OpenSAMM Best Practices, Lessons from the Trenches Seba Deleersnyder OpenSAMM project co-leaders Bart De Win AppSec.

Slides:



Advertisements
Similar presentations
What is Business Architecture?. Overview Agility matters today more than yesterday Previous methods for managing change were designed for the needs of.
Advertisements

Software Assurance Maturity Model
Professional Services Overview
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Course: e-Governance Project Lifecycle Day 1
The OWASP Foundation OpenSAMM Software Assurance Maturity Model Seba Deleersnyder OWASP Foundation Board Member OWASP.
OpenSAMM Software Assurance Maturity Model Seba Deleersnyder SAMM project co-leaders Pravir Chandra AppSec USA 2014 Project.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
<<Date>><<SDLC Phase>>
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Unilever IT Career Framework Daryl Beck IT Excellence Thursday 6 th December 2007.
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
Achieving (and Maintaining) Compliance With Secure Software Development Compliance Requirements (ISC)² SecureSDLC May 17, 2012.
ISEB Qualifications an evolving framework for the future.
A framework for describing IT Project Management Processes and Tool Set Features Enterprise Project Management Framework.
©2009 Gotham Digital Science, LLC Software Assurance with SAMM 21 Sept 2009, SOURCE Barcelona Matt Bartoldus
The OWASP Foundation Setting up a Secure Development Life Cycle with OWASP Seba Deleersnyder OWASP Foundation Board.
© 1998 Concept Five Technologies Enterprise Application Integration Capability Maturity Model.
Charting a course PROCESS.
Control environment and control activities. Day II Session III and IV.
Factors influencing open source software adoption
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
The Evergreen, Background, Methodology and IT Service Management Model
© 2007 Heuristic Management Systems Inc. Learning to Thrive in a Risk-averse Culture Chris Vandersluis President,
Measuring Security Best Practices with OpenSAMM Alan Jex SnowFROC 2013.
OWASP SAMM Best Practices, Lessons from the Trenches
Test Organization and Management
-Nikhil Bhatia 28 th October What is RUP? Central Elements of RUP Project Lifecycle Phases Six Engineering Disciplines Three Supporting Disciplines.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1. 2 Business Process Reengineering (BPR) “the fundamental rethinking and redesign of processes to achieve dramatic improvements in critical, contemporary.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
IT Requirements Management Balancing Needs and Expectations.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Performance Management: Getting Ready for Accreditation Needs Assessment Survey Community Assessment 1 Online survey Open to anyone interested in this.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The OWASP Foundation Where we are Where we are going Seba DeleersnyderEoin Keary OWASP Foundation Board.
Microsoft Office Project 2003: Selling EPM in your Organization Matt Wilson Business Solutions Specialist LMR Solutions.
Rational Unified Process Fundamentals Module 5: Implementing RUP.
Software Assurance Maturity Model Pravir Chandra OpenSAMM Project Lead
Principles of Information Systems, Sixth Edition Systems Investigation and Analysis Chapter 12.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Achieving SOA Governance through Organizational Consensus SOA e-Government Conference Hosted by MITRE and The Federal SOA Community of Practice September.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Example Incident Mgmt Initiation No recording of Incidents Users can approach different departments Solutions of previous incidents are not available.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP AppSec India Aug 2008.
Strategies for Knowledge Management Success SCP Best Practices Showcase March 18, 2004.
Using OMB Section 508 reporting in addressing your agency's program maturity. How to Measure Your Agency's 508 Program.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Proventures reconnect session on Project Portfolio Management (PPM)
Overview of RUP Lunch and Learn. Overview of RUP © 2008 Cardinal Solutions Group 2 Welcome  Introductions  What is your experience with RUP  What is.
The OWASP Foundation OWASP Global Update Seba Deleersnyder OWASP Foundation Board Member.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
How Good are you at Managing your Processes? Operational Excellence.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
OpenSAMM Best Practices, Lessons from the Trenches
Presented by Rob Carver
The Five Secrets of Project Scheduling A PMO Approach
Data Architecture World Class Operations - Impact Workshop.
Identify the Risk of Not Doing BA
Sample Agile Assessment Report for XYZ Company
Software Assurance Maturity Model
Canberra OWASP Chapter meeting
Getting benefits of OWASP ASVS at initial phases
Building your Webex adoption dream team
Presentation transcript:

OpenSAMM Best Practices, Lessons from the Trenches Seba Deleersnyder OpenSAMM project co-leaders Bart De Win AppSec Europe 2014 Project Talk

Bart / Seba ? Sebastien Deleersnyder 15+ years developer / information security experience Belgian OWASP chapter founder OWASP volunteer Co-organizer Application security specialist Toreon Bart De Win, Ph.D. 15+ years experience in secure software development Belgian OWASP chapter co-leader Author of >60 publications Security consultant PwC

Agenda Integrating software assurance? OpenSAMM Quick Start Lessons Learned Resources & Self-Assessment OpenSAMM Road Map

“Build in” software assurance 4 Design Build Test Production vulnerability scanning - WAF vulnerability scanning - WAF security testing dynamic test tools security testing dynamic test tools coding guidelines code reviews static test tools security requirements / threat modeling security requirements / threat modeling reactiveproactive Secure Development Lifecycle (SAMM)

We need a Maturity Model An organization’s behavior changes slowly over time Changes must be iterative while working toward long-term goals There is no single recipe that works for all organizations A solution must enable risk-based choices tailored to the organization Guidance related to security activities must be prescriptive A solution must provide enough details for non- security-people Overall, must be simple, well- defined, and measurable OWASP Software Assurance Maturity Model (SAMM)

SAMM users 6 Dell Inc KBC ING Insurance Gotham Digital Science HP Fortify ISG...

