SlideShare a Scribd company logo
1 of 28
Download to read offline
APPSEC BEST PRACTICES FOR
3RD PARTY SUPPLY CHAIN
MANAGEMENT
NAVIGATING THE RISK
 The Current State of Software Security
 The People
 The Processes
 The Policy
 Closing
AGENDA
THE CURRENT STATE OF SOFTWARE SECURITY
CLOUD
BIG
DATA
1 0 1
0 0 1 0
0 1 1
MOBILE
SOCIAL
IOT
SOFTWARE POWERS EVERY COMPANY
Increasingly Complex
APPLICATION SECURITY IS A MONSTER PROBLEM
APPLICATIONS
LEGACY
CODE
INTERNAL
DEVT.
OFFSHORE
3RD
PARTY
OPEN
SOURCE
Explosion of Apps
Speed to Market
Cloud Consumerization
of IT
Distributed
Development
Open
Source
Regulatoryand
Compliance
Mobile
ENVIRONMENT
 Supply chain introduces significant risk
 Nearly 3 out of 4 applications produced by third
parties fail OWASP Top 10
3rd PARTY TO INTERNALLY DEVELOPED APPLICATIONS COMPARISON
Source: SoSS Volume 6 Report
Compliance to OWASP Top 10 by Industry
Source: SoSS Volume6 Report
CHARACTERISTICS OF A WORLD-CLASS PROGRAM
Architecture Review in Design
Threat modeling of applications
o Vendor Analysis
Centralized Application Security
Inventory
o Applications
o Client Server
o Web Application
o Mobile
o Components
o 3rd Party
o Vendor
o Open Sourced
Much Broader Scale than “business
critical” apps
o Internally Developed
o Vendor Supplied
o Downloaded
MultipleTesting Techniques
o Static Analysis
o Dynamic Analysis
o Penetration Testing
o Mobile
o RASP
Risk Based
o Security sets the Policies
Remediate/Mitigate
Developer Coaching
o Remediation Guidance
o eLearning
Developer Self Service
Integration into the SDLC
Other
o Web Discovery
o Software Composition
AnalysisASP
Governance Communications
Standardization Unclear Roles and
Responsibilities• Program scalability is
not possible with
multiple
documentation
standards
• Varying terminology
increases likelihood
of incorrect actions
by program
participants
• Absenceof Enterprise-
levelManagement Plan
leaves gaps in roles and
responsibilities;
• Vendorconfusion on 3rd-
Party program decision
making authority
• Communication
protocols are defined
and vary by project
• No standardized
glossary adoptedby all
stakeholders
• No documented
communication plan or
escalation procedures
• No collaborative forum
to discuss project risks,
action items, and
process/product change
requests
• Each LOB has process
autonomy without
overall management
and documentation
WORLD-CLASS PROGRAM DEVELOPMENT CHALLENGES
THE PEOPLE
Photo by Tim Gouw, Head of Tales & Stories @IdeationKings – url: https://hd.unsplash.com/photo-1453799527828-cf1bd7b2f682
ENTERPRISE CORE TEAM
EXECUTIVE SPONSOR
Overall program
owner and
champion
Aligns key
stakeholder
involvement
Drives vision and
requirements
Deliver key
program
communications
PROGRAM OWNER
Shapes overall
strategy for
Program and
drives 3rd Party
influence within
the Enterprise
Work with program
manager to
resolve program
issues
Receive and
review program
status reports
PROGRAM
MANAGER
Ensures program
objectives are met
Manage 3rd Party
Toolkit artifacts
Creates Vendor
application list
Primary point of
internal escalation
Key decision
maker on Vendor
escalations
Identifies security
policy
requirements
Establishes
Enterprise’s
mitigation
approval process
VENDOR
MANAGEMENT
Owns
relationship/comm
unications with
vendor
Facilitates Vendor
participation and
awareness
TECHNICAL
RESOURCE
Define Security
Policy
Review/Approval
of Vendor
Attestation and
Mitigations
VENDOR CORE TEAM
CUSTOMER ACCOUNT
MANAGER
Drive Vendor
execution
Identify relevant
stakeholders
Coordinate vendor
logistics
Distribute
Enterprise program
requirements and
artifacts
INFORMATION
SECURITY
Assess
Requirements
Support
Development
Support
Remediation and
Mitigation
PROGRAM
MANAGER
Plan and manage
application
remediation and
mitigation
Integrate changes
into product
roadmap
DEVELOPER
Design and
develop
remediation
vendor
Implement to
production
LEGAL
Assess contractual
obligations
SECURITY TESTING SERVICE PROVIDER CORE TEAM
PROGRAM
MANAGER
Driv e program
execution through
the three 3rd Party
stages; Definition,
Execution &
Optimization
Prov ide guidance
around: Program
strategy and
requirements, Key
artifact and Process
Measure the
programs
performance
against milestones,
deliv erables &
resources.
Deliv er program
communications
Escalate issues to
Program Owner
when necessary
ASSOCIATE PM
Manage v endor
tracking and
reporting
Driv e day-to-day
execution and
management
Assist in responding
to enterprise and
v endor program
questions
Identify facilitate
and resolv e v endor
escalations
Monitor issues and
escalate to program
manager as
necessary
VENDOR
