SlideShare a Scribd company logo
© 2019 Synopsys, Inc. 1
Using Evidence-Based Security in Your Secure
Development Life Cycle
• Andrew van der Stock
• Senior Principal Consultant, Synopsys
• OWASP Top 10 Co-Lead
• OWASP Application Security Verification Standard Co-Lead
© 2019 Synopsys, Inc. 2
Andrew van der
Stock
Joined OWASP late 2002 (ish)
Executive Director 2005–2007
OWASP Developer Guide 2.0 (2003–
2005)
OWASP Top 10 2007
OWASP ESAPI for PHP (sorry!)
OWASP Application Security Verification
Standard (2009–2018)
OWASP Top 10 2017
Board Member 2015–2018
© 2019 Synopsys, Inc. 3
Difficult gestation
OWASP Top 10 history
© 2019 Synopsys, Inc. 4
Top 10 is awareness. Period.
© 2019 Synopsys, Inc. 5 Source: I Can Has Cheezeburger
© 2019 Synopsys, Inc. 6
Criticism—valid and
invalid
• “Not OWASP-like”
– A7 Monitoring and A10 API Protection boiled down to
“failure to buy a tool”
– From a vendor who sets the standard
– From a vendor who owns the tool-type market
• John Steven and others had ontological issues with both
controls and vulnerabilities (“Define vulnerability. Is that a
vulnerability?”)
• Others had problems with the data quality
• Showed us people really care about the OWASP Top 10!
Source: I Can Has Cheezeburger
© 2019 Synopsys, Inc. 7
Leadership
• Dave Wichers and Jeff Williams stood
down
• Handed it over to Andrew van der Stock
• Immediately appointed co-leaders
–Neil Smithline (participated since
2004)
–Torsten Gigler (German translator
since 2010)
–And the team added … Brian Glas
(data geek)
Source: I Can Has Cheezeburger
© 2019 Synopsys, Inc. 8
Project Summit
• OWASP Project Summit
• 10–15 folks local, including Brian Glas and
Dave Wichers
• 5–10 folks remote, including Andrew van der
Stock
• Aimed for a release in 2017 (achieved)
• Agreed to reopen data call (done)
• Agreed on up to two forward-looking issues
(done)
• Agreed to open a new survey (done)
• Agreed to work in the open at GitHub (done)
Source: I Can Has Cheezeburger
© 2019 Synopsys, Inc. 9
Data
OWASP Top 10 2017
© 2019 Synopsys, Inc. 10
Data call
• Needed data for 2016
• Needed qualitative survey data for two replacements for
A7 and A10
• Brian Glas designed the new survey
• 500+ responses
• Obtained a great deal more data, including from the CAC,
HPE (Fortify), Veracode, Checkmarx, and Bugcrowd
• Over 114,000 apps form data set
• Still analyzing all this data
Source: I Can Has Cheezeburger
© 2019 Synopsys, Inc. 11
Dimensions of data qualityIntrinsic
Accuracy
Lineage
Semantic
Structure
Integrity
Contextual
Completeness
Consistency
Currency
Timeliness
Reasonableness
Identifiability
© 2019 Synopsys, Inc. 12
© 2019 Synopsys, Inc. 13
© 2019 Synopsys, Inc. 14
Ordering
• We ordered in risk (impact x likelihood),
which means CVSS x (survey | data)
• Represents our best understanding of
2017 issues
© 2019 Synopsys, Inc. 15
Road to release
OWASP Top 10 RC2
OWASP Top 10 GM
OWASP Top 10 Final
© 2019 Synopsys, Inc. 16
GitHub
• Everything is in GitHub
• Open: Moved to GitHub
• Open: Data and analysis
• Traceable: Issues
• Translatable: Markdown
© 2019 Synopsys, Inc. 17
Translations
Please contribute to translations
- Fork
- Translate
- Submit a pull request
- Maintain your translation
• English
• French
• Hebrew
• Japanese
• Korean
• Spanish
私わ猫です。
© 2019 Synopsys, Inc. 18
Final release
• Hundreds of issues closed in three months
