SlideShare a Scribd company logo
1 of 33
BSIMM-V
The Building Security In Maturity Model
Gary McGraw, Ph.D.
Chief Technology Officer
August 6, 2015
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 1
Cigital
• Providing software security professionals services since
1992
• World’s premiere software security consulting firm
• 430 employees
• Washington DC, New York, Santa Clara, Bloomington, Boston, Chicago,
Atlanta, Amsterdam, and London
• Recognized experts in software security
• Widely published in books, white papers, and articles
• Industry thought leaders
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 2
BSIMM BASICS
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 3
We Hold These Truths to Be Self-evident
• Software security is more than a set of security functions
• Not magic crypto fairy dust
• Not silver-bullet security mechanisms
• Non-functional aspects of design are essential
• Bugs and flaws are 50/50
• Security is an emergent property of the entire system (just
like quality)
• To end up with secure software, deep integration with the
SDLC is necessary
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 4
2006: A Shift from Philosophy to HOW TO
• Integrating best practices into large organizations’ SDLC
(that is, an SSDL)
• Microsoft’s SDL
• Cigital’s Touchpoints
• OWASP CLASP
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 5
Prescriptive vs. Descriptive Models
Prescriptive Models
• Describe what you should
do.
• SAFECode
• SAMM
• SDL
• Touchpoints
• Every firm has a
methodology they follow
(often a hybrid).
• You need an SSDL.
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 6
Descriptive Models
• Describe what is actually
happening.
• The BSIMM is a
descriptive model that
can be used to measure
any number of
prescriptive SSDLs.
BSIMM: Software Security Measurement
• Real data from (67) real initiatives
• 161 measurements
• 21 (4) over time
• McGraw, Migues, & West
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 7
67 Firms in the BSIMM-V Community
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 8
Building BSIMM (2009)
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 9
• Big idea: Build a maturity model from actual data gathered
from 9 well known large-scale software security initiatives.
• Create a software security framework.
• Interview 9 firms in-person.
• Discover 110 activities through observation.
• Organize the activities in 3 levels.
• Build A scorecard.
• The model has been validated with data from 67 firms.
• There is no special snowflake…
The Magic 30
• Since we have data from >30 firms, we can perform statistical
analysis. (Laurie Williams from NCSU is doing more of that now.)
• How good is the model?
• What activities correlate with what other activities?
• Do high maturity firms look the same?
• We now have 67 firms with 161 distinct measurements.
• BSIMM (the 9)
• BSIMM Europe (9 in EU)
• BSIMM2 (30)
• BSIMM3 (42)
• BSIMM4 (51)
• BSIMM-V (67) ← data freshness emphasized
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 10
Monkeys Eat Bananas
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 11
Monkeys Eat Bananas
• BSIMM is not about good or
bad ways to eat bananas or
banana best practices
• BSIMM is about observations
• BSIMM is descriptive, not
prescriptive
• BSIMM describes and
measures multiple
prescriptive approaches
A Software Security Framework
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 12
• 4 domains
• 12 practices
• See informIT article on BSIMM: http://bsimm.com
Example Activity
[AA1.2] Perform design review for high-risk
applications. The organization learns about the benefits of
architecture analysis by seeing real results for a few high-
risk, high-profile applications. The reviewers must have
some experience performing architecture analysis and
breaking the architecture being considered. If the SSG is
not yet equipped to perform an in-depth architecture
analysis, it uses consultants to do this work. Ad hoc review
paradigms that rely heavily on expertise may be used here,
though in the long run they do not scale.
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 13
NEW BSIMM-V Activity
[CMVM3.4] Operate a bug bounty program. The
organization solicits vulnerability reports from external
researchers and pays a bounty for each verified and
accepted vulnerability received. Payouts typically follow a
sliding scale linked to multiple factors, such as vulnerability
type (e.g., remote code execution is worth $10,000 versus
CSRF is worth $750), exploitability (demonstrable exploits
command much higher payouts), or specific services and
software versions (widely- deployed or critical services
warrant higher payouts). Ad hoc or short-duration activities,
such as capture-the-flag contests, do not count. [This is a
new activity that will be reported on in BSIMM6.]
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 14
BSIMM-V MEASUREMENTS
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 15
Real-World Data (67 firms)
Initiative age
• Average: 6 years
• Newest: 0.4
• Oldest: 18.1
• Median: 5.3
SSG size
• Average: 14.78
• Smallest: 1
• Largest: 100
• Median: 7
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 16
Satellite size
• Average: 29.6
• Smallest: 0
• Largest: 400
• Median: 4
Dev size
• Average: 4190
• Smallest: 11
• Largest: 30,000
• Median: 1600
Average SSG size: 1.4% of dev group size
BSIMM-V Scorecard
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 17
Earth (67)
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 18
BSIMM-V AS A MEASURING STICK
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 19
BSIMM-V as a Measuring Stick
• Compare a firm with peers using the high water mark
view
• Compare business units
• Chart an SSI over time
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 20
BSIMM-V Scorecard with FAKE Firm Data
• Top 12 activities
• purple = good?
• red = bad?
• “Blue shift” practices
to emphasize
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 21
COMPARING GROUPS OF FIRMS
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 22
We Are a Special Snowflake (NOT!)
ISV (25) results are similar to financial services (26)
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 23
BSIMM Longitudinal: Improvement Over Time
• 21 firms measured twice (an average of 24 months apart)
• Show how firms improve
• An average of 16% activity increase
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 24
BSIMM By the Numbers
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 25
BSIMM-V+ BSIMM-V BSIMM4 BSIMM3 BSIMM2 BSIMM1
Firms 93 67 51 42 30 9
Measurements 216 161 95 81 49 9
2nd Measures 48 21 13 11 0 0
3rd Measures 9 4 1 0 0 0
SSG Members 1379 976 978 786 635 370
Satellite Mem. 2611 1954 2039 1750 1150 710
Developers 363,925 272,358 218,286 185,316 141,175 67,950
Applications 93,687 69,039 58,739 41,157 28,243 3970
Avg SSG Age 4.24 4.28 4.13 4.32 4.49 5.32
SSG Avg of Avgs 1.77 / 100 1.4 / 100 1.95 / 100 1.99 / 100 1.02 / 100 1.13 / 100
Financials 40 26 19 17 12 4
ISVs 32 25 19 15 7 4
High Tech 18 14 13 10 7 2
The BSIMM Community
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 26
BSIMM Conferences
• 2010: Annapolis, MD
• 2011: Stevenson, WA
• 2012: Galloway, NJ
• 2013: Dulles, VA
• 2014: Monrerey, CA
• 2015: Denver, CO
BSIMM EU Conferences
• 2012: Amsterdam
• 2013: London
• 2014: Oxford
• 2015: Windsor (this week)
BSIMM RSA Mixers
• 2010: RSA
• 2011: RSA
• 2012: RSA
• 2013: RSA
• 2014: RSA
• 2015 RSA
BSIMM Mailing List
• Moderated
• High S/N ratio
BSIMM Community Conference
2015
• November in Denver
BSIMM-V to BSIMM6
• BSIMM-V released October 2013
under creative commons
• http://bsimm.com
• Italian, German, and Spanish translations available
• BSIMM is a yardstick
• Use it to see where you stand
• Use it to figure out what your peers do
• BSIMM-V→BSIMM6
• BSIMM is growing (93 firms)
• Goal = 100 firms
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 27
WHERE TO LEARN MORE
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 28
SearchSecurity + Justice League
1. In-depth thought-leadership blog from the Cigital Principals:
• Gary McGraw
• Sammy Migues
• John Steven
• Paco Hope
• Jim DelGrosso
www.cigital.com/justiceleague
2. No-nonsense monthly security column by Gary McGraw:
www.searchsecurity.com
3. Gary McGraw’s blog: www.cigital.com/~gem/writing
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 29
Silver Bullet + IEEE Security & Privacy
1. Monthly Silver Bullet podcast with Gary McGraw:
www.cigital.com/silverbullet
2. Building Security In Software Security Best Practices column
www.computer.org/security/bsisub/
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 30
The Book
• How to DO software security
• Best practices
• Tools
• Knowledge
• Cornerstone of the Addison-
Wesley Software Security
Series: www.swsec.com
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 31
Build Security In
• Real Software Security
Measurement http://bsimm.com
• Read the Addison-Wesley
Software Security series
• Send e-mail: gem@cigital.com
• @cigitalgem
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 32
Thank You
Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted

More Related Content

What's hot

Scanning web vulnerabilities
Scanning web vulnerabilitiesScanning web vulnerabilities
Scanning web vulnerabilitiesMohit Dholakiya
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Security Architecture-Security Models
Security Architecture-Security ModelsSecurity Architecture-Security Models
Security Architecture-Security ModelsSuraj Singh
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Nessus Software
Nessus SoftwareNessus Software
Nessus SoftwareMegha Sahu
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat huntingVikas Jain
 
Design of security architecture in Information Technology
Design of security architecture in Information TechnologyDesign of security architecture in Information Technology
Design of security architecture in Information Technologytrainersenthil14
 
20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsxSuman Garai
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsYulian Slobodyan
 
DEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyDEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyJason Suttie
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Usable Security: When Security Meets Usability
Usable Security: When Security Meets UsabilityUsable Security: When Security Meets Usability
Usable Security: When Security Meets UsabilityShujun Li
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
Iso 17799
Iso 17799Iso 17799
Iso 17799rcm_007
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 

What's hot (20)

Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
Scanning web vulnerabilities
Scanning web vulnerabilitiesScanning web vulnerabilities
Scanning web vulnerabilities
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
Security Architecture-Security Models
Security Architecture-Security ModelsSecurity Architecture-Security Models
Security Architecture-Security Models
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
 
Design of security architecture in Information Technology
Design of security architecture in Information TechnologyDesign of security architecture in Information Technology
Design of security architecture in Information Technology
 
20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 
DEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyDEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journey
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Usable Security: When Security Meets Usability
Usable Security: When Security Meets UsabilityUsable Security: When Security Meets Usability
Usable Security: When Security Meets Usability
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
Iso 17799
Iso 17799Iso 17799
Iso 17799
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0
 

Viewers also liked

Preventing XSS with Content Security Policy
Preventing XSS with Content Security PolicyPreventing XSS with Content Security Policy
Preventing XSS with Content Security PolicyKsenia Peguero
 
