SlideShare uma empresa Scribd logo
1 de 12
Building Secure Application
• Application Security Governance
• Application Security Framework
• Application Security Process & Procedure
• Application Security in All Layers of Computing
Environment
• Integrated Secure Coding Environment
Evolving Threats
Source : Cisco
Application Secure development
Development
Tools
Source
control
Bug tracking Test Manager Code
verification
Desktop Transport Network Web Applications
Antivirus
Protection
Encryption
(SSL)
Firewalls /
IDS / IPS
Firewall
Web Servers
Databases
Backend
Server
Application
Servers
Info Security Landscape
Application Security -
Understanding the Problem
Secure Infrastructure
Weakest link
Building Security Into the
Development Process
*Graphics from OWASP.com
• Test existing deployed apps
• Eliminate security exposure in
live applications
Production
• Test apps before going to production
• Deploy secure web applications
Deploy
• Test apps for security issues in QA
organization along with performance and
functional testing
• Reduce costs of security testing
Test
• Test apps for security issues in
Development identifying issues
at their earliest point
• Realize optimum security
testing efficiencies (cost
reduction)
Development• Security requirements, architecture,
threat modeling, etc
Define/Design
Application Security Adoption
Within the SDLC
Difficulty &
Cost of
Test
% Applications Tested
High
Low
Low High
Security
Team
Security Team
Security Team
QA Team
QA Team
Development Team
Phase 1 Phase 2 Phase 3
Criticality
& Risk of
App.
Development
Team
Educating Developers and Getting
“Buy in”
• Establish security accountability and stds for shipping
• Create a “security architect” role
• Create a security community of practice
• Create a secure development portal or wiki
• Conduct hacking demos to demonstrate risks
• Online & offline courses for secure coding
• Put developers through secure coding exams
• Security reviews of real applications
• Pay premiums for security architects
Security Framework
Security Governance, Risk Management
and Compliance
WorleyParsons Security Framework
External Representation
Network, Server, and End-point
Physical Infrastructure
People and Identity
Data and Information
Application and Process
Managed
Security
Services
Security
Hardware and
Software
Professional
Services
Physical Security Solutions
Security Governance, Risk & Compliance Solutions
Threat and Vulnerability Mgmt & Monitoring Solutions
Application Security Lifecycle Mgmt Solutions
Identity and Access Management Solutions
Information Security Solutions
Application Security
Process Framework
Verify In Production Applications
Design, Develop, Test, and Verify Secure Apps
Educate IT Professionals
Maintain and Publish Policies and Guidelines
Respond to Security Exposure Incidents
ApplyLessonsLearned
Application Management – Secure
Infrastructure
NETWORK HOST APPLICATION ACCOUNT TRUST
 Architecture
 Transport
 Network device
 Access control
list (ACL)
permission
settings
 Operating
system
 Services
 Internet
Information
Services (IIS)
 Simple Mail
Transfer
Protocol
(SMTP)
 File Transfer
Protocol (FTP)
 NetBIOS/Remo
te procedure
call (RPC)
 Terminal
Services
 Microsoft
SQL Server
 Input validation
 Clear text
protocol
 Authentication
 Authorization
 Cryptography
 Auditing and
logging
 Unused
accounts
 Weak or blank
passwords
 Shared
accounts
 Access
privileges
 Rogue trusts
Application Layer Requirements
• Input validation
• Session management
• Authentication and authorization
• Design and code review
• Application and server error handling
• Application auditing and logging
• Application backup and restore
• Private data encryption
Common Application Development
Issues
• User input validation
• Cookies, authentication, and access
• Passwords
• Access control lists
• COM+ application configuration
• Auditing and logging

Mais conteúdo relacionado

Mais procurados

Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsUlf Mattsson
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secopsMohammed Ahmed
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramDeborah Schalm
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseTonex
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingAarno Aukia
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsAmazon Web Services
 
DevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just SecurityDevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just SecurityKevin Fealey
 
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise ScaleSecuring Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise ScaleDevOps.com
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
Devops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source WayDevops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source WayYusuf Hadiwinata Sutandar
 
DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSAChris Downey
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCSuman Sourav
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOpsCYBRIC
 
Simplify Dev with Complicated Security Tools
Simplify Dev with Complicated Security ToolsSimplify Dev with Complicated Security Tools
Simplify Dev with Complicated Security ToolsKevin Fealey
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps SecRubal Jain
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an IntroductionPrashanth B. P.
 
