optimizing capability maturity for application security in...

47
CRISC CGEIT CISM CISA 2013 Fall Conference “Sail to Success” Optimizing Capability Maturity for Application Security in the Software Development Lifecycle Jonathan Davis, CISA, CISSP, CCSK Vice President, Marketing Steve Wolf - Vice President, Application Security AsTech Consulting www.astechconsulting.com Governance, Risk & Compliance G22

Upload: others

Post on 08-Jun-2020

16 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

CRISC

CGEIT

CISM

CISA 2013 Fall Conference – “Sail to Success”

Optimizing Capability Maturity for

Application Security in the Software

Development Lifecycle

Jonathan Davis, CISA, CISSP, CCSK – Vice President, Marketing

Steve Wolf - Vice President, Application Security

AsTech Consulting www.astechconsulting.com

Governance, Risk & Compliance – G22

Page 2: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Course Objectives

Intro to Software Security Capability Maturity

Benefits of Capability Maturity

Guiding Concepts

Key Areas of Focus

2

Page 3: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

9/20/2013 3

CRISC

CGEIT

CISM

CISA 2013 Fall Conference – “Sail to Success”

INTRODUCTION TO

SOFTWARE SECURITY

CAPABILITY MATURITY

3

Page 4: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Web & Mobile Applications: High Reward and High Risk

Web & Mobile Apps drive revenue

Time-to-Market & UX vs. Security

Attacks & breaches on the rise

Compliance increasingly complex

Vendor / 3rd party code risks

Post-release remediation costly

4

Page 5: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

What Are You Willing to Risk?

5

Brand Reputation?

Loss of Revenue & Customers?

Fines for Non-Compliance?

Litigation Exposure?

High Costs and Post-Release Fixes?

Page 6: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

How Strong is Your Faith In Your Application Security Program?

“If you can't describe what you are doing as a process,

you don't know what you're

doing.”

?

W. Edwards Deming

6

Page 7: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Status Quo is Unacceptable

In an immature organization, there is no

objective basis for judging product

quality or for solving product or process

problems. Therefore, product quality is

difficult to predict.

- Software Engineering Institute

Capability Maturity Model for Software

7

Page 8: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Security is More Than Tools

A well-crafted process is essential

Depends upon clearly defined goals

Communication between stakeholders

Metrics for all key program aspects

Process must be designed to evolve

8

Page 9: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Enter Capability Maturity

Capability Maturity Models (CMM) help establish relevant, repeatable processes

that lead to measurable, predictable

outcomes. These generate feedback

that can be monitored, interpreted, and

ultimately optimized for greater quality

and efficiency, leading to a virtuous

cycle of continuous improvement.

9

Page 10: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Capability Maturity Models

Original CMM created in the 1980’s

Joint project of Dept. of Defense and Software

Engineering Institute (SEI) at Carnegie Mellon

Established standardized quality best-practices

for software development initiatives

Software Security CMMs take similar approach,

but focus on security in the SDLC

10

Page 11: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Two Software Security CMMs

BSIMM

OpenSAMM

While there are other maturity models for

secure development frameworks, such as

the Microsoft Security Development Lifecycle and CLASP, the two models above offer a

very practical mix of strategy and detail.

11

Page 12: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

BSIMM

Building Security In Maturity Model

http://www.bsimm.com/

Launched in 2008

Compares secure development initiatives

51 organizations shared data in 2012

4 Domains, 12 Practices, 111 activities

12

Page 13: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

BSIMM Structure 4 Domains – 12 Practices

Governance Intelligence SSDLC

Touchpoints Deployment

Strategy &

Metrics

Attack

Models

Architecture

& Analysis

Penetration

Testing

Compliance

& Policy

Security

Features &

Design

Code

Review

Software

Environment

Training Standards &

Requirements

Security

Testing

Configuration

& Vulnerability

Management

13

Page 14: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

OpenSAMM

Open Software Assurance Maturity Model http://www.opensamm.org/

Created by Fortify Software, now open source

Managed by OWASP http://www.owasp.org

4 Business Functions contain 12 Security Practices

Within each Security Practice, examples are given for increasing levels of program maturity

