SlideShare una empresa de Scribd logo
1 de 23
Lean and (Prepared for) Mean:Application Security Program Essentials Philip J. Beyer - Texas Education Agency philip.beyer@tea.state.tx.us John B. Dickson - Denim Group john@denimgroup.com 1 TASSCC 2011 Annual Conference Copyright 2011 by Texas Education Agency. All rights reserved.
Overview Background Trends Essentials Roadmap TASSCC 2011 Annual Conference 2 Copyright 2011 by Texas Education Agency. All rights reserved.
About Phil Beyer Information Security Officer Consulting background John Dickson Application security industry leader TEA  ~700 employees  ~1200 school districts  ~5 million students TASSCC 2011 Annual Conference 3 Copyright 2011 by Texas Education Agency. All rights reserved.
Application Security – What? Why? In Brief Web applications can be attacked Attacks are different from network or OS levels Becoming a significant attack vector Impact Attackers bypass traditional infrastructure security controls Users are a target as well as data TASSCC 2011 Annual Conference 4 Copyright 2011 by Texas Education Agency. All rights reserved.
Trends At TEA Applications created regularly and retired slowly Ability to outsource remediation decreased due to funding limitations In the Industry Attacks are increasingly sophisticated and automated Remediation costs increase in later phases of the development cycle TASSCC 2011 Annual Conference 5 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhere Did TEA Start Application Security Program established Some policy and procedure Initial training and exposure to concepts Historically siloed approach Outsourcing for subject matter expertise Veracode Denim Group TASSCC 2011 Annual Conference 6 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsThe Premise Some things you Don’t Need Some things you Do Need Some things you Just Don’t Need Yet TASSCC 2011 Annual Conference 7 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Don’t Need An Expensive Scanner A Security Process for scanning is more important Simple (free) scanners will get you started Buy the software later TASSCC 2011 Annual Conference 8 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Don’t Need A Complicated Scoring/Tracking Tool A Security Process for profiling is more important Risk ranking doesn’t have to be hard Keeping track of your applications can be simple Buy the software later TASSCC 2011 Annual Conference 9 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Don’t Need A Dedicated Application Security Team A Security Process for testing is more important Leverage your existing QA and Testing team Simple security testing will get you started Build and train your testing capability gradually TASSCC 2011 Annual Conference 10 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Don’t Need A Perfect SDLC Get started with what you have now Update your policies and procedures as you go Don’t try to drop in “The Secure SDLC” all at once TASSCC 2011 Annual Conference 11 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Do Need A Champion That’s You! Understand the problem Communicate the risk Work with the business TASSCC 2011 Annual Conference 12 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Do Need A Team that Gets It Managers Developers Testers Security TASSCC 2011 Annual Conference 13 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Do Need Good Training Resources exist, some are free The trainer is important Attacks evolve, so should your training TASSCC 2011 Annual Conference 14 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Do Need Expert Help Technical questions will arise Some vendors will dispute vulnerabilities Be sure your team can consult with experts TASSCC 2011 Annual Conference 15 Copyright 2011 by Texas Education Agency. All rights reserved.
EssentialsWhat You Do Need A Roadmap to Maturity Use an established maturity model OpenSAMM BSIMM Design a roadmap to get to maturity Don’t try to do it all at once TASSCC 2011 Annual Conference 16 Copyright 2011 by Texas Education Agency. All rights reserved.
RoadmapUse a Maturity Model OpenSAMM - Software Assurance Maturity Model Maturity levels 1 thru 4 Governance Strategy & Metrics (2), Policy & Compliance (3), Education & Guidance (3) Construction Threat Assessment (3), Security Requirements (3), Secure Architecture (3) Verification Design Review (2), Code Review (2), Security Testing (3) Deployment Vulnerability Management (3), Environment Hardening (3), Operational Enablement (3) TASSCC 2011 Annual Conference 17 Copyright 2011 by Texas Education Agency. All rights reserved.
Roadmap – Phase 1Governance Estimate overall business risk profile Build and maintain an application security program roadmap Build and maintain compliance guidelines Conduct technical security awareness training Build and maintain technical guidelines TASSCC 2011 Annual Conference 18 Copyright 2011 by Texas Education Agency. All rights reserved.
Roadmap – Phase 1Construction Derive security requirements based on business functionality Evaluate security and compliance guidance for requirements TASSCC 2011 Annual Conference 19 Copyright 2011 by Texas Education Agency. All rights reserved.
Roadmap – Phase 1Verification Derive test cases from known security requirements Conduct penetration testing on software releases TASSCC 2011 Annual Conference 20 Copyright 2011 by Texas Education Agency. All rights reserved.
Roadmap – Phase 1Deployment Identify point of contact for security issues Create informal security response team(s) TASSCC 2011 Annual Conference 21 Copyright 2011 by Texas Education Agency. All rights reserved.
Resources OWASP – Open Web Application Security Project http://www.owasp.org/ OpenSAMM - Software Assurance Maturity Model http://www.opensamm.org/ Denim Group – Remediation Resource Center http://www.denimgroup.com/remediation/ TASSCC 2011 Annual Conference 22 Copyright 2011 by Texas Education Agency. All rights reserved.
Questions? TASSCC 2011 Annual Conference 23 Copyright 2011 by Texas Education Agency. All rights reserved.

