SlideShare a Scribd company logo
1 of 2
Download to read offline
AN APPLICATION SECURITY MANAGER’S STEP-BY-
STEP REFERENCE TO IMPLEMENTING AN ADVANCED
APPLICATION SECURITY PROGRAM
Phase 1: Pilot Program
‡‡ Conduct maturity assessments
…… Leverage the OpenSAMM framework
…… Identify most critical gaps in application security efforts
‡‡ Discover your web perimeter: Use a discovery solution to 		
	 identify all public-facing applications
…… Patch vulnerable sites
…… Eliminate unnecessary or unused sites
‡‡ Assess most critical vulnerabilities: Identify your organization’s 	
	 5 to 20 most business-critical applications
…… Evaluate and partner with automated application security 		
solution
…… Scan for critical code-level vulnerabilities and fix
‡‡ Create report to demonstrate success and suggest next steps
…… Present to C-Level to win program expansion support
Phase 2: Set Program Policies and Metrics
‡‡ Identify external compliance drivers
…… Determine internal success metrics
…… Leverage the OWASP Top 10
Phase 3: Scale Program to Legacy Applications and SDLC
‡‡ Leverage automated code scanning technology to scale 		
	 application coverage
…… Prioritize by flaw severity
‡‡ Meet with development team, address concerns and gain buy-in
‡‡ Identify opportunities for automation and streamlining 		
	processes
‡‡ Leverage APIs to enable seamless testing in development 		
	process
Phase 4: Create a Strategy for Third-Party Applications and
Components
‡‡ Create an inventory of software component usage
…… Compare inventory to the National Vulnerability Database
‡‡ Create third-party software assessment policy
…… Strive to match in-house standards
…… Receive feedback from legal and procurement teams
APPLICATION SECURITY
PROGRAM CHECKLIST
Do you know how many web
applications your organization has?
Get an estimate of your
web application perimeter
For information on how to talk to the
board, watch:
A CISO’s Perspective on
Talking to the Board About
Cybersecurity
…… Work with vendors to ensure compliance with policies
‡‡ Identify groups in the organization that purchase the most 		
	technology
…… Educate and enable internal purchasers on software attestation
steps
‡‡ Reach out to existing providers about attestation
Be Ready to Answer These Questions
Any successful application security program requires collaboration with
various departments of an organization. Be ahead of the curve by knowing
the answer to these questions before meeting with each respective group.
C-Suite
…… What does our risk posture look like now?
…… Why should we invest in application security as opposed to other
forms of cybersecurity?
…… What metrics will you use to demonstrate progress?
Development Teams and DevOps
…… How will the assessment process fit into the current development
lifecycle?
…… How will this impact the development teams’ productivity?
…… What training programs will be put in place to help the
development team?
Software Purchasers
…… Why are we assessing the security of the software we are
buying?
…… From whom should I get approval for software purchases?
…… What is the process for purchasing software?
…… What about software we already purchased?
Veracode’s cloud-based service and systematic approach deliver a simpler and more scalable solution for reducing
global application-layer risk across web, mobile and third-party applications. Recognized as a Gartner Magic Quadrant
Leader since 2010, Veracode secures hundreds of the world’s largest global enterprises, including 3 of the top 4 banks
in the Fortune 100 and 20+ of Forbes’ 100 Most Valuable Brands.
LEARN MORE AT WWW.VERACODE.COM, ON THE VERACODE BLOG, AND ON TWITTER.
For more information on creating an application security program, read the:
Ultimate Guide to Getting Started with Application Security

More Related Content

Viewers also liked

Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justified
Parker Donat
 
Conducting Bulletproof Workplace Investigations
Conducting Bulletproof Workplace InvestigationsConducting Bulletproof Workplace Investigations
Conducting Bulletproof Workplace Investigations
HospitalityLawyer.com
 

Viewers also liked (14)

Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justified
 
Quimica II: Enlace quimico
Quimica II: Enlace quimicoQuimica II: Enlace quimico
Quimica II: Enlace quimico
 
Webのグラフィックス2016 WebGL事例
Webのグラフィックス2016 WebGL事例Webのグラフィックス2016 WebGL事例
Webのグラフィックス2016 WebGL事例
 
Punta alla soluzione - Al Complexity Literacy Meeting il libro presentato da ...
Punta alla soluzione - Al Complexity Literacy Meeting il libro presentato da ...Punta alla soluzione - Al Complexity Literacy Meeting il libro presentato da ...
Punta alla soluzione - Al Complexity Literacy Meeting il libro presentato da ...
 