Slides midterm
Slides midtermSlides midterm
Slides midtermIan_Schori
 
Babies on Top of the World: Early Intervention in the Indian Himalayas Part 3
Babies on Top of the World: Early Intervention in the Indian Himalayas Part 3Babies on Top of the World: Early Intervention in the Indian Himalayas Part 3
Babies on Top of the World: Early Intervention in the Indian Himalayas Part 3BASPCAN
 
vat-entire-portfolio-en-2014
vat-entire-portfolio-en-2014vat-entire-portfolio-en-2014
vat-entire-portfolio-en-2014James Wilkinson
 
9th Congress Special Edition Newsletter
9th Congress Special Edition Newsletter9th Congress Special Edition Newsletter
9th Congress Special Edition NewsletterBASPCAN
 
QR Codes Scan your way to engagement
QR Codes Scan your way to engagementQR Codes Scan your way to engagement
QR Codes Scan your way to engagementpamala12
 
The State as party to child maltreatment - lessons from Research on the impac...
The State as party to child maltreatment - lessons from Research on the impac...The State as party to child maltreatment - lessons from Research on the impac...
The State as party to child maltreatment - lessons from Research on the impac...BASPCAN
 
Top 8 network support engineer resume samples
Top 8 network support engineer resume samplesTop 8 network support engineer resume samples
Top 8 network support engineer resume samplescorejom
 
Ternasco de Aragon
Ternasco de AragonTernasco de Aragon
Ternasco de Aragonsupercoci
 
Educación Intercultural, Bolivia, White Skin, Premisa, Paradigma
Educación Intercultural, Bolivia, White Skin, Premisa, ParadigmaEducación Intercultural, Bolivia, White Skin, Premisa, Paradigma
Educación Intercultural, Bolivia, White Skin, Premisa, ParadigmaÁlvaro Miguel Carranza Montalvo
 
The unexpected
The unexpectedThe unexpected
The unexpectedkozzia
 
Scott Final Resume 102014
Scott Final Resume 102014Scott Final Resume 102014
Scott Final Resume 102014Scott Delhom
 

Viewers also liked (20)

Synopsys jul1411
Synopsys jul1411Synopsys jul1411
Synopsys jul1411
 
Preventing XSS with Content Security Policy
Preventing XSS with Content Security PolicyPreventing XSS with Content Security Policy
Preventing XSS with Content Security Policy
 
SYNOPSIS WRITING
SYNOPSIS WRITINGSYNOPSIS WRITING
SYNOPSIS WRITING
 
Photoshoot Plan
Photoshoot Plan Photoshoot Plan
Photoshoot Plan
 
Slides midterm
Slides midtermSlides midterm
Slides midterm
 
Babies on Top of the World: Early Intervention in the Indian Himalayas Part 3
Babies on Top of the World: Early Intervention in the Indian Himalayas Part 3Babies on Top of the World: Early Intervention in the Indian Himalayas Part 3
Babies on Top of the World: Early Intervention in the Indian Himalayas Part 3
 
NUIM Campus Map
NUIM Campus MapNUIM Campus Map
NUIM Campus Map
 
vat-entire-portfolio-en-2014
vat-entire-portfolio-en-2014vat-entire-portfolio-en-2014
vat-entire-portfolio-en-2014
 
9th Congress Special Edition Newsletter
9th Congress Special Edition Newsletter9th Congress Special Edition Newsletter
9th Congress Special Edition Newsletter
 
Eternal recurrence pp
Eternal recurrence ppEternal recurrence pp
Eternal recurrence pp
 
QR Codes Scan your way to engagement
QR Codes Scan your way to engagementQR Codes Scan your way to engagement
QR Codes Scan your way to engagement
 
The State as party to child maltreatment - lessons from Research on the impac...
The State as party to child maltreatment - lessons from Research on the impac...The State as party to child maltreatment - lessons from Research on the impac...
The State as party to child maltreatment - lessons from Research on the impac...
 
Top 8 network support engineer resume samples
Top 8 network support engineer resume samplesTop 8 network support engineer resume samples
Top 8 network support engineer resume samples
 
Ternasco de Aragon
Ternasco de AragonTernasco de Aragon
Ternasco de Aragon
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Educación Intercultural, Bolivia, White Skin, Premisa, Paradigma
Educación Intercultural, Bolivia, White Skin, Premisa, ParadigmaEducación Intercultural, Bolivia, White Skin, Premisa, Paradigma
Educación Intercultural, Bolivia, White Skin, Premisa, Paradigma
 
ESH-Brochure-AR_En
ESH-Brochure-AR_EnESH-Brochure-AR_En
ESH-Brochure-AR_En
 
The unexpected
The unexpectedThe unexpected
The unexpected
 
Resume222
Resume222Resume222
Resume222
 
Scott Final Resume 102014
Scott Final Resume 102014Scott Final Resume 102014
Scott Final Resume 102014
 

Similar to BSIMM-V: The Building Security In Maturity Model

ISCI 2015 Successful Lean Project Management
ISCI 2015 Successful Lean Project ManagementISCI 2015 Successful Lean Project Management
ISCI 2015 Successful Lean Project ManagementBrian Harrington
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC Advisory Group
 
