SlideShare a Scribd company logo
ENSURING INFORMATION
SECURITY IN THE SYSTEM
DEVELOPMENT LIFECYCLE
PROCESS
RENE G. JASPE CISSP, CSSLP
Sinag Solutions Founder and CISO
Phylasso Corp., Founder and Managing Director
MobKard, CoFounder and CTO
Rene Jaspe CISSP, CSSLP
• 13 yrs with Telos Corp., a US Federal Gov’t
Defense Contractor, servicing various US
Defense and Intelligence Agencies as well as
NATO allies.
• 10 years Software Development and 5 Years
Application Security Background.
2015: “We Take It Very Seriously”
IBM Xforce Threat Intelligence
Report 2016
HEALTHCARE, EDUCATION & FINANCIAL SERVICES LEADS GLOBALLY.
Source: Ponemon Institute Research Report 2016 Cost of Data Breach
Incident Pattern By Industry
Verizon Data Breach Incident 2016 Report
• Regulatory & Standards
Compliance
– eCommerce: PCI-DSS, PA-DSS
– Financial Services: GLBA
– Energy: NERC / FERC
– Government: FISMA
– PH: Data Privacy Act, BSP
• 81% of organizations subject to PCI
had not been found compliant prior to
the breach
Market Drivers
Application security challenges:
Security-development disconnect fails to prevent vulnerabilities in production applications
•Developers Lack Security Insights
(or Incentives to Address Security)
•Mandate to deliver functionality on-time
and on-budget – but not to develop
secure applications
•Developers rarely educated in secure
code practices
•Product innovation drives development of
increasingly complicated applications
Security Team = SDLC Bottleneck
•Security tests executed just before launch
– Adds time and cost to fix
vulnerabilities late
in the process
•Growing number of web applications but
small security staff
– Most enterprises scan ~10% of all
applications
•Continuous monitoring of production apps
limited or non-existent
– Unidentified vulnerabilities & risk
3 Great Frameworks For
Implementing an Enterprise
Software Security Program (MOB)
Application Security Pros Hold These
Truths to Be Self Evident
• Software Security is more than a set of
security functions.
– Not magic crypto fairy dust
– Not silver bullet security mechanisms.
• Non-functional aspects of design are
essential
• Bugs and flaws are 50/50.
• Security is an emergent property of the
entire system (just like quality).
• To end up with secure software, deep
integration with the SDLC is necessary.
Source: Cigital on BSIMM VI
Prescriptive vs. Descriptive
Models
Prescriptive Models
• Prescriptive models describe
what you should do.
• OpenSAMM
• Microsoft SDL
• Every company has a
methodology they follow (often
a hybrid)
• You need an SSDL.
Descriptive Models
• Descriptive models describe
what is actually happening.
• The BSIMM is a descriptive
model that can be used to
measure any number of
prescriptive SSDLs.
Microsoft Security Development Lifecycle 5.2 (May 2012)
SDL for Agile
Bucket
Bucket
Bucket
Bucket
One-TimeOne-TimeOne-Time
One-Time
One-Time
Bucket practices:: Important security practices that must be completed on a regular basis but can be spread across multiple sprints
during the project lifetime.
One-Time practices: Foundational security practices that must be established once at the start of every
new Agile project.
SDL Practice #7 USE THREAT MODELING
Applying a structure approach to threat scenarios during design helps a team more
effectively and less expensive identify security vulnerabilities, determines risks from those
threats, and establish appropriate mitigations.
THREAT MODEL SAMPLE
• S – poofing
• T – ampering
• R – epudiation
• I - nformation Disclosure
• D – enial of Service
• E - levation of Privilege
OpenSAMM 1.1 (March 2016)
OpenSAMM 1.1 (March 2016)
ISACA 2016 Application Security RGJ
Sample: Construction
FINANCIAL SERVICES ORGANIZATION
FINANCIAL SERVICES ORGANIZATION
Cost: Phase 1(Months 0 – 3) - Awareness & Planning
BSIMM 7 ( October 2016)
The BSIMM is a measuring stick for
software security. The best way to use
the BSIMM is to compare and contrast
your own initiative with the data about
what other organizations are doing
contained in the model. You can then
identify goals and objectives of your own
and refer to the BSIMM to determine
which additional activities make sense
for you.
The BSIMM data show that high maturity
initiatives are well-rounded—carrying out
numerous activities in all 12 of the
practices described by the model. The
model also describes how mature
software security initiatives evolve,
change, and improve over time.
BSIMM 7
Standards & Requirements
“EVERYBODY” DOES IT
SAMPLE SPIDER CHART
VERTICAL COMPARISON
ISACA 2016 Application Security RGJ
• Microsoft Security Development LifeCycle
https://www.microsoft.com/en-us/sdl/
• OpenSAMM
http://www.opensamm.org/
• BSIMM
https://www.bsimm.com/
KEY TAKE AWAY (MOB)
“Today we were unlucky, but remember we only have to be
lucky once. You will have to be lucky always.”
THANK YOU
QUESTIONS???
Rene.Jaspe@sinagsolutions.com
@renejaspe
https://ph.linkedin.com/in/renejaspe