14

Page 15: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

OpenSAMM Structure 4 Business Functions – 12 Security Practices

Governance Construction Verification Deployment

Strategy &

Metrics

Threat

Assessment

Design

Review Vulnerability

Management

Policy &

Compliance Security

Requirements

Code

Review

Environment

Hardening

Education &

Guidance

Secure

Architecture

Security

Testing

Operational

Enablement

15

Page 16: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

BSIMM vs. OpenSAMM

Both offer resources to build program roadmaps

4 “Business Functions” and underlying practices organized more intuitively than 4 “Domains”

BSIMM’s 111 activities more granular regarding controls than OpenSAMM

OpenSAMM makes it easier to gauge maturity of specific Security Practice areas against the model

BSIMM provides benchmarks from 12 verticals, may be better for comparison against industry norms

16

Page 17: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Key Takeaways

AppSec requires a holistic, programmatic approach

BSIMM & OpenSAMM: 2 CMMs with similar structures

Both models contain valuable recommendations

No need to implement every individual control

Key is to establish a functioning security ecosystem

Customize a framework using components from both

17

Page 18: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

9/20/2013 18

CRISC

CGEIT

CISM

CISA 2013 Fall Conference – “Sail to Success”

BENEFITS OF CAPABILITY MATURITY

18

Page 19: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Application Security Maturity Value Propositions

Brand Integrity

More robust applications

Reduced risk of breach

Fewer downstream costs

Compliance simplified

Security as a selling point

Increased business agility

19

Page 20: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

9/20/2013 20

CRISC

CGEIT

CISM

CISA 2013 Fall Conference – “Sail to Success”

GUIDING CONCEPTS

20

Page 21: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

BSIMM & OpenSAMM are great but…

Both can be a bit overwhelming

Which parts will have most impact?

Start with the 40,000 ft. view

21

Page 22: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Guiding Concepts for CMM

Ownership & Accountability

Application Security Program as Ecosystem

Socialization & Training

Risk-oriented Focus

Open Process Interfaces

Nurturing Feedback Loops

Meaningful Metrics

Automation

22

Page 23: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Ownership & Accountability

Executive sponsorship for AppSec program

Oversight group given real authority

Program goals made explicit, measurable

Policies & Standards formalized

Risk appetite defined & enforced by management

Individuals know how their roles fit in to big picture

Processes monitored & refined

23

Page 24: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

AppSec Is a Complex Ecosystem

People

• Customers • Developers • Product / Project

Managers

• Security Team • Operations Team

• QA Testers • Marketing • Vendors

• Risk/Audit/ Compliance Teams

• Executive Management

Technologies

• SAST

• DAST • Bug Tracking Systems • QA Tools

• WAFs • IPS / IDS / SIEMs

• Application Stack • Third party code or

APIs

• GRC Platform • SaaS, PaaS, or IaaS

Processes

• Governance

• Design & Architecture • Application

Development

• Vulnerability Management

• Threat Modeling • QA • Compliance

• Vendor Management • Operations

• Training • Project Management

24

Page 25: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Application Security as Ecosystem

Multiple internal & external

stakeholders, dependencies,

interfaces Process influenced by internal/external threats & pressures

Many opportunities to introduce

risk

Output of each process is input

for next one

Changes have cascading

effects

Impacts of (perceived) competing interests

State is healthy & sustainable

or not

25

Page 26: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Socialization & Training

Training provides greatest ROI

Communication is critical

Program goals are primary focus

Risk appetite clearly defined & enforced

Targeted training for all stakeholders

Culture of continuous improvement

26

Page 27: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Risk-Oriented Focus

Management defines risk appetite

Understand likely threats to apps

Know you can’t fix everything

High risk apps require most attention

Define security/compliance in requirements

Map vulnerabilities back to actual risk

Prioritize remediation by risk

27

Page 28: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Open Process Interfaces