Secure Software Development – COBIT5 Perspective
Secure Software  Development –  COBIT5  PerspectiveSecure Software  Development –  COBIT5  Perspective
Secure Software Development – COBIT5 PerspectiveSPIN Chennai
 
Sabre: Mastering a strong foundation for operational excellence and enhanced ...
Sabre: Mastering a strong foundation for operational excellence and enhanced ...Sabre: Mastering a strong foundation for operational excellence and enhanced ...
Sabre: Mastering a strong foundation for operational excellence and enhanced ...Orchestra Networks
 
Six sigma in various industries
Six sigma in various industriesSix sigma in various industries
Six sigma in various industriesAamir chouhan
 
Cigniti joint webinar with Soasta - Agile DevOps: Test-driven IT Environment ...
Cigniti joint webinar with Soasta - Agile DevOps: Test-driven IT Environment ...Cigniti joint webinar with Soasta - Agile DevOps: Test-driven IT Environment ...
Cigniti joint webinar with Soasta - Agile DevOps: Test-driven IT Environment ...Cigniti Technologies Ltd
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 
Governing Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile EffectivenessGoverning Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile EffectivenessTechWell
 
Simulation: Taking “Lean Thinking” to the Next Level
Simulation: Taking “Lean Thinking” to the Next LevelSimulation: Taking “Lean Thinking” to the Next Level
Simulation: Taking “Lean Thinking” to the Next LevelSIMUL8 Corporation
 
Data1 qbit investor presentation v1.3
Data1 qbit investor presentation v1.3Data1 qbit investor presentation v1.3
Data1 qbit investor presentation v1.3d1qb
 
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019 Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019 Amazon Web Services
 
The value of a connected factory
The value of a connected factoryThe value of a connected factory
The value of a connected factoryCroonwolter&dros
 
What is Hybrid Cloud and understanding what's right for your business?
What is Hybrid Cloud and understanding what's right for your business?What is Hybrid Cloud and understanding what's right for your business?
What is Hybrid Cloud and understanding what's right for your business?Emma Large
 
Cloud-Based Innovation and Information Security - Choose Both
Cloud-Based Innovation and Information Security - Choose Both Cloud-Based Innovation and Information Security - Choose Both
Cloud-Based Innovation and Information Security - Choose Both Amazon Web Services
 

Similar to BSIMM-V: The Building Security In Maturity Model (20)

ISCI 2015 Successful Lean Project Management
ISCI 2015 Successful Lean Project ManagementISCI 2015 Successful Lean Project Management
ISCI 2015 Successful Lean Project Management
 
Maximize your Lean ROI
Maximize your Lean ROIMaximize your Lean ROI
Maximize your Lean ROI
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
 
Session 5
Session 5Session 5
Session 5
 
Secure Software Development – COBIT5 Perspective
Secure Software  Development –  COBIT5  PerspectiveSecure Software  Development –  COBIT5  Perspective
Secure Software Development – COBIT5 Perspective
 
Six Sigma
Six Sigma Six Sigma
Six Sigma
 
Sabre: Mastering a strong foundation for operational excellence and enhanced ...
Sabre: Mastering a strong foundation for operational excellence and enhanced ...Sabre: Mastering a strong foundation for operational excellence and enhanced ...
Sabre: Mastering a strong foundation for operational excellence and enhanced ...
 
Six sigma in various industries
Six sigma in various industriesSix sigma in various industries
Six sigma in various industries
 
Cigniti joint webinar with Soasta - Agile DevOps: Test-driven IT Environment ...
Cigniti joint webinar with Soasta - Agile DevOps: Test-driven IT Environment ...Cigniti joint webinar with Soasta - Agile DevOps: Test-driven IT Environment ...
Cigniti joint webinar with Soasta - Agile DevOps: Test-driven IT Environment ...
 
Six sigma
Six sigmaSix sigma
Six sigma
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Gsa overviews
Gsa overviewsGsa overviews
Gsa overviews
 
Governing Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile EffectivenessGoverning Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
 
Simulation: Taking “Lean Thinking” to the Next Level
Simulation: Taking “Lean Thinking” to the Next LevelSimulation: Taking “Lean Thinking” to the Next Level
Simulation: Taking “Lean Thinking” to the Next Level
 
Data1 qbit investor presentation v1.3
Data1 qbit investor presentation v1.3Data1 qbit investor presentation v1.3
Data1 qbit investor presentation v1.3
 
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019 Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
 
The value of a connected factory
The value of a connected factoryThe value of a connected factory
The value of a connected factory
 
What is Hybrid Cloud and understanding what's right for your business?
What is Hybrid Cloud and understanding what's right for your business?What is Hybrid Cloud and understanding what's right for your business?
What is Hybrid Cloud and understanding what's right for your business?
 
Six sigma
Six sigmaSix sigma
Six sigma
 
Cloud-Based Innovation and Information Security - Choose Both
Cloud-Based Innovation and Information Security - Choose Both Cloud-Based Innovation and Information Security - Choose Both
Cloud-Based Innovation and Information Security - Choose Both
 

More from Cigital

7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMMCigital
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat ModelingCigital
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramCigital
 
Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Cigital
 
Can You Really Automate Yourself Secure
Can You Really Automate Yourself SecureCan You Really Automate Yourself Secure
Can You Really Automate Yourself SecureCigital
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for YouCigital
 
6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling MisconceptionsCigital
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game SecurityCigital
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentCigital
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security MetricsCigital
 
Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Cigital
 
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind SpotStatic Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind SpotCigital
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCigital
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistCigital
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?Cigital
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application SecurityCigital
 
BSIMM By The Numbers
BSIMM By The NumbersBSIMM By The Numbers
BSIMM By The NumbersCigital
 
5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams 5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams Cigital
 
How to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsHow to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsCigital
 

More from Cigital (19)

7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
 
Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!
 
