SlideShare une entreprise Scribd logo
1  sur  29
Daniel Kefer, Information Security, 1&1 Internet AG
SECURE SOFTWARE
DEVELOPMENT LIFECYCLE
 Who Am I, Who Is 1&1
 Motivation For Secure SDLC
 What the World Does
 What 1&1 Does
 Future Plans
1&1 Internet AG2
Agenda
26.01.2015
 Who Am I, Who Is 1&1
 Motivation For Secure SDLC
 What the World Does
 What 1&1 Does
 Future Plans
1&1 Internet AG3
Agenda
26.01.2015
Who Am I
26.01.20154 1&1 Internet AG
 Daniel Kefer
 Originally from the Czech Republic
 Working in IT-Security since 2005
 Security in development since 2008
 2011 moved to Germany to work for 1&1
 Focus on application security
1&1 – Member of United Internet AG
5 1&1 Group
1&1
Telecommunication
AG
100 %
United Internet
Ventures AG
100 %
5
Goldbach 14.96 %
Hi-media 10.50 %
fun 49 %
Virtual Minds 48.65 %
ProfitBricks 30.02 %
Open-Xchange 28.36 %
ePages 25.10 %
Uberall 25 %
Rocket Internet 8.18 %
Stand: 27. März 2014
SEDO
Holding GmbH
100 %
1&1
Internet AG
100 %
100 %
26/01/15
Locations
6 1&1 Group26/01/15
Motivated team
 Around 7,800 employees, thereof approx.
2,000 in product management, development
and data centers
Sales strength
 Approx. 3 million new customer contracts
p.a.
 50,000 registrations for free services on a
daily basis
Operational excellence
 46 million accounts in 11 countries
7 data centers
 70,000 servers in Europe and USA
1&1: Internet services of United Internet AG
7 1&1 Group
Access Applications
Networks
User
equipment
Content
Standard
software
7
Stand: 19. November 2013
26/01/15
 Who Am I, Who Is 1&1
 Motivation For Secure SDLC
 What the World Does
 What 1&1 Does
 Future Plans
1&1 Internet AG8
Agenda
26.01.2015
Three Common Approaches to Develop Applications (Security View)
26.01.20159 1&1 Internet AG
 Intuitive approach
 Reactive approach
 Proactive approach
Intuitive Approach
26.01.201510 1&1 Internet AG
 Pure best-effort approach
 Relying on individual knowledge and experience of the team members
 No security gates during the development
 Typically leads to higher occurence of security incidents and negative PR
Reactive Approach
26.01.201511 1&1 Internet AG
 Typically one security gate before the application rollout
 Penetration test
 Code review
 Infrastructure configuration audit
 A big step forward from the security point of view, but…
 How effective it is to say „you‘ve done it wrong“ when the development is finished?
 Typically increases the project costs and length
 Security bugs: mistakes in the source code, „quite easy“ to fix
 Security flaws: mistakes in the application design, very expensive to fix
 The world gets more agile all the time… at what point should you test?
 You don‘t usually find everything during a security audit!
Proactive Approach (Secure SDLC)
26.01.201512 1&1 Internet AG
 You try to prevent security bugs before they‘re created
 Cost of a bug during the development lifecycle:
 Who Am I, Who Is 1&1
 Motivation For Secure SDLC
 What the World Does
 What 1&1 Does
 Future Plans
1&1 Internet AG13
Agenda
26.01.2015
What the World Does
26.01.201514 1&1 Internet AG
 Overall Concepts
 Process models: What should I do what at which point?
 Maturity models: Do I do enough for security in the development?
 Supportive Methodologies and Tooling
 How do I perform architecture review?
 Penetration testing tools
 Checklists, cheat sheets
 Development guides, testing guides
 …
Process Models - Example
26.01.201515 1&1 Internet AG
 Microsoft SDL
 Development divided into 7 phases
 Within every phase you should perform a couple of security-related
activities
2004: Microsoft SDL 1.0 Launch
26.01.201516 1&1 Internet AG
 2005 Microsoft published first results they achieved using their SDL
Methodology
Maturity Models - Example
26.01.201517 1&1 Internet AG
 Building Security Into Maturity Model (www.bsimm.com)
 Project comparing regularly companies from different verticals and
measuring their security activities in software development in 112
activities
 2013 (5th version) results – out of 67 firms:
 44 have internal secure SDLC officially published
 57 track results reached at previously defined security gates
 36 require owner‘s security sign-off before deployment
 31 enforce security gates (project not continuing until security requirements are met)
Supportive Methodologies and Tooling
26.01.201518 1&1 Internet AG
 OWASP (Open Web Application Security Project) – www.owasp.org
 The biggest resource regarding application security nowadays
