Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Advertisements

Course: e-Governance Project Lifecycle Day 1
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Achieving (and Maintaining) Compliance With Secure Software Development Compliance Requirements (ISC)² SecureSDLC May 17, 2012.
The Transforming Power of the ITIL Framework for the Project Manager Patrick von Schlag Deep Creek Center November 10, 2010.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
A Framework for Automated Web Application Security Evaluation
 Computer security policy ◦ Defines the goals and elements of an organization's computer systems  Definition can be ◦ Highly formal ◦ Informal  Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Business Systems Development SDLC and introduction to the Microsoft Solutions Framework Team and Process Models.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Microsoft Security Development Lifecycle
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security Development Life Cycle Baking Security into Development September 2010.
PRJ566 Project Planning & Management Software Architecture.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
CSCE 548 Secure Software Development Security Operations.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 Software Engineering and Security DJPS April 12, 2005 Professor Richard Sinn CMPE 297: Software Security Technologies.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Getting Started with OWASP The Top 10, ASVS, and the Guides Dave Wichers COO, Aspect Security OWASP Board Member OWASP Top 10 and ASVS Projects Lead.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Development Security Chapter 10 Part 3 Pages 1108 to 1125.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
RATIONAL UNIFIED PROCESS PROCESS FRAMEWORK OVERVIEW.
Software Engineering Process - II 7.1 Unit 7: Quality Management Software Engineering Process - II.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SAST is MUST About Me Moni (Moshe) many years in IT totally ignorant of risk posed by code. Checkmarx director of sales for.
Presented by Rob Carver
Quality Management Perfectqaservices.
V-Shaped SDLC Model Lecture-6.
MANAGING APPLICATION SECURITY
I have many checklists: how do I get started with cyber security?
OWASP Application Security Verification Standard 2009
Tour of OWASP’s projects
Moving from “Bolt-on” to “Build-in” Security Controls
Secure Coding: SDLC Integration Sixfold Path
Herding Cats and Security Tools
OWASP Application Security Verification Standard
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP Secure Code Review: Enterprise Metrics Richard Tychansky Lockheed Martin Corporation 11/10/2010

OWASP 2 Agenda  Software Development Life Cycles  Enterprise Elements for Secure Development  Application Security Standards  Secure Code Review Metrics  Metrics by SDLC Phase (General Model)  Implementing the Framework

OWASP Software Development Life Cycles  Each SDLC model has its own benefits depending upon your organizational needs.  Agile  Waterfall  Iterative  Vee Model  Incremental and Iterative Development  Microsoft Security Development Lifecycle (SDL)  Ultimately, to develop secure software you need to follow a repeatable and continuously improving software engineering process.  Security needs to be integrated and measured at each SDLC phase. 3

OWASP Enterprise Elements for Secure Development  Management Support  Developer Training  Professional Career Development  Technical Vulnerability Management Program  Integration of Security Standards into the SDLC  Security Metrics Program 4

OWASP 5

Application Security Standards  OWASP Application Security Verification Standard  Level 1 Automated Verification  Level 1A – Dynamic Scan  Level 1B – Source Code Scan  Level 2 Manual Verification  Level 2A – Penetration Test  Level 2B – Code Review  Level 3 Design Verification – threat modeling  Level 4 Internal Verification – examine how security works – look for malicious code  NSA Guidance for Addressing Malicious Code Risk  DISA STIG Application Security and Development  Use a standard which is development life cycle independent and vendor agnostic.  Maintain the principles of the SDLC model you are using and integrate security at each phase. 6

OWASP 7

Secure Code Review Metrics  Decided what to measure  Set the minimum benchmark  Define reporting requirements to Management, and customers.  Use a hybrid approach to integrating standards into your SDLC model of choice.  Map metrics to ASVS level completion and security testing and monitoring programs. 8

OWASP Metrics by SDLC Phase (General Model) SDLC PhaseSecure Code Metric Requirements Percentage of security requirements given in project specifications. Percentage of security requirements subject to cost/benefit, and risk analysis. Percentage of security requirements which are considered in threat models. Design Percentage of design components subjected to attack surface analysis. Percentage of security controls that are covered by security design patterns. Percentage of security controls which pose an architectural risk. Implementation (Coding) Percentage of application components subject to manual and/or automated source code review. Percentage of code deficiencies detected during peer reviews. Percentage of application components subject to code integrity/signing procedures. Verification (Testing) Percentage of common weaknesses and exposures detected per requirement specification. Percentage of security controls within the application that met the required specification for software assurance. 9 Reference: Allen, J.(2009)

OWASP Implementing the Framework  COTS vs internal development web application security metrics.  Security in source code begins with requirements, then design, and test (i.e., throughout the SDLC)  Align source code vulnerability metrics to OWASP Top Ten “design flaw categories”.  Security design flaw metrics captured for:  Source code design  Insecure field scope  Insecure method scope  Insecure class modifiers  Unused external references  Redundant code 10

OWASP Conclusions  Consensus building across multiple business areas is not easy  Training all developers is elusive  Centralizing source code analysis is problematic  Finding the right reporting metrics for Senior Management is critical to project success 11

OWASP References  Allen, J., (2009). Measuring Software Security. Software Engineering Institute, Carnegie Melon University  Application Security and Development STIG Version 3 Release 2. DISA zip zip  Fundamental Practices for Secure Software Development. Software Assurance Forum for Excellence in Code (SAFECode)  NSA Guidance for Addressing Malicious Code Risk.  OWASP Application Security Verification Standard Project. roject roject  OWASP Security Code Review in the SDLC.  OWASP Top Ten Project.  Resources for Developers. Software Engineering Institute, Carnegie Melon University  Software Assurance: An Overview of Current Industry Best Practices. Software Assurance Forum for Excellence in Code (SAFECode)

OWASP Discussion Question  Tell me about security metrics in your organization. 13