Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view.

Slides:



Advertisements
Similar presentations
OWASP CLASP Overview.
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Assurance Maturity Model
Course: e-Governance Project Lifecycle Day 1
Ninth Lecture Hour 8:30 – 9:20 pm, Thursday, September 13
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
RUP/UP Software Development Method Hoang Huu Hanh, Hue University hanh-at-hueuni.edu.vn.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
©2009 Gotham Digital Science, LLC Software Assurance with SAMM 21 Sept 2009, SOURCE Barcelona Matt Bartoldus
Quality evaluation and improvement for Internal Audit
IMS Information Systems Development Practices
High-Level Assessment Month Year
RC14001 ® Update GPCA Responsible Care Committee September 23, 2013.
December 3, 2010 SAIF Governance Framework A Brief Update on work to date.
Patch Management Strategy
Release & Deployment ITIL Version 3
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
® IBM Software Group © 2006 IBM Corporation PRJ480 Mastering the Management of Iterative Development v2 Module 3: Phase Management - Inception.
Project Human Resource Management
COBIT®. COBIT - Control Objectives for Information and related Technology C OBI T was initially created by the Information Systems Audit & Control Foundation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Discovering 10232A – Designing and Developing Microsoft SharePoint Server 2010 Applications Robert Bogue.
S/W Project Management
UML - Development Process 1 Software Development Process Using UML (2)
RUP Fundamentals - Instructor Notes
Basics of OHSAS Occupational Health & Safety Management System
Transitioning to the COSO 2013 Update.  Released on May 14, 2013  Designed to build upon the foundation of the 1992 Framework  Will supersede the 1992.
-Nikhil Bhatia 28 th October What is RUP? Central Elements of RUP Project Lifecycle Phases Six Engineering Disciplines Three Supporting Disciplines.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Introduction In 1992, the Committee Of Sponsoring Organizations of the Treadway Commission (COSO) published Internal Control-Integrated Framework (1992.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Risk Management for Technology Projects Geography 463 : GIS Workshop May
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Service Transition & Planning Service Validation & Testing
UK Wide Core Skills & Training Framework Findings of 2 nd Stage Consultation and Implications for Development of the Framework.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
UKSMA 2005 Lessons Learnt from introducing IT Measurement Peter Thomas –
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Eighth Hour Lecture 7:30 – 8:20 pm, Thursday, September 13 Workflows of the Process (from Chapter 8 of Royce’ book)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Assurance Maturity Model Pravir Chandra OpenSAMM Project Lead
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CEN5011, Fall CEN5011 Software Engineering Dr. Yi Deng ECS359, (305)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
RATIONAL UNIFIED PROCESS PROCESS FRAMEWORK OVERVIEW.
CMMI Certification - By Global Certification Consultancy.
Process 4 Hours.
Data Architecture World Class Operations - Impact Workshop.
CS4311 Spring 2011 Process Improvement Dr
TechStambha PMP Certification Training
ITSM Governance is Imperative to Succeed
Software Assurance Maturity Model
Alignment of COBIT to Botswana IT Audit Methodology
Presentation transcript:

Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit The OWASP Foundation 6 th OWASP AppSec Conference Milan - May The OWASP CLASP Project Pravir Chandra OWASP CLASP Project Lead Principal Consultant -- Cigital, Inc.

6 th OWASP AppSec Conference – Milan – May Agenda  What is CLASP anyway?  The CLASP philosophy and contents  Comparison to other security processes  Details on the OWASP CLASP Project

6 th OWASP AppSec Conference – Milan – May CLASP 2007  Comprehensive, Lightweight Application Security Playbook  CLASP is a prescriptive guide for organizations to address software security iteratively  Cover the entire organization (not just development)  Adaptable to any type of organization or development process  New material to reflect software security’s inexorable tie to the specifics of a business

6 th OWASP AppSec Conference – Milan – May Origins of CLASP  Original version was developed by Secure Software (acquired by Fortify Software)  Collection of ‘stuff’ - vulns, roles, activities, etc.  Heavily modified for CLASP 2007  This is the version we’ll discuss today  To be released by June 2007

6 th OWASP AppSec Conference – Milan – May Top-level organization of CLASP 2007  Think  How to think about software security  Setting long-term goals and strategy based on your business  Plan  Setting near-term goals to execute against  Planning iterations and getting immediate value  Do  The nitty-gritty details of performing activities that provide assurance  Executing and measuring success

6 th OWASP AppSec Conference – Milan – May Think

6 th OWASP AppSec Conference – Milan – May Philosophical Stuff  It’s about balancing risk, not 100% secure  Even if you don’t have well-defined process, you can make an impact  Monitor and measure to make sure you’re on track for efficiency and efficacy  Use the CLASP Best Practices as a ‘north star’

6 th OWASP AppSec Conference – Milan – May The CLASP Best Practices 1.Institute awareness programs 2.Perform application assessments 3.Capture security requirements 4.Implement secure development practices 5.Build vulnerability remediation procedures 6.Define and monitor metrics 7.Publish operational security guidelines

6 th OWASP AppSec Conference – Milan – May Key decision points  What kind of business are you in?  Regulatory requirements  Rough cut at ‘risk appetite’  How does your business rely upon software?  Do you sell boxed applications? … platforms?  Do you build and operate your own software?  Do you outsource and consume?  What top-management support is available?  How much cost can you tolerate short-term? … long-term?

