SlideShare a Scribd company logo
Integrating Security into the
Application Development Process
Jerod Brennen, CISSP
CTO & Principal Security Consultant, Jacadis
Agenda
• Seek First to Understand
• Source Code Security
• AppSec and SQA
• Analyzing Deployed Applications
• Other Considerations
• Resources
How to Write Good Code
From http://xkcd.com/844/
SEEK FIRST TO UNDERSTAND
Development Methodologies
• Agile with Scrum
• Capability Maturity Mode Integrated
– 1 (Waterfall)
– 3 (Iterative)
– 5 (Spiral)
• Extreme Programming (XP)
• Object-Oriented Development
• Pair Programming With Iterative
• Proofs of Correctness with Waterfall
• Rational Unified Process (RUP)
• Team Software Process (TSP)
List from http://www.infoq.com/articles/evaluating-agile-software-methodologies
Programming Languages
• ASP.NET
• C / C++ / C# / Objective-C
• HTML5
• Java
• PHP
• Python
• Ruby
• What else?
Risk/Security Frameworks
• COBIT (ISACA)
• COSO (SOX)
• HITRUST CSF (HIPAA)
• ISO/IEC 27002:2005
• NIST
• OCTAVE (CERT)
• STRIDE/DREAD
– Spoofing (identity), Tampering, Repudiation, Information
disclosure, Denial of service, Elevation of privilege
– Damage, Reproducibility, Exploitability, Affected users,
Discoverability
Project Phase-Gate Model
• Scoping
• Build Business Case
• Development
• Testing and Validation
• Launch
The OWASP Top Ten (Web)
• A1 – Injection
• A2 – Broken Authentication and Session Management
• A3 – Cross-Site Scripting (XSS)
• A4 – Insecure Direct Object References
• A5 – Security Misconfiguration
• A6 – Sensitive Data Exposure
• A7 – Missing Function Level Access Control
• A8 – Cross-Site Request Forgery (CSRF)
• A9 – Using Components with Known Vulnerabilities
• A10 – Unvalidated Redirects and Forwards
The OWASP Top Ten (Mobile)
• M1 – Insecure Data Storage
• M2 – Weak Server Side Controls
• M3 – Insufficient Transport Layer Protection
• M4 – Client Side Injection
• M5 – Poor Authorization and Authentication
• M6 – Improper Session Handling
• M7 – Security Decisions Via Untrusted Inputs
• M8 – Side Channel Data Leakage
• M9 – Broken Cryptography
• M10 – Sensitive Information Disclosure
Prep Checklist
• What development methodologies do we follow?
• What programming languages do we use?
• What risk/security frameworks do we follow?
• What third-party libraries do we use?
• What stages in the development process require
approval from the security team?
SOURCE CODE SECURITY
Code Reviews
• Benefits
– Find flaws
– Reduce fraud
• Peer Reviews in Software, by Karl Wiegers
– Ad hoc review
– Passaround
– Pair programming
– Walkthrough
– Team Review
– Inspection
OWASP Code Review Project
• Methodology (v1.1, current)
– Preparation
– Security Code Review in the SDLC
– Security Code Review Coverage
– Application Threat Modeling
– Code Review Metrics
• Methodology (v2.0, due in January 2014)
– Preparation
– Application Threat Modeling
– Understanding Code Layout/Design/Architecture
– Reviewing by Technical Control
– Reviewing by Vulnerability
– Security Code Review for Agile Development
Code Review Tools
• NIST SAMATE
– Software Assurance Metrics and Tool
Evaluation
• Tools
– Source Code Security Analyzers
– Byte Code Scanners
– Binary Code Scanners
Code Review Tools (cont’d)
• Checkmarx ($; multiple languages)
• DevInpsect ($; Java, .NET)
• FindBugs / FindSecurityBugs (free; Java)
• FxCop (free; .NET)
• IDA Pro ($; Windows/Linux executables)
• LAPSE (free; Java)
• PMD (free; Java)
• Rational AppScan ($; multiple languages)
• RATS (free; C, C++, Perl, PHP, Python)
APPSEC AND SQA
The SQA Process
• Initiation
• Planning
• Tracking
• Training
• Reviews
• Issue Resolution
• Testing
• Audit
• Process Improvement
List from http://www.verndale.com/Our-Thinking/9-Steps-of-the-SQA-Process.aspx
Positive and Negative Testing
• Positive Test Cases
– Does the app do what it’s supposed to
do?
• Negative Test Cases
– Does the app do anything it’s not
supposed to do?
Top 10 Negative Test Cases
• Embedded Single Quote
• Required Data Entry
• Field Type Test
• Field Size Test
• Numeric Bounds Test
• Numeric Limits Test
• Date Bounds Test
• Date Validity
• Web Session Testing
• Performance Changes
