avoiding the pitfalls of secure sdlc

19
Avoiding the Pitfalls of Secure SDLC Succeeding with Automation

Upload: gerard

Post on 16-Feb-2016

61 views

Category:

Documents


0 download

DESCRIPTION

Avoiding the Pitfalls of Secure SDLC. Succeeding with Automation. Introductions. Status Quo. Where we find flaws today. Highest ROI. Look familiar?. Relative cost to fix, based on time of detection. Source: NIST. February 2012 Report from Quocirca. Results of an Open SAMM Assessment. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Avoiding the Pitfalls of Secure SDLC

Avoiding the Pitfalls of Secure SDLC

Succeeding with Automation

Page 2: Avoiding the Pitfalls of Secure SDLC

Introductions

Page 3: Avoiding the Pitfalls of Secure SDLC

Status Quo

Page 4: Avoiding the Pitfalls of Secure SDLC

Requir

emen

ts / A

rchite

cture

Coding

Integ

ration

/ Com

pone

nt Tes

ting

System

/ Acc

eptan

ce T

estin

g

Produc

tion /

Pos

t-Rele

ase

1x6x

11x16x21x26x31x36x

Rel

ativ

e co

st to

fix,

bas

ed o

n tim

e of

det

ectio

n

Source: NIST

Highest ROI

Where we find flaws today

Look familiar?

Page 5: Avoiding the Pitfalls of Secure SDLC

February 2012 Report from Quocirca

Page 6: Avoiding the Pitfalls of Secure SDLC

Results of an Open SAMM Assessment

Page 7: Avoiding the Pitfalls of Secure SDLC

Problems with Verification

Page 8: Avoiding the Pitfalls of Secure SDLC

Security Requirements

42%

58%

Not covered by scannersCan be caught by scanners

Page 9: Avoiding the Pitfalls of Secure SDLC

Scaling: Self-Serve

Page 10: Avoiding the Pitfalls of Secure SDLC

Solution: Automated, Criteria-based

Requirements Generation

Page 11: Avoiding the Pitfalls of Secure SDLC

Context

Page 12: Avoiding the Pitfalls of Secure SDLC

Matched Against Rules

Page 13: Avoiding the Pitfalls of Secure SDLC

Generates Threats

Page 14: Avoiding the Pitfalls of Secure SDLC

Matched Against Rules

Page 15: Avoiding the Pitfalls of Secure SDLC

Which Have Countermeasures

Page 16: Avoiding the Pitfalls of Secure SDLC

Apply the context for specific guidelines

Page 17: Avoiding the Pitfalls of Secure SDLC

And (Optionally) Import into ALM

Page 18: Avoiding the Pitfalls of Secure SDLC

Program Justification:$4k to find vuln in

production

Page 19: Avoiding the Pitfalls of Secure SDLC

[email protected]@sdelements.com