Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Enabling Technology Innovation using Open Source Software
Carlo Tarantola Senior Director EMEA Mobile and Wireless Center of Expertise Warsaw, Poland Oracle Corporation.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Course: e-Governance Project Lifecycle Day 1
LYDIA HARKEY EIR ACCESSIBILITY OFFICER TEXAS A&M UNIVERSITY COMMERCE FALL Implementing Accessibility Strategically at Your Organization.
Speakers Vikram Yellampalli Prity Tewary
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
<<replace with Customer Logo>>
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Privileged Identity Management Enterprise Password Vault
© 2013 IBM Corporation Tivoli and Maximo Quality Improvement Initiatives March 2014.
Achieving (and Maintaining) Compliance With Secure Software Development Compliance Requirements (ISC)² SecureSDLC May 17, 2012.
Yale University Information Technology Services Administrative Systems Art Hunt 3/22/04 Software Service Level Agreement with Finance, Procurement and.
Using SharePoint Server 2007 for Site and Enterprise Search at Monsanto Company Vincent L. Arter, Jr. Project Lead Portals and Collaboration Monsanto.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
APAC Defense Forum Learning and IT Capacity Building for Defense Sector.
Network System Architects, Inc. (NSAi) Capabilities Briefing
Agile insurance carrier - What the carrier has to look like? Glenn Lottering Senior Director, EMEA Insurance Product Strategy and Sales Consulting.
GAJAH ANNUAL REPORT 2015 | 1 Business Process Management Meghan Atkins Lohith Bangalore Omprakash John Doyle Rebecca Mazur.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Agile Testing with Testing Anywhere The road to automation need not be long.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
UMT and Microsoft Presenting Tips and Tricks Basics What’s new in Microsoft Project 2010 Brian Feder, MBA, PMP Senior Vice President UMT Consulting Group.
Challenges Faced in Developing Audit Plans and Programs 21 st March, 2013.
Systems Design. Systems Design Skills People skill (25%) - Listening, understanding others, understanding between two lines, conflict resolution, handling.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
1 A Holistic Approach to EIR Accessibility Part 2: An Operational Framework Jeff Kline, Statewide Accessibility Coordinator Texas Department of Information.
VS Anywhere. Visual Studio Industry Partner VS Anywhere NEXT STEPS Contact us at: Websitehttps://vsanywhere.com Blog- Facebook.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
An Enterprise Platform Copyright © Impact Technologies Group, Inc. | All Rights Reserved | | Ph:
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
CMS Security Justin Klein Keane CMS Working Group March 3, 2010.
Security Development Lifecycle: Changing the Software Development Process to build in Security from the start Eric Bidstrup Ellen Cram Kowalczyk Security.
Module 9 Configuring Messaging Policy and Compliance.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Project 2003 Presentation Ben Howard 15 th July 2003.
Module 9 Configuring Messaging Policy and Compliance.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Chapter 8 Auditing in an E-commerce Environment
1. ENTERPRISE AGILE TRANSFORMATION AT THE US POSTAL SERVICE MAY 24, Agile Business Solutions.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Enterprise Library 3.0 Memi Lavi Solution Architect Microsoft Consulting Services Guy Burstein Senior Consultant Advantech – Microsoft Division.
IS&T Project Reviews September 9, Project Review Overview Facilitative approach that actively engages a number of key project staff and senior IS&T.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Rapid Launch Workshop ©CC BY-SA.
OWASP Static Analysis (SA) Track Goals, Objectives, and Track Roadmap
Third Party Risk Governance in a Diverse Environment
Tyson employees hungry for perfectly cooked intranet
Description of Revision
IS&T Project Reviews September 9, 2004.
AppExchange Security Certification
Herding Cats and Security Tools
WORKSHOP Establish a Communication and Training Plan
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP Enterprise Application Security Practices: Real-world Tips and Techniques Addison Lawrence Chad Barker Mike Craigue Dell Inc. March 30, 2010

OWASP 2 Agenda Section One: Program Overview Dell’s Information Security Organization Policies / Standards for Secure Application Development Awareness/Education/Training Addressing Global Standardization Issues Deploying an SDL as an Overlay to the SDLC Partnerships with Privacy, Legal, Compliance Section Two: Consultant Team Security Consulting Staff Development Division of Labor for Security Consultants Risk Assessments Security Reviews Threat Modeling Source Code Scans Pre-deployment Scans Penetration Testing Q&A

OWASP Section One Program Overview 3

OWASP Our Information Security Organization 4 Security Consulting is the outward-facing information security team; our mission is to manage and reduce security risks for our Dell Business Unit customers (IT, Services, Product Group, etc.)

