SlideShare a Scribd company logo
“Enterprise Software Security
For the real-world!”
Justin Derry
jderry@fortify.com
Enterprise Software Security
• Accenture
–What are we protecting and Why?
–Case Studies & Examples
–Fortify more then a “software vendor”!
–The Fortify platform
What are we protecting?
• It’s more than just about Money!
– Personal Information (Customer Data)
– Financial/Banking Information
– Company/Trade Secrets
– Corporate Data
• Consider this?
– Can you business operate without the use
of software on a daily basis?
– What would happen if you software just
stopped working one day?
Making the Case for Software Security
• Risk of a Major Data Breach is increasing 146% since 2001
• Cost of a data breach could be $11 Million US #1
• A breach will cost more then protecting against attack
• Attacks are focused at the Application Layer (> 76% Gartner)
• NIST: 92% of vulnerabilities in application code
• It’s not all about SQL Injection & Cross Site Scripting
• False sense of security, existing security gates don’t protect you
• 2009 expected to be the year of identity theft and significant increase
in web based attacks for financial benefit
Heartland Payment Systems
• Very Late 2007 – SQL Injection via a customer facing web page in our
corporate (non-payments) environment. Bad guys were in our corporate
network.
• Early 2008 – Hired largest approved QSA to perform penetration testing
of corporate environment
• Spring 2008 – Learned of Sniffer Attack on Hannaford’s , Created a
Dedicated Chief Security Officer Position and filled that position
• April 30, 2008 – Passed 6th Consecutive “Annual Review” by Largest
QSA
• Very Late 2007 – Mid-May 2008 – Bad guys studied our corporate
network
• Mid-May 2008 – Penetration of our Payments Network
Heartland Events!
• Late October 2008 – Informed by a card brand that several issuers
suspected a potential breach of one or more processors. We received
sample fraud transactions to help us determine if there was a problem in
our payments network. A high percentage of these samples never
touched our payments network.
• No evidence could be found of an intrusion despite vigorous efforts by
HPS employees and then two forensics companies to find a problem.
• January 9, 2009 – We were told that “no problems were found” and that
a final report reflecting that opinion would be forthcoming within days.
• January 12, 2009 – January 20, 2009 – Learned of breach, notified card
brands, notified law enforcement and made public announcement.
Case Study – ANZ Bank
• What are the Drivers?
– PCI Compliance Obligations
– APRA Regulations & Requirements after review
– Software security threat #3 risk on Fortune 500
– Internal Risk Drivers
• Initial Steps
– Enablement of new program called “SAFE Program”
– Introduction of Developer Training through organization
– “Adoption of Culture Change” critical
– Implementation of world class technology & Governance
ANZ Timeline of Events
ANZ Bank Integration & Technologies
• Platforms/Development Languages
– Microsoft.NET, Classic ASP, VB, C++
– Java, JSP, J2EE
– Mainframe languages (COBOL, C etc)
– All Platforms such as Windows, UNIX, LINUX etc
• Integration with Existing Technologies
– Quality Centre Integration
– Other bug tracking software (find bugs etc)
– Build integration (ANT, Maven, Cruise Control, MSBUILD)
– Web based delivery technologies (XML API F360 Server)
Fortify more then a software Vendor!
Multi Platforms, Technology
and Governance
Software Security Partner
Vision Guidance
• Creating a successful vision is hard, get help! Or use the
recommended strategy online at www.opensamm.org
• SAMM (Software Assurance Maturity Model), the building
blocks for a successful Software Security Strategy
PCI Compliance
Quickly Demonstrate PCI Compliance
• Instantly Protect Deployed Applications
– Ensure compliance with PCI DSS Section 6.6
– Application defense module
• Identify and Remediate Vulnerabilities
– Ensures compliance with Sections 3, 6.3.7, 6.5, 6.6, 11.3.2
– View vulnerabilities in context of PCI compliance
– Static and dynamic testing
• Complete Self-Assessment Questionnaire
– Assign responsibilities
– View outstanding activities
– Generate detailed reports to demonstrate PCI activities
Fortify 360 Platform
• Identify the Most Vulnerabilities
• Collaborate and Remediate
more Code
• Instantly Protect Deployed
Applications
• Effectively Manage SSA
Programs
• Achieve Compliance Quickly
Vulnerability Detection
Identify the Most Vulnerabilities
Technology Support
SCA, PTA and RTA
• Static Analysis (Fortify 360 SCA)
– Microsoft .NET (All languages), Classic ASP, VB, COM
– C/C++
– Java, J2EE, JSF, Javascript etc
– XML, HTML, Other web technologies
– SQL TSQL/PSQL
– Cold Fusion, PHP, COBOL and more coming..
• Testing/Production (Fortify 360 RTA/PTA)
– Web based technologies only, supporting
– .NET and Java primarily with some minor other languages (CF)
Fortify Technology
Analysis
Result
Analysis
Tracer
Source Code
Summary and details
API
List
Reporting What does it look like?
Open Discussion
• What is currently done during development lifecycles?
• How can/does Fortify integrate and provide value to the
existing development practices within Accenture?
• How do customers benefit from having Fortify scanned as a
part of the development process?
• Technical Questions?
Fortify technology

