SlideShare a Scribd company logo
Secure SDLC. 
Approach and realization 
by Nazar Tymoshyk, Ph.D., CEH
Even best applications 
get challenges
Big applications get bigger challenges
Security is important factor for your app
Consequences 
Reputation loss Penalties Data loss
IP Theft 
Breaching 
organizational 
perimeters 
Modify Victims 
website to deploy 
MALWARE to website 
visitors 
Threats 
Taking over high-value 
accounts
Hackers 
motives 
Previously, attackers used application vulnerabilities 
to cause embarrassment and disruption. But now 
these attackers are exploiting vulnerabilities to steal 
data and much more
Web application firewall 
Microsoft IIS Apache Nginx
CYA 
(cover your apps) 
Time-to-Fix vs. 
Time-to-Hack 
Automated 
Temporary Patches
Why 
• Effective design of protected code requires a change in 
the mindset of the participants involved. 
• Existing training resources impose on their study of the 
causes and consequences of resistance consequences 
instead of eliminating the causes. 
• Following the conventional approach, the designer 
must be qualified penetration tester to start writing 
secure code. 
• It DOES NOT WORK!
WHY 
• Effective design of protected code requires a change in the mindset 
of the participants involved. 
• Existing training resources impose on their study of the causes and 
consequences of resistance consequences instead of eliminating the 
causes. 
• Following the 
conventional approach, 
the designer must be 
qualified penetration 
tester to start writing 
secure code. 
It DOES NOT 
WORK!
Developer 
• Focus on functional requirements 
• Know about: 
– OWASP Top 10 
– 1 threat (DEADLINE fail) 
• Concentrated on risks 
«I know when I’m writing code I’m not 
thinking about evil, I’m just trying to think about 
functionality» (с) Scott Hanselman
Security Officer 
• Focused on 
requirement to 
security 
• Known difference 
between vulnerability 
and attack  
• Focused on 
vulnerabilities
Risks are for managers, not developers
Typical Security Report delivered by security firm
Typical Security Report delivered by other auditor
How security is linked to development 
3rd party or internal audit 
Tone of 
security 
defects 
BACK to re-Coding, re-Building, re-Testing, re-Auditing 
Than start process of re-Coding, re-Building, re-Testing, re-Auditing
How much time you need to fix 
security issues in app?
How it should look 
With proper Security Program number of 
security defects should decrease from phase 
to phase 
Automated 
security 
Tests 
CI 
integrated 
Manual 
security 
Tests 
OWASP methodology 
Secure 
Coding 
trainings 
Regular 
Vulnerability 
Scans
Primary Benefits 
Minimize the costs of the Security related issues 
Avoid repetitive security issues 
Avoid inconsistent level of the security 
Determine activities that pay back faster during current 
state of the project
Secure 
Development 
Lifecycle
Mapping SDL to Agile 
•Every-Sprint practices: Essential security 
practices that should be performed in 
every release. 
•Bucket practices: Important security 
practices that must be completed on a 
regular basis but can be spread across 
multiple sprints during the project 
lifetime. 
•One-Time practices: Foundational 
security practices that must be 
established once at the start of every new 
Agile project.
Microsoft SDL
Training 
PRE SDL TRAINING: 
