SlideShare a Scribd company logo
The Future of Software
Security Assurance:
Cloudy, with Storms Likely


 Rafal Los
 Enterprise & Cloud Security Strategist
 HP Software

 ©2011 Hewlett-Packard Development Company, L.P.
 The information contained herein is subject to change without notice
SSA
                   Software Security Assurance




©2011 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice
Software Security Assurance




Can you trust your software?
THE FUTURE         …of software security.




©2011 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice
5 Inevitables
1 – Application Modernization
Catalysts:
•   Your corporate applications are aging
•   Aging application technologies are hindering your business productivity
•   Applications deployed ‘before security’ are critically exposed


Opportunity:
•   Address software security as a core
    business requirement
•   Modernize security controls, “bolt-ons”
2 – Cloud Adoption
Catalysts:
•   Organizations are adopting cloud whether they acknowledge it or not
•   Extreme confusion: what is “cloud security”?
•   “The Cloud” brings fundamentally different security challenges


Opportunity:
•   A forceful re-evaluation of security paradigms
•   Shift security from perimeter, to application
•   Engage providers, fully understand risks of the cloud model
3 – Consumerization of the Enterprise
Catalysts:
•   Enterprises functions being performed across consumer devices
•   Corporate data is spread across devices enterprises don’t control
•   Applications must run on diverse platforms, pose unique risks


Opportunity:
•   Understand application risk profiles across consumer use-cases
•   Focus on minimizing data sprawl, centralizing logic processing
•   Create strategic mobile application defenses
4 – Technology Overrun
Catalysts:
•   Bleeding-edge client-side technology adoption
•   Mobile development is hot, security is lacking
•   Development technology over-running security capability


Opportunity:
•   Adopt technology-independent security controls
•   Control application release processes (ITIL change control)
5 – Incidents
Catalysts:
•   Incidents will increase as enterprises become more aware
•   Cloud adoption, mobile computing, consumerization increases likelihood
•   Regulations and laws continue to drive disclosure


Opportunity:
•   Optimized technology responds to incidents faster, smarter
•   Identify data acquisition, forensic strategies as part of design plans
8 Evolutions
1 – Start and End with Requirements

            Strategic risk reduction impacts the idea, not the result


            •   Understand organizational goals, seek to reduce risk
            •   Influence “what the business wants”
            •   Abstract security to risk, in business terms
            •   A defect is a deviation from a requirement
2 – Engage the Full SDLC

Organizations must address the full application lifecycle




      IT Handoff                             Release
3 – Shift SSA Ownership

Software security is not the Security organization’s problem.
SSA Today                          SSA Tomorrow

•   SSA is equated with security   • Security governs SSA program
•   Security runs SSA program      • Security manages key aspects
•   Manage all aspects             • Govern testing, validates
•   Perform security testing         findings
•   Manage defect tracking         • Develop policy, practices
•   Fail.                          • Succeed.
4 – Risk-Based Defense
Application use-cases have unique risk profiles.
It’s time to recognize this fact, and build sane strategies.


•   Segregate, segment, build security zones by business criticality
•   Short-term tactical defenses for weakest legacy applications
•   Fix, defer or accept risk.
•   Develop risk profiles for application use-cases such as mobile…
    –   Encrypt data, virtualize usage

•   Fortify more than just the front-end – including services, APIs
5 – Static or Dynamic Testing? Yes.

Static vs. Dynamic security testing is no longer a question.


Static and Dynamic analysis each has advantages, both are needed
Provide the right technology, at the right time, to the right people
Audit source code, validate the running application
Remember, you can’t test yourself secure
6 – Test, but Cheat
  When you’re up against attackers, cheat as often as possible.


  •   Gray-box technology provides deeper insight into application logic
  •   Link exploits with vulnerable code
  •   Get to the fix faster.