Tips voor een goede digitale overheid
Tips voor een goede digitale overheidTips voor een goede digitale overheid
Tips voor een goede digitale overheid
 
Smartphone bezoekers converteren: hoe doe je dat?
Smartphone bezoekers converteren: hoe doe je dat?Smartphone bezoekers converteren: hoe doe je dat?
Smartphone bezoekers converteren: hoe doe je dat?
 
B2B websites: hoe klanten maken van je bezoekers?
B2B websites: hoe klanten maken van je bezoekers?B2B websites: hoe klanten maken van je bezoekers?
B2B websites: hoe klanten maken van je bezoekers?
 
Conducting Bulletproof Workplace Investigations
Conducting Bulletproof Workplace InvestigationsConducting Bulletproof Workplace Investigations
Conducting Bulletproof Workplace Investigations
 
Conducting Effective Workplace Investigation Workshop
Conducting Effective Workplace Investigation WorkshopConducting Effective Workplace Investigation Workshop
Conducting Effective Workplace Investigation Workshop
 
CONDUCTING A WORKPLACE INVESTIGATION
CONDUCTING A WORKPLACE INVESTIGATIONCONDUCTING A WORKPLACE INVESTIGATION
CONDUCTING A WORKPLACE INVESTIGATION
 
Html5/JSモバイルアプリ最前線
Html5/JSモバイルアプリ最前線Html5/JSモバイルアプリ最前線
Html5/JSモバイルアプリ最前線
 
Internal investigations disciplinary procedures slides 02 04 14
Internal investigations  disciplinary procedures  slides 02 04 14Internal investigations  disciplinary procedures  slides 02 04 14
Internal investigations disciplinary procedures slides 02 04 14
 
Bullying in the workplace
Bullying in the workplaceBullying in the workplace
Bullying in the workplace
 
Steps to a Successful Workplace Investigation
Steps to a Successful Workplace InvestigationSteps to a Successful Workplace Investigation
Steps to a Successful Workplace Investigation
 

Recently uploaded

Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
Hot Call Girls In Sector 58 (Noida)
 
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
aakahthapa70
 
Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...
Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...
Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...
callgirlsnewdelhi
 
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
Sheetaleventcompany
 
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
Sheetaleventcompany
 

Recently uploaded (20)

Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
 
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowIndore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
 
Dehradun ❣️ Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
Dehradun ❣️  Call Girl 97487*63073 Call Girls in Dehradun Escort service book...Dehradun ❣️  Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
Dehradun ❣️ Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
 
Silchar Call Girl 97487*63073 Call Girls in Silchar Escort service book now
Silchar Call Girl 97487*63073 Call Girls in Silchar Escort service book nowSilchar Call Girl 97487*63073 Call Girls in Silchar Escort service book now
Silchar Call Girl 97487*63073 Call Girls in Silchar Escort service book now
 
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book nowKolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
 
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...
 
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
 
Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...
Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...
Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...
 
