SlideShare a Scribd company logo
1 of 16
Download to read offline
Auteur: David Tillemans
20/03/11




About Smals vzw-asbl


One of Belgium's largest ICT-organisations:
   1660 people
"ICT for Society"
   Work: ex. Dimona-DmfA
      Salary & labour prestations
   Health: ex. eHealth-platform
      Secure exchange of medical data in Belgium
   Family life: ex. VESTA
      Home care for elderly (financial / operational support)
High priority for ICT Security & Privacy


                                                                    2
20/03/11




Web Project Life Cycle


•   An idea?
•   Analysis of functional requirements
•   Design of the architecture
•   Implementation
     Writing of the source code
        Java
        C#
        ...
     Using a framework


                                                     3
20/03/11




Web Project Life Cycle


•   Functional testing
•   Deployment in production
•   ... (2 years go by)
•   Hacker comes by
     Breaks the application
          gives advise
          publishes on the internet
          steals information
          steals money


                                                  4
20/03/11




What about security ...


• Idea?
    has no security requirements ... (if it is not a security
     solution)
• Analysis of functional requirements
    Non-functional
    Architecture solves this ...
• Design of the architecture
    Non-functional requirements
    Network infrastruture solves this ...
• Developer
    Is not written in design & analysis
    No security guidelines
                                                                       5
20/03/11




What about security ...


• Functional testing
   Tests are performed in the boundaries
   No security is considered in tests
• Deployment to Production
   No security considered in deployment
   Network operations solves this ...




                                                       6
20/03/11




What about security ...


• Hacker comes by
    Analyses the security of the web application in
     relation to the business requirements
    Reviews the architecture
    Verifies the security in the development
    Checks the security of the deployment
• Hacks the application
    Financial gain
    Awards
    Political reasons
    Exploit of resources
                                                                  7
20/03/11




Network solves security ?
Firewalls …




 • Firewalls are always configured to allow web
   traffic -> HTTP(S)
 • Attacker appears to the web application as a
   normal user


                                                     8
20/03/11



Network solves security ?
SSL secures the application…




 • Server-side SSL only guarantees
   confidentiality on transport level
 • Attacker also uses the SSL tunnel



                                                   9
20/03/11




      Secure Software Development LifeCycle


Security                     Design                    Static      Penetration
requirements                 Review                    analysis        testing
                                                       (tools)
                  Risk                Risk-based
                  analysis            security tests




                                                          Code
  Requirements        Design          Test plans                  Test               Field
  and use cases                                                   results        feedback
                                            Code
                                            Review

                                                                                             10
20/03/11




Application Risk Analysis

                    Requirement and Architecture documentation

 Goal of the               External          In- & Output
                                                                 Assets
  Service                  Factors             Channels


                                 Threat Analysis

 Identification           Data Flow          Identification       Threat
  Trust levels            Analysis           of the threats      analysis


               Risk Analysis
                                                     Risk
    Risk                Identification              analysis
   Ranking              of Mitigations             document


                                                                                   11
20/03/11




How To

• Security awareness and training program
    Analysts
       Security requirements -> Functional requirements
       Use cases vs misUse cases
    Architects & Developers
       Data Flow Diagram analysis
       Attack trees
       STRIDE methodology
• Development guidelines publication
• Code Review
    Automatic through tools
    Manual by penetration testers
                                                             12
20/03/11




How To


• Security Testing
   Automatic through tools
   Manual by penetration testers
• Secure configuration
• Technology
   Web application firewall
• Human Resources
   Internal penetration testers (team)
   Perform reviews & controls
• Need of management support !

