SlideShare a Scribd company logo
1
Glenn ten Cate
Twitter:
@FooBar_testing_
Riccardo ten Cate
Twitter:
@RiieCco
2
Agenda
• Why?
• Software (AND Security) development life cycle
3
Developer, you are the one
3
Agenda
• Why?
• Software (AND Security) development life cycle
4
Coding mistakes, déjà vu.
4
Agenda
• Why?
• Software (AND Security) development life cycle
5
Barely hanging on …
5
Agenda
• Why?
• Software (AND Security) development life cycle
6
But there is always an option!
6
Agenda
• Why?
• Software (AND Security) development life cycle
7
There are ways to learn!
7
• Worldwide not-for-profit charitable.
• Our mission is to make software security visible, so that
individuals and organizations worldwide can make
informed decisions about true software security risks.
8
Agenda
• Why?
• Software (AND Security) development life cycle
9
Be responsible for your code.
9
Verify your code
• ASVS lvl1 Opportunistic
It adequately defends against application security vulnerabilities
that are easy to discover.
• ASVS lvl2 Standard
It adequately defends against prevalent application security
vulnerabilities whose existence poses moderate-to-serious risk.
• ASVS lvl3 Advanced
It adequately defends against all advanced application security
vulnerabilities, and also demonstrates principles of good security
design.
10
What is S.K.F
• Guide to secure programming
By adapting your design to security, not securing your design
• Security awareness
It informs you about threats even before you wrote a single line of
code.
• Clear and transparent
Provides information applicable for your specific needs on the spot.
11
Agenda
• Why?
• Software (AND Security) development life cycle
12
And now the blind dev can see.
12
Demo
13
Agenda
• Why?
• Software (AND Security) development life cycle
14
You know this, you are ready.
14
SDLC MANUAL
• OWASP-SKF
• Software Development Life Cycle
• Code review
• SAST
• DAST
15
SDLC CI
• OWASP-SKF
• Software Development Life Cycle
• Travis CI
• Coveralls CI
• Scrutinizer CI
16
Agenda
• Why?
• Software (AND Security) development life cycle
17
GitHub
• https://github.com/blabla1337/skf-flask
17
Agenda
• Why?
• Software (AND Security) development life cycle
18
You have the skills …
18
Agenda
• Why?
• Software (AND Security) development life cycle
19
… you are the one.
19
Getting involved?
• OWASP
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Fr
amework
• Website
https://secureby.design
Together we can make it big, strong and helpful!
20
Agenda
• Why?
• Software (AND Security) development life cycle
21
You are only as strong as the
weakest developer in your team.
21
Questions?
22

More Related Content

PPTX
Build reliable Svelte applications using Cypress
PDF
Zero to Ninety in Securing DevOps
PDF
DevOps or DevSecOps
PDF
Adversary Driven Defense in the Real World
PDF
DevSecOps and the CI/CD Pipeline
PPTX
DeadDropSF - Better Red Than Dead
PPTX
ABN AMRO DevSecOps Journey
PPTX
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
Build reliable Svelte applications using Cypress
Zero to Ninety in Securing DevOps
DevOps or DevSecOps
Adversary Driven Defense in the Real World
DevSecOps and the CI/CD Pipeline
DeadDropSF - Better Red Than Dead
ABN AMRO DevSecOps Journey
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion

What's hot (20)

PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
PDF
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
PPTX
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
PPTX
Continuous security: Bringing agility to the secure development lifecycle
PDF
How to automate your DevSecOps successfully
PDF
DevSecCon London 2017: Shift happens ... by Colin Domoney
PPTX
Outpost24 webinar - application security in a dev ops world-08-2018
PDF
Dos and Don'ts of DevSecOps
PDF
Security as Code: A DevSecOps Approach
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
PDF
DevSecOps - The big picture
PDF
Hacker-powered Software Development
PDF
DevSecOps: essential tooling to enable continuous security 2019-09-16
PDF
RSAC DevSecOpsDays 2018 - We are all Equifax
PDF
DevSecOps for you Full Stack
PDF
DevSecCon London 2017: How far left do you want to go with security? by Javie...
PDF
8 Tips for Deploying DevSecOps
PDF
Implementing DevOps in a Regulated Environment - DJ Schleen
PDF
How GitLab and HackerOne help organizations innovate faster without compromis...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
Continuous security: Bringing agility to the secure development lifecycle
How to automate your DevSecOps successfully
DevSecCon London 2017: Shift happens ... by Colin Domoney
Outpost24 webinar - application security in a dev ops world-08-2018
Dos and Don'ts of DevSecOps
Security as Code: A DevSecOps Approach
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecOps - The big picture
Hacker-powered Software Development
DevSecOps: essential tooling to enable continuous security 2019-09-16
RSAC DevSecOpsDays 2018 - We are all Equifax
DevSecOps for you Full Stack
DevSecCon London 2017: How far left do you want to go with security? by Javie...
8 Tips for Deploying DevSecOps
Implementing DevOps in a Regulated Environment - DJ Schleen
How GitLab and HackerOne help organizations innovate faster without compromis...
Ad

Viewers also liked (20)

PDF
Milano Chatbots Meetup - Vittorio Banfi - Bot Design - Codemotion Milan 2016
PDF
The Evolution of Asynchronous Javascript - Alessandro Cinelli - Codemotion Mi...
PPTX
Corporate Renewable Energy Procurement - Why and How
PDF
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
PDF
Urban Legends: What You Code Makes You Who You Are - PJ Hagerty - Codemotion ...
PDF
Staying Alive: Patterns for Failure Management From the Bottom of the Ocean -...
PDF
App Dev in the Cloud: Not my circus, not my monkeys... - Eric D. Schabell - ...
PDF
Universal JavaScript Web Applications with React - Luciano Mammino - Codemoti...
PDF
Fast Cars, Big Data - How Streaming Can Help Formula 1 - Tugdual Grall - Code...
ODP
Insights into Chatbot Development - Implementing Cross-Platform Chatbots - Ba...
PDF
Con te non ci lavoro - Francesco Fullone - Codemotion Rome 2017
PDF
Microservices and the Inverse Conway Manoeuvre - James Lewis - Codemotion Rom...
PDF
SUPPORTING REGIME FOR SMALL AND MEDIUM ENTERPRISES (“SMEs”) IN VIETNAM
PDF
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
PDF
Progressive Web Apps: trick or real magic? - Maurizio Mangione - Codemotion M...
PDF
Boxcars and Cabooses: When one more XHR is too much - Peter Chittum - Codemot...
PPTX
Sinfonier: How I turned my grandmother into a data analyst - Fran J. Gomez - ...
ODP
If security is hard, you are doing it wrong - Fabio Locati - Codemotion Amste...
PDF
Knowledge is Power: Getting out of trouble by understanding Git - Steve Smith...
PDF
Living on the Edge (Service) - Mark Heckler - Codemotion Amsterdam 2016
Milano Chatbots Meetup - Vittorio Banfi - Bot Design - Codemotion Milan 2016
The Evolution of Asynchronous Javascript - Alessandro Cinelli - Codemotion Mi...
Corporate Renewable Energy Procurement - Why and How
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
Urban Legends: What You Code Makes You Who You Are - PJ Hagerty - Codemotion ...
Staying Alive: Patterns for Failure Management From the Bottom of the Ocean -...
App Dev in the Cloud: Not my circus, not my monkeys... - Eric D. Schabell - ...
Universal JavaScript Web Applications with React - Luciano Mammino - Codemoti...
Fast Cars, Big Data - How Streaming Can Help Formula 1 - Tugdual Grall - Code...
Insights into Chatbot Development - Implementing Cross-Platform Chatbots - Ba...
Con te non ci lavoro - Francesco Fullone - Codemotion Rome 2017
Microservices and the Inverse Conway Manoeuvre - James Lewis - Codemotion Rom...
SUPPORTING REGIME FOR SMALL AND MEDIUM ENTERPRISES (“SMEs”) IN VIETNAM
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
Progressive Web Apps: trick or real magic? - Maurizio Mangione - Codemotion M...
Boxcars and Cabooses: When one more XHR is too much - Peter Chittum - Codemot...
Sinfonier: How I turned my grandmother into a data analyst - Fran J. Gomez - ...
If security is hard, you are doing it wrong - Fabio Locati - Codemotion Amste...
Knowledge is Power: Getting out of trouble by understanding Git - Steve Smith...
Living on the Edge (Service) - Mark Heckler - Codemotion Amsterdam 2016
Ad