• Markdown à PowerPoint
• Released Thanksgiving 2017
• Kicked off translations
• Well received
OWASP Top 10 - 2017
The Ten Most Critical Web Application Security Risks
This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International Licensehttps://owasp.org
© 2019 Synopsys, Inc. 19
Time to upskill and continuously improve
• OWASP Top 10 2017 is different
– Update skills
– Update test plans
– Update tools
– Update scan policies
In particular, A3, A8, and A10 are very
different. No tool can adequately capture all
10 risks.
Source: I Can Has Cheezeburger
© 2019 Synopsys, Inc. 20
Onward to the OWASP Top 10 2020
© 2019 Synopsys, Inc. 21
What did we learn?
• Awareness first
• OWASP Top 10 41
• Data call
• Data quality
• (Business) risk vs. (technical risk) vs. breach likelihood vs. …
• Time for a new look
• Don’t release on Thanksgiving
© 2019 Synopsys, Inc. 22
Focus on awareness
• OWASP Top 10 is an awareness document
– Proactive Controls is better for entry-level AppSec programs
– Application Security Verification Standard is a standard and should be used
– Testing Guide
– Code Review Guide
– Training applications
– Other standards (PCI DSS, NIST 800-63, NIST 800-53, etc.)
• Tighter integration with all OWASP materials, calls to action
© 2019 Synopsys, Inc. 23
OWASP Top 10 … or OWASP Top 41?
• This is to be decided
– SSRF only appears in AR section
– CWE limitations
• More specificity—agreed
• No categories—mostly agreed
Source: I Can Has Cheezeburger
© 2019 Synopsys, Inc. 24
Data call planning
–Anonymous and aggregate public data?
–Detailed private data for academics?
–Full disclosure?
–More sources
–Boutiques
–Vulnerability management
–Bug bounties
–Cloud vendors
–Automated tool vendors with services
This Photo by Unknown Author is licensed under CC BY-SA
© 2019 Synopsys, Inc. 25
Dimensions of data qualityIntrinsic
Accuracy
Lineage
Semantic
Structure
Integrity
Contextual
Completeness
Consistency
Currency
Timeliness
Reasonableness
Identifiability
© 2019 Synopsys, Inc. 26
Data quality
• Segmentation
– Allows folks to work out their Top 10
– Boutiques (manual results are better than
automated results)
– Automated vendors (low-hanging fruit, volume)
– Bug bounties (demonstrated payout) and
vulnerability programs
• Better data science
– Ask better questions of the data
• Share with anyone, including other OWASP projects
– Application Security Verification Standard
– Proactive Controls
– Juice Shop and other training tools
This Photo by Unknown Author is licensed under CC BY
© 2019 Synopsys, Inc. 27
Risk-rated order, or just
existence
• Ordering history (2004, 2007, 2010–
2017)
• Order of the Top 10 is irrelevant
• It’s the absolute, bare, rock-bottom
minimum you can and should do
• Do we provide an order at all?
• Where do we go from here?
© 2019 Synopsys, Inc. 28
Time for a new look
© 2019 Synopsys, Inc. 29
Release date
• Will not be Thanksgiving
• Will engage with media earlier
• Aiming between August and October
–Likely to coincide with OWASP AppSec Global <USA>
© 2019 Synopsys, Inc. 30
Get ready for 2020
We have started getting ready!
- Help us with data!
- Watch us build out on GitHub!
- Provide issues and advice!
This Photo by Unknown Author is licensed under CC BY-SA-NC
© 2019 Synopsys, Inc. 31
Thank you!
Andrew van der Stock
@vanderaj
OWASP related
vanderaj@owasp.org
Work related
vander@synopsys.com