Más contenido relacionado

La actualidad más candente

Engineering Security Vulnerability Prevention, Detection, and Response
Engineering Security Vulnerability Prevention, Detection, and ResponseEngineering Security Vulnerability Prevention, Detection, and Response
Engineering Security Vulnerability Prevention, Detection, and ResponseJinnah University for Women
 
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next LevelTaking Open Source Security to the Next Level
Taking Open Source Security to the Next LevelSBWebinars
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseLumension
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'Positive Hack Days
 
Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingMaganathin Veeraragaloo
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturitySynopsys Software Integrity Group
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411Scott Althouse
 
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Source Conference
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge DeliverableCurtis Brazzell
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.comDavisMurphyC37
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NetLockSmith
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application SecurityCigital
 
Incident Management
Incident ManagementIncident Management
Incident ManagementBIS Safety
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cyclevulsec123
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CulturePhil La Duke
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 

La actualidad más candente (20)

Engineering Security Vulnerability Prevention, Detection, and Response
Engineering Security Vulnerability Prevention, Detection, and ResponseEngineering Security Vulnerability Prevention, Detection, and Response
Engineering Security Vulnerability Prevention, Detection, and Response
 
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next LevelTaking Open Source Security to the Next Level
Taking Open Source Security to the Next Level
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
 
Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and Testing
 
SECURITY
SECURITYSECURITY
SECURITY
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411
 
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
 
Resume Joe Johnston
Resume Joe JohnstonResume Joe Johnston
Resume Joe Johnston
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application Security
 
Incident Management
Incident ManagementIncident Management
Incident Management
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cycle
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Culture
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Cmgt 400 cmgt400
Cmgt 400 cmgt400Cmgt 400 cmgt400
Cmgt 400 cmgt400
 

Similar a Lean and (Prepared for) Mean: Application Security Program Essentials

六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩baoyin
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityCAST
 
case analysis 2.1.docxby Urusha PandeySubmission date 2.docx
case analysis 2.1.docxby Urusha PandeySubmission date 2.docxcase analysis 2.1.docxby Urusha PandeySubmission date 2.docx
case analysis 2.1.docxby Urusha PandeySubmission date 2.docxcowinhelen
 
OWASP: Building Secure Web Apps
OWASP: Building Secure Web AppsOWASP: Building Secure Web Apps
OWASP: Building Secure Web Appsmlogvinov
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewAshish Patel
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Reorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsReorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsLumension
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedkonchada
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedkonchada
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scalePriyanka Aash
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesRyan Faircloth
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-SessionRyan Faircloth
 

Similar a Lean and (Prepared for) Mean: Application Security Program Essentials (20)

六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software Security
 
case analysis 2.1.docxby Urusha PandeySubmission date 2.docx
case analysis 2.1.docxby Urusha PandeySubmission date 2.docxcase analysis 2.1.docxby Urusha PandeySubmission date 2.docx
case analysis 2.1.docxby Urusha PandeySubmission date 2.docx
 
OWASP: Building Secure Web Apps
OWASP: Building Secure Web AppsOWASP: Building Secure Web Apps
OWASP: Building Secure Web Apps
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Reorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsReorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's Threats
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 

