SlideShare a Scribd company logo
1 of 26
Download to read offline
INTRODUCTION TO
SOFTWARE SECURITY INITIATIVE
Sudarshan Narayanan
1
AGENDA
➤ What is a Software Security Initiative?
➤ Objectives & Benefits of a Software Security Initiative
➤ The 1-2-3 of Software Security Initiative implementation
➤ Types of Software Security Frameworks
➤ Questions
2
PRODUCT ENGINEERING TODAY
➤ Agile Product Engineering
➤ Accelerated Deployment - Advent of DevOps
➤ Micro-services and Serverless Architecture
➤ Dependence on Third Party Libraries
➤ Automation Testing - Functional and Performance
3
CURRENT STATE OF APPSEC
➤ AppSec Testing = Manual Pen-testing (and/or) Code Review
➤ Threat Modelling (???)
➤ Regressing security issues across releases
➤ Increased time to fix security vulnerabilities
➤ Lack of metrics to measure Software Security
4
IN SHORT…..
5
WHAT IS A SOFTWARE SECURITY
INITIATIVE??
6
7
AN ADDITIONAL 20 HOURS A WEEK?
EVERY SECURITY ENGINEERING TEAM
8
Penetration
Tests
Threat
Modeling
Infra Sweeps
Adhering to
Compliance
Training
Security
Automation
Design
Review
Code Review
Secure
Coding
Guidelines
Security
Toolchain
Bug Bounty
Program
SAST
DAST
Architecture
Review
DevSecOps
Risk
Assessment
Security
Governance
Server
Hardening
Security
Regressions
Vulnerability
Assessments
Vulnerability
Correlation
SOFTWARE SECURITY INITIATIVE (SSI)
“Collection of activities that Measure, Maintain and Improve the state of Software Security”
9
OBJECTIVES
➤ Drive software security through shared ownership across teams
➤ Build a culture of software security awareness
➤ Equip teams to increase their “secure product throughput”
➤ Measure and Communicate success of building secure software
➤ Security -> Cost Center to Revenue Center
10
THE 1-2-3-4 OF AN SSI
11
STEP 1 - PLAN
12
GATHER HISTORICAL/
CURRENT STATE DATA
ORGANIZE YOUR TOOL
CHEST
APPLICATION : TEAM
MAPPING
IDENTIFY TRAINING
NEEDS
IDENTIFY SECURITY
GATES
ASCERTAIN COMPLIANCE /
LEGAL OBJECTIVES
ESTABLISH SSI
GOVERNANCE
13
Incident
Reports
Assmt
Reports
GA
Reports
Dev / OpsQA
DAST
SAST
Dep
Checks
Commit
Builds Deploy
Prod
PLAN
STEP 2 - DO
14
TOOLCHAIN
IMPLEMENTATION
ENHANCE EXISTING
AUTOMATION
BUILD INTERNAL
CAPABILITY (TRAINING)SIG COLLABORATIONS
TRANSCEND BEYOND
PEN TESTS
ENFORCE SECURITY
GATES
15
QA
Scripts+
DAST
Exploit
Scripts
Threat
Modeling
Infra Audits
Config
Checks
Code
Reviews
DO
STEP 3 - CHECK
16
CHOOSE FRAMEWORK
17
BSIMM
OpenSAMM
CHECK
BSIMM VS OPENSAMM
(Slight Deviation….but its worth it guys!)
18
A QUICK COMPARISON
➤ OpenSAMM
➤ Business Functions - 4
➤ Security Practices - 12
➤ Activities - 72
➤ Maturity Levels - 3
➤ Scoring
➤ Each practice area gets a score from 0.00
- 3.00
➤ Answers from each activity across all
maturity levels, scores are calculated.
➤ Metrics
➤ Spider chart
➤ Roadmap projections
➤ BSIMM8
➤ Domains - 4
➤ Practice Areas - 12
➤ Activities - 113
➤ Maturity Levels - 3
➤ Scoring Method
➤ Performed activities are scored with 1
➤ No score for activities that are not performed
➤ Metrics
➤ Spider charts - Activities with highest
maturity considered as highest water mark
19
CHOOSE FRAMEWORK
PERFORMANCE
ANALYSIS
SECURITY ASSESSMENT
DATA
COMPLIANCE AUDIT
DATA
DEFECT TRIAGE
20
BSIMM
OpenSAMM
CHECK
STEP 4 - ACT
21
EVOLVE USING
FRAMEWORKS
MITIGATION ROADMAPRESPOND TO CHANGES
PROJECT MANAGEMENT
TOOL - SSI
22
ACT
TO SUM IT ALL UP
23
PLAN
DO
CHECK
ACT
Prepare to Kick Start / Improve your SSI
Take Control and Implement your SSI
Measure Success of your SSI
Identify Continuous Improvements of your SSI
BEFORE WE END…
➤ Having trouble mapping security, compliance, legal, risk mandates?
➤ Have product releases been blocked or delayed owing to open security issues?
➤ Realise security is important, but just not able to catch up with deployments?
➤ Had trouble optimising / securing additional security budgets?
➤ You know you’ve done some great stuff on the security front, but just can’t convince
your customers?
24
25
SSI FOR THE WIN!
OPEN HOUSE
Questions , Clarifications et all…..
26