                                  Web App                Function exec_query () {
                                                           take user data (x);
                                                           construct query (x + y);
                                                           execute query;
                                                           return results (z);
4 exploitable fields  1 fix                             }
7 – Dynamic Security Intelligence
Real security isn’t about keeping the ‘bad guys’ out,
it’s about reacting in real-time.                       Critical
                                          Detect
                                                        Data



                                                        Respond




 Compromised
 Remote Corp User
8 – Measure Against Business Goals (KPIs)

Only 2 questions are relevant:
1.   What are your organizational, business objectives?
2.   How does Software Security Assurance contribute to those objectives?


5 Suggested KPIs:
1. WRT – Weighted Risk Trend
2. DRW – Defect Remediation Window
3. RDR – Rate of Defect Recurrence
4. SCM – Specific Coverage Metric
5. SQR – Security to Quality Defect Ratio
1 Cold Hard Fact
You will be breached.
 You will lose data, trust, and money.


   The incident is will matter.
   The response will be the deciding factor.
Surviving a Major Breach
In the court of public opinion




                Organizational                  Due Diligence
                Response




                                             Incident “Damage”



22   Enterprise Security – HP Confidential
SOFTWARE SECURITY ASSURANCE
                                                MUST EVOLVE




Enterprise Security – HP Confidential
  23
Twitter:     @Wh1t3Rabbit
Blog:        http://hp.com/go/white-rabbit
Podcast:     http://podcast.wh1t3rabbit.net




           THANK YOU, LET’S TALK!

More Related Content

PPTX
The QA Analyst's Hacker's Landmark Tour v3.0
PDF
Security BSides Atlanta - "The Business Doesn't Care..."
PPTX
Software Security Assurance - Program Building (You're going to need a bigger...
PPTX
Assess all the things
PPT
Six Mistakes of Log Management 2008
PDF
Jump Start Your Application Security Knowledge
PPTX
Building an Analytics - Enabled SOC Breakout Session
PDF
2015 Cyber Security
The QA Analyst's Hacker's Landmark Tour v3.0
Security BSides Atlanta - "The Business Doesn't Care..."
Software Security Assurance - Program Building (You're going to need a bigger...
Assess all the things
Six Mistakes of Log Management 2008
Jump Start Your Application Security Knowledge
Building an Analytics - Enabled SOC Breakout Session
2015 Cyber Security

What's hot (20)

PPTX
451 and Cylance - The Roadmap To Better Endpoint Security
PPTX
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
PDF
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
PPTX
Building a SOC - hackmiami 2018
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
PPTX
Ten Security Product Categories You've Probably Never Heard Of
PPTX
2016 virus bulletin
PPTX
Generic siem how_2017
PPTX
Security best practices for regular users
PDF
Getting Executive Support for a Software Security Program
PPTX
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
PPTX
Something Fun About Using SIEM by Dr. Anton Chuvakin
PPTX
Incident Response in the age of Nation State Cyber Attacks
PDF
Get Your Board to Say "Yes" to a BSIMM Assessment
PDF
The Path to Proactive Application Security
PDF
Proactive Measures to Defeat Insider Threat
PPTX
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
PPTX
NIST Critical Security Framework (CSF)
PPTX
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
PPTX
For Business's Sake, Let's focus on AppSec
451 and Cylance - The Roadmap To Better Endpoint Security
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Building a SOC - hackmiami 2018
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Ten Security Product Categories You've Probably Never Heard Of
2016 virus bulletin
Generic siem how_2017
Security best practices for regular users
Getting Executive Support for a Software Security Program
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton Chuvakin
Incident Response in the age of Nation State Cyber Attacks
Get Your Board to Say "Yes" to a BSIMM Assessment
The Path to Proactive Application Security
Proactive Measures to Defeat Insider Threat
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
NIST Critical Security Framework (CSF)
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
For Business's Sake, Let's focus on AppSec
Ad

Similar to The Future of Software Security Assurance (20)

PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
PPTX
Application security meetup 27012021
PDF
Trending it security threats in the public sector
PPTX
Protecting health and life science organizations from breaches and ransomware
PDF
Why You'll Care More About Mobile Security in 2020
PDF
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
PPTX
SAM05_Barber PW (7-9-15)
PPT
Information Technology Security Basics
PDF
Software Vulnerabilities Risk Remediation
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
PPTX
Building an AppSec Team Extended Cut
PPTX
Mike Spaulding - Building an Application Security Program
PDF
Top Strategies to Capture Security Intelligence for Applications
PDF
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
PDF
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
PPT
dataProtection_p3.ppt
PDF
Responding to and recovering from sophisticated security attacks
 
PDF
New Age Red Teaming - Enterprise Infilteration
PDF
Vulnerability Management In An Application Security World
Application Hackers Have A Handbook. Why Shouldn't You?
Application security meetup 27012021
Trending it security threats in the public sector
Protecting health and life science organizations from breaches and ransomware
Why You'll Care More About Mobile Security in 2020
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
SAM05_Barber PW (7-9-15)
Information Technology Security Basics
Software Vulnerabilities Risk Remediation
Journey to the Cloud: Securing Your AWS Applications - April 2015
Building an AppSec Team Extended Cut
Mike Spaulding - Building an Application Security Program
Top Strategies to Capture Security Intelligence for Applications
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
dataProtection_p3.ppt
Responding to and recovering from sophisticated security attacks
 
New Age Red Teaming - Enterprise Infilteration
Vulnerability Management In An Application Security World
Ad

More from Rafal Los (20)

PDF
The 7 Things I Know About Cyber Security After 25 Years | April 2024
PDF
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
PDF
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
PPTX
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
PPTX
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
PDF
Lies, Fables and Security Metrics
PDF
Losing battles, winning wars
PPTX
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
PPTX
Operationalizing Security Intelligence [ InfoSec World 2014 ]
PDF
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
PPTX
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
PPTX
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
PPTX
Threat modeling the security of the enterprise
PPTX
Making Measurable Gains - Contextualizing 'Secure' in Business
PDF
Defying Logic - Business Logic Testing with Automation
PDF
Ultimate Hack! Layers 8 & 9 of the OSI Model
PDF
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
PPTX
Oh No They Didn't! 7 Web App Security Stories (v1.0)
PPTX
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
PPTX
Sans Feb 2010 - When Web 2 0 Attacks v3.3
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Lies, Fables and Security Metrics
Losing battles, winning wars
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Threat modeling the security of the enterprise
Making Measurable Gains - Contextualizing 'Secure' in Business
Defying Logic - Business Logic Testing with Automation
Ultimate Hack! Layers 8 & 9 of the OSI Model
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Sans Feb 2010 - When Web 2 0 Attacks v3.3

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Cloud computing and distributed systems.
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
A Presentation on Artificial Intelligence
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
cuic standard and advanced reporting.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
A Presentation on Artificial Intelligence
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Monthly Chronicles - July 2025
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
cuic standard and advanced reporting.pdf