 Everything is open-source
 Everybody can start his/her own security project
 Examples:
 OWASP Top Ten: The most widespread application vulnerabilities
 OWASP Testing Guide: Methodology for penetration testing of applications
 OWASP ASVS: Application Security Verification Standard
 OWASP ESAPI: Security Library for JAVA, .NET, PHP…
 OWASP Zed Attack Proxy: Testing tool
 Who Am I, Who Is 1&1
 Motivation For Secure SDLC
 What the World Does
 What 1&1 Does
 Future Plans
1&1 Internet AG19
Agenda
26.01.2015
Main Goals
26.01.201520 1&1 Internet AG
 We spend budget for security according to the real risk
 Project teams shall have a trusted contact person guiding them through
security challenges
 We actively learn from our mistakes steadily and also give the
opportunity to others to learn from our mistakes
 KISS (Keep it simple stupid)! – build on currently lived processes and
tools as much as possible
System Classification – 3 Security Levels
26.01.201521 1&1 Internet AG
 Low:
 Systems not likely to be target of professional attackers
 Mainly reputation risk in case of finding vulnerabilities
 Requirements should target mainly quality of code and be aimed at quick wins
 Medium:
 Possible abuse of client personal data (incidents have to be reported to authorities)
 We should have a solid confidence that security has been addressed and assessed
consistently and reasonably
 High:
 Systems essential for 1&1’s business and the ones with high compliance requirements
 These systems should be ready to withstand also sophisticated attacks
 Most focus on architectural and functional security
SDLC Requirements
 Two types of requirements:
 Lifecycle: Activities to be done during the lifecycle (e.g. penetration test)
 Technical: Properties of the target system (e.g. login brute-force protection)
 The concept:
 Ever higher category inherits requirements from the lower one and adds new ones
 Total counts of requirements:
Lifecycle req. Technical req.
Low 6 42
Medium 12 72
High 16 84
Lifecycle Requirements (vs. The 1&1 Project Lifecycle)
Low
Medium
High
The 1&1
Project
Lifecycle
Secure
SDLC
Classification
Security
guide
Security
trainings
Select
requirements
Automated
scan
Yellow Pages
Record
Security
workshop
Doc. review
3rd party
code
Penetration
test
Vulnerability
management
Lessons
learned
Threat model
Tailor
requirements
Code review
Configuration
review
Technical Requirements - Categories
26.01.201524 1&1 Internet AG
 Based on OWASP Application Security Verification Standard
Authentication
Session
Management
Access Control
Input Validation
Output
Encoding
Cryptography
Error Handling
and Logging
Data Protection
Communication
Security
Technical Requirements – Example (Brute-Force Protection)
ID AU-07
Criticality Low
Category Authentication
Technology Web Applications, Web Services
Description Brute force protection is provided after a system configurable number of invalid
login attempts occur against an account within a configurable period of time.
Specification
/Best Practise
More information on best practise:
https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks
Reasoning Preventing successful brute force attacks on user credentials.
Functional Yes
Responsible Requirement Engineer
Deadline T2 (end of the design phase)
QA Responsible Test Manager
QA Activity Black box
QA Scenario https://www.owasp.org/index.php/Testing_for_Brute_Force_(OWASP-AT-004)
QA Deadline T3 (before rollout)
Requirement States
26.01.201526 1&1 Internet AG
 Relevant:
 Yes/No
 Does it make sense to implement the particular requirement?
 In Scope:
 Yes: The development team has to (or mustn‘t) do something
 3rd party: The application relies on another service (e.g. authentication service)
 Refused: It was decided not to implement the requirement
 No: If not relevant.
 Who Am I, Who Is 1&1
 Motivation For Secure SDLC
 What the World Does
 What 1&1 Does
 Future Plans
1&1 Internet AG27
Agenda
26.01.2015
Future Plans
26.01.201528 1&1 Internet AG
 Continue increasing the coverage of SDLC-guided projects
 Train and establish a satellite of Security Guides
 Continuous enhancement of the methodology
 Agile methodologies, continuous integration/continuous delivery
 Lessons learned from projects
 Creation of an SDLC Tool
 Department-specific project management methodologies
 Different technologies
 Transparency of common security measures
Thank You For Your Attention!
26.01.201529 1&1 Internet AG
daniel.kefer@1und1.de