                                                 13
20/03/11




Security Integration Processes


• Clearly defined processes according to risks
• 2 processes for the security analyses
    Express (BPMN)
                                                                                                                                                                                                                                                                 Application-Security-Express-v0.2.igx

                                                                                                                                                                                Inception                                                                                                                Elaboration                                                                                                      Construction                                                     Transition                 Production



                                                                                                                                                                                                                                          Revue                                                                                                Revue de securité sur                                                                          Revue de securité sur
                                                                                                                                    Revue                                                                                                                                                                                                                                           Configuration testes
                                                                           Revue optionelle                                                                                                                                             securité sur                                                                                            les reports d'analyse                                                                          les reports de test
                                                                                                                              sécurité architecture                                                                                                       feedback report                                                                                                               de sécurité
                              Security                                        sécurité                                                                                                                                                 architecture,                                                                                               statique de code                                                                          pénétration automatique
                                                                                                                               Requirements V1             feedback report                                                                                                                                                                                                                 1 jour
                              Analist                                     Requirements V1                                                                                                                                               req. V2 et                                                                                                      1/2 jour                                                                                     1/2 jour
                                                                                                                                 Risc analysis
                                                                              0,5 jour                                                                                                                                                    Risque
                                                                                                                                    1,5 jour
                                                                                                                                                                                                                                         1,5 jour

                                                                                                                                                                                                                                                                                                                                                                                                                                                                          Report de
                                                                                                                                                                                                                                                                                                                                                                                                                                                                           sécurité




                                                                                                                                                             Verwerking
                             CSM / CPL                                                                                                                        feedback                                                                                                                                       Yes
                                                                                                                                                                                                                                                             Verwerking
                                                                                                                                                                                                                                                                                            Accepted
                                                                                                                                                                                                                                                              feedback


                                                                                                                                                                                                                                                                                                  No



                                                                                                                                                                                              Requirements V2 doc
                              Analyste                             Requirements V1 doc
                                                     RiSC V1                                                                                                                                                    RiSC V2
                               TO&P




                                                Start




                                                                                                  SADV1        RiSC V1                                                                                                                                                                                                              Reports automatiques
                                                                                                                                                                                                                                                                                                                                 d'analyse statiques de code
                                                                                                                                                                                                                   RiSC V2     SADV2

                             Architecte                                                        Création du                                                                                                           Création du
                              TO&P                                                            SADV1 - critèr                                                                                                        SADV2 - critèr
                                                                                                 es non                                                                                                                 es non
                                                                                                                                                                                                                      fonctionnels                                                                                                                                                                                              Reports automatiques
                                                                                               fonctionnels
                                                                                                                                                                                                                                                                                                                                                                                                                               des testes de pénétration




                                                                                                                                                                                                                                                                                                                                    Developer la
                                                                                                                                                                                                                                                                                                                                      solution




                             Developer                                                                                                                                                         Définir les
                                                                     Définir les                                                                                                                                                                                                                                                                                                                                               Test de
                                                                                                                                                                                             Requirements /
                                                                   Requirements /                                                                                                                                                                                                                                                                                                                                             penetration
                                                                                                                                                                                              critères non-
                                                                    critères non-                                                                                                                                                                                                                                                                                                                                             automatique
                                                                                                                                                                                              fonctionnels
                                                                    fonctionnels                                                                                                                                                                                                                                                                                                                                              (2 à 3 jour)




                                SIC




                              iDeploy                                                                                                                                                                                                                                                                                                                                                                                                                                                 Deployment




                               Client




    Extended (BPMN)                      Security
                                          Analist
                                                                                    Revue optionelle
                                                                                        sécurité
                                                                                    Requirements V1
                                                                                        0,5 jour
                                                                                                                                          Revue
                                                                                                                                   sécurité architecture
                                                                                                                                    Requirements V1
                                                                                                                                      Risc analysis
                                                                                                                                          1,5 jour
                                                                                                                                                              feedback report
                                                                                                                                                                                 Inception



                                                                                                                                                                                                                                        Revue
                                                                                                                                                                                                                                     securité sur
                                                                                                                                                                                                                                     architecture,
                                                                                                                                                                                                                                      req. V2 et
                                                                                                                                                                                                                                        Risque
                                                                                                                                                                                                                                       1,5 jour
                                                                                                                                                                                                                                                       feedback report
                                                                                                                                                                                                                                                                            Application-Security-Extended-v0.1.igx
                                                                                                                                                                                                                                                                                                  Elaboration