• Introduction to Microsoft SDL 
• Essential Software Security Training for the 
Microsoft SDL 
• Basics of Secure Design, Development and 
Test 
• Introduction to Microsoft SDL Threat 
Modeling 
• SDL Quick Security References 
• SDL Developer Starter Kit
Requirements Phase 
• SDL Practice #2: Establish Security and 
Privacy Requirements (one time practice) 
• SDL Practice #3: Create Quality Gates/Bug 
Bars 
• SDL Practice #4: Perform Security and 
Privacy Risk Assessments (one time 
practice)
Design 
• Establish Design Requirements (one time 
practice) 
• Attack Surface Analysis/Reduction (one time 
practice) 
• Use Threat Modeling 
• Mitigation of threats 
• Secure Design 
• Formulating security guidelines 
• Security Design Review
Implementation 
• SDL Practice #8: Use Approved Tools 
• SDL Practice #9: Deprecate Unsafe 
Functions 
• SDL Practice #10: Perform Static Analysis
Verification Phase 
Bucket practices: 
• SDL Practice #11: Perform Dynamic 
Analysis 
• SDL Practice #12: Fuzz Testing 
• SDL Practice #13: Attack Surface Review
Release Phase 
• SDL Practice #14: Create an Incident 
Response Plan (one time practice) 
• SDL Practice #15: Conduct Final Security 
Review 
• SDL Practice #16: Certify Release and 
Archive
Response Phase 
• SDL Practice #17: Execute Incident 
Response Plan 
– Analysis vulnerability information 
– Risk calculation 
– Patch release 
– Clients notification 
– Information publishing
Value 
20-40% time for testing/re-testing decrease 
Catch problems as soon as possible 
Avoid repetitive security issues 
Improve Security Expertise/Practices for current Team 
Automation, Integration, Continuously 
Proactive Security Reporting 
Full coverage
CI SECURITY
Typical CI Workflow
Continuous Integration Delivery 
Deployment
High level vision 
Static Code Analysis Dynamic Security testing 
CI tools 
Deploying application 
Security Reports 
Pull source code
CI Security process 
Build 
• Build code 
with special 
debug 
options 
Deploy 
• Pack build 
and code 
• Deploy app 
to VM for 
test 
Test 
Security 
• Run code 
test 
• Run Test 
dynamic 
web 
application 
from VM 
with security 
tools 
Analyze 
• Collect and 
format 
results 
• Verify results 
• Filter false 
positive / 
negative 
• Tune 
scanning 
engine 
• Fix defects
CI Workflow 
Dynamic tests with Security scanner 
OWASP Top 10 Risk coverage 
A1-Injection 
A2-Broken Authentication and Session 
Management 
A3-Cross-Site Scripting (XSS) 
A4-Insecure Direct Object References 
A5-Security Misconfiguration 
A6-Sensitive Data Exposure 
A7-Missing Function Level Access Control 
A8-Cross-Site Request Forgery (CSRF) 
A9-Using Components with Known 
Vulnerabilities 
A10-Unvalidated Redirects and Forwards
Tools for Secure SDLC 
• IBM AppScan Sources 
• Burp Suite 
• Sonar 
• OWASP ZAP 
• HP Fortify 
• Netsparcer 
• Coverify 
• Veracode
Supported Languages 
• Java 
• .NET (C#, ASP.NET, 
and VB.NET) 
• JSP 
• Client-side JavaScript 
• Cold Fusion 
• C/C++ 
• Classic ASP (both 
JavaScript/VBScript) 
• PHP, Perl 
• Visual Basic 6 
• COBOL 
• T-SQL, PL/SQL
Analysis of App Security Statistic
Sonar – for code quality coverage
Code Security Analysis 
We are able to detect line of bugged code
Filtering false positive
It really 
works! 
Applications Secured - 
Business Protected
THANK YOU 
45 
Email: root.nt@gmail.com 
Skype: root_nt

