
DRAFT ISO 10015:20XX Revision Overview Quality management — Guidelines for competence management and people development ISO/TC176 TG 01.
Presentation transcript:

© 2012 Security Compass inc. 1 Application Security ISO Tak Chijiiwa, CISSP, CSSLP Principal Consultant, Security Compass Copyright 2012

© 2012 Security Compass inc. 2 Introduction

© 2012 Security Compass inc. 3 Speaker Introduction Tak Chijiiwa has 12+ years of IT security experience He has been involved in a wide spectrum of information security strategy and advisory engagements for various Fortune 500 clients Prior to joining Security Compass, he worked at Deloitte & Touche, LLP as a Manager of the Vulnerability Management team in Toronto, Ontario for 6 years and at Kasten Chase Applied Research as a Development Manager in Mississauga, Ontario for 4 years

© 2012 Security Compass inc. 4 Abstract

© 2012 Security Compass inc. 5 Abstract ISO/IEC Part 1 was published in November 2011 and the remaining parts (Part 2-6) are expected to be published soon What does this mean to your organization or your clients who wish to adopt or incorporate this ISO standard for their application? This overview will walk through the sections of standard and highlight the process approach to specifying, designing, developing, testing, implementing and maintaining security functions and controls in application systems

© 2012 Security Compass inc. 6 Agenda

© 2012 Security Compass inc. 7 Agenda 1.ISO Series Background 2.ISO Stages 3.ISO Walkthrough 4.Q&A

© 2012 Security Compass inc. 8 ISO Series Background

© 2012 Security Compass inc. 9 ISO Series Background Image from:

© 2012 Security Compass inc. 10 ISO Series Background - continued Standards are essential for ensuring interoperability within an IT environment Goal is to incorporate the views of all interested parties from manufacturers, vendors and users to research organizations and governments ISO series involves various technical committees, subcommittees, and working groups

© 2012 Security Compass inc. 11 ISO Series Background - continued 1.International Organization for Standardization (ISO) Non-governmental consensus-building network of the national standards institutes of 156 countries Do NOT represent governments but closely works with both governments and industries

© 2012 Security Compass inc. 12 ISO Series Background - continued 2.International Electrotechnical Commission (IEC) Develops international standards for government, business and society for all electrical, electronic and related technologies These standards are relied upon for international commercial contracts and agreements

© 2012 Security Compass inc. 13 ISO Series Background - continued 3. Joint Technical Committee 1/Sub-committee 27 Draft International Standards from joint technical committees from around the world Requires approval by at least 75% of the national bodies to publish as an International Standard Secretariat is Deutschen Institut für Normung (DIN) in Germany

© 2012 Security Compass inc. 14 ISO Series Background - continued Within JCT 1/SC 27, there are 5 working groups which further focuses on the elements of IT Security Each working group (WG) has been assigned a national secretariat ISO/IEC JTC 1/SC 27 Secretariat: Deutsches Institut für Normung (DIN) WG 1 Information Security Management Systems Secretariat: British Standards Institution (or BSI) WG 2 Cryptography and security mechanisms Secretariat: Japanese Industrial Standards Committee (JISC) WG 3 Security evaluation criteria Secretariat: Swedish Standards Institute (SIS) WG 4 Security controls and services Secretariat: Standards, Productivity and Innovation Board (SPRING Singapore) WG 5 Identity management and privacy technologies Secretariat: Deutsches Institut für Normung (DIN)

© 2012 Security Compass inc. 15 ISO Series Background - continued Objectives of Working Group 4 – Security Controls and Services Unknown or emerging information security threats Objective #1: a. Prepare to respond b. Ensure continuous monitoring c. Reduce risk through identifying and understanding information security threats Known or common information security threats Objective #2: a. Manage risks to the environment b. Prevent occurrence (likelihood) c. Reduce impact from occurrence Information security incidents Objective #3: a. Investigate incident and collect facts b. Identify who, what, where, why and how c. Learn from incident

© 2012 Security Compass inc. 16 ISO Series Background - continued Current published standards and projects in progress (review or draft) Unknown or emerging information security threats 1. ISO/IEC 27031:2011 (Business Continuity) 2. ISO/IEC FDIS (Cybersecurity) 3. ISO/IEC 27035:2011 (Incident Management) 4. ISO/IEC WD (IDS) 5. ISO/IEC 24762:2008 (Disaster Recovery) Known or common information security threats 1. ISO/IEC (Network Security) 2. ISO/IEC (Application Security) 3. ISO/IEC (Supplier Relationships) 4. ISO/IEC (Digital Redaction) 5. ISO/IEC (Storage Security) Information security incidents 1. ISO/IEC (Guidelines for identification, collection, acquisition and preservation of digital evidence)

© 2012 Security Compass inc. 17 ISO Stages

© 2012 Security Compass inc. 18 ISO Stages There are various defined stages and sub-stages during the development of International Standards Other definitions include: NP = New Work Item Proposal WD = Working draft

