Building Secure Application
• Application Security Governance
• Application Security Framework
• Application Security Process & Procedure
• Application Security in All Layers of Computing
Environment
• Integrated Secure Coding Environment
Evolving Threats
Source : Cisco
Application Secure development
Development
Tools
Source
control
Bug tracking Test Manager Code
verification
Desktop Transport Network Web Applications
Antivirus
Protection
Encryption
(SSL)
Firewalls /
IDS / IPS
Firewall
Web Servers
Databases
Backend
Server
Application
Servers
Info Security Landscape
Application Security -
Understanding the Problem
Secure Infrastructure
Weakest link
Building Security Into the
Development Process
*Graphics from OWASP.com
• Test existing deployed apps
• Eliminate security exposure in
live applications
Production
• Test apps before going to production
• Deploy secure web applications
Deploy
• Test apps for security issues in QA
organization along with performance and
functional testing
• Reduce costs of security testing
Test
• Test apps for security issues in
Development identifying issues
at their earliest point
• Realize optimum security
testing efficiencies (cost
reduction)
Development• Security requirements, architecture,
threat modeling, etc
Define/Design
Application Security Adoption
Within the SDLC
Difficulty &
Cost of
Test
% Applications Tested
High
Low
Low High
Security
Team
Security Team
Security Team
QA Team
QA Team
Development Team
Phase 1 Phase 2 Phase 3
Criticality
& Risk of
App.
Development
Team
Educating Developers and Getting
“Buy in”
• Establish security accountability and stds for shipping
• Create a “security architect” role
• Create a security community of practice
• Create a secure development portal or wiki
• Conduct hacking demos to demonstrate risks
• Online & offline courses for secure coding
• Put developers through secure coding exams
• Security reviews of real applications
• Pay premiums for security architects
Security Framework
Security Governance, Risk Management
and Compliance
WorleyParsons Security Framework
External Representation
Network, Server, and End-point
Physical Infrastructure
People and Identity
Data and Information
Application and Process
Managed
Security
Services
Security
Hardware and
Software
Professional
Services
Physical Security Solutions
Security Governance, Risk & Compliance Solutions
Threat and Vulnerability Mgmt & Monitoring Solutions
Application Security Lifecycle Mgmt Solutions
Identity and Access Management Solutions
Information Security Solutions
Application Security
Process Framework
Verify In Production Applications
Design, Develop, Test, and Verify Secure Apps
Educate IT Professionals
Maintain and Publish Policies and Guidelines
Respond to Security Exposure Incidents
ApplyLessonsLearned
Application Management – Secure
Infrastructure
NETWORK HOST APPLICATION ACCOUNT TRUST
 Architecture
 Transport
 Network device
 Access control
list (ACL)
permission
settings
 Operating
system
 Services
 Internet
Information
Services (IIS)
 Simple Mail
Transfer
Protocol
(SMTP)
 File Transfer
Protocol (FTP)
 NetBIOS/Remo
te procedure
call (RPC)
 Terminal
Services
 Microsoft
SQL Server
 Input validation
 Clear text
protocol
 Authentication
 Authorization
 Cryptography
 Auditing and
logging
 Unused
accounts
 Weak or blank
passwords
 Shared
accounts
 Access
privileges
 Rogue trusts
Application Layer Requirements
• Input validation
• Session management
• Authentication and authorization
• Design and code review
• Application and server error handling
• Application auditing and logging
• Application backup and restore
• Private data encryption
Common Application Development
Issues
• User input validation
• Cookies, authentication, and access
• Passwords
• Access control lists
• COM+ application configuration
• Auditing and logging

More Related Content

PDF
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
PDF
Securing DevOps Lifecycle
PDF
Four ways dev ops benefits your enterprise in 2022 min
PPTX
A journey from dev ops to devsecops
PPTX
Secure DevOPS Implementation Guidance
PPTX
ABN AMRO DevSecOps Journey
PDF
DevSecOps for the DoD
PDF
Webinar – Risk-based adaptive DevSecOps
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
Securing DevOps Lifecycle
Four ways dev ops benefits your enterprise in 2022 min
A journey from dev ops to devsecops
Secure DevOPS Implementation Guidance
ABN AMRO DevSecOps Journey
DevSecOps for the DoD
Webinar – Risk-based adaptive DevSecOps

What's hot (20)

PPTX
Integrate Security into DevOps - SecDevOps
DOCX
10 things to get right for successful dev secops
PDF
Take Control: Design a Complete DevSecOps Program
PPTX
Application security meetup - cloud security best practices 24062021
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
PDF
DevOps & DevSecOps in Swiss Banking
PPTX
DevSecOps without DevOps is Just Security
PDF
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
PDF
Talk DevSecOps to me
PDF
Pentest is yesterday, DevSecOps is tomorrow
PPTX
DevSecOps
PDF
Devops Indonesia - DevSecOps - The Open Source Way
PDF
DevSecOps at the GSA
PDF
Devops security-An Insight into Secure-SDLC
PPTX
How to Get Started with DevSecOps
PPTX
Simplify Dev with Complicated Security Tools
PDF
DevSecOps | DevOps Sec
PPTX
DevSecOps : an Introduction
PPTX
Enable DevSecOps using JIRA Software
Integrate Security into DevOps - SecDevOps
10 things to get right for successful dev secops
Take Control: Design a Complete DevSecOps Program
Application security meetup - cloud security best practices 24062021
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevOps & DevSecOps in Swiss Banking
DevSecOps without DevOps is Just Security
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
Talk DevSecOps to me
Pentest is yesterday, DevSecOps is tomorrow
DevSecOps
Devops Indonesia - DevSecOps - The Open Source Way
DevSecOps at the GSA
Devops security-An Insight into Secure-SDLC
How to Get Started with DevSecOps
Simplify Dev with Complicated Security Tools
DevSecOps | DevOps Sec
DevSecOps : an Introduction
Enable DevSecOps using JIRA Software
Ad

