Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

OWASP Secure Coding Practices Quick Reference Guide
OWASP Top Dave Wichers OWASP Top 10 Project Lead OWASP Board Member Cofounder, Aspect Security & Contrast Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Achieving (and Maintaining) Compliance With Secure Software Development Compliance Requirements (ISC)² SecureSDLC May 17, 2012.
Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate.
Security Controls – What Works
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
1 An Overview of Computer Security computer security.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Stephen S. Yau CSE , Fall Security Strategies.
Risk Management Vs Risk avoidance William Gillette.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Introduction to Network Defense
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
S/W Project Management
Test Organization and Management
Information Systems Security Computer System Life Cycle Security.
 Computer security policy ◦ Defines the goals and elements of an organization's computer systems  Definition can be ◦ Highly formal ◦ Informal  Security.
Unified Process versus Extreme Programming. Outline Compare and contrast UP and XP  Processes / Disciplines  Management  Artefacts Risk management.
Security Architecture
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Chapter 6 of the Executive Guide manual Technology.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Team Skill 6: Building the Right System Managing Change (28)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP ESAPI SwingSet An introduction by Fabio Cerullo.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Scott Charney Cybercrime and Risk Management PwC.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Getting Started with OWASP The Top 10, ASVS, and the Guides Dave Wichers COO, Aspect Security OWASP Board Member OWASP Top 10 and ASVS Projects Lead.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Process Asad Ur Rehman Chief Technology Officer Feditec Enterprise.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2015, Robert W. Hasker. Classic Model Gathering Requirements Specification Scenarios Sequences Design Architecture Class, state models Implementation.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Software Quality Assurance Chip Ene, February 14, 2015.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
The Security Sprint By Ramnath Cidambi. Agile and DevOps DevOps is a “recent” concept though the building blocks have existed for a while – The understanding.
Embedded Systems Software Engineering
CSCE 548 Secure Software Development Risk-Based Security Testing
^ About the.
OWASP Application Security Verification Standard 2009
How to Mitigate the Consequences What are the Countermeasures?
OWASP Application Security Verification Standard
Albeado - Enabling Smart Energy
OWASP Application Security Verification Standard
OWASP Application Security Verification Standard
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP OWASP New York Conference 2008 Security in Agile Development: Breaking the Waterfall Mindset of the Security Industry Dave Wichers Cofounder and COO Aspect Security Volunteer Member of OWASP Board and OWASP Conferences Chair

OWASP Agile Manifesto 2

OWASP Agile Traits  Agile Practices  Test driven development  Pair programming  The simplest thing  Planning Sprint (Sprint 0) – Define User Stories  Develop in Sprints  Focus on what customer wants first  Short iterative development cycles 3

OWASP Assurance Is the Goal  Can Agile software development methods generate assurance?  “test-driven development places (functional) assurance squarely at the heart of development” – Johan Peters 4

OWASP Waterfall Security Is “Breadth First”  Build assurance layer-by-layer  Challenges  Problem space is very large  Difficult to prioritize issues  Loss of traceability from threat agents to source code  Problems always seem “theoretical” until it’s too late Security Requirements Validation Spec Security Architecture Review Code Review Application Vulnerability Test External Application Security Assessments 5

OWASP Agile vs. Security  Where to insert security activities? 6

OWASP Periodic Security Sprints Security in Agile Threat Model Stakeholder Security Stories Application Security Assurance Review Periodic Security Sprints (if needed) { 7 Some Independent Expert Testing and Security Architecture Review Support

OWASP Key Agile Security Enablers See the OWASP Enterprise Security API (ESAPI) Project Standard Security Controls How to properly use your standard security controls How to avoid common security flaws (e.g., SQL Injection) Automated code analysis (to enforce ‘your’ standards) – QA/security tool Secure Coding Standards How to use your standard controls and avoid common flaws Developer Security Training Even with training and standard controls, security is hard Access to security experts and independent testing/analysis is key Ideally, a security expert would be on the team (but usually not possible) Support from Security Experts

OWASP Planning Sprint (Sprint 0): Stakeholder Identifies Priorities  Identify Stakeholders (User, Roles, Data Owners, …)  Ask them what their most important security concerns are  Work with them on the basic security controls required based on system purpose, environment, existence of such mechanisms, etc.  You are the expert, not them  Confidentiality  Who is allowed to access what data and how?  How important is protecting this data?  Regulatory requirements?  Integrity  What data must be protected and to what degree?  Availability  How important is system availability? Can we define an SLA? 9