Can You Really Automate Yourself Secure
Can You Really Automate Yourself SecureCan You Really Automate Yourself Secure
Can You Really Automate Yourself Secure
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for You
 
6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM Assessment
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security Metrics
 
Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin?
 
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind SpotStatic Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass Houses
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application Security
 
BSIMM By The Numbers
BSIMM By The NumbersBSIMM By The Numbers
BSIMM By The Numbers
 
5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams 5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams
 
How to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsHow to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security Flaws
 

Recently uploaded

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 

Recently uploaded (20)

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 

BSIMM-V: The Building Security In Maturity Model

  • 1. BSIMM-V The Building Security In Maturity Model Gary McGraw, Ph.D. Chief Technology Officer August 6, 2015 Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 1
  • 2. Cigital • Providing software security professionals services since 1992 • World’s premiere software security consulting firm • 430 employees • Washington DC, New York, Santa Clara, Bloomington, Boston, Chicago, Atlanta, Amsterdam, and London • Recognized experts in software security • Widely published in books, white papers, and articles • Industry thought leaders Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 2
  • 3. BSIMM BASICS Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 3
  • 4. We Hold These Truths to Be Self-evident • Software security is more than a set of security functions • Not magic crypto fairy dust • Not silver-bullet security mechanisms • Non-functional aspects of design are essential • Bugs and flaws are 50/50 • Security is an emergent property of the entire system (just like quality) • To end up with secure software, deep integration with the SDLC is necessary Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 4
  • 5. 2006: A Shift from Philosophy to HOW TO • Integrating best practices into large organizations’ SDLC (that is, an SSDL) • Microsoft’s SDL • Cigital’s Touchpoints • OWASP CLASP Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 5
  • 6. Prescriptive vs. Descriptive Models Prescriptive Models • Describe what you should do. • SAFECode • SAMM • SDL • Touchpoints • Every firm has a methodology they follow (often a hybrid). • You need an SSDL. Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 6 Descriptive Models • Describe what is actually happening. • The BSIMM is a descriptive model that can be used to measure any number of prescriptive SSDLs.
  • 7. BSIMM: Software Security Measurement • Real data from (67) real initiatives • 161 measurements • 21 (4) over time • McGraw, Migues, & West Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 7
  • 8. 67 Firms in the BSIMM-V Community Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 8
  • 9. Building BSIMM (2009) Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 9 • Big idea: Build a maturity model from actual data gathered from 9 well known large-scale software security initiatives. • Create a software security framework. • Interview 9 firms in-person. • Discover 110 activities through observation. • Organize the activities in 3 levels. • Build A scorecard. • The model has been validated with data from 67 firms. • There is no special snowflake…
  • 10. The Magic 30 • Since we have data from >30 firms, we can perform statistical analysis. (Laurie Williams from NCSU is doing more of that now.) • How good is the model? • What activities correlate with what other activities? • Do high maturity firms look the same? • We now have 67 firms with 161 distinct measurements. • BSIMM (the 9) • BSIMM Europe (9 in EU) • BSIMM2 (30) • BSIMM3 (42) • BSIMM4 (51) • BSIMM-V (67) ← data freshness emphasized Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 10
  • 11. Monkeys Eat Bananas Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 11 Monkeys Eat Bananas • BSIMM is not about good or bad ways to eat bananas or banana best practices • BSIMM is about observations • BSIMM is descriptive, not prescriptive • BSIMM describes and measures multiple prescriptive approaches
  • 12. A Software Security Framework Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 12 • 4 domains • 12 practices • See informIT article on BSIMM: http://bsimm.com
  • 13. Example Activity [AA1.2] Perform design review for high-risk applications. The organization learns about the benefits of architecture analysis by seeing real results for a few high- risk, high-profile applications. The reviewers must have some experience performing architecture analysis and breaking the architecture being considered. If the SSG is not yet equipped to perform an in-depth architecture analysis, it uses consultants to do this work. Ad hoc review paradigms that rely heavily on expertise may be used here, though in the long run they do not scale. Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 13