Contenu connexe

Tendances

Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsYulian Slobodyan
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling EverythingAnne Oikarinen
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?Jonathan Sinclair
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat ModelingDanny Wong
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)MetroStar
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat huntingVikas Jain
 

Tendances (20)

Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Threat Modeling Using STRIDE
Threat Modeling Using STRIDEThreat Modeling Using STRIDE
Threat Modeling Using STRIDE
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Ssdf nist
Ssdf nistSsdf nist
Ssdf nist
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
 

En vedette (6)

IPsec
IPsecIPsec
IPsec
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Ipsec
IpsecIpsec
Ipsec
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Ipsec
IpsecIpsec
Ipsec
 
IP Security
IP SecurityIP Security
IP Security
 

Similaire à Secure Software Development Lifecycle

Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Sigma Software
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Integrating of security activates in agile process
Integrating of security activates in agile processIntegrating of security activates in agile process
Integrating of security activates in agile processZubair Rahim
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfNathanDjami
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testingCu Nguyen
 
Navigating agile automotive software development
Navigating agile automotive software development Navigating agile automotive software development
Navigating agile automotive software development Rogue Wave Software
 
Applicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit ProgramApplicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit ProgramMichael Davis
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalrkadayam
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
Null application security in an agile world
Null application security in an agile worldNull application security in an agile world
Null application security in an agile worldStefan Streichsbier
 
Comparitive Analysis of Secure SDLC Models
Comparitive Analysis of Secure SDLC ModelsComparitive Analysis of Secure SDLC Models
Comparitive Analysis of Secure SDLC ModelsIRJET Journal
 

Similaire à Secure Software Development Lifecycle (20)

Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Integrating of security activates in agile process
Integrating of security activates in agile processIntegrating of security activates in agile process
Integrating of security activates in agile process
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
 
Se project-methodology-for-security-project-web
Se project-methodology-for-security-project-webSe project-methodology-for-security-project-web
Se project-methodology-for-security-project-web
 
Navigating agile automotive software development
Navigating agile automotive software development Navigating agile automotive software development
Navigating agile automotive software development
 
Applicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit ProgramApplicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit Program
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Null application security in an agile world
Null application security in an agile worldNull application security in an agile world
Null application security in an agile world
 
Comparitive Analysis of Secure SDLC Models
Comparitive Analysis of Secure SDLC ModelsComparitive Analysis of Secure SDLC Models
Comparitive Analysis of Secure SDLC Models
 

Plus de 1&1

1&1 KMU Studie
1&1 KMU Studie 1&1 KMU Studie
1&1 KMU Studie 1&1
 
Inhalte strukturieren für bessere User Experience und Maschinenlesbarkeit
Inhalte strukturieren für bessere User Experience und MaschinenlesbarkeitInhalte strukturieren für bessere User Experience und Maschinenlesbarkeit
Inhalte strukturieren für bessere User Experience und Maschinenlesbarkeit1&1
 
Erfahrungen aus einem Jahr Content Marketing
Erfahrungen aus einem Jahr Content MarketingErfahrungen aus einem Jahr Content Marketing
Erfahrungen aus einem Jahr Content Marketing1&1
 