List from http://www.sqatester.com/methodology/Top10NegativeTestCases.htm
SQA Security Tools
• QAInspect
• OWASP Zed Attack Proxy (ZAP)
• OWASP Mantra
ANALYZING DEPLOYED
APPLICATIONS
Application Scanning
• Automated scanners interact with an
app like an actual user
• Production vs. Non-Production
• Authenticated vs. Non-Authenticated
• Don’t forget the app infrastructure
– Host Systems
– Web Servers
– Backend Databases
Manual App Analysis
• OWASP Testing Guide (v3)
– Information Gathering
– Configuration Management Testing
– Authentication Testing
– Session Management Testing
– Authorization Testing
– Business Logic Testing
– Data Validation Testing
– Testing for Denial of Service
– Web Services Testing
– AJAX Testing
• Version 4 in development (some material available)
Scanning vs. Pen Testing
• Scanning
– Automated
– Look for signature-based flaws
– Some heuristics
• Web App Pen Testing
– Unconventional thinking
– Test application logic
Web App Security Scanners
• Acunetix Web Vulnerability Scanner (WVS)
• AppScan
• Arachni
• Burp Suite
• Grendel-Scan
• QualysGuard Web Application Scanner (WAS)
• SamuraiWTF
• Veracode Web Application Security (WAS)
• W3AF
• WebInspect
• WebSecurify
OTHER CONSIDERATIONS
SQA Metrics
• ISO 9126-1 (Software Quality)
– Functionality
• Security (unauthorized access)
– Reliability
– Usability
– Efficiency
– Maintainability
– Portability
• Security – CIA Triad
– Confidentiality
– Integrity
– Availability
SQA Metrics (cont’d)
• OWASP
– Cross-site scripting tests run
– SQL injection tests run
– User input tests run
– Cookie or credentials manipulation testing has been performed
– Denial of Service scenarios have been checked
• Vulnerabilities detected vs. vulnerabilities remediated
List from https://www.owasp.org/index.php/Software_Quality_Assurance#Metrics
Developer Training
• OWASP Resources
– Top 10 Application Security Risks
– Top 10 Mobile Security Risks
– WebGoat Project (Java)
– Mutillidae (PHP)
– Bricks (PHP and MySQL)
• SANS Courses
– SEC542: Web App Penetration Testing and Ethical Hacking
– DEV522: Defending Web Applications Security Essentials
– DEV541: Secure Coding in Java/JEE
– DEV544: Secure Coding in .NET
• Web Application Security Consortium
Professional Organizations
• OWASP
• ISSA
• (ISC)2
• InfraGard
• ISACA
• W3C Web Application Security
Working Group
RESOURCES
Resources
• Codecademy
– http://www.codecademy.com/learn
• OWASP Top Ten (2013)
– https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
– https://www.owasp.org/index.php/File:OWASP_Top_10_-_2013_Final_-
_English.pptx
• OWASP Code Review Project
– https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project
• NIST SAMATE
– http://samate.nist.gov/
• Web App Scanner List
– http://projects.webappsec.org/w/page/13246988/Web%20Application%20Secu
rity%20Scanner%20List
• SecTools
– http://sectools.org/
More Resources
• Project Phase Gate Model
– http://en.wikipedia.org/wiki/Phase%E2%80%93gate_model
• ISO 9126 Software Quality Characteristics
– http://www.sqa.net/iso9126.html
• Top 10 Negative Test Cases
– http://www.sqatester.com/methodology/Top10NegativeTestCases.htm
• OWASP – Software Quality Assurance
– https://www.owasp.org/index.php/Software_Quality_Assurance
• OWASP Testing Project
– https://www.owasp.org/index.php/OWASP_Testing_Project
• “952” Metrics for Software Quality Assurance (SQA)
– http://davidfrico.com/sqa-metrics.pdf
• Web Application Security Working Group
– http://www.w3.org/2011/webappsec/
Even More Resources
• SQL Injection Tutorial
– http://www.youtube.com/watch?v=qELByGfNJSE
• OWASP Mobile Security Project
– https://www.owasp.org/index.php/OWASP_Mobile_Security_Project
– http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks
• OWASP WebGoat
– https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project
• OWASP Mutillidae
– https://www.owasp.org/index.php/Category:OWASP_Mutillidae
• OWASP Bricks
– https://www.owasp.org/index.php/OWASP_Bricks
Contact Info
Jerod Brennen, CISSP
CTO & Principal Security Consultant, Jacadis
LinkedIn: http://www.linkedin/com/in/slandail
Twitter: https://twitter.com/slandail
http://www.jacadis.com/
contact@jacadis.com