  • 14. NEW BSIMM-V Activity [CMVM3.4] Operate a bug bounty program. The organization solicits vulnerability reports from external researchers and pays a bounty for each verified and accepted vulnerability received. Payouts typically follow a sliding scale linked to multiple factors, such as vulnerability type (e.g., remote code execution is worth $10,000 versus CSRF is worth $750), exploitability (demonstrable exploits command much higher payouts), or specific services and software versions (widely- deployed or critical services warrant higher payouts). Ad hoc or short-duration activities, such as capture-the-flag contests, do not count. [This is a new activity that will be reported on in BSIMM6.] Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 14
  • 15. BSIMM-V MEASUREMENTS Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 15
  • 16. Real-World Data (67 firms) Initiative age • Average: 6 years • Newest: 0.4 • Oldest: 18.1 • Median: 5.3 SSG size • Average: 14.78 • Smallest: 1 • Largest: 100 • Median: 7 Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 16 Satellite size • Average: 29.6 • Smallest: 0 • Largest: 400 • Median: 4 Dev size • Average: 4190 • Smallest: 11 • Largest: 30,000 • Median: 1600 Average SSG size: 1.4% of dev group size
  • 17. BSIMM-V Scorecard Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 17
  • 18. Earth (67) Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 18
  • 19. BSIMM-V AS A MEASURING STICK Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 19
  • 20. BSIMM-V as a Measuring Stick • Compare a firm with peers using the high water mark view • Compare business units • Chart an SSI over time Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 20
  • 21. BSIMM-V Scorecard with FAKE Firm Data • Top 12 activities • purple = good? • red = bad? • “Blue shift” practices to emphasize Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 21
  • 22. COMPARING GROUPS OF FIRMS Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 22
  • 23. We Are a Special Snowflake (NOT!) ISV (25) results are similar to financial services (26) Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 23
  • 24. BSIMM Longitudinal: Improvement Over Time • 21 firms measured twice (an average of 24 months apart) • Show how firms improve • An average of 16% activity increase Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 24
  • 25. BSIMM By the Numbers Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 25 BSIMM-V+ BSIMM-V BSIMM4 BSIMM3 BSIMM2 BSIMM1 Firms 93 67 51 42 30 9 Measurements 216 161 95 81 49 9 2nd Measures 48 21 13 11 0 0 3rd Measures 9 4 1 0 0 0 SSG Members 1379 976 978 786 635 370 Satellite Mem. 2611 1954 2039 1750 1150 710 Developers 363,925 272,358 218,286 185,316 141,175 67,950 Applications 93,687 69,039 58,739 41,157 28,243 3970 Avg SSG Age 4.24 4.28 4.13 4.32 4.49 5.32 SSG Avg of Avgs 1.77 / 100 1.4 / 100 1.95 / 100 1.99 / 100 1.02 / 100 1.13 / 100 Financials 40 26 19 17 12 4 ISVs 32 25 19 15 7 4 High Tech 18 14 13 10 7 2
  • 26. The BSIMM Community Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 26 BSIMM Conferences • 2010: Annapolis, MD • 2011: Stevenson, WA • 2012: Galloway, NJ • 2013: Dulles, VA • 2014: Monrerey, CA • 2015: Denver, CO BSIMM EU Conferences • 2012: Amsterdam • 2013: London • 2014: Oxford • 2015: Windsor (this week) BSIMM RSA Mixers • 2010: RSA • 2011: RSA • 2012: RSA • 2013: RSA • 2014: RSA • 2015 RSA BSIMM Mailing List • Moderated • High S/N ratio BSIMM Community Conference 2015 • November in Denver
  • 27. BSIMM-V to BSIMM6 • BSIMM-V released October 2013 under creative commons • http://bsimm.com • Italian, German, and Spanish translations available • BSIMM is a yardstick • Use it to see where you stand • Use it to figure out what your peers do • BSIMM-V→BSIMM6 • BSIMM is growing (93 firms) • Goal = 100 firms Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 27
  • 28. WHERE TO LEARN MORE Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 28
  • 29. SearchSecurity + Justice League 1. In-depth thought-leadership blog from the Cigital Principals: • Gary McGraw • Sammy Migues • John Steven • Paco Hope • Jim DelGrosso www.cigital.com/justiceleague 2. No-nonsense monthly security column by Gary McGraw: www.searchsecurity.com 3. Gary McGraw’s blog: www.cigital.com/~gem/writing Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 29
  • 30. Silver Bullet + IEEE Security & Privacy 1. Monthly Silver Bullet podcast with Gary McGraw: www.cigital.com/silverbullet 2. Building Security In Software Security Best Practices column www.computer.org/security/bsisub/ Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 30
  • 31. The Book • How to DO software security • Best practices • Tools • Knowledge • Cornerstone of the Addison- Wesley Software Security Series: www.swsec.com Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 31
  • 32. Build Security In • Real Software Security Measurement http://bsimm.com • Read the Addison-Wesley Software Security series • Send e-mail: gem@cigital.com • @cigitalgem Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted 32
  • 33. Thank You Copyright © 2015, Cigital and/or its affiliates. All rights reserved. | Cigital Confidential Restricted