Más de Philip Beyer

Security Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught YouSecurity Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught YouPhilip Beyer
 
It Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in SecurityIt Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in SecurityPhilip Beyer
 
You Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in SecurityYou Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in SecurityPhilip Beyer
 
Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!Philip Beyer
 
Risk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or LessRisk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or LessPhilip Beyer
 
The Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal LifeThe Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal LifePhilip Beyer
 
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and BeyondPhilip Beyer
 
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...Philip Beyer
 

Más de Philip Beyer (8)

Security Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught YouSecurity Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught You
 
It Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in SecurityIt Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in Security
 
You Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in SecurityYou Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in Security
 
Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!
 
Risk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or LessRisk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or Less
 
The Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal LifeThe Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal Life
 
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
 
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Lean and (Prepared for) Mean: Application Security Program Essentials

  • 1. Lean and (Prepared for) Mean:Application Security Program Essentials Philip J. Beyer - Texas Education Agency philip.beyer@tea.state.tx.us John B. Dickson - Denim Group john@denimgroup.com 1 TASSCC 2011 Annual Conference Copyright 2011 by Texas Education Agency. All rights reserved.
  • 2. Overview Background Trends Essentials Roadmap TASSCC 2011 Annual Conference 2 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 3. About Phil Beyer Information Security Officer Consulting background John Dickson Application security industry leader TEA ~700 employees ~1200 school districts ~5 million students TASSCC 2011 Annual Conference 3 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 4. Application Security – What? Why? In Brief Web applications can be attacked Attacks are different from network or OS levels Becoming a significant attack vector Impact Attackers bypass traditional infrastructure security controls Users are a target as well as data TASSCC 2011 Annual Conference 4 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 5. Trends At TEA Applications created regularly and retired slowly Ability to outsource remediation decreased due to funding limitations In the Industry Attacks are increasingly sophisticated and automated Remediation costs increase in later phases of the development cycle TASSCC 2011 Annual Conference 5 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 6. EssentialsWhere Did TEA Start Application Security Program established Some policy and procedure Initial training and exposure to concepts Historically siloed approach Outsourcing for subject matter expertise Veracode Denim Group TASSCC 2011 Annual Conference 6 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 7. EssentialsThe Premise Some things you Don’t Need Some things you Do Need Some things you Just Don’t Need Yet TASSCC 2011 Annual Conference 7 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 8. EssentialsWhat You Don’t Need An Expensive Scanner A Security Process for scanning is more important Simple (free) scanners will get you started Buy the software later TASSCC 2011 Annual Conference 8 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 9. EssentialsWhat You Don’t Need A Complicated Scoring/Tracking Tool A Security Process for profiling is more important Risk ranking doesn’t have to be hard Keeping track of your applications can be simple Buy the software later TASSCC 2011 Annual Conference 9 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 10. EssentialsWhat You Don’t Need A Dedicated Application Security Team A Security Process for testing is more important Leverage your existing QA and Testing team Simple security testing will get you started Build and train your testing capability gradually TASSCC 2011 Annual Conference 10 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 11. EssentialsWhat You Don’t Need A Perfect SDLC Get started with what you have now Update your policies and procedures as you go Don’t try to drop in “The Secure SDLC” all at once TASSCC 2011 Annual Conference 11 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 12. EssentialsWhat You Do Need A Champion That’s You! Understand the problem Communicate the risk Work with the business TASSCC 2011 Annual Conference 12 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 13. EssentialsWhat You Do Need A Team that Gets It Managers Developers Testers Security TASSCC 2011 Annual Conference 13 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 14. EssentialsWhat You Do Need Good Training Resources exist, some are free The trainer is important Attacks evolve, so should your training TASSCC 2011 Annual Conference 14 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 15. EssentialsWhat You Do Need Expert Help Technical questions will arise Some vendors will dispute vulnerabilities Be sure your team can consult with experts TASSCC 2011 Annual Conference 15 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 16. EssentialsWhat You Do Need A Roadmap to Maturity Use an established maturity model OpenSAMM BSIMM Design a roadmap to get to maturity Don’t try to do it all at once TASSCC 2011 Annual Conference 16 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 17. RoadmapUse a Maturity Model OpenSAMM - Software Assurance Maturity Model Maturity levels 1 thru 4 Governance Strategy & Metrics (2), Policy & Compliance (3), Education & Guidance (3) Construction Threat Assessment (3), Security Requirements (3), Secure Architecture (3) Verification Design Review (2), Code Review (2), Security Testing (3) Deployment Vulnerability Management (3), Environment Hardening (3), Operational Enablement (3) TASSCC 2011 Annual Conference 17 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 18. Roadmap – Phase 1Governance Estimate overall business risk profile Build and maintain an application security program roadmap Build and maintain compliance guidelines Conduct technical security awareness training Build and maintain technical guidelines TASSCC 2011 Annual Conference 18 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 19. Roadmap – Phase 1Construction Derive security requirements based on business functionality Evaluate security and compliance guidance for requirements TASSCC 2011 Annual Conference 19 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 20. Roadmap – Phase 1Verification Derive test cases from known security requirements Conduct penetration testing on software releases TASSCC 2011 Annual Conference 20 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 21. Roadmap – Phase 1Deployment Identify point of contact for security issues Create informal security response team(s) TASSCC 2011 Annual Conference 21 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 22. Resources OWASP – Open Web Application Security Project http://www.owasp.org/ OpenSAMM - Software Assurance Maturity Model http://www.opensamm.org/ Denim Group – Remediation Resource Center http://www.denimgroup.com/remediation/ TASSCC 2011 Annual Conference 22 Copyright 2011 by Texas Education Agency. All rights reserved.
  • 23. Questions? TASSCC 2011 Annual Conference 23 Copyright 2011 by Texas Education Agency. All rights reserved.

