SlideShare une entreprise Scribd logo
1  sur  23
Lean and (Prepared for) Mean:Application Security Program Essentials Philip J. Beyer - Texas Education Agency philip.beyer@tea.state.tx.us John B. Dickson - Denim Group john@denimgroup.com 1 TASSCC 2011 Annual Conference Copyright 2011 by Texas Education Agency. All rights reserved.
Overview Background Trends Essentials Roadmap TASSCC 2011 Annual Conference 2 Copyright 2011 by Texas Education Agency. All rights reserved.
About Phil Beyer Information Security Officer Consulting background John Dickson Application security industry leader TEA  ~700 employees  ~1200 school districts  ~5 million students TASSCC 2011 Annual Conference 3 Copyright 2011 by Texas Education Agency. All rights reserved.
Application Security – What? Why? In Brief Web applications can be attacked Attacks are different from network or OS levels Becoming a significant attack vector Impact Attackers bypass traditional infrastructure security controls Users are a target as well as data TASSCC 2011 Annual Conference 4 Copyright 2011 by Texas Education Agency. All rights reserved.
Trends At TEA Applications created regularly and retired slowly Ability to outsource remediation decreased due to funding limitations In the Industry Attacks are increasingly sophisticated and automated Remediation costs increase in later phases of the development cycle TASSCC 2011 Annual Conference 5 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhere Did TEA Start Application Security Program established Some policy and procedure Initial training and exposure to concepts Historically siloed approach Outsourcing for subject matter expertise Veracode Denim Group TASSCC 2011 Annual Conference 6 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsThe Premise Some things you Don’t Need Some things you Do Need Some things you Just Don’t Need Yet TASSCC 2011 Annual Conference 7 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Don’t Need An Expensive Scanner A Security Process for scanning is more important Simple (free) scanners will get you started Buy the software later TASSCC 2011 Annual Conference 8 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Don’t Need A Complicated Scoring/Tracking Tool A Security Process for profiling is more important Risk ranking doesn’t have to be hard Keeping track of your applications can be simple Buy the software later TASSCC 2011 Annual Conference 9 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Don’t Need A Dedicated Application Security Team A Security Process for testing is more important Leverage your existing QA and Testing team Simple security testing will get you started Build and train your testing capability gradually TASSCC 2011 Annual Conference 10 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Don’t Need A Perfect SDLC Get started with what you have now Update your policies and procedures as you go Don’t try to drop in “The Secure SDLC” all at once TASSCC 2011 Annual Conference 11 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Do Need A Champion That’s You! Understand the problem Communicate the risk Work with the business TASSCC 2011 Annual Conference 12 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Do Need A Team that Gets It Managers Developers Testers Security TASSCC 2011 Annual Conference 13 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Do Need Good Training Resources exist, some are free The trainer is important Attacks evolve, so should your training TASSCC 2011 Annual Conference 14 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Do Need Expert Help Technical questions will arise Some vendors will dispute vulnerabilities Be sure your team can consult with experts TASSCC 2011 Annual Conference 15 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Do Need A Roadmap to Maturity Use an established maturity model OpenSAMM BSIMM Design a roadmap to get to maturity Don’t try to do it all at once TASSCC 2011 Annual Conference 16 Copyright 2011 by Texas Education Agency. All rights reserved.
RoadmapUse a Maturity Model OpenSAMM - Software Assurance Maturity Model Maturity levels 1 thru 4 Governance Strategy & Metrics (2), Policy & Compliance (3), Education & Guidance (3) Construction Threat Assessment (3), Security Requirements (3), Secure Architecture (3) Verification Design Review (2), Code Review (2), Security Testing (3) Deployment Vulnerability Management (3), Environment Hardening (3), Operational Enablement (3) TASSCC 2011 Annual Conference 17 Copyright 2011 by Texas Education Agency. All rights reserved.
Roadmap – Phase 1Governance Estimate overall business risk profile Build and maintain an application security program roadmap Build and maintain compliance guidelines Conduct technical security awareness training Build and maintain technical guidelines TASSCC 2011 Annual Conference 18 Copyright 2011 by Texas Education Agency. All rights reserved.
Roadmap – Phase 1Construction Derive security requirements based on business functionality Evaluate security and compliance guidance for requirements TASSCC 2011 Annual Conference 19 Copyright 2011 by Texas Education Agency. All rights reserved.
Roadmap – Phase 1Verification Derive test cases from known security requirements Conduct penetration testing on software releases TASSCC 2011 Annual Conference 20 Copyright 2011 by Texas Education Agency. All rights reserved.
Roadmap – Phase 1Deployment Identify point of contact for security issues Create informal security response team(s) TASSCC 2011 Annual Conference 21 Copyright 2011 by Texas Education Agency. All rights reserved.
Resources OWASP – Open Web Application Security Project http://www.owasp.org/ OpenSAMM - Software Assurance Maturity Model http://www.opensamm.org/ Denim Group – Remediation Resource Center http://www.denimgroup.com/remediation/ TASSCC 2011 Annual Conference 22 Copyright 2011 by Texas Education Agency. All rights reserved.
Questions? TASSCC 2011 Annual Conference 23 Copyright 2011 by Texas Education Agency. All rights reserved.