Editor's Notes

  1. Presenter Biography Gary McGraw, Ph.D. CTO, Cigital company www.cigital.com podcast www.cigital.com/silverbullet blog www.cigital.com/justiceleague book www.swsec.com personal www.cigital.com/~gem twitter @cigitalgem   Gary McGraw is the CTO of Cigital, Inc., a software security consulting firm with headquarters in the Washington, D.C. area and offices throughout the world. He is a globally recognized authority on software security and the author of eight best selling books on this topic. His titles include Software Security, Exploiting Software, Building Secure Software, Java Security, Exploiting Online Games, and 6 other books; and he is editor of the Addison-Wesley Software Security series. Dr. McGraw has also written over 100 peer-reviewed scientific publications, authors a monthly security column for SearchSecurity and Information Security Magazine, and is frequently quoted in the press. Besides serving as a strategic counselor for top business and IT executives, Gary is on the Advisory Boards of Dasient (acquired by Twitter), Fortify Software (acquired by HP), Raven White, Six Trees Capital, and Wall+Main. His dual PhD is in Cognitive Science and Computer Science from Indiana University where he serves on the Dean’s Advisory Council for the School of Informatics. Gary served on the IEEE Computer Society Board of Governors and produces the monthly Silver Bullet Security Podcast for IEEE Security & Privacy magazine (syndicated by SearchSecurity).
  2. Cigital has offices in Virginia, New York, Boston, Atlanta, Chicago, Silicon Valley, London, Amsterdam and India. Cigital’s staff now numbers more than 270 people. Cigital’s thought leadership in software security is second to none. Software security at Cigital kicked off in 1996 with the best selling book Java Security (co-authored by Cigital CTO Dr. Gary McGraw and Princeton Professor Ed Felten) and a multi-million dollar software security grant from DARPA. Cigital formed its software security group in 1997, delivering software security services to Visa International. After two years of successful service delivery (focused on architectural risk analysis and code review for Java Card), the first book in the world on software security, acclaimed best seller Building Secure Software was published in 2001. The book was written by two Cigital employees, John Viega (one time Chief Security Architect of McAfee) and Gary McGraw. Building Secure Software: How to Avoid Security Problems the Right Way, touched off a revolution. Security people who once relied solely on firewalls, intrusion detection, and anti-virus mechanisms came to understand and embrace the necessity of better software. BSS provides a coherent and sensible philosophical foundation for the blossoming field of software security. In 2006, Cigital’s risk-management driven approach to software security was further codified in the book Software Security: Building Security In. Beginning where Building Secure Software left off, Software Security teaches how to put software security into practice. The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly invoking security throughout the software lifecycle. Software Security is about putting the touchpoints to work in commercial software shops. Because the touchpoints can be applied to the kinds of software artifacts already produced as software is developed, this book’s principles can be adopted without radically changing the way software shops work. Exploiting Online Games, a book about massively distributed software was released to much acclaim in July 2007. Cigital collaborated with the Software Engineering Institute (and CERT) to release the book Software Security Engineering in 2009 as part of the Addison-Wesley Software Security Series edited by Gary McGraw. In 2009, Cigital spearheaded the BSIMM project <http://bsi-mm.com>, a real world data-driven study of over 38 software security initiatives. The BSIMM Community is very active and includes an impressive set of firms. BSIMM-V was released in September 2013. Cigital’s approach to software security may be grounded in solid theory, but it is also practical. With Cigital’s help, large software organizations of tens of thousands have adopted Cigital’s touchpoints and have been measured by the BSIMM.
  3. These are some self-evident truths about software security. For more on the basics, see Software Security (2006) http://swsec.com
  4. Every one of the 67+ firms we have measured has an SSDL. Most are hybrids of popular methodologies. The BSIMM is NOT a methodology, it is a tool for measuring the results of applying a methodology.
  5. There is plenty of confusion (especially in the press) about methodologies and measurement tools. The BSIMM is not a methodology. It is a measurement tool. The BSIMM is used to measure and describe (in common terms) each of the 67 distinct SSDL methodologies in use in the BSIMM Community. See the InformIT article BSIMM versus SAFECode and Other Kaiju Cinema (Dec 26, 2011) http://bit.ly/tLIOnJ
  6. Originally conceived and executed by Cigital and Fortify, BSIMM also includes work of Minded Security (Italian translation), Virtual Forge (German Translation), and Plexlogic (statistics). BSIMM-V was released on 10/31/13 BSIMM-V now includes data from 67 firms BSIMM-V describes 112 activities in 12 practices with 2 or more real examples for each activity 21 firms have been measured twice (giving us Longitudinal Study data) and the data show measurable improvement A new activity (bug bounty) was described for the first time in BSIMM-V The BSIMM3 data set has 161 distinct measurements (some firms measured twice, some firms have multiple divisions measured separately) BSIMM-V describes the work of 974 SSG members working with a satellite of 1954 people to secure the software developed by 272,358 developers. The BSIMM remains the only measuring stick for software security initiatives based on science.  It is extremely useful for comparing the initiative of any given firm to a large group of similar firms.  The BSIMM has been used by multiple firms to strategize and plan their software security initiatives and measure the results.  Finally, FWIW, the government is woefully behind when it comes to software security.
  7. 44 of 67 firms. Some firms choose to remain anonymous.
  8. We have yet to encounter a firm that cannot be measured with the BSIMM. To be sure, some firms are more complicated than others, but the BSIMM was designed to measure all SSDLs encountered on the planet. Even yours.
  9. The importance of statistical analysis. Each time we release a new version of the BSIMM, we carefully consider its descriptive properties using math.