                                                                                                                                                                                                                                                                                                                                    Revue de securité sur
                                                                                                                                                                                                                                                                                                                                     les reports d'analyse
                                                                                                                                                                                                                                                                                                                                        statique de code
                                                                                                                                                                                                                                                                                                                                             1/2 jour
                                                                                                                                                                                                                                                                                                                                                                        Configuration testes
                                                                                                                                                                                                                                                                                                                                                                           de sécurité
                                                                                                                                                                                                                                                                                                                                                                               1 jour
                                                                                                                                                                                                                                                                                                                                                                                                           Construction



                                                                                                                                                                                                                                                                                                                                                                                                                            Revue de securité sur
                                                                                                                                                                                                                                                                                                                                                                                                                             les reports de test
                                                                                                                                                                                                                                                                                                                                                                                                                           pénétration automatique
                                                                                                                                                                                                                                                                                                                                                                                                                                   1/2 jour
                                                                                                                                                                                                                                                                                                                                                                                                                                                                         Revue manuel sur le project
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 >5 jour
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         Transition                Production




                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        Report de
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         sécurité


                                                                                                                                                                Verwerking
                                         CSM / CPL                                                                                                               feedback                                                                                                                              Yes
                                                                                                                                                                                                                                                         Verwerking
                                                                                                                                                                                                                                                                                      Accepted
                                                                                                                                                                                                                                                          feedback


                                                                                                                                                                                                                                                                                            No



                                                                                                                                                                                              Requirements V2 doc
                                                                          Requirements V1 doc
                                          Analyste             RiSC V1                                                                                                                                          RiSC V2
                                          TO&P




                                                           Start




                                                                                                           SADV1    RiSC V1                                                                                                                                                                                               Reports automatiques
                                                                                                                                                                                                                                                                                                                       d'analyse statiques de code
                                                                                                                                                                                                                  RiSC V2 SADV2

                                          Architecte                                                    Création du                                                                                                 Création du
                                           TO&P                                                        SADV1 - critèr                                                                                              SADV2 - critèr
                                                                                                          es non                                                                                                      es non
                                                                                                                                                                                                                                                                                                                                                                                                                Reports automatiques
                                                                                                        fonctionnels                                                                                                fonctionnels
                                                                                                                                                                                                                                                                                                                                                                                                               des testes de pénétration




                                                                                                                                                                                                                                                                                                                           Developer la
                                                                                                                                                                                                                                                                                                                             solution




                                          Developer                                                                                                                                            Définir les
                                                                              Définir les                                                                                                                                                                                                                                                                                                                        Test de
                                                                                                                                                                                             Requirements /
                                                                           Requirements /                                                                                                                                                                                                                                                                                                                      penetration
                                                                                                                                                                                              critères non-
                                                                            critères non-                                                                                                                                                                                                                                                                                                                      automatique
                                                                                                                                                                                              fonctionnels
                                                                            fonctionnels                                                                                                                                                                                                                                                                                                                       (2 à 3 jour)




                                             SIC




                                           iDeploy                                                                                                                                                                                                                                                                                                                                                                                                                     Deployment




                                            Client




                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       14
20/03/11




Resources …


• OWASP
   Open Web Application Security Program
• Books:
   Software Security
   Microsoft Secure Development Lifecycle
   Enterprise Security Architecture




                                                    15
20/03/11




Questions ?




              Thanks you!



              www.smals.be




                                    16

More Related Content

What's hot

Choose'10: Uwe Zdun - Compliance in service-oriented architectures: A model-d...
Choose'10: Uwe Zdun - Compliance in service-oriented architectures: A model-d...Choose'10: Uwe Zdun - Compliance in service-oriented architectures: A model-d...
Choose'10: Uwe Zdun - Compliance in service-oriented architectures: A model-d...CHOOSE
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecturebdemchak
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security InitiativesMarco Morana
 
OWASP Québec: Threat Modeling Toolkit - Jonathan Marcil
OWASP Québec: Threat Modeling Toolkit - Jonathan MarcilOWASP Québec: Threat Modeling Toolkit - Jonathan Marcil
OWASP Québec: Threat Modeling Toolkit - Jonathan MarcilJonathan Marcil
 
Isaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfIsaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfMarco Morana
 
TESEM: A Tool for Verifying Security Design Pattern Applications
TESEM: A Tool for Verifying Security Design Pattern ApplicationsTESEM: A Tool for Verifying Security Design Pattern Applications
TESEM: A Tool for Verifying Security Design Pattern ApplicationsHironori Washizaki
 