More Related Content

PPTX
10 Steps to Better Security Incident Detection
PPTX
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PPT
Silsbee - Interface Seattle 2015 - Cybersecurity
PPTX
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
KEY
Introduction to MicroSolved, Inc.
PPTX
How to prevent data leaks with application security testing strategy
PDF
Penetration testing 5 reasons Why Organizations Should Adopt it
PPTX
Are Your IT Systems Secure?
10 Steps to Better Security Incident Detection
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
Silsbee - Interface Seattle 2015 - Cybersecurity
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Introduction to MicroSolved, Inc.
How to prevent data leaks with application security testing strategy
Penetration testing 5 reasons Why Organizations Should Adopt it
Are Your IT Systems Secure?

What's hot (20)

PPTX
The Missing Approach for Threat Detection
PDF
Enumerating your shadow it attack surface
PDF
Infosecurity Europe - Infographic
DOCX
Security from Compliance or Compliance from Security?--Metrics are the key
PPTX
Managing Enterprise Risk: Why U No Haz Metrics?
PPTX
Imperva ppt
PDF
Scammed: Defend Against Social Engineering
PDF
BKK16-200K2 Standards and Security
PPTX
APE Intrusion Prevention
PDF
Network-Security
PDF
7 cyber security questions for boards
PDF
2010 Sc World Congress Nyc
PPT
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
PDF
Third party risk management with cyber threat intelligence
PDF
Symantec Intelligence Report - October 2014
PPTX
Cyber risk tips for boards and executive teams
PPTX
Companies Aware, but Not Prepared for GDPR
PPTX
The Three Pitfalls of Data Security
PPTX
Cyber Attack Survival
PPTX
10 Critical Corporate Cyber Security Risks
The Missing Approach for Threat Detection
Enumerating your shadow it attack surface
Infosecurity Europe - Infographic
Security from Compliance or Compliance from Security?--Metrics are the key
Managing Enterprise Risk: Why U No Haz Metrics?
Imperva ppt
Scammed: Defend Against Social Engineering
BKK16-200K2 Standards and Security
APE Intrusion Prevention
Network-Security
7 cyber security questions for boards
2010 Sc World Congress Nyc
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Third party risk management with cyber threat intelligence
Symantec Intelligence Report - October 2014
Cyber risk tips for boards and executive teams
Companies Aware, but Not Prepared for GDPR
The Three Pitfalls of Data Security
Cyber Attack Survival
10 Critical Corporate Cyber Security Risks
Ad

Similar to ISACA 2016 Application Security RGJ (20)

KEY
Application Security Done Right
PDF
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
PPTX
BSIMM: Bringing Science to Software Security
PDF
Threat modelling & apps testing
ODP
Hack2Secure Assists Organization in Secure Application Development Through BS...
PDF
JavaOne2013: Secure Engineering Practices for Java
PDF
ACS-security-2821-001 Lecture Note 13.pdf
PDF
PDF
Running a Software Security Program with Open Source Tools (Course)
PPTX
BSIMM-V: The Building Security In Maturity Model
PDF
Introduction to Software Security Initiative
PDF
Managing Application Security Risk in Enterprises - Thoughts and recommendations
PDF
Beyond security testing
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
PDF
SDLC & DevSecOps
PPTX
Agile and Secure SDLC
PPT
Software Security in the Real World
PPTX
BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014
PPTX
Owasp no va bsimm
PDF
Realizing Software Security Maturity: The Growing Pains and Gains
Application Security Done Right
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
BSIMM: Bringing Science to Software Security
Threat modelling & apps testing
Hack2Secure Assists Organization in Secure Application Development Through BS...
JavaOne2013: Secure Engineering Practices for Java
ACS-security-2821-001 Lecture Note 13.pdf
Running a Software Security Program with Open Source Tools (Course)
BSIMM-V: The Building Security In Maturity Model
Introduction to Software Security Initiative
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Beyond security testing
Security Culture from Concept to Maintenance: Secure Software Development Lif...
SDLC & DevSecOps
Agile and Secure SDLC
Software Security in the Real World
BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014
Owasp no va bsimm
Realizing Software Security Maturity: The Growing Pains and Gains
Ad

