the abridged application security programmedia.techtarget.com/searchsecurity/downloads/fisd... ·...

23
The Abridged Application The Abridged Application Security Program Max Caceres

Upload: others

Post on 08-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

The Abridged Application The Abridged Application Security Program

Max Caceres

Page 2: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

Approaches to application Approaches to application security

• Microsoft-style (SDL)• Website, books, whitepapers• 80+ activities• 80+ activities

• Building Security In Maturity Model (BSIMM)• 100+ activities100+ activities

Page 3: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have
Page 4: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have
Page 5: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

Dangers of getting big too Dangers of getting big too early

• Developing program takes a long timetakes a long time

• Executing will require a large require a large investment upfront

• You’ll have to do a You ll have to do a lot of selling to get the organization onboard

Page 6: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

The Abridged Security The Abridged Security Program

• Focus on adding value from the start

• Translate traction and credibility • Translate traction and credibility into a program that grows organically into what your organization needsorganization needs

Page 7: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

MVP: Minimum Viable ProgramMVP: Minimum Viable ProgramEngage on just those activities (and not more) that can reduce security defects today

Page 8: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

h ?Why MVP?

• Avoid creating bureaucracy before absolutely necessary

• Avoid creating a complex • Avoid creating a complex program that you then have to retrofit to the organization

• Deploy limited resources wisely• Deploy limited resources wisely

Page 9: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

G iGrowing an appsec program

• Iterative process ( l l (release early, release often)

• Constantly show tangible results

• Develop program as you goy g

Page 10: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

iIterative process

ReviewGrow

Learn

Page 11: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

Building block #1: the Building block #1: the security review

• Benefits• Minimal requirements• Can be partially automated or • Can be partially automated or

outsourcedProduces actionable results• Produces actionable results

• Opportunity to learn and gain dibilicredibility

Page 12: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

i i lMinimal process

Security architecture reviewy

Abbreviated threat modelAbbreviated threat model

Code reviewCode review

R t d di fi diReport and discuss findings

Page 13: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

t d i1st document: review report

• Communicate findings and expectations clearly

• Key elements• Key elements• Succinct description and remediation• Simple risk score scaled by app

criticalityy• Risk waiver scale

Page 14: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

l i fi diExample security finding

• Finding: Authentication bypassS it Hi h• Severity: High

• Adjusted Risk Score: 5i i h d k• Description: An unauthenticated attacker can

execute an account transferR d ti E l th ti t d • Recommendation: Ensure only authenticated and authorized users can transfer funds

Page 15: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

l i d fBe selective and focus

• Look for sensitive applications about to complete a release cycle

• Focus on one review at a time• Focus on one review at a time• Scope reviews to last 2 wks max• Gain credibility by engaging with

dev team throughout reviewdev team throughout review

Page 16: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

In source | OutsourceIn source | OutsourceWhite box | Black box

• Use internal source code review to learn about development organization and grow program g g p gorganically

• Use external penetration testers • Use external penetration testers for highly critical applications with public exposure

Page 17: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

fLearn from your customers

• Adjust risk scoring model• Learn about your firm’s

development processdevelopment process• Learn about your firm’s Learn about your firm s

technology choicesd if f d• Identify your future advocates

Page 18: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

Mine common security Mine common security components

• Ideal candidates are authentication, authorization, encryption, loggingyp , gg g

• The firm already has code that does this Find it review it then does this. Find it, review it, then make it the standard

• You don’t have to own it

Page 19: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

l lApply leverage

• Look at automated tools, staff t ti d t i iaugmentation, and training

• Standardize on key security components

• Institutionalize security architecture yreview

• Breed developer advocates and • Breed developer advocates and delegate

Page 20: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

lDevelop program as you go

Triage Review Mine Scaleg

Security architecture

review

Security review

Standard security Security

trainingreview process

Architecture interview

process

Finding risk

features

Blessed security

training

Policyinterview questionnaire

Application

scoring model

Coding standards &

security patterns

Standard

Policy

Breed security pprisk scoring

model

standards & automation parameters

technology stacks

Breed security advocates

Page 21: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

i id lPractices to avoid early-on

• Coding standards & policy• Complex taxonomies and

vulnerability listsvulnerability lists• Gate application deploymentGate application deployment• Delegating reviews to

d ldevelopers

Page 22: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

Benefits of the abridged Benefits of the abridged program

• You’ll be reducing security defects from d day one

• If you truly added value dev teams will come to you directly

• Resource requirements will grow with q gthe program, but you’ll have traction and supporters to help you get fundingpp p y g g

Page 23: The Abridged Application Security Programmedia.techtarget.com/searchSecurity/downloads/FISD... · Approaches to application security •Microsoft-style (SDL) ... • YouYou ll have

Q iQuestions