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte
 
IIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended UseIIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended UseKaspersky
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software securityMarco Morana
 
Core security utcpresentation962012
Core security utcpresentation962012Core security utcpresentation962012
Core security utcpresentation962012Seema Sheth-Voss
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4FRSecure
 
ISACA T&T Training Week Course Outline
ISACA T&T Training Week Course OutlineISACA T&T Training Week Course Outline
ISACA T&T Training Week Course Outlinetntsa1972
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapDATA SECURITY SOLUTIONS
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 
Rapid Threat Modeling Techniques
Rapid Threat Modeling TechniquesRapid Threat Modeling Techniques
Rapid Threat Modeling TechniquesPriyanka Aash
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat ModelingDanny Wong
 

What's hot (19)

Choose'10: Uwe Zdun - Compliance in service-oriented architectures: A model-d...
Choose'10: Uwe Zdun - Compliance in service-oriented architectures: A model-d...Choose'10: Uwe Zdun - Compliance in service-oriented architectures: A model-d...
Choose'10: Uwe Zdun - Compliance in service-oriented architectures: A model-d...
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
 
OWASP Québec: Threat Modeling Toolkit - Jonathan Marcil
OWASP Québec: Threat Modeling Toolkit - Jonathan MarcilOWASP Québec: Threat Modeling Toolkit - Jonathan Marcil
OWASP Québec: Threat Modeling Toolkit - Jonathan Marcil
 
Isaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfIsaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdf
 
TESEM: A Tool for Verifying Security Design Pattern Applications
TESEM: A Tool for Verifying Security Design Pattern ApplicationsTESEM: A Tool for Verifying Security Design Pattern Applications
TESEM: A Tool for Verifying Security Design Pattern Applications
 
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
 
IIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended UseIIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended Use
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software security
 
Core security utcpresentation962012
Core security utcpresentation962012Core security utcpresentation962012
Core security utcpresentation962012
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
ISACA T&T Training Week Course Outline
ISACA T&T Training Week Course OutlineISACA T&T Training Week Course Outline
ISACA T&T Training Week Course Outline
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Rapid Threat Modeling Techniques
Rapid Threat Modeling TechniquesRapid Threat Modeling Techniques
Rapid Threat Modeling Techniques
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
 

Viewers also liked

Infosessie Smals Research - Application platform as a Service - 12/2013
Infosessie Smals Research - Application platform as a Service - 12/2013Infosessie Smals Research - Application platform as a Service - 12/2013
Infosessie Smals Research - Application platform as a Service - 12/2013Smals
 
Jef Verelst - Smals Open to a shift - Infosecurity.be
Jef Verelst  -  Smals Open to a shift - Infosecurity.beJef Verelst  -  Smals Open to a shift - Infosecurity.be
Jef Verelst - Smals Open to a shift - Infosecurity.beSmals
 
20130620 Streamlining Analytics extern
20130620 Streamlining Analytics extern20130620 Streamlining Analytics extern
20130620 Streamlining Analytics externSmals
 
Infosession BYOD 12-2012 v3 - public
Infosession BYOD 12-2012 v3 - publicInfosession BYOD 12-2012 v3 - public
Infosession BYOD 12-2012 v3 - publicSmals
 
Presentation Café Numérique par Grégory Ogonowski (Smals)
Presentation Café Numérique par Grégory Ogonowski (Smals)Presentation Café Numérique par Grégory Ogonowski (Smals)
Presentation Café Numérique par Grégory Ogonowski (Smals)Smals
 
20141023 social media & e government infosession
20141023 social media & e government   infosession20141023 social media & e government   infosession
20141023 social media & e government infosessionSmals
 
Email address reliability_infosession_201311_session_externe_printable
Email address reliability_infosession_201311_session_externe_printableEmail address reliability_infosession_201311_session_externe_printable
Email address reliability_infosession_201311_session_externe_printableSmals
 

Viewers also liked (7)