ENROLLMENT TEAM
Engage and
Educate Vendor on
program
participation and
success
Conduct v endor
on-boarding
activ ities
Guide Vendor on
result-sharing
protocols
Prov ide Alt.
Attestation
Requirements
Field questions /
gather feedback /
submit initial
escalation request
SUPPORT TEAM
Prov ides general
technical and
“how-to” guidance
to the v endor
community
Address v endor
inquiries in a timely
manner
ADVANCED
SUPPORT
Prov ide with flaw
remediation
guidance helping
secure application
security
compliance
THE PROCESSES
Photo by Startup Stock Photos, a project by @estrattonbailey and @wearesculpt –
url: https://s3.amazonaws.com/StartupStockPhotos/uploads/20160503/6.jpg
BALANCE IS KEY
Processes
•Handbooks for Vendors and
Security Testing Service
Providers
•Continuous process
improvement
•Line of Business User Groups
Policy
•Based on Enterprise-level
policies and guidelines
Approved Program Plan
formalizes program
•Technology enabled
vulnerability and risk
management
People
•Defined roles and
responsibilities
•Decision making authority
belongs to Enterprise
•Consistent status
meetings and reportingSecurity Program Manager
Application Security Consultants
Support Engineers
MATURITY MODEL BASICS
3RD PARTY PROGRAM MATURITY AREA EXAMPLES
 Enterprise 3rd Party AppSec Maturity
 Strength of Mandate
 Strength of Education and Awareness Program
 Level of Enterprise Investment
 Application Inventory Maturity
 Internal Support Programs Maturity
 Extenuating Criteria
Commitment from Executive Level
PhasedActivities
APPSECPROGRAMMATURITY
Bottom Line:
Most successfulclients
followed these best
practices to build a world
class AppSecprogram
Complete Maturity Assessment
Establish Program Goals
Assets Inventory
Policy Definition
Developer Engagement
Multiple Testing Techniques
Remediation Coaching and
Education
Integration
Vendor Testing
-APM
-Static
-Dynamic
-Mobile
-RASP
- MPR
-e-learning
-VAST
START WHERE YOU ARE
Commitment from Executive Level
Phased Activities
APPSECPROGRAMMATURITY
Bottom Line:
Enterprise Strategic Roadmaps
enable identification of the
proper product/service mix within
third-party appsec programs to
advance program maturity
Complete Maturity Assessment
Establish Program Goals
Assets Inventory
Policy Definition
Developer Engagement
Multiple Testing Techniques and
Scale
Remediation Coaching and
Education
Integration
Vendor Testing
-APM
-Static
-Dynamic
-Mobile
-RASP
-eLearning
-VAST
MATURE FROM THERE
Phase 2
Phase 1
Phase 3
PROGRAM FOUNDATIONAL DOCUMENTS
 Program Guide
 Defines the levelof investment that the enterprise is providing, and what
they can expect from Veracode
 Describes roles and responsibilities in the 3rd Party program
 Umbrella document to be shared internally to gain team alignment and
support
 Executive Notification Letter
 Introduces the Program and Expectations to the Supplier, confirming the
importance of complianceby the Enterprise
 Vendor FAQ
 Ready made resource to address many Vendorquestions/concerns
 TailoringPlan
 Defines scope of complex application projects, captures project milestones,
and documents roles and responsibilities
 Communications Plan
 Executive andtacticallevels communications templates that ensure
consistency, scalability, ad repeatability in communications
THE POLICY
Photo by Farzad Nazifi – url: https://unsplash.com/photos/p-xSl33Wxyc
Financial Services and Manufacturing are most secure
Remediate most of their vulnerabilities, 65% and 81% respectively
Higher enforcement of enterprise wide policies and continuous improvement
REMEDIATION BY INDUSTRY VERTICAL
Source: SoSS Volume6 Report
USE POLICY TO DETERMINE COMPLIANCE AND BASELINE RISK PROFILE
Bottom Line:
Identify yourrisk tolerance
guidelines and implement in
the technology policy.
Source: SANS Application Security Survey
Bottom Line:
Codifying remediation
timetables into policy
enforces secure
development best
practices.
USE REMEDIATION TIMETABLES TO DRIVE RISK REDUCTION
Flaw density is represented as number of vulnerabilities per MB of code.
Remediation coaching has a big impact on reducing application risk
Development teams that use Veracode’s experts to help them remediate fix 2.5
times as many flaws as those who go it on their own.
REDUCTION IN FLAW DENSITY
Source: SoSS Volume6 Report
Design and Build:
Test:
Fix:
Govern:
APPLICATION SECURITY BEST PRACTICES
Code Commit Build Test Release Deploy Operate
Bottom Line:
Mature AppSec programs that
utilize scanning and remediation
early in the SDLC have less flaws
introduced in implementation.
BALANCING PEOPLE, PROCESS, AND TECHNOLOGY
Thank You