OWASP Planning Sprint: Identify Key Risks to the Business  Security architecture review process is helpful here  See OWASP Risk Rating Methodology  Attack Vulnerability Asset Technical ImpactBusiness ImpactVulnerabilityAttackThreat Agent Vulnerability Business Impact Business Impact Function Asset Business Impact Control Missing Control 10

OWASP Planning Sprint: Capture Risks in Stakeholder Security Stories I want to be the only one who can access my account, so that I can keep my information private Risk level: HIGH Controls: Authentication and Data Layer Access Control As a User… I want my personal information encrypted in storage and transit so that it doesn’t get stolen by attackers Risk Level: HIGH Controls: SSL and Encryption As a User … …I want to be the only one who can edit Employee salaries so that I can prevent fraud Risk Level: HIGH Controls: Function Layer Access Control As a Manager… I want all security critical actions logged, so that attacks can be noticed and diagnosed Risk Level: MEDIUM Controls: Logging and Intrusion Detection As a Business Owner… 11 Some come from Stakeholder and some come from you as the expert

OWASP Building Assurance “Depth First”  Identify most important security concerns  and their required security mechanisms  Within sprints, or in periodic security sprints  Develop test methods for them and their use  Configure/implement/analyze these security mechanisms  Run the tests ID Most Important Security Concerns Development Sprints Implement Security Mechanisms and Review Priority Security Concerns Development Sprints Implement and Review Next Priority Security Concerns … Development Sprints Perform Application Security Assurance Review 12

OWASP Implement Stakeholder Security Stories  Security stories are implemented just like other stories  Test-Driven Development  Unit test cases come before the code  Continuous reviews and inspection  Pair programming / Constant informal reviews  Continuous integration  Avoid common vulnerabilities. i.e., security controls aren’t 13

OWASP Test Cases for Security Controls  Security ‘requirements’ are defined by developing test cases  Unit tests can test both positive (functional) and negative (not broken) aspects of security mechanisms  Tests are repeatable, providing full regression testing  But not true penetration testing or analysis  Real experience with test driven development  The OWASP Enterprise Security API  600+ test cases, rerun every time a change is made  Results in significant increase in assurance 14

OWASP Test Cases for Security Stories  Functional test cases  Typical unit testing by developers  Verify presence and proper function of security control  May include simple tests with a browser  Security test cases  Check for best practices  Test for common pitfalls  Hopefully, most come with your standard security controls  Test cases provide strong assurance evidence  Independent Security Testing  Verifies that functional and security tests were performed  Provides additional specialized security testing expertise 15

OWASP Periodic Security Sprints  As necessary, build/integrate related security controls  Implement highest priority related security controls first  Leveraging your standard security components is key  Building significant new security controls is hard  Security sprints may even be completely avoided if sufficient standard components are available  Examples  Authentication, Sessions, Authorization  Validation, Canonicalization, Encoding  Error Handling, Logging, Intrusion Detection 16

OWASP Perform Agile Security Reviews  Security Reviews: Verify all are in place and complete  Threat model  Security stories  Security controls  Test cases  Test results Notice: Most are standard agile artifacts, not just add-on security deliverables  Application code review and penetration testing  Added for critical applications to increase assurance  Manual (tool supported), automated, or both  Within security sprints and/or predeployment testing 17

OWASP Example: Agile Access Control  With standard access control components  Just make sure “isAuthorized()” is called where needed  Both in presentation layer and business logic  Stay focused on implementing the functionality  Define user stories around who can do what  Configure your policy for what is most important first  E.g., define and restrict what normal users can do  Policy can be both declarative and programmatic  How do you test proper implementation?  Develop policy specific test cases to make sure policy is enforced properly 18

OWASP Security in Agile Summary  Agile can generate assurance well, possibly better  Approach is depth-first, not breadth-first  Getting the right stakeholder security stories is key 19

OWASP References  Beyond Functional Requirements On Agile Projects - Strategies for addressing nonfunctional requirements  Scott W. Ambler - September 16,  Agile Security Requirements Engineering  Johan Peters  stories.pdf stories.pdf