More Related Content

PDF
Webinar–Delivering a Next Generation Vulnerability Feed
PDF
Webinar–Why All Open Source Scans Aren't Created Equal
PDF
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
PDF
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
PDF
Webinar–You've Got Your Open Source Audit Report–Now What?
PDF
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
PDF
Webinar – Security Tool Misconfiguration and Abuse
PDF
Webinar–That is Not How This Works
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar – Security Tool Misconfiguration and Abuse
Webinar–That is Not How This Works

What's hot (20)

PDF
Webinar–Best Practices for DevSecOps at Scale
PDF
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
PDF
Webinar–What You Need To Know About Open Source Licensing
PDF
Webinar–5 ways to risk rank your vulnerabilities
PDF
Webinar–The 2019 Open Source Year in Review
PDF
Webinar–The State of Open Source in M&A Transactions
PDF
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
PDF
Webinar–OWASP Top 10 for JavaScript for Developers
PDF
Webinar–Open Source Risk in M&A by the Numbers
PDF
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
PDF
Webinar–2019 Open Source Risk Analysis Report
PPTX
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
PPTX
Automate and Enhance Application Security Analysis
PDF
Webinar–AppSec: Hype or Reality
PDF
Preventing Code Leaks & Other Critical Security Risks from Code
PPTX
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
PDF
Tomorrow Starts Here - Security Everywhere
PDF
Cyber Security 4.0 conference 30 November 2016
PPTX
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Webinar–Best Practices for DevSecOps at Scale
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–What You Need To Know About Open Source Licensing
Webinar–5 ways to risk rank your vulnerabilities
Webinar–The 2019 Open Source Year in Review
Webinar–The State of Open Source in M&A Transactions
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–Open Source Risk in M&A by the Numbers
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Webinar–2019 Open Source Risk Analysis Report
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Automate and Enhance Application Security Analysis
Webinar–AppSec: Hype or Reality
Preventing Code Leaks & Other Critical Security Risks from Code
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Tomorrow Starts Here - Security Everywhere
Cyber Security 4.0 conference 30 November 2016
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Ad

Similar to Webinar–Using Evidence-Based Security (20)

PPTX
In that case, we have an OWASP Top 10 opportunity...
PDF
OWASP TOP TEN 2017 RC1
PDF
Owasp top 10
PDF
529 owasp top 10 2013 - rc1[1]
PDF
529 owasp top 10 2013 - rc1[1]
PDF
Owasp top 10 2013
PDF
Owasp top 10_-_2013
PDF
Owasp top 10 2013
PDF
OWASP Top Ten 2013
PDF
Owasp top 10 2017 (en)
PDF
OWASP_Top_10-2017_(en).pdf.pdf
PPTX
12 owasp top 10 - introduction
PDF
Owasp top 10-2017
DOCX
OWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docx
PPTX
20th Anniversary - OWASP Top 10 2021.pptx
PPT
OWASP Top Ten
PPTX
OWASP Top 10 2021 - let's take a closer look by Glenn Wilson
PDF
Owasp o
PDF
Owasp top 10 2013 - rc1
PDF
Running an app sec program with OWASP projects_ Defcon AppSec Village
In that case, we have an OWASP Top 10 opportunity...
OWASP TOP TEN 2017 RC1
Owasp top 10
529 owasp top 10 2013 - rc1[1]
529 owasp top 10 2013 - rc1[1]
Owasp top 10 2013
Owasp top 10_-_2013
Owasp top 10 2013
OWASP Top Ten 2013
Owasp top 10 2017 (en)
OWASP_Top_10-2017_(en).pdf.pdf
12 owasp top 10 - introduction
Owasp top 10-2017
OWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docx
20th Anniversary - OWASP Top 10 2021.pptx
OWASP Top Ten
OWASP Top 10 2021 - let's take a closer look by Glenn Wilson
Owasp o
Owasp top 10 2013 - rc1
Running an app sec program with OWASP projects_ Defcon AppSec Village
Ad

More from Synopsys Software Integrity Group (10)

PDF
Webinar–Segen oder Fluch?
PDF
Webinar–Mobile Application Hardening Protecting Business Critical Apps
PDF
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
PDF
Webinar – Software Security 2019–Embrace Velocity
PDF
Webinar - Developers Are Your Greatest AppSec Resource
PDF
Webinar – Using Metrics to Drive Your Software Security Initiative
PDF
Webinar – Risk-based adaptive DevSecOps
PDF
Webinar–Vulnerabilities in Containerised Production Environments
PDF
Infographic–A Look Back at the First Year of GDPR
PPTX
Webinar–Reviewing Modern JavaScript Applications
Webinar–Segen oder Fluch?
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar – Software Security 2019–Embrace Velocity
Webinar - Developers Are Your Greatest AppSec Resource
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Risk-based adaptive DevSecOps
Webinar–Vulnerabilities in Containerised Production Environments
Infographic–A Look Back at the First Year of GDPR
Webinar–Reviewing Modern JavaScript Applications

