Secure_Development_ISSA_v4

35
Secure Development Steven C. Markey, MSIS, PMP, CISSP, CIPP, CISM, CISA, STS-EV, CCSK, CompTIA Cloud+ Principal, nControl, LLC Adjunct Professor

Transcript of Secure_Development_ISSA_v4

Page 1: Secure_Development_ISSA_v4

Secure Development

Steven C. Markey, MSIS, PMP, CISSP, CIPP, CISM, CISA, STS-EV, CCSK, CompTIA Cloud+

Principal, nControl, LLCAdjunct Professor

Page 2: Secure_Development_ISSA_v4

• Presentation Overview– Application Security (AppSec) Driver(s)– Textbook–Processes (SDLC, SDL, STRIDE, DREAD)–People (InfoSec Staff, Developer Training)–Tools (Scanners, Policies & Standards)–Procuring Secure Applications

– Real World–10 Commandments for AppSec–AppSec Use Cases

Secure Development

Page 3: Secure_Development_ISSA_v4

• AppSec Drivers– Risk Management– Compliance– Revenue/Costs

Secure Development

Page 4: Secure_Development_ISSA_v4

• Risk Management– One of Many Risks–Operational Risk–Financial Risk–Reputational Risk

– Transfer from Network Security to AppSec

Secure Development

Page 5: Secure_Development_ISSA_v4

Source: OWASP

Secure Development

Page 6: Secure_Development_ISSA_v4

Source: ISC2

Secure Development

Page 7: Secure_Development_ISSA_v4

• Compliance– Specific–PCI DSS 6.6

– Vague–SOX–HIPAA–FISMA/FIPS–NERC/FERC–FDA 21 CFRF Part 11/ERES

Secure Development

Page 8: Secure_Development_ISSA_v4

• Revenue/Costs– Value-Add– Key Differentiator– Precursor to 3rd Party Accreditation– ICSA Labs

Secure Development

Page 9: Secure_Development_ISSA_v4

Source: KLP Consulting

Page 10: Secure_Development_ISSA_v4

• AppSec Programs– Architecture + Threat & Vulnerability Management (TVM)– Enterprise Architecture (EA)–Enterprise Security Architecture (ESA)–Sherwood Applied Biz Security Arch (SABSA)–The Open Group Arch Framework (TOGAF)–Jericho Model

– AppSec Maturity Models–Building Security In Maturity Model (BSIMM)–OWASP’s Software Assurance Maturity Model (SAMM)

Secure Development

Page 11: Secure_Development_ISSA_v4

Secure Development

Source: NYSE Euronext

Page 12: Secure_Development_ISSA_v4

Source: NYSE Euronext

Page 13: Secure_Development_ISSA_v4

Source: NYSE Euronext

Page 14: Secure_Development_ISSA_v4

Source: NYSE Euronext

Page 15: Secure_Development_ISSA_v4

Source: NYSE Euronext

Page 16: Secure_Development_ISSA_v4

Source: NYSE Euronext

Page 17: Secure_Development_ISSA_v4
Page 18: Secure_Development_ISSA_v4

Source: Mountain Goat Software

Page 19: Secure_Development_ISSA_v4
Page 20: Secure_Development_ISSA_v4

Source: Microsoft

Secure Development

Page 21: Secure_Development_ISSA_v4

Source: Microsoft

Secure Development

Page 22: Secure_Development_ISSA_v4

Secure Development

Page 23: Secure_Development_ISSA_v4

Secure Development

Page 24: Secure_Development_ISSA_v4

Source: Microsoft

Page 25: Secure_Development_ISSA_v4

Source: Microsoft

Secure Development

Page 26: Secure_Development_ISSA_v4

Source: Microsoft

Page 27: Secure_Development_ISSA_v4

• Training– Know Stakeholders–Project Managers –Development Managers

– Tailor to Development Team– Use an Iterative Model– Incorporate Train the Trainer– Reinforce Training with Formal / Informal Incentives

Secure Development

Page 28: Secure_Development_ISSA_v4

• Scanners– Static Application Security Testing (SAST)– Dynamic Application Security Testing (DAST)– AppSec Pen Testing– Supplemental Tools–Fuzzing, Tracing, Scanning, Sniffing– IDEs–Proxies / Gateways–Firewalls (WAFs, DbFs / DAM, XML)

Secure Development

Page 29: Secure_Development_ISSA_v4

• Coding Conventions & Architectural Standards– Development Team Specific– Coding Enumeration–Error / Exception Handling– Input / Output Validation–Comments / Documentation–Session Management–Memory / Thread Management–PKI– IAM / IdM

Secure Development

Page 30: Secure_Development_ISSA_v4

• Coding Conventions & Architectural Standards– Architectural Enumeration–Thick / Thin– Internal / External–Transactional–Message / Information Delivery–Monitoring–SOA / Mobile / Cloud–App / Middleware–Database

Secure Development

Page 31: Secure_Development_ISSA_v4

• Coding Conventions & Architectural Standards– Architectural Enumeration Scenario–LAMP with Drupal–IAM via AD-based LDAP–Zend (PHP-based) Framework–Imperva DAM–Syslogd with Arcsight SIEM–DMZ w/ Load Balancing

Secure Development

Page 32: Secure_Development_ISSA_v4

• Procuring Secure Applications– Beware of Your Business Ecosystem– Weakest Link Mentality– Legal / SLA Verbiage– 3rd Party Reviews–ASP / Cloud / ISV–Mobile–COTS–Subsidiaries / Customers

Secure Development

Page 33: Secure_Development_ISSA_v4

• 10 AppSec Commandments1. Though Shall Execute AppSec at the Speed of Business2. Though Shall Not Architect Security3. Though Shall Evolve Your Testing Methodologies4. Though Shall Not Surprise Dev Teams5. Though Shall Test Apps in Production6. Though Shall Not Let Frameworks Replace Intelligence7. Though Shall Put Vulnerabilities in Proper Context8. Though Shall Not Give Dev Teams Access to Prod Data9. Though Shall Use a WAF/DAM with a Plan10. Though Shall Not Blame the Dev Team

Secure Development

Source: Dark Reading

Page 34: Secure_Development_ISSA_v4

• AppSec Use Cases– Strong SDLC & SDL Alignment– Socialize & Incentivize SDL Implementation– Embed AppSec SMEs in Dev Teams– Start on New Projects– Retrofit Legacy Apps / Systems as Time Permits– Iterative Improvement & Wins– No (Process / Tool) Silver Bullets

Secure Development

Page 35: Secure_Development_ISSA_v4

• Questions?• Contact– Email: [email protected]– Twitter: @markes1– LI: http://www.linkedin.com/in/smarkey