More Related Content

PPTX
Trust No-One Architecture For Services And Data
PPTX
Digitally Transform (And Keep) Your On-Premises File Servers
PPTX
Azure Networking - The First Technical Challenge
PDF
Microsoft Azure Security Overview
PPTX
Shared Security Responsibility for the Azure Cloud
PPTX
Azure Security Fundamentals
PPTX
Azure Security and Management
PDF
Best Practices in Cloud Security
Trust No-One Architecture For Services And Data
Digitally Transform (And Keep) Your On-Premises File Servers
Azure Networking - The First Technical Challenge
Microsoft Azure Security Overview
Shared Security Responsibility for the Azure Cloud
Azure Security Fundamentals
Azure Security and Management
Best Practices in Cloud Security

What's hot (18)

PPTX
Power of the cloud - Introduction to azure security
PPTX
Windows Azure Security Features And Functionality
PPTX
CSS 17: NYC - Building Secure Solutions in AWS
PPTX
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
PDF
Govern Your Cloud: The Foundation for Success
PDF
Managed Threat Detection & Response for AWS Applications
PPTX
Azure Security Center
PPTX
Azure Security Overview
PDF
Azure Saturday: Security + DevOps + Azure = Awesomeness
PDF
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...
PDF
Security OF The Cloud
PPTX
CCI2018 - Azure Network - Security Best Practices
KEY
Cloud Security at Netflix
PPTX
CSS17: DC - The AWS Shared Responsibility Model in Practice
PPTX
Shared Security Responsibility Model of AWS
PDF
Austin CSS Slalom Presentation
PDF
Protecting Against Web App Attacks
PDF
Networking deep dive
Power of the cloud - Introduction to azure security
Windows Azure Security Features And Functionality
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
Govern Your Cloud: The Foundation for Success
Managed Threat Detection & Response for AWS Applications
Azure Security Center
Azure Security Overview
Azure Saturday: Security + DevOps + Azure = Awesomeness
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...
Security OF The Cloud
CCI2018 - Azure Network - Security Best Practices
Cloud Security at Netflix
CSS17: DC - The AWS Shared Responsibility Model in Practice
Shared Security Responsibility Model of AWS
Austin CSS Slalom Presentation
Protecting Against Web App Attacks
Networking deep dive
Ad

Viewers also liked (7)