More Related Content

PDF
Tenable Solutions for Enterprise Cloud Security
PPTX
Fortify - Source Code Analyzer
PDF
Cisco Security Presentation
PPTX
Practical Operation Automation with StackStorm
PDF
NTXISSACSC3 - How Threat Modeling Can Improve Your IAM Solution by John Fehan
PDF
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
PDF
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
PPTX
Nessus-Vulnerability Tester
Tenable Solutions for Enterprise Cloud Security
Fortify - Source Code Analyzer
Cisco Security Presentation
Practical Operation Automation with StackStorm
NTXISSACSC3 - How Threat Modeling Can Improve Your IAM Solution by John Fehan
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
Nessus-Vulnerability Tester

What's hot (20)

PPTX
Computer virus
PDF
Introducing Bugcrowd
PDF
Bug Bounty Basics
PPT
Trojan Horse Virus
PPTX
OpenVAS
PDF
Cyber Security and Cloud Computing
PDF
Sigma and YARA Rules
PPTX
Wazuh Security Platform
PPTX
Countering Innovative Sandbox Evasion Techniques Used by Malware
PDF
Complete Guide to Cyber Security Operation Center v6.2
PDF
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Ch...
PPTX
Splunk Overview
PDF
Working with MS Endpoint Manager
PPTX
Crowdstrike .pptx
PPTX
Red Team Framework
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
PPTX
Red teaming probably isn't for you
PDF
IBM QRadar Security Intelligence Overview
PPTX
Fortify On Demand and ShadowLabs
PDF
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Computer virus
Introducing Bugcrowd
Bug Bounty Basics
Trojan Horse Virus
OpenVAS
Cyber Security and Cloud Computing
Sigma and YARA Rules
Wazuh Security Platform
Countering Innovative Sandbox Evasion Techniques Used by Malware
Complete Guide to Cyber Security Operation Center v6.2
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Ch...
Splunk Overview
Working with MS Endpoint Manager
Crowdstrike .pptx
Red Team Framework
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Red teaming probably isn't for you
IBM QRadar Security Intelligence Overview
Fortify On Demand and ShadowLabs
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Ad

Similar to Fortify technology (20)

PPT
六合彩香港-六合彩
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
KEY
Application Security Done Right
PDF
The Future of Software Security Assurance
PDF
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
PPTX
Best Practices for a Mature Application Security Program Webinar - February 2016
PDF
Structuring and Scaling an Application Security Program
PPT
Software Security in the Real World
PPTX
Web_Appication_Security_Training_For_Developers.pptx
PPTX
Appsec2013 assurance tagging-robert martin
PPTX
Runtime Protection in the Real World
PDF
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
PPTX
Top 12 Threats to Enterprise
PDF
Fortify Continuous Delivery
PDF
Secure coding guidelines
PDF
Cyber security series Application Security
PPTX
00. introduction to app sec v3
PDF
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
六合彩香港-六合彩
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Application Security Done Right
The Future of Software Security Assurance
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Best Practices for a Mature Application Security Program Webinar - February 2016
Structuring and Scaling an Application Security Program
Software Security in the Real World
Web_Appication_Security_Training_For_Developers.pptx
Appsec2013 assurance tagging-robert martin
Runtime Protection in the Real World
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Top 12 Threats to Enterprise
Fortify Continuous Delivery
Secure coding guidelines
Cyber security series Application Security
00. introduction to app sec v3
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
Ad

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Encapsulation theory and applications.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectral efficient network and resource selection model in 5G networks
Understanding_Digital_Forensics_Presentation.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
Review of recent advances in non-invasive hemoglobin estimation
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...

