Presentation is loading. Please wait.

Presentation is loading. Please wait.

Moving from “Bolt-on” to “Build-in” Security Controls

Similar presentations


Presentation on theme: "Moving from “Bolt-on” to “Build-in” Security Controls"— Presentation transcript:

1 Moving from “Bolt-on” to “Build-in” Security Controls
Secure SDLC Moving from “Bolt-on” to “Build-in” Security Controls Nitin Kotwal Hack2Secure

2 Easiest Path for Attackers
“Insecure Software” Easiest Path for Attackers

3 Heartland Payment System (HPS)
Case Study … Heartland Payment System (HPS) Data Security Breach Quick Fact “Malware” was Injected [SQLi] on Bank’s Website Bypasses Network Security Controls It moves towards (PCI compliant) Payment Network Internally placed Processing Server Steal Account Details for 4 months Active & Passive Loss Stocks dips by 78% Lost 5,000 merchants Delisted by Visa & MasterCard

4 Heartland Payment System (HPS)
Case Study … Heartland Payment System (HPS) Data Security Breach Lessons “Insecure Application” as Easy Entry Point ‘Ensuring’ Compliances vs ‘Effective’ Implementation INTRANET Security

5 “Insecure Design” Easy Attack Surface

6 Facebook Incorrectly Implemented ‘Download Your Information’ Toolbox
Case Study .. Facebook Incorrectly Implemented ‘Download Your Information’ Toolbox Impact User Privacy Leak Undetected for a Year Public Apology Privacy Lawsuits

7 Facebook Incorrectly Implemented ‘Download Your Information’ Toolbox
Case Study .. Facebook Incorrectly Implemented ‘Download Your Information’ Toolbox Lessons Secure Feature Design Security in “Requirement Gathering” Compliance & Standard alignment “Security Feature” vs “Secure Implementation”

8 Lack of Awareness & Skills Partially Integrated Practices
Software Security .. Current Challenges Lack of Awareness & Skills Partially Integrated Practices In-adequate Resources [Documentation, Process, Practices] One Plan Won’t Fit All

9 So, What can be done.. To Optimize Software Security Needs
Ensure in-built Security Attack Resiliency

10 Integrate Security Controls Across SDLC Phases
Security Awareness Security Requirements Secure by Design Secure Implementation Security Testing Security Review & Response Secure Deployment Security Maintenance Secure SDLC

11 Early Identification & Mitigation of Security Vulnerabilities
Secure SDLC .. Benefits Early Identification & Mitigation of Security Vulnerabilities Reduced Security Control Implementation Cost

12 Secure SDLC .. Benefits “Earlier you Detect, Lesser be Cost of Fixing it” “Relative” Cost of Addressing Security Defect at different SDLC Stages

13 Informed Security Decision making
Secure SDLC .. Benefits Informed Security Decision making Comprehensive Risk Management Awareness of Potential Engineering Challenges

14 Security Strategies across Development Models
Secure SDLC .. Benefits Water Fall Model V Model Incremental Model RAD Model Agile Model Iterative Model Spiral Model Security Strategies across Development Models

15 Easy Compliance Adoption
Secure SDLC .. Benefits Easy Compliance Adoption

16 Security “Awareness” “There is only one way to keep your product plans safe and that is by having a Trained, Aware and a Conscientious workforce” Kevin Mitnick ‘The Art of Deception’

17 Define Security ‘Requirements’
Without System Requirements, System will Fail. Without Secure System Requirement, Organizations will. Security Compliance & Standard Needs Security Checklist & Gates Measurable Risk Definition Assurance Methodologies

18 Attack Surface Analysis Threat Modeling
Building Secure “Design” Treat Security as an Integral part of Overall System Design NIST SP : “Engineering Principles for Information Technology Security” Define Design Measure Attack Surface Analysis Threat Modeling Threats are NOT Vulnerabilities. Threats Live Forever, They are Attackers Goal 

19 Safeguards and Countermeasures
Secure “Implementation” Secure Coding Practices Code (Security) Review Safeguards and Countermeasures

20 “Security Testing” is different from “Functional Security Testing”
Grey Box Assessment Risk based Analysis Security Test Plan Best Practices Security Requirements Identified Threats Implemented Safeguards

21 Audit & Compliance Review Deployment & Procurement Risk
Security “Review” & “Response” Final Security Review Audit & Compliance Review Deployment & Procurement Risk Vulnerability Assessment Penetration Testing Incident Handling

22 Security in “Maintenance” Phase
Patch Management 3rd Party Libraries Disposal Policy

23 Awareness Explore Customize Align Skills according to Role
Secure SDLC as a Process .. How to Integrate Awareness Skills according to Role Explore Framework, Practices and Resources Customize Adopt and Integrate Controls Align Standards & Case Studies

24 Case Study … CISCO adoption of Secure SDLC
Aligned with ISO guidelines Adapted for Agile and Waterfall models Enable Global Sale Ref:

25 Case Study … MICROSOFT and VMware adoption
Ref: Ref:

26 E: info@hack2secure.com
Thank You E:


Download ppt "Moving from “Bolt-on” to “Build-in” Security Controls"

Similar presentations


Ads by Google