Copyright © 2006 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.

Slides:



Advertisements
Similar presentations
Environment case Episode 3 - CAATS II Final Dissemination Event Brussels, 13 & 14 Oct 2009 Hellen Foster, Jarlath Molloy NATS, Imperial College London.
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
<<Date>><<SDLC Phase>>
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 April 2010 TX SET Timeline Project Conceptualization 11 weeks Market Requirements 12 weeks ERCOT Requirements 12 weeks Conceptual Design 6 weeks Detail.
10.5 Report Performance The process of collecting and distributing performance information, including status reports, progress measurements and forecasts.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 27 Slide 1 Quality Management 1.
Assessment Activities
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
1 AUDIT PROCESS Quality  Degree to which a set of inherent characteristics fulfils a need or expectation that is stated, generally.
3 Dec 2003Market Operations Standing Committee1 Market Rule and Change Management Consultation Process John MacKenzie / Darren Finkbeiner / Ella Kokotsis,
Qualifications Update: Physical Education Qualifications Update: Physical Education.
Agenda Teams Responsibilities Timeline Homework and next steps.
BSBPMG503A Manage Project Time Manage Project Time Unit Guide Diploma of Project Management Qualification Code BSB51507 Unit Code BSBPMG503A.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 EIR Accessibility Web Scanning Program Jeff Kline, Statewide Accessibility Coordinator Texas Department of Information Resources October, 2012.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
2008 New York - Member Forum Council for Responsible Jewellery Practices, Ltd. Overview of CRJP.
NRTSI/NRC Project Framework for the Assessment of the State, Performance and Management of Canada’s CPI.
“Software Life Cycle Processes”
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Judith Wheeler, OCN Eastern Region Quality Reviewer Direct Claims Status Or, what do we need to see when undertaking a monitoring visit?
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Certification and Accreditation CS Syllabus Ms Jocelyne Farah Mr Clinton Campbell.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
EPA Enterprise Data Architecture Metadata Framework Assessment Kevin J. Kirby, Enterprise Data Architect EPA Enterprise Architecture Team
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Configuration Management and Change Control Change is inevitable! So it has to be planned for and managed.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
SOLUTION What kind of plan do we need? How will we know if the work is on track to be done? How quickly can we get this done? How long will this work take.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Qualifications Update: Design and Manufacture Qualifications Update: Design and Manufacture.
ANALYSIS PHASE OF BUSINESS SYSTEM DEVELOPMENT METHODOLOGY.
Qualifications Update: Computing Science Qualifications Update: Computing Science.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Engineering Process - II 7.1 Unit 7: Quality Management Software Engineering Process - II.
1 ECM APPLICATIONS AND SOLUTIONS - PART 1 MODULE 8 ECM SPECIALIST COURSE 1 Copyright AIIM.
Agenda Leads work – Track Status Admin / Upcoming / Next Steps – RFP Document review – Vendor Question Review – GL Preparation – Orals – Harris.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
INDULGENCE There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
August ICA Agenda Time Topic 8:00 – 8:15
^ About the.
Setting Actuarial Standards
Software Assurance Maturity Model
OWASP Application Security Verification Standard 2009
OWASP Application Security Verification Standard
OWASP Application Security Verification Standard
OWASP Application Security Verification Standard
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit The OWASP Foundation OWASP AppSec Seattle Oct OWASP Application Security Assessment Standards Project Cliff Barlow Assessment Standards Project Lead Director Security Services, KoreLogic, Inc

OWASP AppSec Seattle Presentation Agenda  Impetus for Project  Project Objectives  Project Roadmap  Progress To Date  The Guts  The Road Ahead  How You Can Help

OWASP AppSec Seattle Project Impetus  Current lack of standardization over what constitutes an application security assessment  No single set of criteria being referenced  Lots of definitions, little consistency in what differing assessment techniques constitute  Build a standard that will be flexible in design to accommodate a range of security assurance levels  Keep standard from placing requirements on any party  Ensure standard makes recommendations about what should be done to be consistent with what the OWASP community believes is best practice  Who better than OWASP to create this standard?  If OWASP doesn’t, will someone else impose one on us?

