Embedding Security in the SDLC
Jerod Brennen
Founder & Principal Consultant, Brennen Consulting
Software security is
a positive indicator
of software quality.
Step 1: Introduce automated software security scanning
Train developers on the OWASP Top 10 Web Application Security Risks
● OWASP Juice Shop
Static Application Security Testing (SAST)
● SonarQube Community Edition
● Codacy ($180/yr)
Dynamic Application Security Testing (DAST)
● OWASP ZAP
● Burp Suite ($399/yr)
Step 2: Introduce OWASP proactive controls into the SDLC
C1: Define Security Requirements
C2: Leverage Security Frameworks and Libraries
C3: Secure Database Access
C4: Encode and Escape Data
C5: Validate All Inputs
C6: Implement Digital Identity
C7: Enforce Access Controls
C8: Protect Data Everywhere
C9: Implement Security Logging and Monitoring
C10: Handle All Errors and Exceptions
Step 3: Implement the OWASP Application Security
Verification Standard (ASVS)
Level 1 - First steps, automated, or whole of portfolio view
Level 2 - Most applications
Level 3 - High value, high assurance, or high safety
Map to data classification requirements and business criticality
Validate compliance using the OWASP Web Security Testing Guide
Step 4: Implement the OWASP Software Assurance Maturity
Model (SAMM)
Each business function maps to multiple practices
Perform a maturity self-assessment
Train stakeholders on the SAMM model
Governance Design Implementation Verification Operations
Reiterating the value
Step 1 provides immediate visibility to higher risk vulnerabilities that could be present
in your applications today.
Step 2 allows you to shift from reactive scanning to proactive secure coding.
Step 3 ensures that you’re managing software security activity (people, processes, and
technologies) based on risk.
Step 4 enables you to transition to a maturity-based approach to securing the SDLC,
optimizing people, time, and resource allocation.
Resources
https://owasp.org/www-project-juice-shop/
https://www.sonarqube.org/
https://www.codacy.com/
https://www.zaproxy.org/
https://portswigger.net/
https://owasp.org/www-project-proactive-controls/
https://owasp.org/www-project-application-security-verification-standard/
https://owasp.org/www-project-web-security-testing-guide/
https://owasp.org/www-project-samm/
Training Resources
https://www.linkedin.com/learning/instructors/jerod-brennen
Jerod Brennen
https://www.linkedin.com/in/jerodbrennen
jerod@brennenconsulting.com
Thanks much!

Embedding Security in the SDLC