Download presentation
Presentation is loading. Please wait.
Published byRobert Jordan Modified over 9 years ago
1
Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit http://creativecommons.org/licenses/by-sa/2.5/ The OWASP Foundation 6 th OWASP AppSec Conference Milan - May 2007 http://www.owasp.org/ The OWASP CLASP Project Pravir Chandra OWASP CLASP Project Lead Principal Consultant -- Cigital, Inc. chandra@cigital.com
2
6 th OWASP AppSec Conference – Milan – May 2007 2 Agenda What is CLASP anyway? The CLASP philosophy and contents Comparison to other security processes Details on the OWASP CLASP Project
3
6 th OWASP AppSec Conference – Milan – May 2007 3 CLASP 2007 Comprehensive, Lightweight Application Security Playbook CLASP is a prescriptive guide for organizations to address software security iteratively Cover the entire organization (not just development) Adaptable to any type of organization or development process New material to reflect software security’s inexorable tie to the specifics of a business
4
6 th OWASP AppSec Conference – Milan – May 2007 4 Origins of CLASP Original version was developed by Secure Software (acquired by Fortify Software) Collection of ‘stuff’ - vulns, roles, activities, etc. Heavily modified for CLASP 2007 This is the version we’ll discuss today To be released by June 2007
5
6 th OWASP AppSec Conference – Milan – May 2007 5 Top-level organization of CLASP 2007 Think How to think about software security Setting long-term goals and strategy based on your business Plan Setting near-term goals to execute against Planning iterations and getting immediate value Do The nitty-gritty details of performing activities that provide assurance Executing and measuring success
6
6 th OWASP AppSec Conference – Milan – May 2007 6 Think
7
6 th OWASP AppSec Conference – Milan – May 2007 7 Philosophical Stuff It’s about balancing risk, not 100% secure Even if you don’t have well-defined process, you can make an impact Monitor and measure to make sure you’re on track for efficiency and efficacy Use the CLASP Best Practices as a ‘north star’
8
6 th OWASP AppSec Conference – Milan – May 2007 8 The CLASP Best Practices 1.Institute awareness programs 2.Perform application assessments 3.Capture security requirements 4.Implement secure development practices 5.Build vulnerability remediation procedures 6.Define and monitor metrics 7.Publish operational security guidelines
9
6 th OWASP AppSec Conference – Milan – May 2007 9 Key decision points What kind of business are you in? Regulatory requirements Rough cut at ‘risk appetite’ How does your business rely upon software? Do you sell boxed applications? … platforms? Do you build and operate your own software? Do you outsource and consume? What top-management support is available? How much cost can you tolerate short-term? … long-term?
10
6 th OWASP AppSec Conference – Milan – May 2007 10 Plan
11
6 th OWASP AppSec Conference – Milan – May 2007 11 Creating an action plan CLASP 2007 introduces the concept of ‘Competencies’ High-level areas of the SDLC Each has pre-determined maturity levels (not quite CMM-style) Based on your drivers, pick the next Competency (or maturity level) you’ll target A Competency level has assigned Activities (more on this later) Provides some ready-made milestones Grow the organization’s skill and efficiency over time A few example roadmaps for common types of businesses are provided to get started
12
6 th OWASP AppSec Conference – Milan – May 2007 12 The CLASP Competencies 1.Security Management & Governance 2.Hardened Requirements & Design 3.Secure Implementation 4.Software Assessment & Testing 5.Safe Deployment & Operations
13
6 th OWASP AppSec Conference – Milan – May 2007 13 Do
14
6 th OWASP AppSec Conference – Milan – May 2007 14 Putting rubber on the road Based on target Competency level, implement assigned Activities Plan appropriate resources for the activity Ensure correct Roles are filled Instrument with prescribed monitors for metrics In total, there are ~24 Activities They’re spread across the Competency levels for bite- size consumption Some you may never need to implement
15
6 th OWASP AppSec Conference – Milan – May 2007 15 The CLASP Activities 1.Institute Security Awareness Program 2.Perform Security Analysis of System Requirements and Design (Threat Modeling) 3.Perform Source Level Security Review 4.Identify, Implement, and Perform Security Tests 5.Verify Security Attributes of Resources 6.Research and Assess Security Posture of Technology Solutions 7.Identify Global Security Policy 8.Identify Resources and Trust Boundaries 9.Identify User Roles and Resource Capabilities 10.Specify Operational Environment 11.Detail Misuse Cases 12.Identify Attack Surface 13.Document Security Relevant Requirements 14.Apply Security Principles to Design 15.Annotate Class Designs with Security Properties 16.Implement and Elaborate Resource Policies and Security Technologies 17.Implement Interface Contracts 18.Integrate Security Analysis into Source Management Process 19.Perform Code Signing 20.Manage Security Issue Disclosure Process 21.Address Reported Security Issues 22.Monitor Security Metrics 23.Specify Database Security Configuration 24.Build Operational Security Guide
