SlideShare a Scribd company logo
1
Glenn ten Cate
Twitter:
@FooBar_testing_
Riccardo ten Cate
Twitter:
@RiieCco
2
Agenda
• Why?
• Software (AND Security) development life cycle
3
Developer, you are the one
3
Agenda
• Why?
• Software (AND Security) development life cycle
4
Hackers and automated ownage
4
Agenda
• Why?
• Software (AND Security) development life cycle
5
Coding mistakes, déjà vu.
5
Agenda
• Why?
• Software (AND Security) development life cycle
6
Barely hanging on …
6
Agenda
• Why?
• Software (AND Security) development life cycle
7
But there is always an option!
7
Agenda
• Why?
• Software (AND Security) development life cycle
8
There are ways to learn!
8
• Worldwide not-for-profit charitable.
• Our mission is to make software security visible, so that
individuals and organizations worldwide can make
informed decisions about true software security risks.
9
Agenda
• Why?
• Software (AND Security) development life cycle
10
Be responsible for your code.
10
Verify your code
• ASVS lvl1 Opportunistic
It adequately defends against application security vulnerabilities
that are easy to discover.
• ASVS lvl2 Standard
It adequately defends against prevalent application security
vulnerabilities whose existence poses moderate-to-serious risk.
• ASVS lvl3 Advanced
It adequately defends against all advanced application security
vulnerabilities, and also demonstrates principles of good security
design.
11
What is S.K.F
• Guide to secure programming
By adapting your design to security, not securing your design
• Security awareness
It informs you about threats even before you wrote a single line of
code.
• Clear and transparent
Provides information applicable for your specific needs on the spot.
12
Agenda
• Why?
• Software (AND Security) development life cycle
13
And now the blind dev can see.
13
Demo
14
Agenda
• Why?
• Software (AND Security) development life cycle
15
You know this, you are ready.
15
SDLC MANUAL
• OWASP-SKF
• Software Development Life Cycle
• Code review
• SAST
• DAST
16
SDLC CI
• OWASP-SKF
• Software Development Life Cycle
• Travis CI
• Coveralls CI
• Scrutinizer CI
17
Agenda
• Why?
• Software (AND Security) development life cycle
18
GitHub
• https://github.com/blabla1337/skf-flask
18
Agenda
• Why?
• Software (AND Security) development life cycle
19
You have the skills …
19
Agenda
• Why?
• Software (AND Security) development life cycle
20
… you are the one.
20
Getting involved?
• OWASP
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Fr
amework
• Website
https://secureby.design
Together we can make it big, strong and helpful!
21
Agenda
• Why?
• Software (AND Security) development life cycle
22
You are only as strong as the
weakest developer in your team.
22
Questions?
23

More Related Content

PDF
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
PDF
Introduction to iOS Penetration Testing
PDF
Security in open source projects
PPTX
[OWASP Poland Day] Saving private token
PDF
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
PPTX
[Wroclaw #2] iOS Security - 101
PDF
Making Enterprise-Ready Plugins - Kaj Kandler JUC West 2015
PPTX
[OWASP Poland Day] Application security - daily questions & answers
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
Introduction to iOS Penetration Testing
Security in open source projects
[OWASP Poland Day] Saving private token
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
[Wroclaw #2] iOS Security - 101
Making Enterprise-Ready Plugins - Kaj Kandler JUC West 2015
[OWASP Poland Day] Application security - daily questions & answers

What's hot (20)

PDF
Security Issues in Android Custom ROM
PPTX
Know Your Security Model
PDF
DevSecOps: What Why and How : Blackhat 2019
PDF
When the internet bleeded : RootConf 2014
PDF
Android Tamer (Anant Shrivastava)
PDF
Stranger Danger: Securing Third Party Components (Tech2020)
PPTX
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
PPTX
Securing your web applications a pragmatic approach
PDF
The Log4Shell Vulnerability – explained: how to stay secure
PPTX
[Wroclaw #2] Web Application Security Headers
PPTX
So You Want to be a Hacker?
PDF
Building a DevSecOps Pipeline Around Your Spring Boot Application
PDF
The DevSecOps Builder’s Guide to the CI/CD Pipeline
PDF
DevSecOps: Finding the Adversaries in our Midst
PPTX
Hp fortify source code analyzer(sca)
PDF
DevSecOps at Agile 2019
PDF
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
PDF
Stranger Danger (NodeSummit, 2016)
PDF
Learning by hacking - android application hacking tutorial
PDF
HKG15-407: EME implementation in Chromium: Linaro Clear Key
Security Issues in Android Custom ROM
Know Your Security Model
DevSecOps: What Why and How : Blackhat 2019
When the internet bleeded : RootConf 2014
Android Tamer (Anant Shrivastava)
Stranger Danger: Securing Third Party Components (Tech2020)
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Securing your web applications a pragmatic approach
The Log4Shell Vulnerability – explained: how to stay secure
[Wroclaw #2] Web Application Security Headers
So You Want to be a Hacker?
Building a DevSecOps Pipeline Around Your Spring Boot Application
The DevSecOps Builder’s Guide to the CI/CD Pipeline
DevSecOps: Finding the Adversaries in our Midst
Hp fortify source code analyzer(sca)
DevSecOps at Agile 2019
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Stranger Danger (NodeSummit, 2016)
Learning by hacking - android application hacking tutorial
HKG15-407: EME implementation in Chromium: Linaro Clear Key
Ad

Viewers also liked (19)