OWASP 5 Policies/Standards for App Dev Overcoming concerns of developers, business partners, compliance, and IT execs requires front-line success stories and realistic goals. Should be tied to root policy Complete standard re-write; tool-agnostic Socialization with developers, testers, compliance team, and VPs Approval at CIO staff was easy to get Revisions at procedure-level after 2 years Exception management and escalation process

OWASP Awareness, Education, and Training  Outside speakers (Michael Howard from MS)  Employee orientation  Annual privacy/security course for all employees  One-time first course for developers  30-minute crash courses on 10 topics via CBT  Security Consulting portal  Security User Groups  Communities of Practice 6 Having a marketing/communications specialist on the team helps immensely

OWASP Addressing Global Standardization Issues  Enterprise Architecture standards review board  Java and.NET  Eclipse Ganymede, Galileo  VS 2003 / 05 / 08  XP, Vista, Windows 7  MS Team Foundation Server for source control  ASP 3.0, C, C++, Python, Perl, PHP, VB, Cold Fusion, COBOL  Red Hat, SUSE, Oracle Enterprise Linux  Novell  VMWare  Acquisitions and divestitures 7 Lack of a standardized developer desktop has been one of our greatest challenges

OWASP SDL Checkpoints in the SDLC  Getting embedded early, with simple checkpoints  IT / Services / Product Group tailoring  Traditional versus Agile methods 8 Better to be a phase reviewer throughout, than a change ticket approver at the end

OWASP Agile SDL Checkpoints  One Risk Assessment per Release (#1 on the diagram below)  One Fortify scan per Sprint (#2 on the diagram below) 9

OWASP Partnerships with Privacy, Legal, etc.  Privacy – having EU representation on our privacy team has been crucial  Data Architecture  Legal – lead security/privacy attorney  Compliance – strong alliance with compliance reps for each IT org  Vendor Management Office (IPSA)  Product Group CTO  Corporate Governance  Enterprise Architecture / SDLC (Dev tools, processes)  Service Oriented Architecture team 10 Having escalation points and allies in each of these areas has been essential

OWASP Section Two Consultant Team 11

OWASP Security Consulting Staff Development  Global reach – Brazil, India, Malaysia, and US  Hot Market, Retention issues  DB, App, and Network subject matter experts  Weekly meetings  Global staff; 1:1 Manager / IC  Scheduled, unstructured, and informal “around the cubes” discussions  Collaborative team training  CISSP training group (3 rounds through Shon Harris) 12 Onboarding deck and procedure docs for everything

OWASP Division of Labor for Security Consultants  IT, Product Group, Services  Mergers, acquisitions, and divestitures  Interaction with Red Team  High-risk projects, at consultant’s discretion  Project management  Projects without a project charter—we don’t say “no”  Informal project management within our team  Outreach and Corporate Communications 13 We have at least one SME dedicated to Apps, DB, and Network

OWASP Risk Modeler Tool, Risk Assessments, etc.  This is our primary engagement mechanism, and it is the first security checkpoint in the SDLC.  Spreadsheet approach was used prior to rollout of this tool  Triage helps align most of our resources to high-risk projects  Tool enhancements: Audit trail, Automated s, Search  On-the-fly question customization and weighted risk calculation  Engagement types with targeted questions (internal software, infrastructure, and vendor apps)  Major factors in risk calculation weightings  Data Classification  Internally / Externally facing  SOX, PCI  Low-risk - directed to self-help documentation and to our allies in compliance  High-risk - usually have a security consultant in attendance at major project meetings/milestones, as well as penetration testing prior to launch  Risk has impact on source code remediation requirements  Need to mine data more deeply to follow up on some sorts of issues projects in 2008; 726 projects in 2009; 101 in Jan/Feb 2010

OWASP Threat Modeling  Initial emphasis on Product Group, Services during design phase  Requires culture shift to doing Data Flow Diagrams  Very time-consuming  Resulting artifact is less important; having the conversation between security consultant and dev team is the key  Dev lead or architect must attend  CBA: Low-yield; 8-16 hours for 1-2 significant findings  Adopting a light-weight threat modeling program for IT with a quiet rollout  Using new MS Threat Modeling tool 3.1 for PG/Services 15 More experienced security consultants do this analysis intuitively

OWASP Source Code Scans  Manual versus automated (MS 200, Dell 10)  Great vendor partnership  Evolving procedures for which rules are enforced  Started with “top 5” hot issues  XSS (MS Anti-XSS)  SQL Injection (Stored procedures, least privilege, input validation)  Buffer Overflow (C/C++, PG)  Hardcoded passwords (MS DPAPI)  Weak encryption (rare)  Now all hot issues, as well as certain mediums  Very little impact in sheer numbers after “top 5”  Back doors  Exploring cloud-based scans for 3rd-party code 16 Plan to start modestly and tighten the screws as the program matures. Plan for exception management.

OWASP Pre-deployment Scans  Source code scans have a sweet spot. For high-risk apps, we have found a few additional issues via black/gray box testing  May be our only option for languages/technologies not covered by source scans  Host OS findings not in synch with enterprise patch windows / SLA’s  Entire Red Team in one time zone  Most teams are ok with 1 week turnaround; recently, that has become an issue  Must build remediation time into the project timeline 17 Risk-based, and at the consultant’s discretion

OWASP Penetration Testing  Routine, regulatory requirement  Scope is a moving target  Acquisitions  New apps  10,000 legacy apps  More thorough, manual testing by senior team members  Opportunities for better coordination 18 The real challenge is not issue discovery, but remediation.

OWASP Lessons Learned  Adding ourselves into existing SDLC  Partnering with other groups  Leveraging regulatory compliance for adoption  One step at a time, one org at a time, show metrics, build momentum  Exception management process, executive escalation, roadmaps  won the ISE North America Information Security Project of the Year Award for We’re doing fundamentals, not cutting edge work

OWASP Q & A, Suggestions for Improvement  Addison_Lawrence dell.com  Chad_Barker  Michael_Craigue dell.com 20 Thanks to Phil Agcaoili, Neil Matatall, and Brad Shaver for their review and input!