Infosessie Smals Research - Application platform as a Service - 12/2013
Infosessie Smals Research - Application platform as a Service - 12/2013Infosessie Smals Research - Application platform as a Service - 12/2013
Infosessie Smals Research - Application platform as a Service - 12/2013
 
Jef Verelst - Smals Open to a shift - Infosecurity.be
Jef Verelst  -  Smals Open to a shift - Infosecurity.beJef Verelst  -  Smals Open to a shift - Infosecurity.be
Jef Verelst - Smals Open to a shift - Infosecurity.be
 
20130620 Streamlining Analytics extern
20130620 Streamlining Analytics extern20130620 Streamlining Analytics extern
20130620 Streamlining Analytics extern
 
Infosession BYOD 12-2012 v3 - public
Infosession BYOD 12-2012 v3 - publicInfosession BYOD 12-2012 v3 - public
Infosession BYOD 12-2012 v3 - public
 
Presentation Café Numérique par Grégory Ogonowski (Smals)
Presentation Café Numérique par Grégory Ogonowski (Smals)Presentation Café Numérique par Grégory Ogonowski (Smals)
Presentation Café Numérique par Grégory Ogonowski (Smals)
 
20141023 social media & e government infosession
20141023 social media & e government   infosession20141023 social media & e government   infosession
20141023 social media & e government infosession
 
Email address reliability_infosession_201311_session_externe_printable
Email address reliability_infosession_201311_session_externe_printableEmail address reliability_infosession_201311_session_externe_printable
Email address reliability_infosession_201311_session_externe_printable
 

Similar to 24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02

Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudTjylen Veselyj
 
PIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdfPIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdfTAURUSEER
 
Ibm עמרי וייסמן
Ibm  עמרי וייסמןIbm  עמרי וייסמן
Ibm עמרי וייסמןlihig
 
Omri
OmriOmri
Omrilihig
 
Ibm עמרי וייסמן
Ibm  עמרי וייסמןIbm  עמרי וייסמן
Ibm עמרי וייסמןlihig
 
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster ProjectsRisk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster ProjectsSecureIoT H2020 funded project
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solutionhearme limited company
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...DevOps.com
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...DevOps for Enterprise Systems
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Deborah Schalm
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyBlack Duck by Synopsys
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutionsakshayvreddy
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityLarry Ball
 
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish Presentation
C S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  PresentationC S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  Presentation
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish PresentationWon Ju Jub
 
Software Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and SecuritySoftware Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and SecurityTao Xie
 
Enterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsEnterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsSplunk
 
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...Priyanka Aash
 

Similar to 24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02 (20)

Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the Cloud
 
PIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdfPIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdf
 
Ibm עמרי וייסמן
Ibm  עמרי וייסמןIbm  עמרי וייסמן
Ibm עמרי וייסמן
 
Omri
OmriOmri
Omri
 
Ibm עמרי וייסמן
Ibm  עמרי וייסמןIbm  עמרי וייסמן
Ibm עמרי וייסמן
 
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster ProjectsRisk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application Security
 
CSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoatCSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoat
 
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish Presentation
C S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  PresentationC S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  Presentation
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish Presentation
 
Software Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and SecuritySoftware Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and Security
 
Enterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsEnterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior Analytics
 
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
 

More from Smals

Wat zijn chatbots en waarvoor gebruiken we ze
Wat zijn chatbots en waarvoor gebruiken we zeWat zijn chatbots en waarvoor gebruiken we ze
Wat zijn chatbots en waarvoor gebruiken we zeSmals
 
Wat is augmented reality en waarvoor gebruiken we het nl
Wat is augmented reality en waarvoor gebruiken we het nlWat is augmented reality en waarvoor gebruiken we het nl
Wat is augmented reality en waarvoor gebruiken we het nlSmals
 
Named entity recognition hoe werkt het wat kunnen we er mee doen nl
Named entity recognition hoe werkt het wat kunnen we er mee doen nlNamed entity recognition hoe werkt het wat kunnen we er mee doen nl
Named entity recognition hoe werkt het wat kunnen we er mee doen nlSmals
 
Natural language generation nederlands
Natural language generation nederlandsNatural language generation nederlands
Natural language generation nederlandsSmals
 