6 th OWASP AppSec Conference – Milan – May Plan

6 th OWASP AppSec Conference – Milan – May Creating an action plan  CLASP 2007 introduces the concept of ‘Competencies’  High-level areas of the SDLC  Each has pre-determined maturity levels (not quite CMM-style)  Based on your drivers, pick the next Competency (or maturity level) you’ll target  A Competency level has assigned Activities (more on this later)  Provides some ready-made milestones  Grow the organization’s skill and efficiency over time  A few example roadmaps for common types of businesses are provided to get started

6 th OWASP AppSec Conference – Milan – May The CLASP Competencies 1.Security Management & Governance 2.Hardened Requirements & Design 3.Secure Implementation 4.Software Assessment & Testing 5.Safe Deployment & Operations

6 th OWASP AppSec Conference – Milan – May Do

6 th OWASP AppSec Conference – Milan – May Putting rubber on the road  Based on target Competency level, implement assigned Activities  Plan appropriate resources for the activity  Ensure correct Roles are filled  Instrument with prescribed monitors for metrics  In total, there are ~24 Activities  They’re spread across the Competency levels for bite- size consumption  Some you may never need to implement

6 th OWASP AppSec Conference – Milan – May The CLASP Activities 1.Institute Security Awareness Program 2.Perform Security Analysis of System Requirements and Design (Threat Modeling) 3.Perform Source Level Security Review 4.Identify, Implement, and Perform Security Tests 5.Verify Security Attributes of Resources 6.Research and Assess Security Posture of Technology Solutions 7.Identify Global Security Policy 8.Identify Resources and Trust Boundaries 9.Identify User Roles and Resource Capabilities 10.Specify Operational Environment 11.Detail Misuse Cases 12.Identify Attack Surface 13.Document Security Relevant Requirements 14.Apply Security Principles to Design 15.Annotate Class Designs with Security Properties 16.Implement and Elaborate Resource Policies and Security Technologies 17.Implement Interface Contracts 18.Integrate Security Analysis into Source Management Process 19.Perform Code Signing 20.Manage Security Issue Disclosure Process 21.Address Reported Security Issues 22.Monitor Security Metrics 23.Specify Database Security Configuration 24.Build Operational Security Guide

6 th OWASP AppSec Conference – Milan – May Lots of details  Each Activity is well-specified  Roles involved  Applicability and Impacts  Frequency and appx. Level-of-effort  How-to steps for executing the activity  Measurement criteria  CLASP specifies Roles as well  High-level so one person may hold >1 Role  Skills requirements for filling the Role

6 th OWASP AppSec Conference – Milan – May The CLASP Roles 1.Architect 2.Designer 3.Implementer 4.Project Manager 5.Requirements Specifier 6.Security Auditor 7.Test Analyst

6 th OWASP AppSec Conference – Milan – May Summary of CLASP 2007  Think  Philosophy of software security  Best Practices to guide decisions  Key decision points that affect logistics  Plan  Competencies and maturity levels  Sample, goal-based roadmaps  Do  Activity definitions and details  Role definitions and supporting information

6 th OWASP AppSec Conference – Milan – May On SDLCs

6 th OWASP AppSec Conference – Milan – May CLASP and other SDLC models  There are two other secure SDLC models that you may have heard of  Microsoft’s SDL (The Security Development Lifecycle. Howard, Lipner)  The Security Touchpoints (Software Security. McGraw)  These both map to CLASP in a fairly straightforward way, with a few exceptions

6 th OWASP AppSec Conference – Milan – May The Stages of Microsoft’s SDL  0: Education & Awareness  1: Project Inception  2: Define and Follow Design Best Practices  3: Product Risk Assessment  4: Risk Analysis  5: Creating Security Documents, Tools, and Best Practices for Customers  6: Secure Coding Policies  7: Secure Testing Policies  8: The Security Push  9: The Final Security Review  10: Security Response Planning  11: Product Release  12: Security Response Execution Source: The Security Development Lifecycle, by Michael Howard and Steve Lipner

6 th OWASP AppSec Conference – Milan – May CLASP and SDL  Direct mapping is tricky since SDL isn’t specified the same way as CLASP  Some Stages of SDL are activities, some are artifacts, and some are processes  SDL contains lots more tactical advice from the MS trenches  CLASP is specified more prescriptively, with fewer open-ended ideas  Timelines or impacts for SDL stages aren’t clearly defined  Makes is harder to plan for cost-effectiveness (SDL is expensive)  Following the CLASP Competency roadmap for an ISV gives a roadmap that’s darn close to SDL

6 th OWASP AppSec Conference – Milan – May The Security Touchpoints Source: Software Security, by Gary McGraw

6 th OWASP AppSec Conference – Milan – May CLASP and the Touchpoints  The Touchpoints map almost exactly to CLASP  Several CLASP activities map to a single Touchpoint in some cases  Touchpoints focus on the core of software development  CLASP aims to be a bit broader across an organization (including things like policy and awareness training)  Touchpoints have a prescribed adoption order  CLASP varies this a bit in the Competency roadmaps according to the kind of business

6 th OWASP AppSec Conference – Milan – May The bottom line  Whether it’s SDL, the Touchpoints, or CLASP, it’s all good  There’s really nothing that the three fundamentally disagree on  The real question is what applies to your organization best and what you’re most comfortable with  CLASP 2007 will contain a more detailed analysis and mapping of each

6 th OWASP AppSec Conference – Milan – May Add’l Info

6 th OWASP AppSec Conference – Milan – May The OWASP CLASP Project  Mission  Reinforce application security through prescriptive guidance that enables iterative improvement to any development model.  Tactical Goals 1.Getting draft of CLASP 2007 out for review 2.Updating OWASP Wiki with latest information and downloads 3.Beefing up CLASP materials with more practical advice/suggestions

6 th OWASP AppSec Conference – Milan – May Get involved  We need volunteers for reviewers and contributors  Start by browsing the wiki pages for CLASP  The Roles and most of the Activities are the same  The Competency information will be up as soon as it’s ready for review  Mailing list for discussions 

6 th OWASP AppSec Conference – Milan – May Pravir Chandra