Enable DevSecOps using JIRA Software
Enable DevSecOps using JIRA SoftwareEnable DevSecOps using JIRA Software
Enable DevSecOps using JIRA SoftwareAUGNYC
 

Mais procurados (20)

Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss Banking
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
DevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just SecurityDevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just Security
 
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise ScaleSecuring Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
 
Talk DevSecOps to me
Talk DevSecOps to meTalk DevSecOps to me
Talk DevSecOps to me
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
Devops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source WayDevops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source Way
 
DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSA
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
Simplify Dev with Complicated Security Tools
Simplify Dev with Complicated Security ToolsSimplify Dev with Complicated Security Tools
Simplify Dev with Complicated Security Tools
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an Introduction
 
Enable DevSecOps using JIRA Software
Enable DevSecOps using JIRA SoftwareEnable DevSecOps using JIRA Software
Enable DevSecOps using JIRA Software
 

Semelhante a Application_security_Strategic

Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product SecuritySoftServe
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile WorldDavid Lindner
 
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly DavidoffDevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly DavidoffDevSecCon
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityAnne Oikarinen
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudAlert Logic
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudTjylen Veselyj
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceMSAdvAnalytics
 
TSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesAhmad Sharaf
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Mykhailo Antonishyn
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Security guidelines
Security guidelinesSecurity guidelines
Security guidelineskarthz
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3Eoin Keary
 
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...GoQA
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudCloudHesive
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceSPAN Infotech (India) Pvt Ltd
 
Digital Assurance Center of Excellence
Digital Assurance Center of ExcellenceDigital Assurance Center of Excellence
Digital Assurance Center of ExcellenceIra Agarwal
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsCprime
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalrkadayam
 

Semelhante a Application_security_Strategic (20)

Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly DavidoffDevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
 
Agile and Secure SDLC
Agile and Secure SDLCAgile and Secure SDLC
Agile and Secure SDLC
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the Cloud
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
TSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing Services
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Security guidelines
Security guidelinesSecurity guidelines
Security guidelines
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and compliance
 
Digital Assurance Center of Excellence
Digital Assurance Center of ExcellenceDigital Assurance Center of Excellence
Digital Assurance Center of Excellence
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 

Application_security_Strategic

  • 1. Building Secure Application • Application Security Governance • Application Security Framework • Application Security Process & Procedure • Application Security in All Layers of Computing Environment • Integrated Secure Coding Environment
  • 4. Desktop Transport Network Web Applications Antivirus Protection Encryption (SSL) Firewalls / IDS / IPS Firewall Web Servers Databases Backend Server Application Servers Info Security Landscape Application Security - Understanding the Problem Secure Infrastructure Weakest link
  • 5. Building Security Into the Development Process *Graphics from OWASP.com • Test existing deployed apps • Eliminate security exposure in live applications Production • Test apps before going to production • Deploy secure web applications Deploy • Test apps for security issues in QA organization along with performance and functional testing • Reduce costs of security testing Test • Test apps for security issues in Development identifying issues at their earliest point • Realize optimum security testing efficiencies (cost reduction) Development• Security requirements, architecture, threat modeling, etc Define/Design
  • 6. Application Security Adoption Within the SDLC Difficulty & Cost of Test % Applications Tested High Low Low High Security Team Security Team Security Team QA Team QA Team Development Team Phase 1 Phase 2 Phase 3 Criticality & Risk of App. Development Team
  • 7. Educating Developers and Getting “Buy in” • Establish security accountability and stds for shipping • Create a “security architect” role • Create a security community of practice • Create a secure development portal or wiki • Conduct hacking demos to demonstrate risks • Online & offline courses for secure coding • Put developers through secure coding exams • Security reviews of real applications • Pay premiums for security architects
  • 8. Security Framework Security Governance, Risk Management and Compliance WorleyParsons Security Framework External Representation Network, Server, and End-point Physical Infrastructure People and Identity Data and Information Application and Process Managed Security Services Security Hardware and Software Professional Services Physical Security Solutions Security Governance, Risk & Compliance Solutions Threat and Vulnerability Mgmt & Monitoring Solutions Application Security Lifecycle Mgmt Solutions Identity and Access Management Solutions Information Security Solutions
  • 9. Application Security Process Framework Verify In Production Applications Design, Develop, Test, and Verify Secure Apps Educate IT Professionals Maintain and Publish Policies and Guidelines Respond to Security Exposure Incidents ApplyLessonsLearned
  • 10. Application Management – Secure Infrastructure NETWORK HOST APPLICATION ACCOUNT TRUST  Architecture  Transport  Network device  Access control list (ACL) permission settings  Operating system  Services  Internet Information Services (IIS)  Simple Mail Transfer Protocol (SMTP)  File Transfer Protocol (FTP)  NetBIOS/Remo te procedure call (RPC)  Terminal Services  Microsoft SQL Server  Input validation  Clear text protocol  Authentication  Authorization  Cryptography  Auditing and logging  Unused accounts  Weak or blank passwords  Shared accounts  Access privileges  Rogue trusts
  • 11. Application Layer Requirements • Input validation • Session management • Authentication and authorization • Design and code review • Application and server error handling • Application auditing and logging • Application backup and restore • Private data encryption
  • 12. Common Application Development Issues • User input validation • Cookies, authentication, and access • Passwords • Access control lists • COM+ application configuration • Auditing and logging