Copyright © 2004 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.

Slides:



Advertisements
Similar presentations
AMBULANCE OPERATIONS. Three types of ambulances Type I Type II Type III.
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Chapter 1-3 Test Review Driver’s Education. List the 5 restrictions you must follow while on you special learners permit.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2005 CMMI and ITIL Alison Adams & Kieran Doyle.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Chapter 1 and 2 Review Study Guide.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
DMV Chapter 1. 6 Point Verification There are four requirements for 6 Point ID Verification: At least one Primary ID At least one Secondary ID Verifiable.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright 2005 Welcome to The Great Lakes TL 9000 SIG TL 9000 Requirements Release 3.0 to Release 4.0 Differences Bob Clancy Vice President, BIZPHYX,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
-Nikhil Bhatia 28 th October What is RUP? Central Elements of RUP Project Lifecycle Phases Six Engineering Disciplines Three Supporting Disciplines.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
DOMESTIC ARRAGEMENTS Emergency Exists Fire Alarms and Evacuation Toilets and Breaks Introductions GSM/Mobiles –Switch off Please.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Accelerating Development Using Open Source Software Black Duck Software Company Presentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Drivers Edge: Interactive slides and videos Drivers Edge: Interactive slides and videos CATEGORY: Copyrighted Driver Education School Literature Copyright.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Chapter 1 Driver License System. Laws Governing Driver Licenses Change of address – Must report within one week Name change – Report within two weeks.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Resource Management in OGSA Authored by the CMM-WG.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Practical Investment Assurance Framework PIAF Copyright © 2009 Group Joy Pty. Ltd. All rights reserved. Recommended for C- Level Executives.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Practical Threat Modeling for Software Architects & System Developers
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
October 10, Better Together – The Road to Responsible Information Management Presented by Colleen Pedroza, State Information Security Officer.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Commercial Insurance Product Development Justin VanOpdorp ACAS, MAAA GE Commercial Insurance g.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Nomenclature for the OGSA Platform document Fred Maciel.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
New Specialization Training Requirement Available Now: Selling Business Outcomes v
CHAPTER 2 NEW JERSEY DRIVER TESTING
Physical Security Governance Model
Resource Management in OGSA
Data Architecture World Class Operations - Impact Workshop.
HARDENING CLIENT COMPUTERS
Website update and service integration tool
Chapter 2: The Linux System Part 1
Chapter 1 and 2 Review Study Guide.
New Jersey Driver License System
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation OWASP AppSec June 2004 NYC Teaching developers to fish Denis Verdon Senior Vice President, Corporate Information Security Fidelity National Financial Tel:

OWASP AppSec Give a man a fish and you feed him for a day; Teach a man to fish and you feed him for a lifetime. Chinese proverb

OWASP AppSec About Fidelity National Financial

OWASP AppSec The developer who could…..

OWASP AppSec If cars were built like applications…. 1.70% of all cars would be built without following the original designs and blueprints. The other 30% would not have designs. 2.Car design would assume that safety is a function of road design and that all drivers were considerate, sober and expert drivers. 3.Cars would have no airbags, mirrors, seat belts, doors, roll-bars, side-impact bars, or locks, because no-one had asked for them. But they would all have at least six cup holders. 4.Not all the components would be bolted together securely and many of them would not be built to tolerate even the slightest abuse. 5.Safety tests would assume frontal impact only. Cars would not be roll tested, or tested for stability in emergency maneuvers, brake effectiveness, side impact and resistance to theft. 6.Many safety features originally included might be removed before the car was completed, because they might adversely impact performance. 7.70% of all cars would be subject to monthly recalls to add major components left out of the initial production. The other 30% wouldn’t be recalled, because no-one would sue anyway. 8.The after-market for safety devices would include such useful products as training wheels, screen doors, elastic seatbelts and devices that would restrict the car’s top speed to 3mph, if found to be unsafe (which would be always). 9.Useful safety could be found, but could only be custom retro-fitted, would take six months to fit and would cost more than the car itself. 10.A DOT inspection would consist of counting the wheels and making recommendations on wheel quantity. 11.Your only warning indicator would be large quantities of smoke and flame in the cab. 12.You could only get insurance from one provider, it would be extremely expensive, require a duplicate DOT inspection, and you might still never be able to claim against the policy.

OWASP AppSec What has been achieved?  Awareness is growing.  Modern development frameworks, such as J2EE and.NET have been built with security in mind.  Tools have been developed that begin to address application security.  Secure coding is becoming a priority.  Best practice libraries are now being developed.  Training courses are springing up everywhere.  Major Computer Science colleges are beginning to offer security-specific courses.  OWASP.

OWASP AppSec Root cause analysis  Current standards and policy are unclear.  The language for gauging risk and applying it practically to application design has not been fully developed.  Security frameworks have been developed (J2EE and.NET), but the language of “what, when, where and why” is missing.  Many developers lack expertise in security specializations, such as risk analysis or cryptography.  Many security practitioners lack expertise in OOD and in application development frameworks.  Assumptions regarding infrastructure security can be dangerous.

OWASP AppSec How is FNF addressing this need?  Tactical: Holding the fort  OWASP guide and other best practices  Testing program (Nikto, Appscan, Nessus)  Bespoke code reviews  Strategic: Defining practicable policy through:  A consistent secure application life-cycle definition.  A common application security architecture reference model.  A purpose-designed application security risk analysis methodology.  Trust model.  Security requirements analysis and definition process.  Specific guidelines and standards.

OWASP AppSec Application development life-cycle Design Build Deploy Operate Dispose

OWASP AppSec Application security reference model

OWASP AppSec Library of guidelines and best practices  Application Security Policy Guidelines  Application Risk Analysis  Application Security Requirements Definition  Designing Secure Applications Guideline  Implementation Guidelines .NET  ASP  J2EE  Cryptography Guidelines  Secure Application Testing Guidelines  Production Application Security Guidelines  Application Audit and Review Program

OWASP AppSec What I’d like to see  Practicable standards for risk analysis and data classification.  A common language for deriving and applying risk analysis data.  Relevant security modeling languages.  Common definitions of trust.  Tools to support the methodology.  A standards-based approach.

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation OWASP AppSec June 2004 NYC Questions?