Advertisement
Advertisement

More Related Content

Advertisement

NULL - OpenSAMM

  1. http://digitalcatharsis.files.wordpress.com/2008/10/sleeping-man_ml.jpg Good Morning
  2. openSAMM { Why & How?
  3. http://api.ning.com/files/OMGuiScfW0WEzLqgZ-vEG1Gocfg9TzXJ*3p8tfJVh6piUZb380lsGCXDJa0aFePIDX7qFwM16dSET5kxHSYqOcFNjdBtZiK/elephant.jpg
  4. http://30dom.com/wp-content/uploads/2013/11/olympic-weight-lifting-wallpaperli-xueying-weightlifting-olympic--china-photos-and-wallpapers-nusxdel.jpg
  5. http://www.veracode.com/blog/wp-content/uploads/2013/06/bug-bounty-programs.jpg
  6. https://www.owasp.org/images/thumb/f/ff/Security_in_the_SDLC_Process.png/600px-Security_in_the_SDLC_Process.png
  7. http://www.shipulski.com/wp-content/uploads/2012/06/Impossible.jpeg
  8. https://s3.amazonaws.com/pbblogassets/uploads/2013/04/donkey-pulling-cart.jpg
  9. http://devpolicy.org/wp-content/uploads/2013/08/Value-for-money.jpg
  10. http://www.rms.net/roi_investreturn.gif
  11. http://www.you-stylish-barcelona-apartments.com/blog/wp-content/uploads/2010/09/what-to-do.JPG.jpeg
  12.    Classification system for a set of processes / function Shows characteristics of processes over different levels Examples    CMMI (DEV, SVC, ACQ) SSE-CMM BSIMM, openSAMM, etc Maturity Models
  13.    Open Software Assurance Maturity Model OWASP Project Open framework to help organizations     Formulate Implement Strategy for software security Tailored to the specific risks facing the organization openSAMM
  14.   Recognizes 4 type of business functions Any organization performing software development would have these (names could be different) openSAMM
  15.   3 business practices for each function 3 objectives (for levels) under each practice     0 (implied starting point, not included) 1 (initial understanding and ad hoc provision of practice) 2 (increase efficiency / effectiveness of practice) 3 (comprehensive mastery of the practice) openSAMM - Security Practices
  16. openSAMM - Example
  17.  For every level, SAMM defines        Objective Activities Results Success Metrics Costs Personnel Related Levels openSAMM
  18. http://creativeconstruction.files.wordpress.com/2013/02/how_to_do_one_thing_at_a_time.jpg
  19. http://www.jasonshen.com/wp-content/uploads/2012/04/buy-in-image-560x355.jpg
  20. Step 2 - Perform Gap Assessment
  21. Step 3 - Create Roadmap / Assurance Program
  22.   Perform practices / activities for level 1 Keep assessing it till you are satisfied and the scorecard tells you to   Inform management with the updated roadmap in a periodic manner Move to next level after you are done with the previous one Step 4 - Execute with periodic reviews
  23.   www.sripati.info http://in.linkedin.com/in/sripati Who Am I
  24.   http://www.opensamm.org/downloads/resources/OpenSAMM-1.0.ppt http://www.opensamm.org/downloads/resources/20090602Software%20Assurance%20Maturity%20Model.ppt Credits

Editor's Notes

  1. Talk about how this talk is going to benefit people who want to stay connected to security but are finding it difficult to do so in the absence of a formal transition (e.g., developer, tester, etc.). Also tell them how it is a very good thing to do if you want to jump onto the technical side of security but are currently in some other job that has little relationship with security
  2. Ask them about what they think of this image, and get onto the different perceptions that everyone has for their work and its impact on the business (bottomline – every role / work is important towards client satisfaction, but no-one is ready to accept it, except business)
  3. Ask everyone about their work, and how do they go about it … then move onto why it is a process (a way of doing things), and why any change in either of the three (people, process, and technology) results in a better client satisfaction
  4. Talk about how many things have forced people to come to terms now that application security should be implemented from the beginning, and not patched in the end (otherwise money just piles up).
  5. So it gives rise to SecureSDLCs. However, in the absence of a structured approach to implement it, and a way to measure our progress and benchmarking, management sometimes make unrealistic plans / schedules, which look like this:-
  6. This is how managementusually expects people to implement security
  7. Can you tell me what is lacking here (people, process or technology)?
  8. Management View of secure SDLC
Advertisement