PPT
Software security engineering
ODP
CISSP Week 13
PDF
isecure's Identity Management Training Intro
PDF
CISSP Prep: Ch 9. Software Development Security
PPTX
Managing Open Source in Application Security and Software Development Lifecycle
PPSX
7 Software Development Security
PPTX
Information systems development methodologies
Software security engineering
CISSP Week 13
isecure's Identity Management Training Intro
CISSP Prep: Ch 9. Software Development Security
Managing Open Source in Application Security and Software Development Lifecycle
7 Software Development Security
Information systems development methodologies
Ad

Similar to Integrating security into the application development process (20)

PDF
AppSec in an Agile World
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
Attacking and Defending Mobile Applications
PPTX
Security for developers
PPTX
Application_security_Strategic
PPTX
Agile and Secure SDLC
PDF
The What, Why, and How of DevSecOps
PDF
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
PPTX
Digital Product Security
PPTX
Unified Security Governance
PPTX
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
PPTX
Cloud Security vs Security in the Cloud
PDF
The API Primer (OWASP AppSec Europe, May 2015)
PDF
Protecting microservices using secure design patterns 1.0
PDF
What Every Developer And Tester Should Know About Software Security
PDF
Web App Security Presentation by Ryan Holland - 05-31-2017
PPTX
Security guidelines
PPTX
SecDevOps: The New Black of IT
PPTX
Azure DevSecOps Training | Azure DevOps Certification Course.pptx
PDF
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
AppSec in an Agile World
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Attacking and Defending Mobile Applications
Security for developers
Application_security_Strategic
Agile and Secure SDLC
The What, Why, and How of DevSecOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
Digital Product Security
Unified Security Governance
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
Cloud Security vs Security in the Cloud
The API Primer (OWASP AppSec Europe, May 2015)
Protecting microservices using secure design patterns 1.0
What Every Developer And Tester Should Know About Software Security
Web App Security Presentation by Ryan Holland - 05-31-2017
Security guidelines
SecDevOps: The New Black of IT
Azure DevSecOps Training | Azure DevOps Certification Course.pptx
Pactera - App Security Assessment - Mobile, Web App, IoT - v2

More from Jerod Brennen (14)

PDF
Embedding Security in the SDLC
PPTX
The Path to IAM Maturity
PDF
Hacking identity: A Pen Tester's Guide to IAM
PDF
Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF)
PDF
Automating Security Testing with the OWTF
PPTX
Assess all the things
PDF
What you need to know about OSINT
PDF
Running Your Apps Through the "Gauntlt"
PPTX
Common Sense Security Framework
PPTX
Please, Please, PLEASE Defend Your Mobile Apps!
PDF
Bridging the Social Media Implementation/Audit Gap
PDF
Identity and Access Management 101
PDF
DDoS Attack Preparation and Mitigation
PDF
Information Security Management 101
Embedding Security in the SDLC
The Path to IAM Maturity
Hacking identity: A Pen Tester's Guide to IAM
Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF)
Automating Security Testing with the OWTF
Assess all the things
What you need to know about OSINT
Running Your Apps Through the "Gauntlt"
Common Sense Security Framework
Please, Please, PLEASE Defend Your Mobile Apps!
Bridging the Social Media Implementation/Audit Gap
Identity and Access Management 101
DDoS Attack Preparation and Mitigation
Information Security Management 101

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Empathic Computing: Creating Shared Understanding
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
MIND Revenue Release Quarter 2 2025 Press Release
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Understanding_Digital_Forensics_Presentation.pptx