More Related Content

PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PPTX
Secure SDLC Framework
PPT
SOC presentation- Building a Security Operations Center
PPTX
Security operation center (SOC)
PPTX
An introduction to SOC (Security Operation Center)
PPTX
Enterprise Security Architecture Design
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Secure SDLC Framework
SOC presentation- Building a Security Operations Center
Security operation center (SOC)
An introduction to SOC (Security Operation Center)
Enterprise Security Architecture Design

What's hot (20)

PPTX
Cloud Security
PPTX
SABSA Implementation(Part V)_ver1-0
PDF
Security champions v1.0
PPT
Introduction To OWASP
PPTX
The Future of Security Architecture Certification
PDF
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
PPTX
7 Steps to Threat Modeling
PDF
Active Directory in ICS: Lessons Learned From The Field
PPTX
Cloud Security Architecture.pptx
PPTX
SABSA Implementation(Part I)_ver1-0
PPTX
PPTX
Enterprise Security Architecture
PDF
Cybersecurity Roadmap Development for Executives
PPTX
Cloud security and security architecture
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PDF
Application Security - Your Success Depends on it
PPTX
Risk Assessment and Threat Modeling
PPTX
Adaptive Enterprise Security Architecture
PDF
Introduction to Tenable
PDF
Industrial_Cyber_Security
Cloud Security
SABSA Implementation(Part V)_ver1-0
Security champions v1.0
Introduction To OWASP
The Future of Security Architecture Certification
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
7 Steps to Threat Modeling
Active Directory in ICS: Lessons Learned From The Field
Cloud Security Architecture.pptx
SABSA Implementation(Part I)_ver1-0
Enterprise Security Architecture
Cybersecurity Roadmap Development for Executives
Cloud security and security architecture
From SIEM to SOC: Crossing the Cybersecurity Chasm
Application Security - Your Success Depends on it
Risk Assessment and Threat Modeling
Adaptive Enterprise Security Architecture
Introduction to Tenable
Industrial_Cyber_Security
Ad

Viewers also liked (20)

PPTX
Agile & Secure SDLC
PDF
Security Development Lifecycle Tools
PPTX
Intro to Security in SDLC
PPTX
Security Hole #11 - Competitive intelligence - Beliaiev
PPTX
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
PPTX
Hack through Injections
PPTX
Security Hole #11 - Unusual security vulnerabilities - Yuriy Bilyk
PPTX
Security as a new metric for Business, Product and Development Lifecycle
PDF
Rica Belna _ Art for Interior Design (Graphic + Photo PDF) - meeting your int...
PDF
August 2 Treasure Emporium with Britty & Tazzy
PDF
See andrew week2_ignite_presentation_slidesow
PPT
Distribution
PDF
Lisa Lowder Ignite Slideshow, Choose Excellence
PDF
User Experience at Fundacion Paraguaya
PPTX
Dasar kompetensi keahlian multimedia 2
PDF
4 οκτωβρίου Παγκόσμια Ημέρα Προστασίας των Ζώων
PPTX
OWASP Top 10 practice workshop by Stanislav Breslavskyi
PPTX
Ppt kolaborasi qbl 1 - azzara nurfitri - IPE 31
DOCX
Botacora de tecnologia1
PPTX
Training in vidya electrotech pvt. ltd. noida
Agile & Secure SDLC
Security Development Lifecycle Tools
Intro to Security in SDLC
Security Hole #11 - Competitive intelligence - Beliaiev
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
Hack through Injections
Security Hole #11 - Unusual security vulnerabilities - Yuriy Bilyk
Security as a new metric for Business, Product and Development Lifecycle
Rica Belna _ Art for Interior Design (Graphic + Photo PDF) - meeting your int...
August 2 Treasure Emporium with Britty & Tazzy
See andrew week2_ignite_presentation_slidesow
Distribution
Lisa Lowder Ignite Slideshow, Choose Excellence
User Experience at Fundacion Paraguaya
Dasar kompetensi keahlian multimedia 2
4 οκτωβρίου Παγκόσμια Ημέρα Προστασίας των Ζώων
OWASP Top 10 practice workshop by Stanislav Breslavskyi
Ppt kolaborasi qbl 1 - azzara nurfitri - IPE 31
Botacora de tecnologia1
Training in vidya electrotech pvt. ltd. noida
Ad

Similar to Agile and Secure SDLC (20)