ISACA 2016 Application Security RGJ

  • 1. ENSURING INFORMATION SECURITY IN THE SYSTEM DEVELOPMENT LIFECYCLE PROCESS RENE G. JASPE CISSP, CSSLP
  • 2. Sinag Solutions Founder and CISO Phylasso Corp., Founder and Managing Director MobKard, CoFounder and CTO Rene Jaspe CISSP, CSSLP • 13 yrs with Telos Corp., a US Federal Gov’t Defense Contractor, servicing various US Defense and Intelligence Agencies as well as NATO allies. • 10 years Software Development and 5 Years Application Security Background.
  • 3. 2015: “We Take It Very Seriously” IBM Xforce Threat Intelligence Report 2016
  • 4. HEALTHCARE, EDUCATION & FINANCIAL SERVICES LEADS GLOBALLY. Source: Ponemon Institute Research Report 2016 Cost of Data Breach
  • 5. Incident Pattern By Industry Verizon Data Breach Incident 2016 Report
  • 6. • Regulatory & Standards Compliance – eCommerce: PCI-DSS, PA-DSS – Financial Services: GLBA – Energy: NERC / FERC – Government: FISMA – PH: Data Privacy Act, BSP • 81% of organizations subject to PCI had not been found compliant prior to the breach Market Drivers
  • 7. Application security challenges: Security-development disconnect fails to prevent vulnerabilities in production applications •Developers Lack Security Insights (or Incentives to Address Security) •Mandate to deliver functionality on-time and on-budget – but not to develop secure applications •Developers rarely educated in secure code practices •Product innovation drives development of increasingly complicated applications Security Team = SDLC Bottleneck •Security tests executed just before launch – Adds time and cost to fix vulnerabilities late in the process •Growing number of web applications but small security staff – Most enterprises scan ~10% of all applications •Continuous monitoring of production apps limited or non-existent – Unidentified vulnerabilities & risk
  • 8. 3 Great Frameworks For Implementing an Enterprise Software Security Program (MOB)
  • 9. Application Security Pros Hold These Truths to Be Self Evident • Software Security is more than a set of security functions. – Not magic crypto fairy dust – Not silver bullet security mechanisms. • Non-functional aspects of design are essential • Bugs and flaws are 50/50. • Security is an emergent property of the entire system (just like quality). • To end up with secure software, deep integration with the SDLC is necessary. Source: Cigital on BSIMM VI
  • 10. Prescriptive vs. Descriptive Models Prescriptive Models • Prescriptive models describe what you should do. • OpenSAMM • Microsoft SDL • Every company has a methodology they follow (often a hybrid) • You need an SSDL. Descriptive Models • Descriptive models describe what is actually happening. • The BSIMM is a descriptive model that can be used to measure any number of prescriptive SSDLs.
  • 11. Microsoft Security Development Lifecycle 5.2 (May 2012)
  • 12. SDL for Agile Bucket Bucket Bucket Bucket One-TimeOne-TimeOne-Time One-Time One-Time Bucket practices:: Important security practices that must be completed on a regular basis but can be spread across multiple sprints during the project lifetime. One-Time practices: Foundational security practices that must be established once at the start of every new Agile project.
  • 13. SDL Practice #7 USE THREAT MODELING Applying a structure approach to threat scenarios during design helps a team more effectively and less expensive identify security vulnerabilities, determines risks from those threats, and establish appropriate mitigations.
  • 14. THREAT MODEL SAMPLE • S – poofing • T – ampering • R – epudiation • I - nformation Disclosure • D – enial of Service • E - levation of Privilege
  • 21. Cost: Phase 1(Months 0 – 3) - Awareness & Planning
  • 22. BSIMM 7 ( October 2016) The BSIMM is a measuring stick for software security. The best way to use the BSIMM is to compare and contrast your own initiative with the data about what other organizations are doing contained in the model. You can then identify goals and objectives of your own and refer to the BSIMM to determine which additional activities make sense for you. The BSIMM data show that high maturity initiatives are well-rounded—carrying out numerous activities in all 12 of the practices described by the model. The model also describes how mature software security initiatives evolve, change, and improve over time.
  • 29. • Microsoft Security Development LifeCycle https://www.microsoft.com/en-us/sdl/ • OpenSAMM http://www.opensamm.org/ • BSIMM https://www.bsimm.com/ KEY TAKE AWAY (MOB)
  • 30. “Today we were unlucky, but remember we only have to be lucky once. You will have to be lucky always.” THANK YOU QUESTIONS??? Rene.Jaspe@sinagsolutions.com @renejaspe https://ph.linkedin.com/in/renejaspe