Mehr Sichtbarkeit durch Google News und AMP
Mehr Sichtbarkeit durch Google News und AMPMehr Sichtbarkeit durch Google News und AMP
Mehr Sichtbarkeit durch Google News und AMP1&1
 
SEO & Content Marketing entlang der Customer Journey
SEO & Content Marketing entlang der Customer JourneySEO & Content Marketing entlang der Customer Journey
SEO & Content Marketing entlang der Customer Journey1&1
 
SEO Content: Eine Zeitreise
SEO Content: Eine ZeitreiseSEO Content: Eine Zeitreise
SEO Content: Eine Zeitreise1&1
 
Social Media bei 1&1
Social Media bei 1&1Social Media bei 1&1
Social Media bei 1&11&1
 
Camunda@1&1
Camunda@1&1Camunda@1&1
Camunda@1&11&1
 
Design Types
Design TypesDesign Types
Design Types1&1
 
HostingCon Europe: Grow your hosting business by better serving small businesses
HostingCon Europe: Grow your hosting business by better serving small businessesHostingCon Europe: Grow your hosting business by better serving small businesses
HostingCon Europe: Grow your hosting business by better serving small businesses1&1
 
Prinzipiensprachen
PrinzipiensprachenPrinzipiensprachen
Prinzipiensprachen1&1
 
1&1 New Hosting Products
1&1 New Hosting Products1&1 New Hosting Products
1&1 New Hosting Products1&1
 
1&1 Hosting Europe Media Event: Server Update
1&1 Hosting Europe Media Event: Server Update1&1 Hosting Europe Media Event: Server Update
1&1 Hosting Europe Media Event: Server Update1&1
 
1&1 Hosting Europe Media Event: New Top Level Domains
1&1 Hosting Europe Media Event: New Top Level Domains1&1 Hosting Europe Media Event: New Top Level Domains
1&1 Hosting Europe Media Event: New Top Level Domains1&1
 
DIY Web Builder: Apps and Social Media
DIY Web Builder: Apps and Social MediaDIY Web Builder: Apps and Social Media
DIY Web Builder: Apps and Social Media1&1
 
Passwort-Sicherheit - WEB.DE Studie 2012 (Convios Consulting GmbH)
Passwort-Sicherheit - WEB.DE Studie 2012 (Convios Consulting GmbH)Passwort-Sicherheit - WEB.DE Studie 2012 (Convios Consulting GmbH)
Passwort-Sicherheit - WEB.DE Studie 2012 (Convios Consulting GmbH)1&1
 
Kundenzufriedenheitsoffensive bei 1&1 - mehr als eine Kampagne
Kundenzufriedenheitsoffensive bei 1&1 - mehr als eine KampagneKundenzufriedenheitsoffensive bei 1&1 - mehr als eine Kampagne
Kundenzufriedenheitsoffensive bei 1&1 - mehr als eine Kampagne1&1
 
Website-Studie 2012
Website-Studie 2012Website-Studie 2012
Website-Studie 20121&1
 
Die neuen Features der 1&1 Do-It-Yourself Homepage im Überblick
Die neuen Features der 1&1 Do-It-Yourself Homepage im ÜberblickDie neuen Features der 1&1 Do-It-Yourself Homepage im Überblick
Die neuen Features der 1&1 Do-It-Yourself Homepage im Überblick1&1
 
IPv6 at 1&1
IPv6 at 1&1 IPv6 at 1&1
IPv6 at 1&1 1&1
 

Plus de 1&1 (20)

1&1 KMU Studie
1&1 KMU Studie 1&1 KMU Studie
1&1 KMU Studie
 
Inhalte strukturieren für bessere User Experience und Maschinenlesbarkeit
Inhalte strukturieren für bessere User Experience und MaschinenlesbarkeitInhalte strukturieren für bessere User Experience und Maschinenlesbarkeit
Inhalte strukturieren für bessere User Experience und Maschinenlesbarkeit
 
Erfahrungen aus einem Jahr Content Marketing
Erfahrungen aus einem Jahr Content MarketingErfahrungen aus einem Jahr Content Marketing
Erfahrungen aus einem Jahr Content Marketing
 