PPTX
Digital Product Security
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PPTX
Secure SDLC in mobile software development.
PDF
What Every Developer And Tester Should Know About Software Security
PPTX
Security Services and Approach by Nazar Tymoshyk
PPTX
Implementing an Application Security Pipeline in Jenkins
PPTX
DevSecOps Story with added security controls
PDF
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
PDF
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
PPTX
Agile and Secure Development
PPTX
Perforce on Tour 2015 - Grab Testing By the Horns and Move
PPTX
How to Get Started with DevSecOps
PPTX
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
PDF
Devops security-An Insight into Secure-SDLC
PDF
Vulnerability Management: A Comprehensive Overview
PPTX
Дмитро Терещенко, "How to secure your application with Secure SDLC"
PPTX
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
PDF
Applicaiton Security - Building The Audit Program
PPT
Lecture Course Outline and Secure SDLC.ppt
PDF
AppSec in an Agile World
Digital Product Security
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Secure SDLC in mobile software development.
What Every Developer And Tester Should Know About Software Security
Security Services and Approach by Nazar Tymoshyk
Implementing an Application Security Pipeline in Jenkins
DevSecOps Story with added security controls
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Agile and Secure Development
Perforce on Tour 2015 - Grab Testing By the Horns and Move
How to Get Started with DevSecOps
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Devops security-An Insight into Secure-SDLC
Vulnerability Management: A Comprehensive Overview
Дмитро Терещенко, "How to secure your application with Secure SDLC"
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
Applicaiton Security - Building The Audit Program
Lecture Course Outline and Secure SDLC.ppt
AppSec in an Agile World

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Monthly Chronicles - July 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Modernizing your data center with Dell and AMD
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Monthly Chronicles - July 2025
The AUB Centre for AI in Media Proposal.docx
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Modernizing your data center with Dell and AMD
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Understanding_Digital_Forensics_Presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx

Agile and Secure SDLC

  • 1. Secure SDLC. Approach and realization by Nazar Tymoshyk, Ph.D., CEH
  • 2. Even best applications get challenges
  • 3. Big applications get bigger challenges
  • 4. Security is important factor for your app
  • 5. Consequences Reputation loss Penalties Data loss
  • 6. IP Theft Breaching organizational perimeters Modify Victims website to deploy MALWARE to website visitors Threats Taking over high-value accounts
  • 7. Hackers motives Previously, attackers used application vulnerabilities to cause embarrassment and disruption. But now these attackers are exploiting vulnerabilities to steal data and much more
  • 8. Web application firewall Microsoft IIS Apache Nginx
  • 9. CYA (cover your apps) Time-to-Fix vs. Time-to-Hack Automated Temporary Patches
  • 10. Why • Effective design of protected code requires a change in the mindset of the participants involved. • Existing training resources impose on their study of the causes and consequences of resistance consequences instead of eliminating the causes. • Following the conventional approach, the designer must be qualified penetration tester to start writing secure code. • It DOES NOT WORK!
  • 11. WHY • Effective design of protected code requires a change in the mindset of the participants involved. • Existing training resources impose on their study of the causes and consequences of resistance consequences instead of eliminating the causes. • Following the conventional approach, the designer must be qualified penetration tester to start writing secure code. It DOES NOT WORK!
  • 12. Developer • Focus on functional requirements • Know about: – OWASP Top 10 – 1 threat (DEADLINE fail) • Concentrated on risks «I know when I’m writing code I’m not thinking about evil, I’m just trying to think about functionality» (с) Scott Hanselman
  • 13. Security Officer • Focused on requirement to security • Known difference between vulnerability and attack  • Focused on vulnerabilities
  • 14. Risks are for managers, not developers
  • 15. Typical Security Report delivered by security firm
  • 16. Typical Security Report delivered by other auditor
  • 17. How security is linked to development 3rd party or internal audit Tone of security defects BACK to re-Coding, re-Building, re-Testing, re-Auditing Than start process of re-Coding, re-Building, re-Testing, re-Auditing
  • 18. How much time you need to fix security issues in app?
  • 19. How it should look With proper Security Program number of security defects should decrease from phase to phase Automated security Tests CI integrated Manual security Tests OWASP methodology Secure Coding trainings Regular Vulnerability Scans
  • 20. Primary Benefits Minimize the costs of the Security related issues Avoid repetitive security issues Avoid inconsistent level of the security Determine activities that pay back faster during current state of the project
  • 22. Mapping SDL to Agile •Every-Sprint practices: Essential security practices that should be performed in every release. •Bucket practices: Important security practices that must be completed on a regular basis but can be spread across multiple sprints during the project lifetime. •One-Time practices: Foundational security practices that must be established once at the start of every new Agile project.
  • 24. Training PRE SDL TRAINING: • Introduction to Microsoft SDL • Essential Software Security Training for the Microsoft SDL • Basics of Secure Design, Development and Test • Introduction to Microsoft SDL Threat Modeling • SDL Quick Security References • SDL Developer Starter Kit
  • 25. Requirements Phase • SDL Practice #2: Establish Security and Privacy Requirements (one time practice) • SDL Practice #3: Create Quality Gates/Bug Bars • SDL Practice #4: Perform Security and Privacy Risk Assessments (one time practice)
  • 26. Design • Establish Design Requirements (one time practice) • Attack Surface Analysis/Reduction (one time practice) • Use Threat Modeling • Mitigation of threats • Secure Design • Formulating security guidelines • Security Design Review
  • 27. Implementation • SDL Practice #8: Use Approved Tools • SDL Practice #9: Deprecate Unsafe Functions • SDL Practice #10: Perform Static Analysis
  • 28. Verification Phase Bucket practices: • SDL Practice #11: Perform Dynamic Analysis • SDL Practice #12: Fuzz Testing • SDL Practice #13: Attack Surface Review
  • 29. Release Phase • SDL Practice #14: Create an Incident Response Plan (one time practice) • SDL Practice #15: Conduct Final Security Review • SDL Practice #16: Certify Release and Archive
  • 30. Response Phase • SDL Practice #17: Execute Incident Response Plan – Analysis vulnerability information – Risk calculation – Patch release – Clients notification – Information publishing
  • 31. Value 20-40% time for testing/re-testing decrease Catch problems as soon as possible Avoid repetitive security issues Improve Security Expertise/Practices for current Team Automation, Integration, Continuously Proactive Security Reporting Full coverage
  • 35. High level vision Static Code Analysis Dynamic Security testing CI tools Deploying application Security Reports Pull source code
  • 36. CI Security process Build • Build code with special debug options Deploy • Pack build and code • Deploy app to VM for test Test Security • Run code test • Run Test dynamic web application from VM with security tools Analyze • Collect and format results • Verify results • Filter false positive / negative • Tune scanning engine • Fix defects
  • 37. CI Workflow Dynamic tests with Security scanner OWASP Top 10 Risk coverage A1-Injection A2-Broken Authentication and Session Management A3-Cross-Site Scripting (XSS) A4-Insecure Direct Object References A5-Security Misconfiguration A6-Sensitive Data Exposure A7-Missing Function Level Access Control A8-Cross-Site Request Forgery (CSRF) A9-Using Components with Known Vulnerabilities A10-Unvalidated Redirects and Forwards
  • 38. Tools for Secure SDLC • IBM AppScan Sources • Burp Suite • Sonar • OWASP ZAP • HP Fortify • Netsparcer • Coverify • Veracode
  • 39. Supported Languages • Java • .NET (C#, ASP.NET, and VB.NET) • JSP • Client-side JavaScript • Cold Fusion • C/C++ • Classic ASP (both JavaScript/VBScript) • PHP, Perl • Visual Basic 6 • COBOL • T-SQL, PL/SQL
  • 40. Analysis of App Security Statistic
  • 41. Sonar – for code quality coverage
  • 42. Code Security Analysis We are able to detect line of bugged code
  • 44. It really works! Applications Secured - Business Protected
  • 45. THANK YOU 45 Email: root.nt@gmail.com Skype: root_nt