More Related Content

What's hot

Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...Sonatype
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411Scott Althouse
 
A "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesA "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesSonatype
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Emily Brady
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSalil Kumar Subramony
 
Volume 2-issue-6-1983-1986
Volume 2-issue-6-1983-1986Volume 2-issue-6-1983-1986
Volume 2-issue-6-1983-1986Editor IJARCET
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web applicationTestingXperts
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Synopsys Software Integrity Group
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxCheckmarx
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewAshish Patel
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurityVincent Kwon
 
IBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionIBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionhearme limited company
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeDigital Defense Inc
 

What's hot (19)

Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411
 
Veracode - Inglês
Veracode - InglêsVeracode - Inglês
Veracode - Inglês
 
SOFWARE QUALITY, INTRODUCTION
SOFWARE QUALITY, INTRODUCTIONSOFWARE QUALITY, INTRODUCTION
SOFWARE QUALITY, INTRODUCTION
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
A "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesA "Firewall" for Bad Binaries
A "Firewall" for Bad Binaries
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Volume 2-issue-6-1983-1986
Volume 2-issue-6-1983-1986Volume 2-issue-6-1983-1986
Volume 2-issue-6-1983-1986
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's Toolbox
 
HP Fortify!
HP Fortify!HP Fortify!
HP Fortify!
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurity
 
IBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionIBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solution
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 

Viewers also liked

Risks in the Software Supply Chain
Risks in the Software Supply Chain Risks in the Software Supply Chain
Risks in the Software Supply Chain Sonatype
 
The Value of a Smarter Data Centre
The Value of a Smarter Data CentreThe Value of a Smarter Data Centre
The Value of a Smarter Data CentreNone
 
IDC Nordics - Directions 2015 Digital transformation Services and sourcing
IDC Nordics - Directions 2015 Digital transformation Services and sourcingIDC Nordics - Directions 2015 Digital transformation Services and sourcing
IDC Nordics - Directions 2015 Digital transformation Services and sourcingJohan Hallberg
 
061026 Prezent Kolkasrags Ag
061026 Prezent Kolkasrags Ag061026 Prezent Kolkasrags Ag
061026 Prezent Kolkasrags AgJanis Dambitis
 