© 2012 Security Compass inc. 19 ISO Stages - continued

© 2012 Security Compass inc. 20 ISO Walkthrough

© 2012 Security Compass inc. 21 ISO Walkthrough Part 1: Overview & concepts Part 2: Organization normative framework Part 3: Application security management process Part 4: Application security validation Part 5: Protocols and application security controls data structure Part 6: Security guidance for specific applications (if needed)

© 2012 Security Compass inc. 22 Overview Provides guidance for organizations in integrating security into the processes used for managing their applications Explicitly takes a process approach to specifying, designing, developing, testing, implementing and maintaining security functions and controls in application systems Defines application security not as a state of security but as “a process an organization can perform for applying controls and measurements to its applications in order the manage the risk of using them”

© 2012 Security Compass inc. 23 Overview - continued ISO/IEC is not: Development standard for software applications Application project management standard Software Development Lifecycle (SDLC) standard ISO/IEC does not: Provide guidelines for physical and network security Provide controls or measurements (metrics) Provide secure coding strategies for any programming language

© 2012 Security Compass inc. 24 Part 1 ISO/IEC :2011 – Overview & concepts Published November 21, 2011 Provides and overview of application security Introduces definitions, concepts, principles and processes involved in application security Designed to be used in conjunction with other standards in the ISO27000 family

© 2012 Security Compass inc. 25 Part 1 - continued Applicable to applications: 1.developed (in-house) 2.acquired from third parties 3.where development or operation is outsourced The intended use and benefits are highlighted below:

© 2012 Security Compass inc. 26 Part 1 - continued Key principles defined for this standard include: “Security is a requirement” Requirements should be defined and analyzed for each and every stage of the application's life cycle and managed on a continuous basis. “Application security is context-dependent” The type and scope of application security requirements are influenced by the risks associated with the application which come in the form of (1) business; (2) regulatory; and (3) technological. “Appropriate investment for application security” Costs for applying Application Security Controls and performing audit measurements should align with the Targeted Level of Trust. “Application security should be demonstrated” Auditing process leverage the verifiable evidence provided by Application Security Controls to confirm if it has reached management’s Targeted Level of Trust.

© 2012 Security Compass inc. 27 Part 1 - continued “Target application level of trust” definition: Confidence level required by the organization using the application Defined when establishing the Organization Normative Framework (ONF) Application Risk Analysis Risk Management Process Target Application Level of Trust

© 2012 Security Compass inc. 28 Part 2 ISO/IEC WD – Organization normative framework Standards under development Describes the relationships and interdependencies between processes in the Organization Normative Framework (ONF) Processes include creating, maintaining and adapting it to the organization’s needs and contexts (e.g. business, regulatory, technological)

© 2012 Security Compass inc. 29 Part 2 - continued Describes how to implement an Application Security Management Process (ASMP) for an organization 1. Establish an Organizational Normative Framework (ONF) It will contain regulations, laws, best practices, roles & responsibilities accepted by the organization. 2. Application Security Risk Management (ASRM) Obtain the organization’s approval on a target level of trust through specific application-oriented risk analysis. 3. Application Normative Framework (ANF) Identify the relevant elements from the ONF which are applicable to the target business project. 4. Business Application Project Implement the security activities contained in the ANF. 5. Application Security Verification Verify and provide evidence that an application has reached and maintained the targeted level of trust.

© 2012 Security Compass inc. 30 Part 3 ISO/IEC NP – Application security management process Standards under development Considered to be widely applicable and useful to organizations dealing with application security Describes information security relevant processes within an application development project Attempts to highlight process relationships and interdependencies

© 2012 Security Compass inc. 31 Part 4 ISO/IEC NP – Application security validation Standards under development Describes application security certification and validation processes Methods for assessing and comparing the Level of Trust against information security requirements

© 2012 Security Compass inc. 32 Part 5 ISO/IEC NP – Protocols and application security controls data structure Standards under development (preliminary text released recently ~April 2012) Defines the Application Security Control (ASC) data structure Electronic business eXtensible Markup Language (ebXML) designated as the format to establish libraries of reusable security functions that may be shared both within and between organizations

© 2012 Security Compass inc. 33 Part 5 - continued An Application Security Control (ASC) may satisfy various aspects of information security ASCs Target level of Trust Verification method Security Requirements Security activity

© 2012 Security Compass inc. 34 Part 6 ISO/IEC NP – Security guidance for specific applications (if needed) Standards under development and may be considered for inclusion Identifies Application Security Controls corresponding to “specific application security requirements” (if applicable) For example: N-Tier and web applications security Client/Server applications security

© 2012 Security Compass inc. 35 Considerations The requirements and processes specified in ISO/IEC are not intended to be implemented in isolation but rather integrated into an organization's existing processes Annex A of ISO/IEC presents a case study on how to map an existing software development process to some of the components of ISO/IEC (to reduce overall effort to conform with this standard)

© 2012 Security Compass inc. 36 Q&A

© 2012 Security Compass inc. 37 Thank you! Security Compass Please let me know your comments and thoughts!