Process designed to

deliver intended

results

Every process has

input/output, make these

interoperable like an API

Deliverables designed

for specific audiences

Extra care given to ensure smooth

handoffs

Remove friction,

OPTIMIZEFLOW

28

Page 29: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Nurturing Feedback Loops

Security/Compliance Policies

Project Management Model

Design Requirements

Development Guidelines

Vulnerability Assessments

Bug Tracking

Solution/Tool Configuration

Continuous monitoring

Rinse & Repeat

29

Understand All of These in Terms of:

Workflows

Required Inputs

Downstream Recipients

Output Usable?

Lost in transit?

Obstacles

Page 30: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

AppSec Feedback Loop

30

Bug Tracking System

Application

Vulnerability Scanning

Tools & Findings

GRC Platform

Secure Dev Requirements

WAF & SIEM

Threat

Models

Security Policy

Page 31: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Meaningful Metrics

If you can’t measure it, you can’t manage it

Use metrics to define success

Are metrics audience appropriate?

Metrics should pivot up & down the org-chart

Analyze trends

Start small, then build

31

Page 32: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Automation

Increased volume, accuracy, & consistency

Frees up bandwidth to focus on strategy

1st Step is understanding processes well

Garbage in, garbage out

Start small, then build

32

Page 33: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Build a Program to Evolve

Look

Listen

Learn

Adapt

33

Page 34: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

9/20/2013 34

CRISC

CGEIT

CISM

CISA 2013 Fall Conference – “Sail to Success”

KEY AREAS OF FOCUS

34

Page 35: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

This All Sounds Complicated…

35

Where do I begin?

Page 36: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Take Inventory

36

What do you have?

How does your program compare to CMM?

Focus on Risk: all apps are NOT created equal

Identify High Risk Applications (PII, PAN, PHI, $ transactions, high visibility)

Which compliance standards must be met? (GLBA, SOX, FFIEC, FINRA, PCI, HIPAA, ISO, etc.)

Categorize applications into risk buckets

Page 37: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Key Areas of Focus

Metrics

Training

Controls

Review

Testing

Environment

Defect Handling

37

Page 38: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Metrics

Collected Details

Trends

Audiences

Internal Team

Executives

Customers

38

Page 39: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Training

Targeted Training

Developers

Analysts

Security Team

Executives

Relevant Content

Dated

39

Page 40: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Controls

Corporate Policies

Data Classification

Compliance

PCI, HIPAA, SOX, GLBA, HITECH, ISO, NIST

Guidance

Requirements

Standards

40

Page 41: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Review

Requirements Review

Design Review

Architecture Review

Peer Review

Code Review

41

Page 42: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Testing

When does testing occur in the SDL?

Developer Tools

Various Tools

SAST

DAST

Pen-testing

42

Page 43: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Environment

Staged Deployment

Deploy to a Secure Environment

Repetitive Hardening

Stay Current

43

Page 44: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Defect Handling

Security Defect Tracking

Prioritization

Verification

Remediation

Risk Assumption

44

Page 45: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

5 Key Takeaways

Test Early and Test Often

Use Familiar Channels of Communication

Establish Metrics Early

Govern the SDL Process

Train Train Train

45

Page 46: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Q &A

46

Application Security Consulting

Application Vulnerability Discovery

Secure Development Training

Vulnerability Remediation

Security Architecture

Secure Development Lifecycle Consulting

www.astechconsulting.com

Page 47: Optimizing Capability Maturity for Application Security in ...sfisaca.org/images/FC13Presentations/G22_Presentation.pdfOptimizing Capability Maturity for Application Security in the

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Thank You

AsTech Consulting

[email protected]

http://www.astechconsulting.com

Jonathan Davis [email protected]

Steve Wolf [email protected]

47