Social Media for Sports
Social Media for SportsSocial Media for Sports
Social Media for SportsSports Geek
 
SMART BUSINESS CONTROL
SMART BUSINESS CONTROLSMART BUSINESS CONTROL
SMART BUSINESS CONTROLvideos
 
Recreation & leisure
Recreation & leisureRecreation & leisure
Recreation & leisureBean Malicse
 
Koop: Using 3rd Party Services in ArcGIS
Koop: Using 3rd Party Services in ArcGISKoop: Using 3rd Party Services in ArcGIS
Koop: Using 3rd Party Services in ArcGISDaniel Fenton
 
3rd party logistic
3rd party logistic3rd party logistic
3rd party logisticvikramkr3116
 
Tiff Arcella – Stop wasting money and valuable opportunities: How to optimize...
Tiff Arcella – Stop wasting money and valuable opportunities: How to optimize...Tiff Arcella – Stop wasting money and valuable opportunities: How to optimize...
Tiff Arcella – Stop wasting money and valuable opportunities: How to optimize...Sean Bradley
 
Designing Teams for Emerging Challenges
Designing Teams for Emerging ChallengesDesigning Teams for Emerging Challenges
Designing Teams for Emerging ChallengesAaron Irizarry
 

Viewers also liked (11)

Risks in the Software Supply Chain
Risks in the Software Supply Chain Risks in the Software Supply Chain
Risks in the Software Supply Chain
 
The Value of a Smarter Data Centre
The Value of a Smarter Data CentreThe Value of a Smarter Data Centre
The Value of a Smarter Data Centre
 
IDC Nordics - Directions 2015 Digital transformation Services and sourcing
IDC Nordics - Directions 2015 Digital transformation Services and sourcingIDC Nordics - Directions 2015 Digital transformation Services and sourcing
IDC Nordics - Directions 2015 Digital transformation Services and sourcing
 
061026 Prezent Kolkasrags Ag
061026 Prezent Kolkasrags Ag061026 Prezent Kolkasrags Ag
061026 Prezent Kolkasrags Ag
 
Social Media for Sports
Social Media for SportsSocial Media for Sports
Social Media for Sports
 
SMART BUSINESS CONTROL
SMART BUSINESS CONTROLSMART BUSINESS CONTROL
SMART BUSINESS CONTROL
 
Recreation & leisure
Recreation & leisureRecreation & leisure
Recreation & leisure
 
Koop: Using 3rd Party Services in ArcGIS
Koop: Using 3rd Party Services in ArcGISKoop: Using 3rd Party Services in ArcGIS
Koop: Using 3rd Party Services in ArcGIS
 
3rd party logistic
3rd party logistic3rd party logistic
3rd party logistic
 
Tiff Arcella – Stop wasting money and valuable opportunities: How to optimize...
Tiff Arcella – Stop wasting money and valuable opportunities: How to optimize...Tiff Arcella – Stop wasting money and valuable opportunities: How to optimize...
Tiff Arcella – Stop wasting money and valuable opportunities: How to optimize...
 
Designing Teams for Emerging Challenges
Designing Teams for Emerging ChallengesDesigning Teams for Emerging Challenges
Designing Teams for Emerging Challenges
 

Similar to Cybersecurity Best Practices for 3rd Party Supply Chain

Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideHCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerHCLSoftware
 
Mark Stevens presentation GxP Compliance for MHealth Applications
Mark Stevens presentation GxP Compliance for MHealth ApplicationsMark Stevens presentation GxP Compliance for MHealth Applications
Mark Stevens presentation GxP Compliance for MHealth ApplicationsMark Stevens
 
Apq Qms Project Plan
Apq Qms Project PlanApq Qms Project Plan
Apq Qms Project PlanEng-Mohammad
 
Developer Support Models: Calibrating Service Level to Commitment
Developer Support Models: Calibrating Service Level to CommitmentDeveloper Support Models: Calibrating Service Level to Commitment
Developer Support Models: Calibrating Service Level to CommitmentNordic APIs
 