Notas del editor

  1. You can contact us by email.These slides will be provided.Resources, including links, are provided at the end.
  2. BackgroundAbout usAbout TEAAbout application securityTrendsAt TEAIn the industryEssentialsWhere did TEA startWhat you don’t needWhat you do needRoadmap-Work to maturity-Phased approach
  3. TEA works with school districts and regional service centers and is responsible for school funding and educator certification.
  4. Key Point*Application security should be on your radar screen.Statistics-Trustwave Global Security Report 2011 identifies the cause of 6% of breaches as an SQL Injection flaw (on par with Email Trojan and Social Engineering). Trustwave cites it as the most popular attack vector for web applications.-Verizon Data Breach Incident Report 2011 identifies the cause of 14% of breaches involving hacking as an SQL Injection flaw. Almost ¼ of hacking breaches (22%) used web applications as their attack vector. The Verizon DBIR 2011 states, “Just because web applications dropped as an overall percentage of attacks, don’t believe for an instant that they are any less critical a vector than they were a year ago. If you remove hospitality and retail victims from this dataset, web applications are right back on top and are more numerous than ever.”
  5. Key Point*Application security is as important as ever but funding is limited.
  6. Key Point*TEA needed to revamp its Application Security Program.VeracodeManaged security service providerProprietary automated scanningInitial review performed by vendorDenim GroupSecondary review performed by vendorRemediation analysis and work performed by vendor
  7. Key Point*This is not about the perfect Application Security Program… It’s about a basic one.Mostly, you need to start with structure, not software.
  8. Key Point*Expensive software is best purchased after you have policy and procedure already in place.
  9. Key Point*Expensive software is best purchased after you have policy and procedure already in place.
  10. Key Point*Begin with what you already have.
  11. Key Point*Begin with what you already have.
  12. Key Point*The effort will need a leader.Other** introduce OWASP at this point
  13. Key Point*Application security should involve everyone, not just the technical folks.Other-Security team is primarily oversight
  14. Key Point*Developers and testers need to know what they are up against.
  15. Key Point*Your team will need to consult with experts, inside or outside of your organization.
  16. Key Point*Have a plan and execute it… slowly.
  17. Key Point*TEA’s roadmap is based on OpenSAMM.Other-OpenSAMM is managed by OWASP-TEA target maturity levels are listed in parentheses-TEA will take a multi-phase approach to implement target maturity
  18. Key Point*Governance activities work to align the program with the business.
  19. Key Point*Construction activities work to build security procedures into software development.
  20. Key Point*Verification activities work to address security in software testing.
  21. Key Point*Deployment activities work to provide security for software in production.