Contenu connexe

Tendances

Engineering Security Vulnerability Prevention, Detection, and Response
Engineering Security Vulnerability Prevention, Detection, and ResponseEngineering Security Vulnerability Prevention, Detection, and Response
Engineering Security Vulnerability Prevention, Detection, and ResponseJinnah University for Women
 
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next LevelTaking Open Source Security to the Next Level
Taking Open Source Security to the Next LevelSBWebinars
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseLumension
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'Positive Hack Days
 
Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingMaganathin Veeraragaloo
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturitySynopsys Software Integrity Group
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411Scott Althouse
 
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Source Conference
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge DeliverableCurtis Brazzell
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.comDavisMurphyC37
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NetLockSmith
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application SecurityCigital
 
Incident Management
Incident ManagementIncident Management
Incident ManagementBIS Safety
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cyclevulsec123
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CulturePhil La Duke
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 

Tendances (20)

Engineering Security Vulnerability Prevention, Detection, and Response
Engineering Security Vulnerability Prevention, Detection, and ResponseEngineering Security Vulnerability Prevention, Detection, and Response
Engineering Security Vulnerability Prevention, Detection, and Response
 
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next LevelTaking Open Source Security to the Next Level
Taking Open Source Security to the Next Level
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
 
Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and Testing
 
SECURITY
SECURITYSECURITY
SECURITY
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411
 
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
 
Resume Joe Johnston
Resume Joe JohnstonResume Joe Johnston
Resume Joe Johnston
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application Security
 
Incident Management
Incident ManagementIncident Management
Incident Management
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cycle
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Culture
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Cmgt 400 cmgt400
Cmgt 400 cmgt400Cmgt 400 cmgt400
Cmgt 400 cmgt400
 

Similaire à Lean and (Prepared for) Mean: Application Security Program Essentials

六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩baoyin
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityCAST
 
case analysis 2.1.docxby Urusha PandeySubmission date 2.docx
case analysis 2.1.docxby Urusha PandeySubmission date 2.docxcase analysis 2.1.docxby Urusha PandeySubmission date 2.docx
case analysis 2.1.docxby Urusha PandeySubmission date 2.docxcowinhelen
 
OWASP: Building Secure Web Apps
OWASP: Building Secure Web AppsOWASP: Building Secure Web Apps
OWASP: Building Secure Web Appsmlogvinov
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewAshish Patel
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Reorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsReorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsLumension
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedkonchada
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedkonchada
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scalePriyanka Aash
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-SessionRyan Faircloth
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesRyan Faircloth
 

Similaire à Lean and (Prepared for) Mean: Application Security Program Essentials (20)

六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software Security
 
case analysis 2.1.docxby Urusha PandeySubmission date 2.docx
case analysis 2.1.docxby Urusha PandeySubmission date 2.docxcase analysis 2.1.docxby Urusha PandeySubmission date 2.docx
case analysis 2.1.docxby Urusha PandeySubmission date 2.docx
 
OWASP: Building Secure Web Apps
OWASP: Building Secure Web AppsOWASP: Building Secure Web Apps
OWASP: Building Secure Web Apps
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Reorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsReorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's Threats
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 

Plus de Philip Beyer

Security Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught YouSecurity Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught YouPhilip Beyer
 
It Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in SecurityIt Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in SecurityPhilip Beyer
 
You Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in SecurityYou Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in SecurityPhilip Beyer
 
Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!Philip Beyer
 
Risk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or LessRisk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or LessPhilip Beyer
 
The Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal LifeThe Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal LifePhilip Beyer
 
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and BeyondPhilip Beyer
 
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...Philip Beyer
 

Plus de Philip Beyer (8)

Security Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught YouSecurity Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught You
 
It Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in SecurityIt Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in Security
 
You Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in SecurityYou Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in Security
 
Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!
 