Recently uploaded (20)

PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
history of c programming in notes for students .pptx
PDF
medical staffing services at VALiNTRY
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
System and Network Administration Chapter 2
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Understanding Forklifts - TECH EHS Solution
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
L1 - Introduction to python Backend.pptx
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
CHAPTER 2 - PM Management and IT Context
history of c programming in notes for students .pptx
medical staffing services at VALiNTRY
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
System and Network Administration Chapter 2
Design an Analysis of Algorithms II-SECS-1021-03
Understanding Forklifts - TECH EHS Solution
How to Choose the Right IT Partner for Your Business in Malaysia
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
L1 - Introduction to python Backend.pptx
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Odoo Companies in India – Driving Business Transformation.pdf
Odoo POS Development Services by CandidRoot Solutions
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Wondershare Filmora 15 Crack With Activation Key [2025

Webinar–Using Evidence-Based Security

  • 1. © 2019 Synopsys, Inc. 1 Using Evidence-Based Security in Your Secure Development Life Cycle • Andrew van der Stock • Senior Principal Consultant, Synopsys • OWASP Top 10 Co-Lead • OWASP Application Security Verification Standard Co-Lead
  • 2. © 2019 Synopsys, Inc. 2 Andrew van der Stock Joined OWASP late 2002 (ish) Executive Director 2005–2007 OWASP Developer Guide 2.0 (2003– 2005) OWASP Top 10 2007 OWASP ESAPI for PHP (sorry!) OWASP Application Security Verification Standard (2009–2018) OWASP Top 10 2017 Board Member 2015–2018
  • 3. © 2019 Synopsys, Inc. 3 Difficult gestation OWASP Top 10 history
  • 4. © 2019 Synopsys, Inc. 4 Top 10 is awareness. Period.
  • 5. © 2019 Synopsys, Inc. 5 Source: I Can Has Cheezeburger
  • 6. © 2019 Synopsys, Inc. 6 Criticism—valid and invalid • “Not OWASP-like” – A7 Monitoring and A10 API Protection boiled down to “failure to buy a tool” – From a vendor who sets the standard – From a vendor who owns the tool-type market • John Steven and others had ontological issues with both controls and vulnerabilities (“Define vulnerability. Is that a vulnerability?”) • Others had problems with the data quality • Showed us people really care about the OWASP Top 10! Source: I Can Has Cheezeburger
  • 7. © 2019 Synopsys, Inc. 7 Leadership • Dave Wichers and Jeff Williams stood down • Handed it over to Andrew van der Stock • Immediately appointed co-leaders –Neil Smithline (participated since 2004) –Torsten Gigler (German translator since 2010) –And the team added … Brian Glas (data geek) Source: I Can Has Cheezeburger
  • 8. © 2019 Synopsys, Inc. 8 Project Summit • OWASP Project Summit • 10–15 folks local, including Brian Glas and Dave Wichers • 5–10 folks remote, including Andrew van der Stock • Aimed for a release in 2017 (achieved) • Agreed to reopen data call (done) • Agreed on up to two forward-looking issues (done) • Agreed to open a new survey (done) • Agreed to work in the open at GitHub (done) Source: I Can Has Cheezeburger
  • 9. © 2019 Synopsys, Inc. 9 Data OWASP Top 10 2017
  • 10. © 2019 Synopsys, Inc. 10 Data call • Needed data for 2016 • Needed qualitative survey data for two replacements for A7 and A10 • Brian Glas designed the new survey • 500+ responses • Obtained a great deal more data, including from the CAC, HPE (Fortify), Veracode, Checkmarx, and Bugcrowd • Over 114,000 apps form data set • Still analyzing all this data Source: I Can Has Cheezeburger
  • 11. © 2019 Synopsys, Inc. 11 Dimensions of data qualityIntrinsic Accuracy Lineage Semantic Structure Integrity Contextual Completeness Consistency Currency Timeliness Reasonableness Identifiability
  • 12. © 2019 Synopsys, Inc. 12
  • 13. © 2019 Synopsys, Inc. 13
  • 14. © 2019 Synopsys, Inc. 14 Ordering • We ordered in risk (impact x likelihood), which means CVSS x (survey | data) • Represents our best understanding of 2017 issues