  10. See the informIT article “Cargo Cult Computer Security” (January 28, 2010) http://bit.ly/9HO6ex
  11. BSIMM articles and the BSIMM itself can be found on the website at http://bsi-mm.com. There is also a clickable web version. The SSF is covered exclusively in an informIT article: A Software Security Framework: Working Towards a Realistic Maturity Model (October 15, 2008) http://bit.ly/NDMkYn
  12. There is a paragraph like this describing each of the 112 activities. Note the REAL examples.
  13. There is a paragraph like this describing each of the 112 activities. Note the REAL examples. CMVM3.4 is a new activity added to BSIMM-V and now being tracked for BSIMM6.
  14. For lots of pretty BSIMM-V pictures in one little article, see: Software [in]security -- BSIMM-V does a number on secure software dev (October 29, 2013) http://bit.ly/1aBi4UZ
  15. This is the basic information about our pool of 67 firms. All 67 firms have an SSG. This fact is important enough that we devoted an informIT article to it: “You Really Need a Software Security Group” (December 21, 2009) http://bit.ly/7dqCn8 A satellite is the group of people that don’t work directly for the SSG, but still carry out day-to-day grass roots software security efforts. The universal approach in the data set so far is to have someone specifically responsible for software security and, have that team include, on average, approximately two people for every 100 developers. Every firm in the BSIMM study attributed their ongoing success to having someone specifically responsible for software security and the growth of a satellite.
  16. This is the 67 firm raw data about activities. Each highlighted activity is the most common one in its practice, one for each practice.
  17. For lots of pretty BSIMM-V pictures in one little article, see: Software [in]security -- BSIMM-V does a number on secure software dev (October 29, 2013) http://bit.ly/1aBi4UZ
  18. This is a comparison of a FAKE firm’s high water mark score against the top 10 curve. Note where the blue is INSIDE the orange. These are practices where the firm is substantially behind what we have observed elsewhere. In general, firms with a “round” curve have a more balanced program than firms with a “prickly” shape or worse yet a “butterfly” shape. Remember, this is not a value judgment, it is simply a comparison to what other firms are doing.
  19. A higher-resolution view of the same data shows how the spider diagram curve relates to the 112 activities in the BSIMM. We have also highlighted the 12 “things that everybody does” for a quick comparison of the basics. Blue shift practices are those practices in the spider diagram (see previous slide) where the firm was behind the average. By noting which activities other firms are carrying out in those practices, the target firm can create a data-driven strategic plan.
  20. For lots of pretty BSIMM-V pictures in one little article, see: Software [in]security -- BSIMM-V does a number on secure software dev (October 29, 2013) http://bit.ly/1aBi4UZ
  21. A comparison by verticals is also interesting. Some people believe that their firm (or even their entire vertical discipline) is special and that the BSIMM scores for either their firm or their vertical will be different, making the BSIMM data not as useful for them. Turns out that is incorrect. Diverse verticals such as “Financial Services” and “Independent Software Vendors” (ISV) have much in common. An eyeball check of the overlap between spider diagrams shows this. But more importantly, statistical analysis bears this out. Comparisons along geographic lines are also possible.
  22. 21 firms have been measured twice with a 24 month interval between measurements. Though individual activities among the 12 practices come and go, in general, re-measurement over time shows a clear trend of increased maturity in the population of 21 firms re-measured thus far.
  23. BSIMM shows impressive growth no matter how you slice it.
  24. The BSIMM Community is a powerful set of firms all interested in collectively helping each other.
  25. The current state of the BSIMM model. We are actively seeking more firms for BSIMM6 We imposed a data freshness threshold of 48 months for BSIMM-V and will decrease that window to 36 months for BSIMM6. Get involved.
  26. Gary McGraw publishes a monthly column for SearchSecurity See http://www.cigital.com/~gem/writings for URLs Software [in]security -- BSIMM-V does a number on secure software dev (October 29, 2013) Software [in]security -- software flaws in application architecture (September 10, 2013) Five major technology trends affecting software security assurance (August 9, 2013) NSA data collection programs demand discussion, scrutiny (June 17, 2013) Financial services develop a proactive posture (June 10, 2013) BSIMM4 measures and advances secure application development (May 10, 2013) Chinese Hackers, 'Active Defense' and Other Bad Ideas, Information Security (April 2013) Cyberwar calls for software and system investment, not hacking back (March 20, 2013) McGraw's mobile app security strategy: Three legs of 'trusted on busted' (February 13, 2013) Testing, assessment methods offer third-party software security assurance (February 5, 2013) Thirteen principles to ensure enterprise system security (January 17, 2013) Twelve common software security activities to lift your program (December 10, 2012) Proactive defense prudent alternative to cyberwarfare (November 1, 2012) Ten commandments for software security (October 4, 2012) Data supports need for security awareness training despite naysayers (September 4, 2012) Congress should encourage bug fixes, reward secure systems (August 1, 2012) Mobile security: It’s all about mobile software security (July 2, 2012) Cloud computing pros and cons for security (June 19, 2012) Eliminating badware addresses malware problem (May 7, 2012) Software security assurance: Build it in, build it right (April 10, 2012) Cigital’s justiceleague blog covers emerging software security issues in an informal and technical manner.
  27. The Silver Bullet security podcast has many thousands of regular listeners. With 92 episodes released to date, silver bullet includes interviews with many security luminaries including: Bruce Schneier, Ross Anderson, Avi Rubin, Dan Geer, Marcus Ranum, and many others. Dr McGraw is the founding editor of the Building Security In Department of IEEE Security & Privacy magazine. This magazine is the best periodical in security, with both scientific accuracy, cutting edge technology, and real world relevance.
  28. Dr. McGraw’s book “Software Security” (2006) provides an important cornerstone for the field and continues to sell briskly. <http://swsec.com>
  29. Dr. McGraw welcomes e-mail about software security.