Software Confidence. Achieved. March 2011 BSIMM: The Building Security In Maturity Model Gary McGraw, Ph.D. Chief Technology Officer, Cigital.

Slides:



Advertisements
Similar presentations
Strengthening Your HR Capacity The Government of Canada Perspective
Advertisements

Software Assurance Maturity Model
Memorable Events dont just happen They start with a plan Thats where we come in.
Austin Discovery Middle School Transformation to Fine Arts Academy.
International Society for Pharmaceutical Engineering Student Chapter Standard of Excellence Training Program Webinar August 2007.
How to attract customers and increase sales?. Foundation.
Copyright © 2013, Cigital and/or its affiliates. All rights reserved. BSIMM-V THE BUILDING SECURITY IN MATURITY MODEL GARY MCGRAW, PH.D. CHIEF TECHNOLOGY.
6/2/20151 Enterprise Risk & Assurance Management in Zurich North America Brian Selby MA (Audit), FIIA, QiCA, MBCS, CISA.
A Technical Game Project 4 Due dates: Game Idea Friday, March 16 th Game Plan Friday, March 23 rd Web Page Sunday, April 9 th First Playable Wednesday,
Diane Green Greentree Naturals Small Farm Marketing.
St. Mark’s Catholic Church Working Hands Career Ministry Networking Jonathan Donahue.
‘How engineers create solutions to problems ’ Manuel Burton.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Dialog Practices Connections Roundtable September 2014.
Craig J. Nichols, Secretary Purchasing Directors’ Meeting September 19, 2013.
PUBLIC RELATIONS AN INTRODUCTION.
© Infosys Technologies Limited Consulting Services Paul Cole Managing Director – Infosys Consulting.
The Chartered Professional (Ch.P.) Strategic Wealth.
FUNDRAISING APAMSA Leadership Development Module.
NovaVision Software A/S Company Profile, May 2006.
Day 2.  Questions??  Blackboard updates  IP Projects discussions  Why project management??  Assignment 1 posted in Blackboard ◦ Due in one week;
Sakai Overview Sakai Conference: June 12-14, 2007 Amsterdam, NL.
Elementary & Middle School 2014 Mathematics MCAS Evaluation & Strategy.
A Scientific Approach to Software Security Dennis Fisher May 15, 2012 The Kaspersky Lab Security News Service.
Project Tracking. Questions... Why should we track a project that is underway? What aspects of a project need tracking?
+ In-Person Assister Network Eastern Washington Outreach Coalition May ,514 people enrolled 11 counties collaborating $814,000 in new revenue The.
GoodsWayGoodsWay Capstone Project Team information Goodsway.
Ms. Decker’s Third- Grade Class Welcome, students! 1 st Grade Back to School Night Mrs. Fuchs
Financing and Shaping the Media: Advertising, Public Relations, and Marketing Communications Week Three.
1 Technical Assistance - PTAB Selecting and Hiring the Design Professional Dave Maxwell, P.E. Chairman, New Mexico Professional Technical Advisory Board.
WORKSHOP, Nicosia 2-3rd July 2008 “Extension of SAFETY & QUALITY Common Requirements to the EMAC States” Item 3 : Regulatory Context Peter Stastny EUROCONTROL.
Stock a/o Exchanges on Web. Stock a/o Exchanges on web The web offers Private Investors access to Services update in real time, data and updates about.
Q2014 – Special Session Big Data Vienna, 4 June 2014 Quality Approaches to Big Data Peter Struijs and Piet Daas.
Watching Software Run Brian ChessNov 18, Success is foreseeing failure. – Henry Petroski.
The Communications Mix: Sales Promotions, Merchandising, Public Relations, and Publicity.
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
Quality System Assessment in Italy European Curricula for Economic Animator in the Enlarging Europe – ECONOMIC ANIMATOR PT04/PP/08/36/446.
COMP 208/214/215/216 – Lecture 8 Demonstrations and Portfolios.
GIS for Environmental Modeling GEO 479/559 Spring.
Software Assurance Maturity Model Pravir Chandra OpenSAMM Project Lead
EUMA ON THE MOVE selling EUMA. Reflecting… Do your family & friends know you are a member of EUMA? Do they know what EUMA stands for? Who is part of your.
 GetGlue BUS111 Cory Milbach. What is GetGlue?  Entertainment based social networking site  A cross between foursquare and a discussion board  Users.
Design Process … and some design inspiration. Course ReCap To make you notice interfaces, good and bad – You’ll never look at doors the same way again.
Academy of Creative Computer Youth Center for Community Services and Continuing Education Kuwait University.
Boots-to-Scrubs How to Get the Job in the Healthcare (or any) Industry Presented by: Deborah Berkovitz Career Placement Coordinator
Theories of Agile, Fails of Security Daniel Liber CyberArk.
Alpha Phi Alpha Fraternity, Inc. Delta Lambda Chapter Beautillion Program Presented to Ms. Rosetta Wilson December 10, 2006.
Eurostat Making the ESS visible. Eurostat The ESS - a large international network, unknown to the European public and faced with challenges.
Asociatia Pro Xpert Entrepreneurial Competencies and Horizontal (Soft) Skills for Social Entrepreneurs.
Objective ICT : Internet of Services, Software & Virtualisation FLOSSEvo some preliminary ideas.
SAP MDG(MASTER DATA GOVERNANCE) ONLINE TRAINING UK Contact Us :
@NAVUG Housekeeping Organizer will mute all lines during this presentation Use the Questions Box as a means to communicate with the organizer (feel free.
NIH Change Management Program Change Management Program Overview March 8,
Fraud Detection with Machine Learning: A Case Study from Sift Science
SAP BPC / EPM ONLINE TRAINING UK Contact Us :
© 2007 by Prentice HallManagement Information Systems, 10/e Raymond McLeod and George Schell 1 Information Auditing ► External auditors from outside the.
Year 10 GCSE Focus Evening. Work Experience Mr T Beal Work Experience Mr T Beal GCSE Focus Evening.
Exploitation means to use and benefit from something. For Erasmus+ this means maximising the potential of the funded activities, so that the results are.
The Principle of Management
Information and Orientation Session
Presented by Rob Carver
SO MARKETING IS….. Marketing is not just about selling. It involves:
THE BUSINESS ANALYSIS PROCESS MODEL
LDXXXIX Labs Team Tool Kit
An Evaluation of Professional Scheduling Practices and Training Issues in Mississippi Claire Freeney School of Engineering Technology, University of Southern.
Navigating the Political Waters as a Workforce Planner
Staff Service Awards Update
Policy guide example Guidance and template for creating a travel policy that’s fit for a video enabled world.
Presentation transcript:

Software Confidence. Achieved. March 2011 BSIMM: The Building Security In Maturity Model Gary McGraw, Ph.D. Chief Technology Officer, Cigital

© 2011 Cigital Inc. We hold these truths to be self-evident Software security is more than a set of security functions Not magic crypto fairy dust Not silver-bullet security mechanisms Non-functional aspects of design are essential Bugs and flaws are 50/50 Security is an emergent property of the entire system (just like quality) To end up with secure software, deep integration with the SDLC is necessary

© 2011 Cigital Inc. Real data from (33) real initiatives 60 measurements McGraw, Chess, & Migues BSIMM: Software Security Measurement PlexLogic

© 2011 Cigital Inc. 4 Intel + eleven unnamed firms 33 software security initiatives measured

© 2011 Cigital Inc. The magic 30 Since we have data from > 30 firms we can perform statistical analysis How good is the model? What activities correlate with what other activities? Do high maturity firms look the same? Etc We now have 33 firms (+ more underway) BSIMM (the nine) BSIMM Europe (nine in EU) BSIMM2 (30) some underway

© 2011 Cigital Inc. Building BSIMM (2009) Big idea: Build a maturity model from actual data gathered from 9 of ~60 known large-scale software security initiatives Create a software security framework Nine in-person executive interviews Build bullet lists (one per practice) Bucketize the lists to identify activities Create levels Objectives  Activities 109 activities supported by real data Three levels of “maturity” The model has been validated with data from > 30 firms

© 2011 Cigital Inc. Monkeys eat bananas BSIMM is not about good or bad ways to eat bananas or banana best practices BSIMM is about observations BSIMM is descriptive, not prescriptive 7

© 2011 Cigital Inc. Four domains Twelve practices See informIT article on BSIMM website A Software Security Framework

© 2011 Cigital Inc. Training practice skeleton

© 2011 Cigital Inc. Example activity [T1.3] Establish SSG office hours. The SSG offers help to any and all comers during an advertised lab period or regularly scheduled office hours. By acting as an informal resource for people who want to solve security problems, the SSG leverages teachable moments and emphasizes the carrot over the stick. Office hours might be held one afternoon per week in the office of a senior SSG member.

© 2011 Cigital Inc. 109 Activities 3 levels Top 15 things 66% cutoff 20 of 30 firms Yellow highlight BSIMM2 Scorecard

© 2011 Cigital Inc. BSIMM2 as a measuring stick Compare a firm with peers using the high water mark view Descriptive (not prescriptive)

© 2011 Cigital Inc. Top 15 things green = good? red = bad? “Blue shift” practices to emphasize activities you should maybe think about in brown BSIMM2 scorecard with firm data

© 2011 Cigital Inc. We are a special snowflake (NOT) ISV (7) results are similar to financial services (12) BSIMM Europe vs BSIMM US You do the same things You can demand the same results 14 11/19/2015

© 2011 Cigital Inc. BSIMM Community Events 22 firms gathered in Annapolis, MD Nov Talks by SSG leaders Workshop on efficiency and effectiveness Intense networking BSIMM mailing list High S/N ratio A BSIMM Community Mixer at RSA 2011 included New logo revealed Update on BSIMM3 BSIMM Longitudinal results Music and mixology 15 11/19/2015

© 2011 Cigital Inc. BSIMM2 to BSIMM3 BSIMM2 released April 2010 under creative commons Italian and German translations available BSIMM is a yardstick Use it to see where you stand Use it to figure out what your peers do BSIMM3 BSIMM Longitudinal (10) BSIMM3 (40)

© 2011 Cigital Inc. Get involved in the BSIMM Community See the Addison-Wesley Software Security series Send “ So now, when we face a choice between adding features and resolving security issues, we need to choose security.” -Bill Gates