Similar to Application_security_Strategic (20)

PPTX
Digital Product Security
PDF
AppSec in an Agile World
PPTX
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
PDF
What Every Developer And Tester Should Know About Software Security
PPTX
DevSecOps Story with added security controls
PPTX
Agile and Secure SDLC
PPTX
Shared Security Responsibility for the Azure Cloud
PPTX
Cloud Security vs Security in the Cloud
PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
PPSX
TSS - App Penetration Testing Services
PDF
Azure 101: Shared responsibility in the Azure Cloud
PPTX
Secure SDLC in mobile software development.
PPT
Material best practices in network security using ethical hacking
PPTX
Security guidelines
PPTX
00. introduction to app sec v3
PPTX
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
PPTX
Enterprise under attack dealing with security threats and compliance
PDF
Digital Assurance Center of Excellence
PDF
The What, Why, and How of DevSecOps
Digital Product Security
AppSec in an Agile World
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
What Every Developer And Tester Should Know About Software Security
DevSecOps Story with added security controls
Agile and Secure SDLC
Shared Security Responsibility for the Azure Cloud
Cloud Security vs Security in the Cloud
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
TSS - App Penetration Testing Services
Azure 101: Shared responsibility in the Azure Cloud
Secure SDLC in mobile software development.
Material best practices in network security using ethical hacking
Security guidelines
00. introduction to app sec v3
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
NIST Cybersecurity Framework (CSF) on the Public Cloud
Enterprise under attack dealing with security threats and compliance
Digital Assurance Center of Excellence
The What, Why, and How of DevSecOps
Ad

Application_security_Strategic

  • 1. Building Secure Application • Application Security Governance • Application Security Framework • Application Security Process & Procedure • Application Security in All Layers of Computing Environment • Integrated Secure Coding Environment
  • 4. Desktop Transport Network Web Applications Antivirus Protection Encryption (SSL) Firewalls / IDS / IPS Firewall Web Servers Databases Backend Server Application Servers Info Security Landscape Application Security - Understanding the Problem Secure Infrastructure Weakest link
  • 5. Building Security Into the Development Process *Graphics from OWASP.com • Test existing deployed apps • Eliminate security exposure in live applications Production • Test apps before going to production • Deploy secure web applications Deploy • Test apps for security issues in QA organization along with performance and functional testing • Reduce costs of security testing Test • Test apps for security issues in Development identifying issues at their earliest point • Realize optimum security testing efficiencies (cost reduction) Development• Security requirements, architecture, threat modeling, etc Define/Design
  • 6. Application Security Adoption Within the SDLC Difficulty & Cost of Test % Applications Tested High Low Low High Security Team Security Team Security Team QA Team QA Team Development Team Phase 1 Phase 2 Phase 3 Criticality & Risk of App. Development Team
  • 7. Educating Developers and Getting “Buy in” • Establish security accountability and stds for shipping • Create a “security architect” role • Create a security community of practice • Create a secure development portal or wiki • Conduct hacking demos to demonstrate risks • Online & offline courses for secure coding • Put developers through secure coding exams • Security reviews of real applications • Pay premiums for security architects
  • 8. Security Framework Security Governance, Risk Management and Compliance WorleyParsons Security Framework External Representation Network, Server, and End-point Physical Infrastructure People and Identity Data and Information Application and Process Managed Security Services Security Hardware and Software Professional Services Physical Security Solutions Security Governance, Risk & Compliance Solutions Threat and Vulnerability Mgmt & Monitoring Solutions Application Security Lifecycle Mgmt Solutions Identity and Access Management Solutions Information Security Solutions
  • 9. Application Security Process Framework Verify In Production Applications Design, Develop, Test, and Verify Secure Apps Educate IT Professionals Maintain and Publish Policies and Guidelines Respond to Security Exposure Incidents ApplyLessonsLearned
  • 10. Application Management – Secure Infrastructure NETWORK HOST APPLICATION ACCOUNT TRUST  Architecture  Transport  Network device  Access control list (ACL) permission settings  Operating system  Services  Internet Information Services (IIS)  Simple Mail Transfer Protocol (SMTP)  File Transfer Protocol (FTP)  NetBIOS/Remo te procedure call (RPC)  Terminal Services  Microsoft SQL Server  Input validation  Clear text protocol  Authentication  Authorization  Cryptography  Auditing and logging  Unused accounts  Weak or blank passwords  Shared accounts  Access privileges  Rogue trusts
  • 11. Application Layer Requirements • Input validation • Session management • Authentication and authorization • Design and code review • Application and server error handling • Application auditing and logging • Application backup and restore • Private data encryption
  • 12. Common Application Development Issues • User input validation • Cookies, authentication, and access • Passwords • Access control lists • COM+ application configuration • Auditing and logging