Fortify technology

  • 1. “Enterprise Software Security For the real-world!” Justin Derry jderry@fortify.com
  • 2. Enterprise Software Security • Accenture –What are we protecting and Why? –Case Studies & Examples –Fortify more then a “software vendor”! –The Fortify platform
  • 3. What are we protecting? • It’s more than just about Money! – Personal Information (Customer Data) – Financial/Banking Information – Company/Trade Secrets – Corporate Data • Consider this? – Can you business operate without the use of software on a daily basis? – What would happen if you software just stopped working one day?
  • 4. Making the Case for Software Security • Risk of a Major Data Breach is increasing 146% since 2001 • Cost of a data breach could be $11 Million US #1 • A breach will cost more then protecting against attack • Attacks are focused at the Application Layer (> 76% Gartner) • NIST: 92% of vulnerabilities in application code • It’s not all about SQL Injection & Cross Site Scripting • False sense of security, existing security gates don’t protect you • 2009 expected to be the year of identity theft and significant increase in web based attacks for financial benefit
  • 5. Heartland Payment Systems • Very Late 2007 – SQL Injection via a customer facing web page in our corporate (non-payments) environment. Bad guys were in our corporate network. • Early 2008 – Hired largest approved QSA to perform penetration testing of corporate environment • Spring 2008 – Learned of Sniffer Attack on Hannaford’s , Created a Dedicated Chief Security Officer Position and filled that position • April 30, 2008 – Passed 6th Consecutive “Annual Review” by Largest QSA • Very Late 2007 – Mid-May 2008 – Bad guys studied our corporate network • Mid-May 2008 – Penetration of our Payments Network
  • 6. Heartland Events! • Late October 2008 – Informed by a card brand that several issuers suspected a potential breach of one or more processors. We received sample fraud transactions to help us determine if there was a problem in our payments network. A high percentage of these samples never touched our payments network. • No evidence could be found of an intrusion despite vigorous efforts by HPS employees and then two forensics companies to find a problem. • January 9, 2009 – We were told that “no problems were found” and that a final report reflecting that opinion would be forthcoming within days. • January 12, 2009 – January 20, 2009 – Learned of breach, notified card brands, notified law enforcement and made public announcement.
  • 7. Case Study – ANZ Bank • What are the Drivers? – PCI Compliance Obligations – APRA Regulations & Requirements after review – Software security threat #3 risk on Fortune 500 – Internal Risk Drivers • Initial Steps – Enablement of new program called “SAFE Program” – Introduction of Developer Training through organization – “Adoption of Culture Change” critical – Implementation of world class technology & Governance
  • 9. ANZ Bank Integration & Technologies • Platforms/Development Languages – Microsoft.NET, Classic ASP, VB, C++ – Java, JSP, J2EE – Mainframe languages (COBOL, C etc) – All Platforms such as Windows, UNIX, LINUX etc • Integration with Existing Technologies – Quality Centre Integration – Other bug tracking software (find bugs etc) – Build integration (ANT, Maven, Cruise Control, MSBUILD) – Web based delivery technologies (XML API F360 Server)
  • 10. Fortify more then a software Vendor! Multi Platforms, Technology and Governance
  • 12. Vision Guidance • Creating a successful vision is hard, get help! Or use the recommended strategy online at www.opensamm.org • SAMM (Software Assurance Maturity Model), the building blocks for a successful Software Security Strategy
  • 13. PCI Compliance Quickly Demonstrate PCI Compliance • Instantly Protect Deployed Applications – Ensure compliance with PCI DSS Section 6.6 – Application defense module • Identify and Remediate Vulnerabilities – Ensures compliance with Sections 3, 6.3.7, 6.5, 6.6, 11.3.2 – View vulnerabilities in context of PCI compliance – Static and dynamic testing • Complete Self-Assessment Questionnaire – Assign responsibilities – View outstanding activities – Generate detailed reports to demonstrate PCI activities
  • 14. Fortify 360 Platform • Identify the Most Vulnerabilities • Collaborate and Remediate more Code • Instantly Protect Deployed Applications • Effectively Manage SSA Programs • Achieve Compliance Quickly
  • 15. Vulnerability Detection Identify the Most Vulnerabilities
  • 16. Technology Support SCA, PTA and RTA • Static Analysis (Fortify 360 SCA) – Microsoft .NET (All languages), Classic ASP, VB, COM – C/C++ – Java, J2EE, JSF, Javascript etc – XML, HTML, Other web technologies – SQL TSQL/PSQL – Cold Fusion, PHP, COBOL and more coming.. • Testing/Production (Fortify 360 RTA/PTA) – Web based technologies only, supporting – .NET and Java primarily with some minor other languages (CF)
  • 18. Reporting What does it look like?
  • 19. Open Discussion • What is currently done during development lifecycles? • How can/does Fortify integrate and provide value to the existing development practices within Accenture? • How do customers benefit from having Fortify scanned as a part of the development process? • Technical Questions?

Editor's Notes

  • #11: Talk here a little about last year and what we talked about with SSA.