Risk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or LessRisk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or Less
 
The Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal LifeThe Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal Life
 
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
 
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
 

Dernier

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Dernier (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Lean and (Prepared for) Mean: Application Security Program Essentials

  • 1. Lean and (Prepared for) Mean:Application Security Program Essentials Philip J. Beyer - Texas Education Agency philip.beyer@tea.state.tx.us John B. Dickson - Denim Group john@denimgroup.com 1 TASSCC 2011 Annual Conference Copyright 2011 by Texas Education Agency. All rights reserved.
  • 2. Overview Background Trends Essentials Roadmap TASSCC 2011 Annual Conference 2 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 3. About Phil Beyer Information Security Officer Consulting background John Dickson Application security industry leader TEA ~700 employees ~1200 school districts ~5 million students TASSCC 2011 Annual Conference 3 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 4. Application Security – What? Why? In Brief Web applications can be attacked Attacks are different from network or OS levels Becoming a significant attack vector Impact Attackers bypass traditional infrastructure security controls Users are a target as well as data TASSCC 2011 Annual Conference 4 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 5. Trends At TEA Applications created regularly and retired slowly Ability to outsource remediation decreased due to funding limitations In the Industry Attacks are increasingly sophisticated and automated Remediation costs increase in later phases of the development cycle TASSCC 2011 Annual Conference 5 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 6. EssentialsWhere Did TEA Start Application Security Program established Some policy and procedure Initial training and exposure to concepts Historically siloed approach Outsourcing for subject matter expertise Veracode Denim Group TASSCC 2011 Annual Conference 6 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 7. EssentialsThe Premise Some things you Don’t Need Some things you Do Need Some things you Just Don’t Need Yet TASSCC 2011 Annual Conference 7 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 8. EssentialsWhat You Don’t Need An Expensive Scanner A Security Process for scanning is more important Simple (free) scanners will get you started Buy the software later TASSCC 2011 Annual Conference 8 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 9. EssentialsWhat You Don’t Need A Complicated Scoring/Tracking Tool A Security Process for profiling is more important Risk ranking doesn’t have to be hard Keeping track of your applications can be simple Buy the software later TASSCC 2011 Annual Conference 9 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 10. EssentialsWhat You Don’t Need A Dedicated Application Security Team A Security Process for testing is more important Leverage your existing QA and Testing team Simple security testing will get you started Build and train your testing capability gradually TASSCC 2011 Annual Conference 10 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 11. EssentialsWhat You Don’t Need A Perfect SDLC Get started with what you have now Update your policies and procedures as you go Don’t try to drop in “The Secure SDLC” all at once TASSCC 2011 Annual Conference 11 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 12. EssentialsWhat You Do Need A Champion That’s You! Understand the problem Communicate the risk Work with the business TASSCC 2011 Annual Conference 12 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 13. EssentialsWhat You Do Need A Team that Gets It Managers Developers Testers Security TASSCC 2011 Annual Conference 13 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 14. EssentialsWhat You Do Need Good Training Resources exist, some are free The trainer is important Attacks evolve, so should your training TASSCC 2011 Annual Conference 14 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 15. EssentialsWhat You Do Need Expert Help Technical questions will arise Some vendors will dispute vulnerabilities Be sure your team can consult with experts TASSCC 2011 Annual Conference 15 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 16. EssentialsWhat You Do Need A Roadmap to Maturity Use an established maturity model OpenSAMM BSIMM Design a roadmap to get to maturity Don’t try to do it all at once TASSCC 2011 Annual Conference 16 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 17. RoadmapUse a Maturity Model OpenSAMM - Software Assurance Maturity Model Maturity levels 1 thru 4 Governance Strategy & Metrics (2), Policy & Compliance (3), Education & Guidance (3) Construction Threat Assessment (3), Security Requirements (3), Secure Architecture (3) Verification Design Review (2), Code Review (2), Security Testing (3) Deployment Vulnerability Management (3), Environment Hardening (3), Operational Enablement (3) TASSCC 2011 Annual Conference 17 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 18. Roadmap – Phase 1Governance Estimate overall business risk profile Build and maintain an application security program roadmap Build and maintain compliance guidelines Conduct technical security awareness training Build and maintain technical guidelines TASSCC 2011 Annual Conference 18 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 19. Roadmap – Phase 1Construction Derive security requirements based on business functionality Evaluate security and compliance guidance for requirements TASSCC 2011 Annual Conference 19 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 20. Roadmap – Phase 1Verification Derive test cases from known security requirements Conduct penetration testing on software releases TASSCC 2011 Annual Conference 20 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 21. Roadmap – Phase 1Deployment Identify point of contact for security issues Create informal security response team(s) TASSCC 2011 Annual Conference 21 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 22. Resources OWASP – Open Web Application Security Project http://www.owasp.org/ OpenSAMM - Software Assurance Maturity Model http://www.opensamm.org/ Denim Group – Remediation Resource Center http://www.denimgroup.com/remediation/ TASSCC 2011 Annual Conference 22 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 23. Questions? TASSCC 2011 Annual Conference 23 Copyright 2011 by Texas Education Agency. All rights reserved.