The Future of Software Security Assurance

  • 1. The Future of Software Security Assurance: Cloudy, with Storms Likely Rafal Los Enterprise & Cloud Security Strategist HP Software ©2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
  • 2. SSA Software Security Assurance ©2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
  • 3. Software Security Assurance Can you trust your software?
  • 4. THE FUTURE …of software security. ©2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
  • 6. 1 – Application Modernization Catalysts: • Your corporate applications are aging • Aging application technologies are hindering your business productivity • Applications deployed ‘before security’ are critically exposed Opportunity: • Address software security as a core business requirement • Modernize security controls, “bolt-ons”
  • 7. 2 – Cloud Adoption Catalysts: • Organizations are adopting cloud whether they acknowledge it or not • Extreme confusion: what is “cloud security”? • “The Cloud” brings fundamentally different security challenges Opportunity: • A forceful re-evaluation of security paradigms • Shift security from perimeter, to application • Engage providers, fully understand risks of the cloud model
  • 8. 3 – Consumerization of the Enterprise Catalysts: • Enterprises functions being performed across consumer devices • Corporate data is spread across devices enterprises don’t control • Applications must run on diverse platforms, pose unique risks Opportunity: • Understand application risk profiles across consumer use-cases • Focus on minimizing data sprawl, centralizing logic processing • Create strategic mobile application defenses
  • 9. 4 – Technology Overrun Catalysts: • Bleeding-edge client-side technology adoption • Mobile development is hot, security is lacking • Development technology over-running security capability Opportunity: • Adopt technology-independent security controls • Control application release processes (ITIL change control)
  • 10. 5 – Incidents Catalysts: • Incidents will increase as enterprises become more aware • Cloud adoption, mobile computing, consumerization increases likelihood • Regulations and laws continue to drive disclosure Opportunity: • Optimized technology responds to incidents faster, smarter • Identify data acquisition, forensic strategies as part of design plans
  • 12. 1 – Start and End with Requirements Strategic risk reduction impacts the idea, not the result • Understand organizational goals, seek to reduce risk • Influence “what the business wants” • Abstract security to risk, in business terms • A defect is a deviation from a requirement
  • 13. 2 – Engage the Full SDLC Organizations must address the full application lifecycle IT Handoff Release
  • 14. 3 – Shift SSA Ownership Software security is not the Security organization’s problem. SSA Today SSA Tomorrow • SSA is equated with security • Security governs SSA program • Security runs SSA program • Security manages key aspects • Manage all aspects • Govern testing, validates • Perform security testing findings • Manage defect tracking • Develop policy, practices • Fail. • Succeed.
  • 15. 4 – Risk-Based Defense Application use-cases have unique risk profiles. It’s time to recognize this fact, and build sane strategies. • Segregate, segment, build security zones by business criticality • Short-term tactical defenses for weakest legacy applications • Fix, defer or accept risk. • Develop risk profiles for application use-cases such as mobile… – Encrypt data, virtualize usage • Fortify more than just the front-end – including services, APIs
  • 16. 5 – Static or Dynamic Testing? Yes. Static vs. Dynamic security testing is no longer a question. Static and Dynamic analysis each has advantages, both are needed Provide the right technology, at the right time, to the right people Audit source code, validate the running application Remember, you can’t test yourself secure
  • 17. 6 – Test, but Cheat When you’re up against attackers, cheat as often as possible. • Gray-box technology provides deeper insight into application logic • Link exploits with vulnerable code • Get to the fix faster. Web App Function exec_query () { take user data (x); construct query (x + y); execute query; return results (z); 4 exploitable fields  1 fix }
  • 18. 7 – Dynamic Security Intelligence Real security isn’t about keeping the ‘bad guys’ out, it’s about reacting in real-time. Critical Detect Data Respond Compromised Remote Corp User
  • 19. 8 – Measure Against Business Goals (KPIs) Only 2 questions are relevant: 1. What are your organizational, business objectives? 2. How does Software Security Assurance contribute to those objectives? 5 Suggested KPIs: 1. WRT – Weighted Risk Trend 2. DRW – Defect Remediation Window 3. RDR – Rate of Defect Recurrence 4. SCM – Specific Coverage Metric 5. SQR – Security to Quality Defect Ratio
  • 20. 1 Cold Hard Fact
  • 21. You will be breached. You will lose data, trust, and money. The incident is will matter. The response will be the deciding factor.
  • 22. Surviving a Major Breach In the court of public opinion Organizational Due Diligence Response Incident “Damage” 22 Enterprise Security – HP Confidential
  • 23. SOFTWARE SECURITY ASSURANCE MUST EVOLVE Enterprise Security – HP Confidential 23
  • 24. Twitter: @Wh1t3Rabbit Blog: http://hp.com/go/white-rabbit Podcast: http://podcast.wh1t3rabbit.net THANK YOU, LET’S TALK!