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book nowGuwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
 
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
 
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book nowPatna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
 
CALL GIRL JAMMU 9234842891 INDEPENDENT LOW PRICE JAMMU ESCORT SERVICE
CALL GIRL JAMMU 9234842891 INDEPENDENT LOW PRICE JAMMU ESCORT SERVICECALL GIRL JAMMU 9234842891 INDEPENDENT LOW PRICE JAMMU ESCORT SERVICE
CALL GIRL JAMMU 9234842891 INDEPENDENT LOW PRICE JAMMU ESCORT SERVICE
 
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
 
Shimla 💋 Call Girl 9748763073 Call Girls in Shimla Escort service book now
Shimla 💋  Call Girl 9748763073 Call Girls in Shimla Escort service book nowShimla 💋  Call Girl 9748763073 Call Girls in Shimla Escort service book now
Shimla 💋 Call Girl 9748763073 Call Girls in Shimla Escort service book now
 
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL IN
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL INBhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL IN
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL IN
 
Mysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRL
Mysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRLMysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRL
Mysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRL
 
FARIDABAD CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
FARIDABAD CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICEFARIDABAD CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
FARIDABAD CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Varanasi Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
Varanasi  Call Girl 78709*93772 Call Girls in Varanasi Escort service book nowVaranasi  Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
Varanasi Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
 
Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...
Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...
Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...
 
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
 

Application security-program-checklist-white-paper-0125

  • 1. AN APPLICATION SECURITY MANAGER’S STEP-BY- STEP REFERENCE TO IMPLEMENTING AN ADVANCED APPLICATION SECURITY PROGRAM Phase 1: Pilot Program ‡‡ Conduct maturity assessments …… Leverage the OpenSAMM framework …… Identify most critical gaps in application security efforts ‡‡ Discover your web perimeter: Use a discovery solution to identify all public-facing applications …… Patch vulnerable sites …… Eliminate unnecessary or unused sites ‡‡ Assess most critical vulnerabilities: Identify your organization’s 5 to 20 most business-critical applications …… Evaluate and partner with automated application security solution …… Scan for critical code-level vulnerabilities and fix ‡‡ Create report to demonstrate success and suggest next steps …… Present to C-Level to win program expansion support Phase 2: Set Program Policies and Metrics ‡‡ Identify external compliance drivers …… Determine internal success metrics …… Leverage the OWASP Top 10 Phase 3: Scale Program to Legacy Applications and SDLC ‡‡ Leverage automated code scanning technology to scale application coverage …… Prioritize by flaw severity ‡‡ Meet with development team, address concerns and gain buy-in ‡‡ Identify opportunities for automation and streamlining processes ‡‡ Leverage APIs to enable seamless testing in development process Phase 4: Create a Strategy for Third-Party Applications and Components ‡‡ Create an inventory of software component usage …… Compare inventory to the National Vulnerability Database ‡‡ Create third-party software assessment policy …… Strive to match in-house standards …… Receive feedback from legal and procurement teams APPLICATION SECURITY PROGRAM CHECKLIST Do you know how many web applications your organization has? Get an estimate of your web application perimeter For information on how to talk to the board, watch: A CISO’s Perspective on Talking to the Board About Cybersecurity
  • 2. …… Work with vendors to ensure compliance with policies ‡‡ Identify groups in the organization that purchase the most technology …… Educate and enable internal purchasers on software attestation steps ‡‡ Reach out to existing providers about attestation Be Ready to Answer These Questions Any successful application security program requires collaboration with various departments of an organization. Be ahead of the curve by knowing the answer to these questions before meeting with each respective group. C-Suite …… What does our risk posture look like now? …… Why should we invest in application security as opposed to other forms of cybersecurity? …… What metrics will you use to demonstrate progress? Development Teams and DevOps …… How will the assessment process fit into the current development lifecycle? …… How will this impact the development teams’ productivity? …… What training programs will be put in place to help the development team? Software Purchasers …… Why are we assessing the security of the software we are buying? …… From whom should I get approval for software purchases? …… What is the process for purchasing software? …… What about software we already purchased? Veracode’s cloud-based service and systematic approach deliver a simpler and more scalable solution for reducing global application-layer risk across web, mobile and third-party applications. Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode secures hundreds of the world’s largest global enterprises, including 3 of the top 4 banks in the Fortune 100 and 20+ of Forbes’ 100 Most Valuable Brands. LEARN MORE AT WWW.VERACODE.COM, ON THE VERACODE BLOG, AND ON TWITTER. For more information on creating an application security program, read the: Ultimate Guide to Getting Started with Application Security