  • 15. © 2019 Synopsys, Inc. 15 Road to release OWASP Top 10 RC2 OWASP Top 10 GM OWASP Top 10 Final
  • 16. © 2019 Synopsys, Inc. 16 GitHub • Everything is in GitHub • Open: Moved to GitHub • Open: Data and analysis • Traceable: Issues • Translatable: Markdown
  • 17. © 2019 Synopsys, Inc. 17 Translations Please contribute to translations - Fork - Translate - Submit a pull request - Maintain your translation • English • French • Hebrew • Japanese • Korean • Spanish 私わ猫です。
  • 18. © 2019 Synopsys, Inc. 18 Final release • Hundreds of issues closed in three months • Markdown à PowerPoint • Released Thanksgiving 2017 • Kicked off translations • Well received OWASP Top 10 - 2017 The Ten Most Critical Web Application Security Risks This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International Licensehttps://owasp.org
  • 19. © 2019 Synopsys, Inc. 19 Time to upskill and continuously improve • OWASP Top 10 2017 is different – Update skills – Update test plans – Update tools – Update scan policies In particular, A3, A8, and A10 are very different. No tool can adequately capture all 10 risks. Source: I Can Has Cheezeburger
  • 20. © 2019 Synopsys, Inc. 20 Onward to the OWASP Top 10 2020
  • 21. © 2019 Synopsys, Inc. 21 What did we learn? • Awareness first • OWASP Top 10 41 • Data call • Data quality • (Business) risk vs. (technical risk) vs. breach likelihood vs. … • Time for a new look • Don’t release on Thanksgiving
  • 22. © 2019 Synopsys, Inc. 22 Focus on awareness • OWASP Top 10 is an awareness document – Proactive Controls is better for entry-level AppSec programs – Application Security Verification Standard is a standard and should be used – Testing Guide – Code Review Guide – Training applications – Other standards (PCI DSS, NIST 800-63, NIST 800-53, etc.) • Tighter integration with all OWASP materials, calls to action
  • 23. © 2019 Synopsys, Inc. 23 OWASP Top 10 … or OWASP Top 41? • This is to be decided – SSRF only appears in AR section – CWE limitations • More specificity—agreed • No categories—mostly agreed Source: I Can Has Cheezeburger
  • 24. © 2019 Synopsys, Inc. 24 Data call planning –Anonymous and aggregate public data? –Detailed private data for academics? –Full disclosure? –More sources –Boutiques –Vulnerability management –Bug bounties –Cloud vendors –Automated tool vendors with services This Photo by Unknown Author is licensed under CC BY-SA
  • 25. © 2019 Synopsys, Inc. 25 Dimensions of data qualityIntrinsic Accuracy Lineage Semantic Structure Integrity Contextual Completeness Consistency Currency Timeliness Reasonableness Identifiability
  • 26. © 2019 Synopsys, Inc. 26 Data quality • Segmentation – Allows folks to work out their Top 10 – Boutiques (manual results are better than automated results) – Automated vendors (low-hanging fruit, volume) – Bug bounties (demonstrated payout) and vulnerability programs • Better data science – Ask better questions of the data • Share with anyone, including other OWASP projects – Application Security Verification Standard – Proactive Controls – Juice Shop and other training tools This Photo by Unknown Author is licensed under CC BY
  • 27. © 2019 Synopsys, Inc. 27 Risk-rated order, or just existence • Ordering history (2004, 2007, 2010– 2017) • Order of the Top 10 is irrelevant • It’s the absolute, bare, rock-bottom minimum you can and should do • Do we provide an order at all? • Where do we go from here?
  • 28. © 2019 Synopsys, Inc. 28 Time for a new look
  • 29. © 2019 Synopsys, Inc. 29 Release date • Will not be Thanksgiving • Will engage with media earlier • Aiming between August and October –Likely to coincide with OWASP AppSec Global <USA>
  • 30. © 2019 Synopsys, Inc. 30 Get ready for 2020 We have started getting ready! - Help us with data! - Watch us build out on GitHub! - Provide issues and advice! This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 31. © 2019 Synopsys, Inc. 31 Thank you! Andrew van der Stock @vanderaj OWASP related vanderaj@owasp.org Work related vander@synopsys.com