16
6 th OWASP AppSec Conference – Milan – May 2007 16 Lots of details Each Activity is well-specified Roles involved Applicability and Impacts Frequency and appx. Level-of-effort How-to steps for executing the activity Measurement criteria CLASP specifies Roles as well High-level so one person may hold >1 Role Skills requirements for filling the Role
17
6 th OWASP AppSec Conference – Milan – May 2007 17 The CLASP Roles 1.Architect 2.Designer 3.Implementer 4.Project Manager 5.Requirements Specifier 6.Security Auditor 7.Test Analyst
18
6 th OWASP AppSec Conference – Milan – May 2007 18 Summary of CLASP 2007 Think Philosophy of software security Best Practices to guide decisions Key decision points that affect logistics Plan Competencies and maturity levels Sample, goal-based roadmaps Do Activity definitions and details Role definitions and supporting information
19
6 th OWASP AppSec Conference – Milan – May 2007 19 On SDLCs
20
6 th OWASP AppSec Conference – Milan – May 2007 20 CLASP and other SDLC models There are two other secure SDLC models that you may have heard of Microsoft’s SDL (The Security Development Lifecycle. Howard, Lipner) The Security Touchpoints (Software Security. McGraw) These both map to CLASP in a fairly straightforward way, with a few exceptions
21
6 th OWASP AppSec Conference – Milan – May 2007 21 The Stages of Microsoft’s SDL 0: Education & Awareness 1: Project Inception 2: Define and Follow Design Best Practices 3: Product Risk Assessment 4: Risk Analysis 5: Creating Security Documents, Tools, and Best Practices for Customers 6: Secure Coding Policies 7: Secure Testing Policies 8: The Security Push 9: The Final Security Review 10: Security Response Planning 11: Product Release 12: Security Response Execution Source: The Security Development Lifecycle, by Michael Howard and Steve Lipner
22
6 th OWASP AppSec Conference – Milan – May 2007 22 CLASP and SDL Direct mapping is tricky since SDL isn’t specified the same way as CLASP Some Stages of SDL are activities, some are artifacts, and some are processes SDL contains lots more tactical advice from the MS trenches CLASP is specified more prescriptively, with fewer open-ended ideas Timelines or impacts for SDL stages aren’t clearly defined Makes is harder to plan for cost-effectiveness (SDL is expensive) Following the CLASP Competency roadmap for an ISV gives a roadmap that’s darn close to SDL
23
6 th OWASP AppSec Conference – Milan – May 2007 23 The Security Touchpoints Source: Software Security, by Gary McGraw
24
6 th OWASP AppSec Conference – Milan – May 2007 24 CLASP and the Touchpoints The Touchpoints map almost exactly to CLASP Several CLASP activities map to a single Touchpoint in some cases Touchpoints focus on the core of software development CLASP aims to be a bit broader across an organization (including things like policy and awareness training) Touchpoints have a prescribed adoption order CLASP varies this a bit in the Competency roadmaps according to the kind of business
25
6 th OWASP AppSec Conference – Milan – May 2007 25 The bottom line Whether it’s SDL, the Touchpoints, or CLASP, it’s all good There’s really nothing that the three fundamentally disagree on The real question is what applies to your organization best and what you’re most comfortable with CLASP 2007 will contain a more detailed analysis and mapping of each
26
6 th OWASP AppSec Conference – Milan – May 2007 26 Add’l Info
27
6 th OWASP AppSec Conference – Milan – May 2007 27 The OWASP CLASP Project Mission Reinforce application security through prescriptive guidance that enables iterative improvement to any development model. Tactical Goals 1.Getting draft of CLASP 2007 out for review 2.Updating OWASP Wiki with latest information and downloads 3.Beefing up CLASP materials with more practical advice/suggestions
28
6 th OWASP AppSec Conference – Milan – May 2007 28 Get involved We need volunteers for reviewers and contributors Start by browsing the wiki pages for CLASP The Roles and most of the Activities are the same The Competency information will be up as soon as it’s ready for review Mailing list for discussions owasp-clasp@lists.owasp.org owasp-clasp@lists.owasp.org
29
6 th OWASP AppSec Conference – Milan – May 2007 29 Pravir Chandra chandra@cigital.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.