Integrating security into the application development process

  • 1. Integrating Security into the Application Development Process Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis
  • 2. Agenda • Seek First to Understand • Source Code Security • AppSec and SQA • Analyzing Deployed Applications • Other Considerations • Resources
  • 3. How to Write Good Code From http://xkcd.com/844/
  • 4. SEEK FIRST TO UNDERSTAND
  • 5. Development Methodologies • Agile with Scrum • Capability Maturity Mode Integrated – 1 (Waterfall) – 3 (Iterative) – 5 (Spiral) • Extreme Programming (XP) • Object-Oriented Development • Pair Programming With Iterative • Proofs of Correctness with Waterfall • Rational Unified Process (RUP) • Team Software Process (TSP) List from http://www.infoq.com/articles/evaluating-agile-software-methodologies
  • 6. Programming Languages • ASP.NET • C / C++ / C# / Objective-C • HTML5 • Java • PHP • Python • Ruby • What else?
  • 7. Risk/Security Frameworks • COBIT (ISACA) • COSO (SOX) • HITRUST CSF (HIPAA) • ISO/IEC 27002:2005 • NIST • OCTAVE (CERT) • STRIDE/DREAD – Spoofing (identity), Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege – Damage, Reproducibility, Exploitability, Affected users, Discoverability
  • 8. Project Phase-Gate Model • Scoping • Build Business Case • Development • Testing and Validation • Launch
  • 9. The OWASP Top Ten (Web) • A1 – Injection • A2 – Broken Authentication and Session Management • A3 – Cross-Site Scripting (XSS) • A4 – Insecure Direct Object References • A5 – Security Misconfiguration • A6 – Sensitive Data Exposure • A7 – Missing Function Level Access Control • A8 – Cross-Site Request Forgery (CSRF) • A9 – Using Components with Known Vulnerabilities • A10 – Unvalidated Redirects and Forwards
  • 10. The OWASP Top Ten (Mobile) • M1 – Insecure Data Storage • M2 – Weak Server Side Controls • M3 – Insufficient Transport Layer Protection • M4 – Client Side Injection • M5 – Poor Authorization and Authentication • M6 – Improper Session Handling • M7 – Security Decisions Via Untrusted Inputs • M8 – Side Channel Data Leakage • M9 – Broken Cryptography • M10 – Sensitive Information Disclosure
  • 11. Prep Checklist • What development methodologies do we follow? • What programming languages do we use? • What risk/security frameworks do we follow? • What third-party libraries do we use? • What stages in the development process require approval from the security team?
  • 13. Code Reviews • Benefits – Find flaws – Reduce fraud • Peer Reviews in Software, by Karl Wiegers – Ad hoc review – Passaround – Pair programming – Walkthrough – Team Review – Inspection
  • 14. OWASP Code Review Project • Methodology (v1.1, current) – Preparation – Security Code Review in the SDLC – Security Code Review Coverage – Application Threat Modeling – Code Review Metrics • Methodology (v2.0, due in January 2014) – Preparation – Application Threat Modeling – Understanding Code Layout/Design/Architecture – Reviewing by Technical Control – Reviewing by Vulnerability – Security Code Review for Agile Development
  • 15. Code Review Tools • NIST SAMATE – Software Assurance Metrics and Tool Evaluation • Tools – Source Code Security Analyzers – Byte Code Scanners – Binary Code Scanners
  • 16. Code Review Tools (cont’d) • Checkmarx ($; multiple languages) • DevInpsect ($; Java, .NET) • FindBugs / FindSecurityBugs (free; Java) • FxCop (free; .NET) • IDA Pro ($; Windows/Linux executables) • LAPSE (free; Java) • PMD (free; Java) • Rational AppScan ($; multiple languages) • RATS (free; C, C++, Perl, PHP, Python)
  • 18. The SQA Process • Initiation • Planning • Tracking • Training • Reviews • Issue Resolution • Testing • Audit • Process Improvement List from http://www.verndale.com/Our-Thinking/9-Steps-of-the-SQA-Process.aspx
  • 19. Positive and Negative Testing • Positive Test Cases – Does the app do what it’s supposed to do? • Negative Test Cases – Does the app do anything it’s not supposed to do?
  • 20. Top 10 Negative Test Cases • Embedded Single Quote • Required Data Entry • Field Type Test • Field Size Test • Numeric Bounds Test • Numeric Limits Test • Date Bounds Test • Date Validity • Web Session Testing • Performance Changes List from http://www.sqatester.com/methodology/Top10NegativeTestCases.htm