OWASP AppSec Seattle Project Objectives  Create standards defining baseline approach to conducting differing levels of application assessment  Establish common, consistent methods for application assessments that organizations can use as guidance on:  What tasks should be completed;  How the tasks should be completed;  Who should be involved; and,  What level is appropriate based on business requirements.  Will not define how to technically to conduct an assessment; instead meant to tie business practices to application security in order to establish a common, consistent guidance in conducting assessments  Adhering to standards increases consumer confidence that assessment meets industry agreed-upon approach

OWASP AppSec Seattle Project Roadmap Sept 2006Dec 2006Jan 2007Feb 2007Mar 2007Apr 2007 May 2007 Phase I – Project Approach: Comment Period for Proposed Project Approach, Solicit Contributor Support Phase V – OWASP Integration: Document integration and linkages with other OWASP projects Phase IV – Assessment Levels: Establish a common set of application assessment levels to be used as business guidance to ensure conducting assessments to appropriate level Phase II – Application Assessment Definitions: Establish core definitions to ensure common base terminology Phase III – Assessment Context: Establish assessment context, selection, qualification and process frameworks Schedule Can Only Be Meet With Volunteer Help! Oct 2006Nov 2006

OWASP AppSec Seattle Assessment Standards Project Status Define Common Business Application Types Develop Project Approach Phase I Phase II Define Assessment Techniques Define Assessment Techniques Phase III Define Assessment Scope Per Level Define Assessment Scope Per Level Establish Assessor Qualification Criteria Per Level Establish Assessor Qualification Criteria Per Level Define Business End Preparation For Assessment Establish Where in SDLC Assessment Components Lie Phase IV [ Stub Started – Open to Comment And Edit ] [ Stub Needed – Open to Contribution ] 1 1 – Can establish baseline now but will need further detail post Phase IV 1 Define Standard Assessment Process Framework Define Standard Assessment Process Framework

OWASP AppSec Seattle The Path Forward  Phase IV – Assessment Levels:  Establish assessment level system decision criteria  Analysis and documentation of corresponding security measurements (i.e. common security metrics, security assurance/maturity models, related legislation, other standards, etc.)  Establish Assessment levels based on Phase II and III  Define assessment depth, testing components required and tools usage per level (not products)  Establish guidance parameters to allow organizations to determine appropriate assessment level based on business application to be assessed  Phase V – OWASP Integration: Document integration and linkages with other OWASP projects.

OWASP AppSec Seattle Key Determinants To Assessment Levels  Business Criticality  Expected Security Assurance  Testing Requirements  Accredited/Certified App  Independent 3 rd Party Required  Easily Understood By The Business Layman  ?  What Needed To Get There  Decision Criteria – How Do We Get To Agreement  Decision Criteria – How Does Layman Determine Which Level They Should Use

OWASP AppSec Seattle Business Criticality (Impact of Loss) (Defined by Business) Expected Security Assurance (Assessment Depth – Expected Level of Security) (Defined by Corporate Security) The Guts of Project… Assessment Levels Security Assessment Techniques – Relative Depth ? Threat Analysis & Architecture Review (Analyst) External App Scan (Tool) Auto Source Code Review (Tool) Manual Penetration Testing (Specialist) Manual Security Code Review (Specialist)

OWASP AppSec Seattle Business Criticality (Defined by Business) Expected Security Assurance (Defined by Corporate Security) The Guts of Project… Assessment Levels One Approach… AL1 AL2 AL3 AL4 AL6 AL5  AL1: Architecture Review/Threat Analysis - Design level review to identify critical assets, sensitive data stores and business critical interconnections. In addition to architecture reviews is threat analysis to determine potential attack vectors, which could be used in testing. Details to be developed  AL3: Basic Application Security Check – AL2 + verification and validation of scan results. Security areas not scanned (encryption, access control, etc.) must be lightly tested or code reviewed.  AL2: Quick Hit Application Security Check - Automated scans (either external vulnerability scan or code scan or both) with minimal interpretation and verification.

OWASP AppSec Seattle The Guts of Project… Assessment Levels One Approach…  AL4: Standard Application Security Verification – AL3 + verification of common security mechanisms and common vulnerabilities using either manual penetration testing or code review or both. Not all instances of problems found - Sampling allowed. Details to be developed  AL5: Enhanced Application Security Verification – AL1 + AL3 + verification of all security mechanisms and vulnerabilities based on threat analysis model using either manual penetration testing or code review or both.  AL6: Comprehensive Application Security Verification – AL1 + AL4 + search for malicious code. All code must be manually reviewed against a standard and all security mechanisms tested. Business Criticality (Defined by Business) Expected Security Assurance (Defined by Corporate Security) AL1 AL2 AL3 AL4 AL6 AL5

OWASP AppSec Seattle Help…  We hope you find the OWASP Application Security Assessment Standards Project useful  Please contribute back to the project by sending your comments, questions, and suggestions to  To join the OWASP Assessment Standards mailing list or view the archives, please visit the subscription page standards standards