MAKE THE QUALITY OF SOFTWARE PRODUCT IN THE VIEW OF POOR PRACTICES BY USING S...
MAKE THE QUALITY OF SOFTWARE PRODUCT IN THE VIEW OF POOR PRACTICES BY USING S...MAKE THE QUALITY OF SOFTWARE PRODUCT IN THE VIEW OF POOR PRACTICES BY USING S...
MAKE THE QUALITY OF SOFTWARE PRODUCT IN THE VIEW OF POOR PRACTICES BY USING S...Journal For Research
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application SecurityVeracode
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...DMIMarketing
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise AppsDMIMarketing
 
Best Practices for Reporting and Communicating Software Testing Results 3333.pdf
Best Practices for Reporting and Communicating Software Testing Results 3333.pdfBest Practices for Reporting and Communicating Software Testing Results 3333.pdf
Best Practices for Reporting and Communicating Software Testing Results 3333.pdfUncodemy
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodesciccone
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecJessica Lavery Pozerski
 
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdfQuestions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdfinfosecTrain
 

Similar to Cybersecurity Best Practices for 3rd Party Supply Chain (20)

Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
Mark Stevens presentation GxP Compliance for MHealth Applications
Mark Stevens presentation GxP Compliance for MHealth ApplicationsMark Stevens presentation GxP Compliance for MHealth Applications
Mark Stevens presentation GxP Compliance for MHealth Applications
 
Apq Qms Project Plan
Apq Qms Project PlanApq Qms Project Plan
Apq Qms Project Plan
 
Developer Support Models: Calibrating Service Level to Commitment
Developer Support Models: Calibrating Service Level to CommitmentDeveloper Support Models: Calibrating Service Level to Commitment
Developer Support Models: Calibrating Service Level to Commitment
 
MAKE THE QUALITY OF SOFTWARE PRODUCT IN THE VIEW OF POOR PRACTICES BY USING S...
MAKE THE QUALITY OF SOFTWARE PRODUCT IN THE VIEW OF POOR PRACTICES BY USING S...MAKE THE QUALITY OF SOFTWARE PRODUCT IN THE VIEW OF POOR PRACTICES BY USING S...
MAKE THE QUALITY OF SOFTWARE PRODUCT IN THE VIEW OF POOR PRACTICES BY USING S...
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
 
Developing Secure Apps
Developing Secure AppsDeveloping Secure Apps
Developing Secure Apps
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
 
Best Practices for Reporting and Communicating Software Testing Results 3333.pdf
Best Practices for Reporting and Communicating Software Testing Results 3333.pdfBest Practices for Reporting and Communicating Software Testing Results 3333.pdf
Best Practices for Reporting and Communicating Software Testing Results 3333.pdf
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
 
Application Sustainability Assessment Framework within the Canada Revenue Ag...
Application Sustainability Assessment Framework within the Canada Revenue Ag...Application Sustainability Assessment Framework within the Canada Revenue Ag...
Application Sustainability Assessment Framework within the Canada Revenue Ag...
 
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdfQuestions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Cybersecurity Best Practices for 3rd Party Supply Chain