SAMM Security Practices From each of the Business Functions, 3 Security Practices are defined The Security Practices cover all areas relevant to software security assurance Each one is a ‘silo’ for improvement

Example: Education & Guidance 8

Per Level, SAMM defines... Objective Activities Results Success Metrics Costs Personnel Related Levels

SAMM Quick Start ASSES questionnaire GOAL gap analysis PLAN roadmap IMPLEMENT OWASP resources

Assess SAMM includes assessment worksheets for each Security Practice

Lessons Learned – Organisation Specific Pre-screen general software development maturity Define assessment scope in organisation: –Organisation wide –Selected Business Units –Development Groups (internal, supplier) –IT infrastructure Groups (hosting internal, cloud) Involve key stakeholders Invaluable for awareness & education Apply CONSISTENT (same interviewers) within same organisation

Lessons Learned – Interview / Scoring Adapt & select subset questionnaire per profile (risk management, development, IT infrastructure, …) Try different formats: interview style, workshops Capture more details: “Adjusted” scoring Ask percentage instead of Yes/No If Yes: request CMM level for activity Ask about strengths & weaknesses Validate results: Repeat questions to several people Lightweight vs full approach Anonymous interviews Aggregate gathered information

Goal Gap analysis Capturing scores from detailed assessments versus expected performance levels Demonstrating improvement Capturing scores from before and after an iteration of assurance program build- out Ongoing measurement Capturing scores over consistent time frames for an assurance program that is already in place

Goal – Lessons Learned Link to the organisational context –Specific Business Case (ROI) –Organisation objectives / risk profile Think carefully about selection –So you want to achieve all 3’s. Hmm. Who are you, NSA ? –Link to industry level –Respect practice dependencies –It can make sense not to include particular low-level activities, or to lower a current level

Goal – Lessons Learned Get consensus, management support Be ready for budget questions (linked to Plan phase) –MD, CAPEX, OPEX –General stats about %’s Create & reuse own organisation template

Plan Roadmaps: to make the “ building blocks ” usable Roadmaps templates for typical kinds of organizations Independent Software Vendors Online Service Providers Financial Services Organizations Government Organizations Tune these to your own targets / speed

Plan – Lessons Learned Identify quick wins (focus on success cases) Start with awareness / training Adapt to upcoming release cycles / key projects Spread effort & “gaps to close” over realistic iterations Spread work, roles & responsibilities SW security competence centre, development, security, operations For instance service portfolio and guidelines: when and who ? Take into account dependencies Be ready to adapt planning

Plan – Budgeting Average budget impact 5%-15% on project Cost of tooling Central procurement vs per development group Cost of training Do not forget internal/external time spent Cost of external suppliers / outsourcing Different technology stacks will impact budget

Implement: 150+ OWASP resources PROTECT Tools: Enterprise Security API (ESAPI), CSRFGuard, AppSensor, ModSecurity Core Rule Set Project Docs: Development Guide, Cheat Sheets, Secure Coding Practices - Quick Reference Guide DETECTTools: OWTF, Broken Web Applications Project, Zed Attack ProxyDocs: Code Review Guide, Testing Guide, Top Ten ProjectLIFE CYCLE SAMM, Application Security Verification Standard, Legal Project, WebGoat, Education Project, Cornucopia

Implement – Lessons Learned Adapt & reuse SAMM to your organisation Categorize applications: High, Medium, Low based on risk: e.g. Internet facing, transactions, … Recheck progress & derive lessons learned at each iteration Create & improve reporting dashboard Application & process metrics Treat new & legacy code bases differently Agile: differentiate between Every Sprint, Bucket & one-time AppSec activities Balance planning on people, process, knowledge and tools

Lessons Learned – AppSec Competence Centre Inject & spread best practices “market & promote” – do not become risk/audit function Do not become operational bottle-neck Spread/hand-over knowledge to champions throughout organisation Create & nurture AppSec community

SAMM Resources Presentations Quick Start (to be released) Assessment worksheets / templates Roadmap templates Translations (Spanish, Japanese, …) SAMM mappings to ISO/EIC – BSIMM – PCI (to be released) NEW: Training material 23

NEW: Self-Assessment Online 24

SAMM Roadmap Build the SAMM community: Grow list of SAMM adopters Workshops at conferences Dedicated SAMM summit V1.1: Incorporate Quick Start / tools / guidance / OWASP projects Revamp SAMM wiki V2.0: Revise scoring model Model revision necessary ? (12 practices, 3 levels,...) Application to agile Roadmap planning: how to measure effort ? Presentations & teaching material … 25

Get involved Project mailing list / work packages Use and donate (feed)back! Donate resources Sponsor SAMM

Critical Success Factors Get initiative buy-in from all stakeholders Adopt a risk-based approach Awareness / education is the foundation Integrate security in your development / acquisition and deployment processes Measure: Provide management visibility 27

Measure & Improve! OpenSAMM.org

Mapping Projects / SAMM 29

OWASP Projects Coverage 30

SDLC Cornerstones (recap) SDLC Workshop Feb SecAppDev 2013 Roles & Responsibilities People Activities Deliverables Control Gates Process Standards & Guidelines Compliance Transfer methods Knowledge Development support Assessment tools Management tools Tools & Components RiskTraining