Transcript
Page 1: ISACA 2016 Application Security RGJ

ENSURING INFORMATION SECURITY IN THE SYSTEM DEVELOPMENT LIFECYCLE PROCESS

RENE G. JASPE CISSP, CSSLP

Page 2: ISACA 2016 Application Security RGJ

Sinag Solutions Founder and CISO Phylasso Corp., Founder and Managing DirectorMobKard, CoFounder and CTO Rene Jaspe CISSP, CSSLP• 13 yrs with Telos Corp., a US Federal Gov’t

Defense Contractor, servicing various US Defense and Intelligence Agencies as well as NATO allies.

• 10 years Software Development and 5 Years Application Security Background.

Page 3: ISACA 2016 Application Security RGJ

2015: “We Take It Very Seriously”

IBM Xforce Threat Intelligence Report 2016

Page 4: ISACA 2016 Application Security RGJ

HEALTHCARE, EDUCATION & FINANCIAL SERVICES LEADS GLOBALLY.

Source: Ponemon Institute Research Report 2016 Cost of Data Breach

Page 5: ISACA 2016 Application Security RGJ

Incident Pattern By Industry

Verizon Data Breach Incident 2016 Report

Page 6: ISACA 2016 Application Security RGJ

• Regulatory & Standards Compliance

– eCommerce: PCI-DSS, PA-DSS– Financial Services: GLBA– Energy: NERC / FERC– Government: FISMA– PH: Data Privacy Act, BSP

• 81% of organizations subject to PCI had not been found compliant prior to the breach

Market Drivers

Page 7: ISACA 2016 Application Security RGJ

Application security challenges:Security-development disconnect fails to prevent vulnerabilities in production applications

•Developers Lack Security Insights (or Incentives to Address Security)

•Mandate to deliver functionality on-time and on-budget – but not to develop secure applications•Developers rarely educated in secure code practices•Product innovation drives development of increasingly complicated applications

Security Team = SDLC Bottleneck• Security tests executed just before launch

– Adds time and cost to fix vulnerabilities late in the process

• Growing number of web applications but small security staff

– Most enterprises scan ~10% of all applications

• Continuous monitoring of production apps limited or non-existent

– Unidentified vulnerabilities & risk

Page 8: ISACA 2016 Application Security RGJ

3 Great Frameworks For Implementing an Enterprise

Software Security Program (MOB)

Page 9: ISACA 2016 Application Security RGJ

Application Security Pros Hold These Truths to Be Self Evident

• Software Security is more than a set of security functions.

– Not magic crypto fairy dust– Not silver bullet security mechanisms.

• Non-functional aspects of design are essential• Bugs and flaws are 50/50.• Security is an emergent property of the entire

system (just like quality).• To end up with secure software, deep

integration with the SDLC is necessary.

Source: Cigital on BSIMM VI

Page 10: ISACA 2016 Application Security RGJ

Prescriptive vs. Descriptive ModelsPrescriptive Models

• Prescriptive models describe what you should do.

• OpenSAMM• Microsoft SDL

• Every company has a methodology they follow (often a hybrid)

• You need an SSDL.

Descriptive Models

• Descriptive models describe what is actually happening.

• The BSIMM is a descriptive model that can be used to measure any number of prescriptive SSDLs.

Page 11: ISACA 2016 Application Security RGJ

Microsoft Security Development Lifecycle 5.2 (May 2012)

Page 12: ISACA 2016 Application Security RGJ

SDL for Agile

Bucket

Bucket

Bucket

Bucket

One-TimeOne-TimeOne-Time

One-Time

One-Time

Bucket practices:: Important security practices that must be completed on a regular basis but can be spread across multiple sprints during the project lifetime.

One-Time practices: Foundational security practices that must be established once at the start of every new Agile project.

Rene Jaspe
Page 13: ISACA 2016 Application Security RGJ

SDL Practice #7 USE THREAT MODELINGApplying a structure approach to threat scenarios during design helps a team more effectively and less expensive identify security vulnerabilities, determines risks from those threats, and establish appropriate mitigations.

Page 14: ISACA 2016 Application Security RGJ

THREAT MODEL SAMPLE

• S – poofing• T – ampering• R – epudiation• I - nformation Disclosure• D – enial of Service• E - levation of Privilege

Page 15: ISACA 2016 Application Security RGJ

OpenSAMM 1.1 (March 2016)

Page 16: ISACA 2016 Application Security RGJ

OpenSAMM 1.1 (March 2016)

Page 17: ISACA 2016 Application Security RGJ
Page 18: ISACA 2016 Application Security RGJ

Sample: Construction

Page 19: ISACA 2016 Application Security RGJ

FINANCIAL SERVICES ORGANIZATION

Page 20: ISACA 2016 Application Security RGJ

FINANCIAL SERVICES ORGANIZATION

Page 21: ISACA 2016 Application Security RGJ

Cost: Phase 1(Months 0 – 3) - Awareness & Planning

Page 22: ISACA 2016 Application Security RGJ

BSIMM 7 ( October 2016)

The BSIMM is a measuring stick for software security. The best way to use the BSIMM is to compare and contrast your own initiative with the data about what other organizations are doing contained in the model. You can then identify goals and objectives of your own and refer to the BSIMM to determine which additional activities make sense for you. The BSIMM data show that high maturity initiatives are well-rounded—carrying out numerous activities in all 12 of the practices described by the model. The model also describes how mature software security initiatives evolve, change, and improve over time.

Page 23: ISACA 2016 Application Security RGJ

BSIMM 7

Page 24: ISACA 2016 Application Security RGJ

Standards & Requirements

Page 25: ISACA 2016 Application Security RGJ

“EVERYBODY” DOES IT

Page 26: ISACA 2016 Application Security RGJ

SAMPLE SPIDER CHART

Page 27: ISACA 2016 Application Security RGJ

VERTICAL COMPARISON

Page 28: ISACA 2016 Application Security RGJ
Page 29: ISACA 2016 Application Security RGJ

• Microsoft Security Development LifeCyclehttps://www.microsoft.com/en-us/sdl/

• OpenSAMMhttp://www.opensamm.org/

• BSIMMhttps://www.bsimm.com/

KEY TAKE AWAY (MOB)

Page 30: ISACA 2016 Application Security RGJ

“Today we were unlucky, but remember we only have to be lucky once. You will have to be lucky always.”

THANK YOU QUESTIONS???

[email protected]@renejaspe

https://ph.linkedin.com/in/renejaspe


Top Related