Wat is ai en wat kan het nl
Wat is ai en wat kan het nlWat is ai en wat kan het nl
Wat is ai en wat kan het nlSmals
 
Realite augmentee
Realite augmenteeRealite augmentee
Realite augmenteeSmals
 
Internet des objets
Internet des objetsInternet des objets
Internet des objetsSmals
 
Chatbots comment ca marche a quoi ca sert
Chatbots comment ca marche a quoi ca sertChatbots comment ca marche a quoi ca sert
Chatbots comment ca marche a quoi ca sertSmals
 
Analyse predictive comment ca marche a quoi ca sert
Analyse predictive comment ca marche a quoi ca sertAnalyse predictive comment ca marche a quoi ca sert
Analyse predictive comment ca marche a quoi ca sertSmals
 
Traduction vocale quasi instantanee introduction
Traduction vocale quasi instantanee introductionTraduction vocale quasi instantanee introduction
Traduction vocale quasi instantanee introductionSmals
 
Automatisation des processus robotises introduction
Automatisation des processus robotises introductionAutomatisation des processus robotises introduction
Automatisation des processus robotises introductionSmals
 
Interfaces conversationnelle introduction
Interfaces conversationnelle introductionInterfaces conversationnelle introduction
Interfaces conversationnelle introductionSmals
 
Reconnaissance d'entites nommees introduction
Reconnaissance d'entites nommees introductionReconnaissance d'entites nommees introduction
Reconnaissance d'entites nommees introductionSmals
 
Generation automatique de textes
Generation automatique de textesGeneration automatique de textes
Generation automatique de textesSmals
 
Intelligence artificielle etroite introduction
Intelligence artificielle etroite introductionIntelligence artificielle etroite introduction
Intelligence artificielle etroite introductionSmals
 
Named entity recognition hoe werkt het wat kunnen we er mee doen
Named entity recognition hoe werkt het wat kunnen we er mee doenNamed entity recognition hoe werkt het wat kunnen we er mee doen
Named entity recognition hoe werkt het wat kunnen we er mee doenSmals
 
Real time voice translation handig maar hoe ver staat het
Real time voice translation   handig  maar hoe ver staat hetReal time voice translation   handig  maar hoe ver staat het
Real time voice translation handig maar hoe ver staat hetSmals
 
Wat is predictive analytics en waarvoor kun je het gebruiken
Wat is predictive analytics en waarvoor kun je het gebruikenWat is predictive analytics en waarvoor kun je het gebruiken
Wat is predictive analytics en waarvoor kun je het gebruikenSmals
 
Wat is robotic process automation en wat kun je er mee doen
Wat is robotic process automation en wat kun je er mee doenWat is robotic process automation en wat kun je er mee doen
Wat is robotic process automation en wat kun je er mee doenSmals
 
Exemples europeens comme source d inspiration
Exemples europeens comme source d inspirationExemples europeens comme source d inspiration
Exemples europeens comme source d inspirationSmals
 

More from Smals (20)

Wat zijn chatbots en waarvoor gebruiken we ze
Wat zijn chatbots en waarvoor gebruiken we zeWat zijn chatbots en waarvoor gebruiken we ze
Wat zijn chatbots en waarvoor gebruiken we ze
 
Wat is augmented reality en waarvoor gebruiken we het nl
Wat is augmented reality en waarvoor gebruiken we het nlWat is augmented reality en waarvoor gebruiken we het nl
Wat is augmented reality en waarvoor gebruiken we het nl
 
Named entity recognition hoe werkt het wat kunnen we er mee doen nl
Named entity recognition hoe werkt het wat kunnen we er mee doen nlNamed entity recognition hoe werkt het wat kunnen we er mee doen nl
Named entity recognition hoe werkt het wat kunnen we er mee doen nl
 
Natural language generation nederlands
Natural language generation nederlandsNatural language generation nederlands
Natural language generation nederlands
 
Wat is ai en wat kan het nl
Wat is ai en wat kan het nlWat is ai en wat kan het nl
Wat is ai en wat kan het nl
 