PDF
MCE^3 - Natasha Murashev - Practical Protocol-Oriented Programming in Swift
PPSX
MCE^3 - Konstantin Raev - React Native: Open Source Continuous Build and Deli...
PPTX
4Developers: Szymon Warda- Graph databases - why and how
PPT
PLNOG 17 - Marek Czardybon - Grupa 3S dla Światowych Dni Młodzieży 2016
PDF
[4developers] - ScalaJS – web without pain of JavaScript
PDF
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
POTX
Atmosphere Conference 2015: DevOps sum is greater than its parts
PDF
MCE^3 - Boaz Katz - Prioritization is Hell
PDF
4Developers2016: Michał Kowalczyk- Djinni - bridge pomiędzy Java, Objective-C...
PDF
Atmosphere Conference 2015: The 10 Myths of DevOps
PDF
Bujok hazelcast 4developers
PDF
4Developers: Tworzenie systemów rozproszonych z wykorzystaniem AKKA.NET.
PPTX
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
PDF
infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...
PPTX
infraxstructure: Mariusz Rybusiński, Veeam "Keep Calm and Backup to the Cloud"
PDF
infraXstructure Alexis Dacquay, "How to win back visibility into your network...
PDF
infraxstructure: Mirosław Burnejko "Cloud Migration Checklist – Czyli jakie ...
PDF
JDD 2016 - Andrej Mihály - How To Bake Reactive Behavior Into Your Java Ee Ap...
PDF
JDD 2016 - Jakub Kubrynski - Jpa - beyond copy-paste
MCE^3 - Natasha Murashev - Practical Protocol-Oriented Programming in Swift
MCE^3 - Konstantin Raev - React Native: Open Source Continuous Build and Deli...
4Developers: Szymon Warda- Graph databases - why and how
PLNOG 17 - Marek Czardybon - Grupa 3S dla Światowych Dni Młodzieży 2016
[4developers] - ScalaJS – web without pain of JavaScript
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
Atmosphere Conference 2015: DevOps sum is greater than its parts
MCE^3 - Boaz Katz - Prioritization is Hell
4Developers2016: Michał Kowalczyk- Djinni - bridge pomiędzy Java, Objective-C...
Atmosphere Conference 2015: The 10 Myths of DevOps
Bujok hazelcast 4developers
4Developers: Tworzenie systemów rozproszonych z wykorzystaniem AKKA.NET.
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...
infraxstructure: Mariusz Rybusiński, Veeam "Keep Calm and Backup to the Cloud"
infraXstructure Alexis Dacquay, "How to win back visibility into your network...
infraxstructure: Mirosław Burnejko "Cloud Migration Checklist – Czyli jakie ...
JDD 2016 - Andrej Mihály - How To Bake Reactive Behavior Into Your Java Ee Ap...
JDD 2016 - Jakub Kubrynski - Jpa - beyond copy-paste
Ad

Similar to [CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design, become empowered, be THE Neo (20)

PDF
OWASP-SKF Making the web secure by design - Glenn ten Cate - Codemotion Amste...
PDF
[OWASP Poland Day] Security knowledge framework
PDF
Cybersecurity Roadmap for Beginners
PPTX
Started In Security Now I'm Here
PDF
The Principles of Secure Development - BSides Las Vegas 2009
PPTX
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
PDF
DevSecOps - The big picture
PDF
DevSecOps - The big picture
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
PPTX
Programming languages and techniques for today’s embedded andIoT world
PDF
ShiftGearsWithInformationSecurity.pdf
PPSX
Meetup code security
PPTX
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
PPTX
OSS has taken over the enterprise: The top five OSS trends of 2015
PPTX
Threat Modeling All Day!
PDF
Steering a Bullet Train: Owasp Latam Tour BA 2015
PDF
Deepfence.pdf
PPTX
Outpost24 webinar - application security in a dev ops world-08-2018
PDF
SDLC & DevSecOps
PDF
17 - Application Development Security Section PDF.pdf
OWASP-SKF Making the web secure by design - Glenn ten Cate - Codemotion Amste...
[OWASP Poland Day] Security knowledge framework
Cybersecurity Roadmap for Beginners
Started In Security Now I'm Here
The Principles of Secure Development - BSides Las Vegas 2009
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
DevSecOps - The big picture
DevSecOps - The big picture
DevSecCon London 2017: when good containers go bad by Tim Mackey
Programming languages and techniques for today’s embedded andIoT world
ShiftGearsWithInformationSecurity.pdf
Meetup code security
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
OSS has taken over the enterprise: The top five OSS trends of 2015
Threat Modeling All Day!
Steering a Bullet Train: Owasp Latam Tour BA 2015
Deepfence.pdf
Outpost24 webinar - application security in a dev ops world-08-2018
SDLC & DevSecOps
17 - Application Development Security Section PDF.pdf

Recently uploaded (20)

PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Approach and Philosophy of On baking technology
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
A Presentation on Touch Screen Technology
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
1. Introduction to Computer Programming.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Web App vs Mobile App What Should You Build First.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Encapsulation_ Review paper, used for researhc scholars
Hindi spoken digit analysis for native and non-native speakers
Approach and Philosophy of On baking technology
SOPHOS-XG Firewall Administrator PPT.pptx
A Presentation on Touch Screen Technology
A comparative analysis of optical character recognition models for extracting...
Heart disease approach using modified random forest and particle swarm optimi...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
MIND Revenue Release Quarter 2 2025 Press Release
cloud_computing_Infrastucture_as_cloud_p
DP Operators-handbook-extract for the Mautical Institute
1. Introduction to Computer Programming.pptx
Encapsulation theory and applications.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
NewMind AI Weekly Chronicles - August'25-Week II
A comparative study of natural language inference in Swahili using monolingua...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design, become empowered, be THE Neo