Mehr Sichtbarkeit durch Google News und AMP
Mehr Sichtbarkeit durch Google News und AMPMehr Sichtbarkeit durch Google News und AMP
Mehr Sichtbarkeit durch Google News und AMP
 
SEO & Content Marketing entlang der Customer Journey
SEO & Content Marketing entlang der Customer JourneySEO & Content Marketing entlang der Customer Journey
SEO & Content Marketing entlang der Customer Journey
 
SEO Content: Eine Zeitreise
SEO Content: Eine ZeitreiseSEO Content: Eine Zeitreise
SEO Content: Eine Zeitreise
 
Social Media bei 1&1
Social Media bei 1&1Social Media bei 1&1
Social Media bei 1&1
 
Camunda@1&1
Camunda@1&1Camunda@1&1
Camunda@1&1
 
Design Types
Design TypesDesign Types
Design Types
 
HostingCon Europe: Grow your hosting business by better serving small businesses
HostingCon Europe: Grow your hosting business by better serving small businessesHostingCon Europe: Grow your hosting business by better serving small businesses
HostingCon Europe: Grow your hosting business by better serving small businesses
 
Prinzipiensprachen
PrinzipiensprachenPrinzipiensprachen
Prinzipiensprachen
 
1&1 New Hosting Products
1&1 New Hosting Products1&1 New Hosting Products
1&1 New Hosting Products
 
1&1 Hosting Europe Media Event: Server Update
1&1 Hosting Europe Media Event: Server Update1&1 Hosting Europe Media Event: Server Update
1&1 Hosting Europe Media Event: Server Update
 
1&1 Hosting Europe Media Event: New Top Level Domains
1&1 Hosting Europe Media Event: New Top Level Domains1&1 Hosting Europe Media Event: New Top Level Domains
1&1 Hosting Europe Media Event: New Top Level Domains
 
DIY Web Builder: Apps and Social Media
DIY Web Builder: Apps and Social MediaDIY Web Builder: Apps and Social Media
DIY Web Builder: Apps and Social Media
 
Passwort-Sicherheit - WEB.DE Studie 2012 (Convios Consulting GmbH)
Passwort-Sicherheit - WEB.DE Studie 2012 (Convios Consulting GmbH)Passwort-Sicherheit - WEB.DE Studie 2012 (Convios Consulting GmbH)
Passwort-Sicherheit - WEB.DE Studie 2012 (Convios Consulting GmbH)
 
Kundenzufriedenheitsoffensive bei 1&1 - mehr als eine Kampagne
Kundenzufriedenheitsoffensive bei 1&1 - mehr als eine KampagneKundenzufriedenheitsoffensive bei 1&1 - mehr als eine Kampagne
Kundenzufriedenheitsoffensive bei 1&1 - mehr als eine Kampagne
 
Website-Studie 2012
Website-Studie 2012Website-Studie 2012
Website-Studie 2012
 
Die neuen Features der 1&1 Do-It-Yourself Homepage im Überblick
Die neuen Features der 1&1 Do-It-Yourself Homepage im ÜberblickDie neuen Features der 1&1 Do-It-Yourself Homepage im Überblick
Die neuen Features der 1&1 Do-It-Yourself Homepage im Überblick
 