  • 21. SQA Security Tools • QAInspect • OWASP Zed Attack Proxy (ZAP) • OWASP Mantra
  • 23. Application Scanning • Automated scanners interact with an app like an actual user • Production vs. Non-Production • Authenticated vs. Non-Authenticated • Don’t forget the app infrastructure – Host Systems – Web Servers – Backend Databases
  • 24. Manual App Analysis • OWASP Testing Guide (v3) – Information Gathering – Configuration Management Testing – Authentication Testing – Session Management Testing – Authorization Testing – Business Logic Testing – Data Validation Testing – Testing for Denial of Service – Web Services Testing – AJAX Testing • Version 4 in development (some material available)
  • 25. Scanning vs. Pen Testing • Scanning – Automated – Look for signature-based flaws – Some heuristics • Web App Pen Testing – Unconventional thinking – Test application logic
  • 26. Web App Security Scanners • Acunetix Web Vulnerability Scanner (WVS) • AppScan • Arachni • Burp Suite • Grendel-Scan • QualysGuard Web Application Scanner (WAS) • SamuraiWTF • Veracode Web Application Security (WAS) • W3AF • WebInspect • WebSecurify
  • 28. SQA Metrics • ISO 9126-1 (Software Quality) – Functionality • Security (unauthorized access) – Reliability – Usability – Efficiency – Maintainability – Portability • Security – CIA Triad – Confidentiality – Integrity – Availability
  • 29. SQA Metrics (cont’d) • OWASP – Cross-site scripting tests run – SQL injection tests run – User input tests run – Cookie or credentials manipulation testing has been performed – Denial of Service scenarios have been checked • Vulnerabilities detected vs. vulnerabilities remediated List from https://www.owasp.org/index.php/Software_Quality_Assurance#Metrics
  • 30. Developer Training • OWASP Resources – Top 10 Application Security Risks – Top 10 Mobile Security Risks – WebGoat Project (Java) – Mutillidae (PHP) – Bricks (PHP and MySQL) • SANS Courses – SEC542: Web App Penetration Testing and Ethical Hacking – DEV522: Defending Web Applications Security Essentials – DEV541: Secure Coding in Java/JEE – DEV544: Secure Coding in .NET • Web Application Security Consortium
  • 31. Professional Organizations • OWASP • ISSA • (ISC)2 • InfraGard • ISACA • W3C Web Application Security Working Group
  • 33. Resources • Codecademy – http://www.codecademy.com/learn • OWASP Top Ten (2013) – https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project – https://www.owasp.org/index.php/File:OWASP_Top_10_-_2013_Final_- _English.pptx • OWASP Code Review Project – https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project • NIST SAMATE – http://samate.nist.gov/ • Web App Scanner List – http://projects.webappsec.org/w/page/13246988/Web%20Application%20Secu rity%20Scanner%20List • SecTools – http://sectools.org/
  • 34. More Resources • Project Phase Gate Model – http://en.wikipedia.org/wiki/Phase%E2%80%93gate_model • ISO 9126 Software Quality Characteristics – http://www.sqa.net/iso9126.html • Top 10 Negative Test Cases – http://www.sqatester.com/methodology/Top10NegativeTestCases.htm • OWASP – Software Quality Assurance – https://www.owasp.org/index.php/Software_Quality_Assurance • OWASP Testing Project – https://www.owasp.org/index.php/OWASP_Testing_Project • “952” Metrics for Software Quality Assurance (SQA) – http://davidfrico.com/sqa-metrics.pdf • Web Application Security Working Group – http://www.w3.org/2011/webappsec/
  • 35. Even More Resources • SQL Injection Tutorial – http://www.youtube.com/watch?v=qELByGfNJSE • OWASP Mobile Security Project – https://www.owasp.org/index.php/OWASP_Mobile_Security_Project – http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks • OWASP WebGoat – https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project • OWASP Mutillidae – https://www.owasp.org/index.php/Category:OWASP_Mutillidae • OWASP Bricks – https://www.owasp.org/index.php/OWASP_Bricks
  • 36. Contact Info Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis LinkedIn: http://www.linkedin/com/in/slandail Twitter: https://twitter.com/slandail http://www.jacadis.com/ contact@jacadis.com