Realite augmentee
Realite augmenteeRealite augmentee
Realite augmentee
 
Internet des objets
Internet des objetsInternet des objets
Internet des objets
 
Chatbots comment ca marche a quoi ca sert
Chatbots comment ca marche a quoi ca sertChatbots comment ca marche a quoi ca sert
Chatbots comment ca marche a quoi ca sert
 
Analyse predictive comment ca marche a quoi ca sert
Analyse predictive comment ca marche a quoi ca sertAnalyse predictive comment ca marche a quoi ca sert
Analyse predictive comment ca marche a quoi ca sert
 
Traduction vocale quasi instantanee introduction
Traduction vocale quasi instantanee introductionTraduction vocale quasi instantanee introduction
Traduction vocale quasi instantanee introduction
 
Automatisation des processus robotises introduction
Automatisation des processus robotises introductionAutomatisation des processus robotises introduction
Automatisation des processus robotises introduction
 
Interfaces conversationnelle introduction
Interfaces conversationnelle introductionInterfaces conversationnelle introduction
Interfaces conversationnelle introduction
 
Reconnaissance d'entites nommees introduction
Reconnaissance d'entites nommees introductionReconnaissance d'entites nommees introduction
Reconnaissance d'entites nommees introduction
 
Generation automatique de textes
Generation automatique de textesGeneration automatique de textes
Generation automatique de textes
 
Intelligence artificielle etroite introduction
Intelligence artificielle etroite introductionIntelligence artificielle etroite introduction
Intelligence artificielle etroite introduction
 
Named entity recognition hoe werkt het wat kunnen we er mee doen
Named entity recognition hoe werkt het wat kunnen we er mee doenNamed entity recognition hoe werkt het wat kunnen we er mee doen
Named entity recognition hoe werkt het wat kunnen we er mee doen
 
Real time voice translation handig maar hoe ver staat het
Real time voice translation   handig  maar hoe ver staat hetReal time voice translation   handig  maar hoe ver staat het
Real time voice translation handig maar hoe ver staat het
 
Wat is predictive analytics en waarvoor kun je het gebruiken
Wat is predictive analytics en waarvoor kun je het gebruikenWat is predictive analytics en waarvoor kun je het gebruiken
Wat is predictive analytics en waarvoor kun je het gebruiken
 
Wat is robotic process automation en wat kun je er mee doen
Wat is robotic process automation en wat kun je er mee doenWat is robotic process automation en wat kun je er mee doen
Wat is robotic process automation en wat kun je er mee doen
 
Exemples europeens comme source d inspiration
Exemples europeens comme source d inspirationExemples europeens comme source d inspiration
Exemples europeens comme source d inspiration
 