IPv6 at 1&1
IPv6 at 1&1 IPv6 at 1&1
IPv6 at 1&1
 

Dernier

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 

Dernier (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 

Secure Software Development Lifecycle

  • 1. Daniel Kefer, Information Security, 1&1 Internet AG SECURE SOFTWARE DEVELOPMENT LIFECYCLE
  • 2.  Who Am I, Who Is 1&1  Motivation For Secure SDLC  What the World Does  What 1&1 Does  Future Plans 1&1 Internet AG2 Agenda 26.01.2015
  • 3.  Who Am I, Who Is 1&1  Motivation For Secure SDLC  What the World Does  What 1&1 Does  Future Plans 1&1 Internet AG3 Agenda 26.01.2015
  • 4. Who Am I 26.01.20154 1&1 Internet AG  Daniel Kefer  Originally from the Czech Republic  Working in IT-Security since 2005  Security in development since 2008  2011 moved to Germany to work for 1&1  Focus on application security
  • 5. 1&1 – Member of United Internet AG 5 1&1 Group 1&1 Telecommunication AG 100 % United Internet Ventures AG 100 % 5 Goldbach 14.96 % Hi-media 10.50 % fun 49 % Virtual Minds 48.65 % ProfitBricks 30.02 % Open-Xchange 28.36 % ePages 25.10 % Uberall 25 % Rocket Internet 8.18 % Stand: 27. März 2014 SEDO Holding GmbH 100 % 1&1 Internet AG 100 % 100 % 26/01/15
  • 7. Motivated team  Around 7,800 employees, thereof approx. 2,000 in product management, development and data centers Sales strength  Approx. 3 million new customer contracts p.a.  50,000 registrations for free services on a daily basis Operational excellence  46 million accounts in 11 countries 7 data centers  70,000 servers in Europe and USA 1&1: Internet services of United Internet AG 7 1&1 Group Access Applications Networks User equipment Content Standard software 7 Stand: 19. November 2013 26/01/15
  • 8.  Who Am I, Who Is 1&1  Motivation For Secure SDLC  What the World Does  What 1&1 Does  Future Plans 1&1 Internet AG8 Agenda 26.01.2015
  • 9. Three Common Approaches to Develop Applications (Security View) 26.01.20159 1&1 Internet AG  Intuitive approach  Reactive approach  Proactive approach
  • 10. Intuitive Approach 26.01.201510 1&1 Internet AG  Pure best-effort approach  Relying on individual knowledge and experience of the team members  No security gates during the development  Typically leads to higher occurence of security incidents and negative PR
  • 11. Reactive Approach 26.01.201511 1&1 Internet AG  Typically one security gate before the application rollout  Penetration test  Code review  Infrastructure configuration audit  A big step forward from the security point of view, but…  How effective it is to say „you‘ve done it wrong“ when the development is finished?  Typically increases the project costs and length  Security bugs: mistakes in the source code, „quite easy“ to fix  Security flaws: mistakes in the application design, very expensive to fix  The world gets more agile all the time… at what point should you test?  You don‘t usually find everything during a security audit!
  • 12. Proactive Approach (Secure SDLC) 26.01.201512 1&1 Internet AG  You try to prevent security bugs before they‘re created  Cost of a bug during the development lifecycle:
  • 13.  Who Am I, Who Is 1&1  Motivation For Secure SDLC  What the World Does  What 1&1 Does  Future Plans 1&1 Internet AG13 Agenda 26.01.2015
  • 14. What the World Does 26.01.201514 1&1 Internet AG  Overall Concepts  Process models: What should I do what at which point?  Maturity models: Do I do enough for security in the development?  Supportive Methodologies and Tooling  How do I perform architecture review?  Penetration testing tools  Checklists, cheat sheets  Development guides, testing guides  …
  • 15. Process Models - Example 26.01.201515 1&1 Internet AG  Microsoft SDL  Development divided into 7 phases  Within every phase you should perform a couple of security-related activities
  • 16. 2004: Microsoft SDL 1.0 Launch 26.01.201516 1&1 Internet AG  2005 Microsoft published first results they achieved using their SDL Methodology
  • 17. Maturity Models - Example 26.01.201517 1&1 Internet AG  Building Security Into Maturity Model (www.bsimm.com)  Project comparing regularly companies from different verticals and measuring their security activities in software development in 112 activities  2013 (5th version) results – out of 67 firms:  44 have internal secure SDLC officially published  57 track results reached at previously defined security gates  36 require owner‘s security sign-off before deployment  31 enforce security gates (project not continuing until security requirements are met)