  • 1. APPSEC BEST PRACTICES FOR 3RD PARTY SUPPLY CHAIN MANAGEMENT NAVIGATING THE RISK
  • 2.  The Current State of Software Security  The People  The Processes  The Policy  Closing AGENDA
  • 3. THE CURRENT STATE OF SOFTWARE SECURITY
  • 4. CLOUD BIG DATA 1 0 1 0 0 1 0 0 1 1 MOBILE SOCIAL IOT SOFTWARE POWERS EVERY COMPANY
  • 5. Increasingly Complex APPLICATION SECURITY IS A MONSTER PROBLEM APPLICATIONS LEGACY CODE INTERNAL DEVT. OFFSHORE 3RD PARTY OPEN SOURCE Explosion of Apps Speed to Market Cloud Consumerization of IT Distributed Development Open Source Regulatoryand Compliance Mobile ENVIRONMENT
  • 6.  Supply chain introduces significant risk  Nearly 3 out of 4 applications produced by third parties fail OWASP Top 10 3rd PARTY TO INTERNALLY DEVELOPED APPLICATIONS COMPARISON Source: SoSS Volume 6 Report
  • 7. Compliance to OWASP Top 10 by Industry Source: SoSS Volume6 Report
  • 8. CHARACTERISTICS OF A WORLD-CLASS PROGRAM Architecture Review in Design Threat modeling of applications o Vendor Analysis Centralized Application Security Inventory o Applications o Client Server o Web Application o Mobile o Components o 3rd Party o Vendor o Open Sourced Much Broader Scale than “business critical” apps o Internally Developed o Vendor Supplied o Downloaded MultipleTesting Techniques o Static Analysis o Dynamic Analysis o Penetration Testing o Mobile o RASP Risk Based o Security sets the Policies Remediate/Mitigate Developer Coaching o Remediation Guidance o eLearning Developer Self Service Integration into the SDLC Other o Web Discovery o Software Composition AnalysisASP
  • 9. Governance Communications Standardization Unclear Roles and Responsibilities• Program scalability is not possible with multiple documentation standards • Varying terminology increases likelihood of incorrect actions by program participants • Absenceof Enterprise- levelManagement Plan leaves gaps in roles and responsibilities; • Vendorconfusion on 3rd- Party program decision making authority • Communication protocols are defined and vary by project • No standardized glossary adoptedby all stakeholders • No documented communication plan or escalation procedures • No collaborative forum to discuss project risks, action items, and process/product change requests • Each LOB has process autonomy without overall management and documentation WORLD-CLASS PROGRAM DEVELOPMENT CHALLENGES
  • 10. THE PEOPLE Photo by Tim Gouw, Head of Tales & Stories @IdeationKings – url: https://hd.unsplash.com/photo-1453799527828-cf1bd7b2f682
  • 11. ENTERPRISE CORE TEAM EXECUTIVE SPONSOR Overall program owner and champion Aligns key stakeholder involvement Drives vision and requirements Deliver key program communications PROGRAM OWNER Shapes overall strategy for Program and drives 3rd Party influence within the Enterprise Work with program manager to resolve program issues Receive and review program status reports PROGRAM MANAGER Ensures program objectives are met Manage 3rd Party Toolkit artifacts Creates Vendor application list Primary point of internal escalation Key decision maker on Vendor escalations Identifies security policy requirements Establishes Enterprise’s mitigation approval process VENDOR MANAGEMENT Owns relationship/comm unications with vendor Facilitates Vendor participation and awareness TECHNICAL RESOURCE Define Security Policy Review/Approval of Vendor Attestation and Mitigations
  • 12. VENDOR CORE TEAM CUSTOMER ACCOUNT MANAGER Drive Vendor execution Identify relevant stakeholders Coordinate vendor logistics Distribute Enterprise program requirements and artifacts INFORMATION SECURITY Assess Requirements Support Development Support Remediation and Mitigation PROGRAM MANAGER Plan and manage application remediation and mitigation Integrate changes into product roadmap DEVELOPER Design and develop remediation vendor Implement to production LEGAL Assess contractual obligations
  • 13. SECURITY TESTING SERVICE PROVIDER CORE TEAM PROGRAM MANAGER Driv e program execution through the three 3rd Party stages; Definition, Execution & Optimization Prov ide guidance around: Program strategy and requirements, Key artifact and Process Measure the programs performance against milestones, deliv erables & resources. Deliv er program communications Escalate issues to Program Owner when necessary ASSOCIATE PM Manage v endor tracking and reporting Driv e day-to-day execution and management Assist in responding to enterprise and v endor program questions Identify facilitate and resolv e v endor escalations Monitor issues and escalate to program manager as necessary VENDOR ENROLLMENT TEAM Engage and Educate Vendor on program participation and success Conduct v endor on-boarding activ ities Guide Vendor on result-sharing protocols Prov ide Alt. Attestation Requirements Field questions / gather feedback / submit initial escalation request SUPPORT TEAM Prov ides general technical and “how-to” guidance to the v endor community Address v endor inquiries in a timely manner ADVANCED SUPPORT Prov ide with flaw remediation guidance helping secure application security compliance