Recently uploaded

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02

  • 2. 20/03/11 About Smals vzw-asbl One of Belgium's largest ICT-organisations: 1660 people "ICT for Society" Work: ex. Dimona-DmfA Salary & labour prestations Health: ex. eHealth-platform Secure exchange of medical data in Belgium Family life: ex. VESTA Home care for elderly (financial / operational support) High priority for ICT Security & Privacy 2
  • 3. 20/03/11 Web Project Life Cycle • An idea? • Analysis of functional requirements • Design of the architecture • Implementation  Writing of the source code  Java  C#  ...  Using a framework 3
  • 4. 20/03/11 Web Project Life Cycle • Functional testing • Deployment in production • ... (2 years go by) • Hacker comes by  Breaks the application  gives advise  publishes on the internet  steals information  steals money 4
  • 5. 20/03/11 What about security ... • Idea?  has no security requirements ... (if it is not a security solution) • Analysis of functional requirements  Non-functional  Architecture solves this ... • Design of the architecture  Non-functional requirements  Network infrastruture solves this ... • Developer  Is not written in design & analysis  No security guidelines 5
  • 6. 20/03/11 What about security ... • Functional testing  Tests are performed in the boundaries  No security is considered in tests • Deployment to Production  No security considered in deployment  Network operations solves this ... 6
  • 7. 20/03/11 What about security ... • Hacker comes by  Analyses the security of the web application in relation to the business requirements  Reviews the architecture  Verifies the security in the development  Checks the security of the deployment • Hacks the application  Financial gain  Awards  Political reasons  Exploit of resources 7
  • 8. 20/03/11 Network solves security ? Firewalls … • Firewalls are always configured to allow web traffic -> HTTP(S) • Attacker appears to the web application as a normal user 8
  • 9. 20/03/11 Network solves security ? SSL secures the application… • Server-side SSL only guarantees confidentiality on transport level • Attacker also uses the SSL tunnel 9
  • 10. 20/03/11 Secure Software Development LifeCycle Security Design Static Penetration requirements Review analysis testing (tools) Risk Risk-based analysis security tests Code Requirements Design Test plans Test Field and use cases results feedback Code Review 10
  • 11. 20/03/11 Application Risk Analysis Requirement and Architecture documentation Goal of the External In- & Output Assets Service Factors Channels Threat Analysis Identification Data Flow Identification Threat Trust levels Analysis of the threats analysis Risk Analysis Risk Risk Identification analysis Ranking of Mitigations document 11
  • 12. 20/03/11 How To • Security awareness and training program  Analysts  Security requirements -> Functional requirements  Use cases vs misUse cases  Architects & Developers  Data Flow Diagram analysis  Attack trees  STRIDE methodology • Development guidelines publication • Code Review  Automatic through tools  Manual by penetration testers 12
  • 13. 20/03/11 How To • Security Testing  Automatic through tools  Manual by penetration testers • Secure configuration • Technology  Web application firewall • Human Resources  Internal penetration testers (team)  Perform reviews & controls • Need of management support ! 13
  • 14. 20/03/11 Security Integration Processes • Clearly defined processes according to risks • 2 processes for the security analyses  Express (BPMN) Application-Security-Express-v0.2.igx Inception Elaboration Construction Transition Production Revue Revue de securité sur Revue de securité sur Revue Configuration testes Revue optionelle securité sur les reports d'analyse les reports de test sécurité architecture feedback report de sécurité Security sécurité architecture, statique de code pénétration automatique Requirements V1 feedback report 1 jour Analist Requirements V1 req. V2 et 1/2 jour 1/2 jour Risc analysis 0,5 jour Risque 1,5 jour 1,5 jour Report de sécurité Verwerking CSM / CPL feedback Yes Verwerking Accepted feedback No Requirements V2 doc Analyste Requirements V1 doc RiSC V1 RiSC V2 TO&P Start SADV1 RiSC V1 Reports automatiques d'analyse statiques de code RiSC V2 SADV2 Architecte Création du Création du TO&P SADV1 - critèr SADV2 - critèr es non es non fonctionnels Reports automatiques fonctionnels des testes de pénétration Developer la solution Developer Définir les Définir les Test de Requirements / Requirements / penetration critères non- critères non- automatique fonctionnels fonctionnels (2 à 3 jour) SIC iDeploy Deployment Client  Extended (BPMN) Security Analist Revue optionelle sécurité Requirements V1 0,5 jour Revue sécurité architecture Requirements V1 Risc analysis 1,5 jour feedback report Inception Revue securité sur architecture, req. V2 et Risque 1,5 jour feedback report Application-Security-Extended-v0.1.igx Elaboration Revue de securité sur les reports d'analyse statique de code 1/2 jour Configuration testes de sécurité 1 jour Construction Revue de securité sur les reports de test pénétration automatique 1/2 jour Revue manuel sur le project >5 jour Transition Production Report de sécurité Verwerking CSM / CPL feedback Yes Verwerking Accepted feedback No Requirements V2 doc Requirements V1 doc Analyste RiSC V1 RiSC V2 TO&P Start SADV1 RiSC V1 Reports automatiques d'analyse statiques de code RiSC V2 SADV2 Architecte Création du Création du TO&P SADV1 - critèr SADV2 - critèr es non es non Reports automatiques fonctionnels fonctionnels des testes de pénétration Developer la solution Developer Définir les Définir les Test de Requirements / Requirements / penetration critères non- critères non- automatique fonctionnels fonctionnels (2 à 3 jour) SIC iDeploy Deployment Client 14
  • 15. 20/03/11 Resources … • OWASP  Open Web Application Security Program • Books:  Software Security  Microsoft Secure Development Lifecycle  Enterprise Security Architecture 15
  • 16. 20/03/11 Questions ? Thanks you! www.smals.be 16