Notes de l'éditeur

  1. You can contact us by email.These slides will be provided.Resources, including links, are provided at the end.
  2. BackgroundAbout usAbout TEAAbout application securityTrendsAt TEAIn the industryEssentialsWhere did TEA startWhat you don’t needWhat you do needRoadmap-Work to maturity-Phased approach
  3. TEA works with school districts and regional service centers and is responsible for school funding and educator certification.
  4. Key Point*Application security should be on your radar screen.Statistics-Trustwave Global Security Report 2011 identifies the cause of 6% of breaches as an SQL Injection flaw (on par with Email Trojan and Social Engineering). Trustwave cites it as the most popular attack vector for web applications.-Verizon Data Breach Incident Report 2011 identifies the cause of 14% of breaches involving hacking as an SQL Injection flaw. Almost ¼ of hacking breaches (22%) used web applications as their attack vector. The Verizon DBIR 2011 states, “Just because web applications dropped as an overall percentage of attacks, don’t believe for an instant that they are any less critical a vector than they were a year ago. If you remove hospitality and retail victims from this dataset, web applications are right back on top and are more numerous than ever.”
  5. Key Point*Application security is as important as ever but funding is limited.
  6. Key Point*TEA needed to revamp its Application Security Program.VeracodeManaged security service providerProprietary automated scanningInitial review performed by vendorDenim GroupSecondary review performed by vendorRemediation analysis and work performed by vendor
  7. Key Point*This is not about the perfect Application Security Program… It’s about a basic one.Mostly, you need to start with structure, not software.
  8. Key Point*Expensive software is best purchased after you have policy and procedure already in place.
  9. Key Point*Expensive software is best purchased after you have policy and procedure already in place.
  10. Key Point*Begin with what you already have.
  11. Key Point*Begin with what you already have.
  12. Key Point*The effort will need a leader.Other** introduce OWASP at this point
  13. Key Point*Application security should involve everyone, not just the technical folks.Other-Security team is primarily oversight
  14. Key Point*Developers and testers need to know what they are up against.
  15. Key Point*Your team will need to consult with experts, inside or outside of your organization.
  16. Key Point*Have a plan and execute it… slowly.
  17. Key Point*TEA’s roadmap is based on OpenSAMM.Other-OpenSAMM is managed by OWASP-TEA target maturity levels are listed in parentheses-TEA will take a multi-phase approach to implement target maturity
  18. Key Point*Governance activities work to align the program with the business.
  19. Key Point*Construction activities work to build security procedures into software development.
  20. Key Point*Verification activities work to address security in software testing.
  21. Key Point*Deployment activities work to provide security for software in production.