  • 14. THE PROCESSES Photo by Startup Stock Photos, a project by @estrattonbailey and @wearesculpt – url: https://s3.amazonaws.com/StartupStockPhotos/uploads/20160503/6.jpg
  • 15. BALANCE IS KEY Processes •Handbooks for Vendors and Security Testing Service Providers •Continuous process improvement •Line of Business User Groups Policy •Based on Enterprise-level policies and guidelines Approved Program Plan formalizes program •Technology enabled vulnerability and risk management People •Defined roles and responsibilities •Decision making authority belongs to Enterprise •Consistent status meetings and reportingSecurity Program Manager Application Security Consultants Support Engineers
  • 17. 3RD PARTY PROGRAM MATURITY AREA EXAMPLES  Enterprise 3rd Party AppSec Maturity  Strength of Mandate  Strength of Education and Awareness Program  Level of Enterprise Investment  Application Inventory Maturity  Internal Support Programs Maturity  Extenuating Criteria
  • 18. Commitment from Executive Level PhasedActivities APPSECPROGRAMMATURITY Bottom Line: Most successfulclients followed these best practices to build a world class AppSecprogram Complete Maturity Assessment Establish Program Goals Assets Inventory Policy Definition Developer Engagement Multiple Testing Techniques Remediation Coaching and Education Integration Vendor Testing -APM -Static -Dynamic -Mobile -RASP - MPR -e-learning -VAST START WHERE YOU ARE
  • 19. Commitment from Executive Level Phased Activities APPSECPROGRAMMATURITY Bottom Line: Enterprise Strategic Roadmaps enable identification of the proper product/service mix within third-party appsec programs to advance program maturity Complete Maturity Assessment Establish Program Goals Assets Inventory Policy Definition Developer Engagement Multiple Testing Techniques and Scale Remediation Coaching and Education Integration Vendor Testing -APM -Static -Dynamic -Mobile -RASP -eLearning -VAST MATURE FROM THERE Phase 2 Phase 1 Phase 3
  • 20. PROGRAM FOUNDATIONAL DOCUMENTS  Program Guide  Defines the levelof investment that the enterprise is providing, and what they can expect from Veracode  Describes roles and responsibilities in the 3rd Party program  Umbrella document to be shared internally to gain team alignment and support  Executive Notification Letter  Introduces the Program and Expectations to the Supplier, confirming the importance of complianceby the Enterprise  Vendor FAQ  Ready made resource to address many Vendorquestions/concerns  TailoringPlan  Defines scope of complex application projects, captures project milestones, and documents roles and responsibilities  Communications Plan  Executive andtacticallevels communications templates that ensure consistency, scalability, ad repeatability in communications
  • 21. THE POLICY Photo by Farzad Nazifi – url: https://unsplash.com/photos/p-xSl33Wxyc
  • 22. Financial Services and Manufacturing are most secure Remediate most of their vulnerabilities, 65% and 81% respectively Higher enforcement of enterprise wide policies and continuous improvement REMEDIATION BY INDUSTRY VERTICAL Source: SoSS Volume6 Report
  • 23. USE POLICY TO DETERMINE COMPLIANCE AND BASELINE RISK PROFILE Bottom Line: Identify yourrisk tolerance guidelines and implement in the technology policy.
  • 24. Source: SANS Application Security Survey Bottom Line: Codifying remediation timetables into policy enforces secure development best practices. USE REMEDIATION TIMETABLES TO DRIVE RISK REDUCTION
  • 25. Flaw density is represented as number of vulnerabilities per MB of code. Remediation coaching has a big impact on reducing application risk Development teams that use Veracode’s experts to help them remediate fix 2.5 times as many flaws as those who go it on their own. REDUCTION IN FLAW DENSITY Source: SoSS Volume6 Report
  • 26. Design and Build: Test: Fix: Govern: APPLICATION SECURITY BEST PRACTICES Code Commit Build Test Release Deploy Operate Bottom Line: Mature AppSec programs that utilize scanning and remediation early in the SDLC have less flaws introduced in implementation.
  • 27. BALANCING PEOPLE, PROCESS, AND TECHNOLOGY