  • 18. Supportive Methodologies and Tooling 26.01.201518 1&1 Internet AG  OWASP (Open Web Application Security Project) – www.owasp.org  The biggest resource regarding application security nowadays  Everything is open-source  Everybody can start his/her own security project  Examples:  OWASP Top Ten: The most widespread application vulnerabilities  OWASP Testing Guide: Methodology for penetration testing of applications  OWASP ASVS: Application Security Verification Standard  OWASP ESAPI: Security Library for JAVA, .NET, PHP…  OWASP Zed Attack Proxy: Testing tool
  • 19.  Who Am I, Who Is 1&1  Motivation For Secure SDLC  What the World Does  What 1&1 Does  Future Plans 1&1 Internet AG19 Agenda 26.01.2015
  • 20. Main Goals 26.01.201520 1&1 Internet AG  We spend budget for security according to the real risk  Project teams shall have a trusted contact person guiding them through security challenges  We actively learn from our mistakes steadily and also give the opportunity to others to learn from our mistakes  KISS (Keep it simple stupid)! – build on currently lived processes and tools as much as possible
  • 21. System Classification – 3 Security Levels 26.01.201521 1&1 Internet AG  Low:  Systems not likely to be target of professional attackers  Mainly reputation risk in case of finding vulnerabilities  Requirements should target mainly quality of code and be aimed at quick wins  Medium:  Possible abuse of client personal data (incidents have to be reported to authorities)  We should have a solid confidence that security has been addressed and assessed consistently and reasonably  High:  Systems essential for 1&1’s business and the ones with high compliance requirements  These systems should be ready to withstand also sophisticated attacks  Most focus on architectural and functional security
  • 22. SDLC Requirements  Two types of requirements:  Lifecycle: Activities to be done during the lifecycle (e.g. penetration test)  Technical: Properties of the target system (e.g. login brute-force protection)  The concept:  Ever higher category inherits requirements from the lower one and adds new ones  Total counts of requirements: Lifecycle req. Technical req. Low 6 42 Medium 12 72 High 16 84
  • 23. Lifecycle Requirements (vs. The 1&1 Project Lifecycle) Low Medium High The 1&1 Project Lifecycle Secure SDLC Classification Security guide Security trainings Select requirements Automated scan Yellow Pages Record Security workshop Doc. review 3rd party code Penetration test Vulnerability management Lessons learned Threat model Tailor requirements Code review Configuration review
  • 24. Technical Requirements - Categories 26.01.201524 1&1 Internet AG  Based on OWASP Application Security Verification Standard Authentication Session Management Access Control Input Validation Output Encoding Cryptography Error Handling and Logging Data Protection Communication Security
  • 25. Technical Requirements – Example (Brute-Force Protection) ID AU-07 Criticality Low Category Authentication Technology Web Applications, Web Services Description Brute force protection is provided after a system configurable number of invalid login attempts occur against an account within a configurable period of time. Specification /Best Practise More information on best practise: https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks Reasoning Preventing successful brute force attacks on user credentials. Functional Yes Responsible Requirement Engineer Deadline T2 (end of the design phase) QA Responsible Test Manager QA Activity Black box QA Scenario https://www.owasp.org/index.php/Testing_for_Brute_Force_(OWASP-AT-004) QA Deadline T3 (before rollout)
  • 26. Requirement States 26.01.201526 1&1 Internet AG  Relevant:  Yes/No  Does it make sense to implement the particular requirement?  In Scope:  Yes: The development team has to (or mustn‘t) do something  3rd party: The application relies on another service (e.g. authentication service)  Refused: It was decided not to implement the requirement  No: If not relevant.
  • 27.  Who Am I, Who Is 1&1  Motivation For Secure SDLC  What the World Does  What 1&1 Does  Future Plans 1&1 Internet AG27 Agenda 26.01.2015
  • 28. Future Plans 26.01.201528 1&1 Internet AG  Continue increasing the coverage of SDLC-guided projects  Train and establish a satellite of Security Guides  Continuous enhancement of the methodology  Agile methodologies, continuous integration/continuous delivery  Lessons learned from projects  Creation of an SDLC Tool  Department-specific project management methodologies  Different technologies  Transparency of common security measures
  • 29. Thank You For Your Attention! 26.01.201529 1&1 Internet AG daniel.kefer@1und1.de

Notes de l'éditeur

  1. Number of employees UI: 6,700