Similar to OWASP-SKF Making the web secure by design - Glenn ten Cate - Codemotion Amsterdam 2016 (20)

PDF
[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...
PDF
[OWASP Poland Day] Security knowledge framework
PDF
Arved sandstrom - the rotwithin - atlseccon2011
PDF
ACS-security-2821-001 Lecture Note 13.pdf
KEY
Application Security Done Right
PPTX
Application Security and Secure Software Development Lifecycle
PDF
Applicaiton Security - Building The Audit Program
PPT
Software Security Testing
PPTX
5 Ways to Reduce 3rd Party Developer Risk
PDF
Application Security Testing for Software Engineers: An approach to build sof...
PPTX
Reduce Third Party Developer Risks
PDF
Managing Application Security Risk in Enterprises - Thoughts and recommendations
PDF
Matteo Meucci - Security Summit 12th March 2019
PPT
SoftwareSecurity.ppt
PDF
An Introduction to Secure Application Development
PDF
The Principles of Secure Development - BSides Las Vegas 2009
PPTX
Red7 SSDLC Introduction: Building Secure Web and Mobile Applications
PPT
六合彩香港-六合彩
PDF
WebAppSec @ Ibuildings in 2014
PDF
App sec and quality london - may 2016 - v0.5
[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...
[OWASP Poland Day] Security knowledge framework
Arved sandstrom - the rotwithin - atlseccon2011
ACS-security-2821-001 Lecture Note 13.pdf
Application Security Done Right
Application Security and Secure Software Development Lifecycle
Applicaiton Security - Building The Audit Program
Software Security Testing
5 Ways to Reduce 3rd Party Developer Risk
Application Security Testing for Software Engineers: An approach to build sof...
Reduce Third Party Developer Risks
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Matteo Meucci - Security Summit 12th March 2019
SoftwareSecurity.ppt
An Introduction to Secure Application Development
The Principles of Secure Development - BSides Las Vegas 2009
Red7 SSDLC Introduction: Building Secure Web and Mobile Applications
六合彩香港-六合彩
WebAppSec @ Ibuildings in 2014
App sec and quality london - may 2016 - v0.5

More from Codemotion (20)

PDF
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
PDF
Pompili - From hero to_zero: The FatalNoise neverending story
PPTX
Pastore - Commodore 65 - La storia
PPTX
Pennisi - Essere Richard Altwasser
PPTX
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
PPTX
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
PPTX
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
PPTX
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
PDF
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
PDF
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
PDF
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
PDF
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
PDF
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
PDF
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
PPTX
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
PPTX
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
PDF
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
PDF
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
PDF
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
PDF
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Pompili - From hero to_zero: The FatalNoise neverending story
Pastore - Commodore 65 - La storia
Pennisi - Essere Richard Altwasser
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Mushroom cultivation and it's methods.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Hybrid model detection and classification of lung cancer
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Encapsulation_ Review paper, used for researhc scholars
Zenith AI: Advanced Artificial Intelligence
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cloud_computing_Infrastucture_as_cloud_p
A comparative analysis of optical character recognition models for extracting...
Web App vs Mobile App What Should You Build First.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Mushroom cultivation and it's methods.pdf
TLE Review Electricity (Electricity).pptx
1 - Historical Antecedents, Social Consideration.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Heart disease approach using modified random forest and particle swarm optimi...
DP Operators-handbook-extract for the Mautical Institute
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Building Integrated photovoltaic BIPV_UPV.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Hybrid model detection and classification of lung cancer
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

OWASP-SKF Making the web secure by design - Glenn ten Cate - Codemotion Amsterdam 2016