More Related Content

What's hot

Intro to Software Engineering - Software Quality Assurance
Intro to Software Engineering - Software Quality AssuranceIntro to Software Engineering - Software Quality Assurance
Intro to Software Engineering - Software Quality Assurance
Radu_Negulescu
 
FAILURE MODE EFFECT ANALYSIS
FAILURE MODE EFFECT ANALYSISFAILURE MODE EFFECT ANALYSIS
FAILURE MODE EFFECT ANALYSIS
ANOOPA NARAYANAN
 

What's hot (20)

Hello
HelloHello
Hello
 
Software metrics
Software metricsSoftware metrics
Software metrics
 
Software engineering testing and types
Software engineering testing and typesSoftware engineering testing and types
Software engineering testing and types
 
Testing introduction
Testing introductionTesting introduction
Testing introduction
 
Human factors in software reliability engineering - Research Paper
Human factors in software reliability engineering - Research PaperHuman factors in software reliability engineering - Research Paper
Human factors in software reliability engineering - Research Paper
 
Security Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSecurity Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar Tymoshyk
 
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
 
ST-All about Test Case-p3
ST-All about Test Case-p3ST-All about Test Case-p3
ST-All about Test Case-p3
 
Types of software testing
Types of software testingTypes of software testing
Types of software testing
 
Security Certification or How I Learned to Stop Worrying & Love Stories - And...
Security Certification or How I Learned to Stop Worrying & Love Stories - And...Security Certification or How I Learned to Stop Worrying & Love Stories - And...
Security Certification or How I Learned to Stop Worrying & Love Stories - And...
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Presentation1
Presentation1Presentation1
Presentation1
 
Software Engineering Overview
Software Engineering OverviewSoftware Engineering Overview
Software Engineering Overview
 
I ntroduction to software testing part1
I ntroduction to software testing part1I ntroduction to software testing part1
I ntroduction to software testing part1
 
Intro to Software Engineering - Software Quality Assurance
Intro to Software Engineering - Software Quality AssuranceIntro to Software Engineering - Software Quality Assurance
Intro to Software Engineering - Software Quality Assurance
 
FAILURE MODE EFFECT ANALYSIS
FAILURE MODE EFFECT ANALYSISFAILURE MODE EFFECT ANALYSIS
FAILURE MODE EFFECT ANALYSIS
 
Integration testing in Scaled agile projects
Integration testing in Scaled agile projectsIntegration testing in Scaled agile projects
Integration testing in Scaled agile projects
 
Failure Mode Effect Analysis - FMEA
Failure Mode Effect Analysis - FMEAFailure Mode Effect Analysis - FMEA
Failure Mode Effect Analysis - FMEA
 
Sop test planning
Sop test planningSop test planning
Sop test planning
 
Software testing principles
Software testing principlesSoftware testing principles
Software testing principles
 

Similar to Introduction to Software Security Initiative

Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development Lifecycle
Rishi Kant
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
Brian Levine
 

Similar to Introduction to Software Security Initiative (20)

Managing Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendationsManaging Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendations
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Software Process Improvement - RKREDDY
Software Process Improvement - RKREDDYSoftware Process Improvement - RKREDDY
Software Process Improvement - RKREDDY
 
Building an application security program
Building an application security programBuilding an application security program
Building an application security program
 
AppSec & DevSecOps Metrics: Key Performance Indicators (KPIs) to Measure Success
AppSec & DevSecOps Metrics: Key Performance Indicators (KPIs) to Measure SuccessAppSec & DevSecOps Metrics: Key Performance Indicators (KPIs) to Measure Success
AppSec & DevSecOps Metrics: Key Performance Indicators (KPIs) to Measure Success
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development Lifecycle
 
DevOps : Integrate, Deliver and Deploy continuously with Visual Studio Team S...
DevOps : Integrate, Deliver and Deploy continuously with Visual Studio Team S...DevOps : Integrate, Deliver and Deploy continuously with Visual Studio Team S...
DevOps : Integrate, Deliver and Deploy continuously with Visual Studio Team S...
 
Realizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and GainsRealizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and Gains
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
 
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 
Security Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLCSecurity Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLC
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
 
Using JIRA for Risk Based Testing - QASymphony Webinar
Using JIRA for Risk Based Testing  - QASymphony WebinarUsing JIRA for Risk Based Testing  - QASymphony Webinar
Using JIRA for Risk Based Testing - QASymphony Webinar
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
Unit 4- Testing.pptx
Unit 4- Testing.pptxUnit 4- Testing.pptx
Unit 4- Testing.pptx
 
Scrum_BLR 11th meet up 13 dec-2014 - SDET - They Way to go for Testers - Jaya...
Scrum_BLR 11th meet up 13 dec-2014 - SDET - They Way to go for Testers - Jaya...Scrum_BLR 11th meet up 13 dec-2014 - SDET - They Way to go for Testers - Jaya...
Scrum_BLR 11th meet up 13 dec-2014 - SDET - They Way to go for Testers - Jaya...
 
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 102020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 10
 
t map brief
t map brieft map brief
t map brief
 

Recently uploaded

%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 

Recently uploaded (20)

%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 

Introduction to Software Security Initiative

  • 1. INTRODUCTION TO SOFTWARE SECURITY INITIATIVE Sudarshan Narayanan 1
  • 2. AGENDA ➤ What is a Software Security Initiative? ➤ Objectives & Benefits of a Software Security Initiative ➤ The 1-2-3 of Software Security Initiative implementation ➤ Types of Software Security Frameworks ➤ Questions 2
  • 3. PRODUCT ENGINEERING TODAY ➤ Agile Product Engineering ➤ Accelerated Deployment - Advent of DevOps ➤ Micro-services and Serverless Architecture ➤ Dependence on Third Party Libraries ➤ Automation Testing - Functional and Performance 3
  • 4. CURRENT STATE OF APPSEC ➤ AppSec Testing = Manual Pen-testing (and/or) Code Review ➤ Threat Modelling (???) ➤ Regressing security issues across releases ➤ Increased time to fix security vulnerabilities ➤ Lack of metrics to measure Software Security 4
  • 6. WHAT IS A SOFTWARE SECURITY INITIATIVE?? 6
  • 7. 7 AN ADDITIONAL 20 HOURS A WEEK?
  • 8. EVERY SECURITY ENGINEERING TEAM 8 Penetration Tests Threat Modeling Infra Sweeps Adhering to Compliance Training Security Automation Design Review Code Review Secure Coding Guidelines Security Toolchain Bug Bounty Program SAST DAST Architecture Review DevSecOps Risk Assessment Security Governance Server Hardening Security Regressions Vulnerability Assessments Vulnerability Correlation
  • 9. SOFTWARE SECURITY INITIATIVE (SSI) “Collection of activities that Measure, Maintain and Improve the state of Software Security” 9
  • 10. OBJECTIVES ➤ Drive software security through shared ownership across teams ➤ Build a culture of software security awareness ➤ Equip teams to increase their “secure product throughput” ➤ Measure and Communicate success of building secure software ➤ Security -> Cost Center to Revenue Center 10
  • 11. THE 1-2-3-4 OF AN SSI 11
  • 12. STEP 1 - PLAN 12
  • 13. GATHER HISTORICAL/ CURRENT STATE DATA ORGANIZE YOUR TOOL CHEST APPLICATION : TEAM MAPPING IDENTIFY TRAINING NEEDS IDENTIFY SECURITY GATES ASCERTAIN COMPLIANCE / LEGAL OBJECTIVES ESTABLISH SSI GOVERNANCE 13 Incident Reports Assmt Reports GA Reports Dev / OpsQA DAST SAST Dep Checks Commit Builds Deploy Prod PLAN
  • 14. STEP 2 - DO 14
  • 15. TOOLCHAIN IMPLEMENTATION ENHANCE EXISTING AUTOMATION BUILD INTERNAL CAPABILITY (TRAINING)SIG COLLABORATIONS TRANSCEND BEYOND PEN TESTS ENFORCE SECURITY GATES 15 QA Scripts+ DAST Exploit Scripts Threat Modeling Infra Audits Config Checks Code Reviews DO
  • 16. STEP 3 - CHECK 16
  • 18. BSIMM VS OPENSAMM (Slight Deviation….but its worth it guys!) 18
  • 19. A QUICK COMPARISON ➤ OpenSAMM ➤ Business Functions - 4 ➤ Security Practices - 12 ➤ Activities - 72 ➤ Maturity Levels - 3 ➤ Scoring ➤ Each practice area gets a score from 0.00 - 3.00 ➤ Answers from each activity across all maturity levels, scores are calculated. ➤ Metrics ➤ Spider chart ➤ Roadmap projections ➤ BSIMM8 ➤ Domains - 4 ➤ Practice Areas - 12 ➤ Activities - 113 ➤ Maturity Levels - 3 ➤ Scoring Method ➤ Performed activities are scored with 1 ➤ No score for activities that are not performed ➤ Metrics ➤ Spider charts - Activities with highest maturity considered as highest water mark 19
  • 20. CHOOSE FRAMEWORK PERFORMANCE ANALYSIS SECURITY ASSESSMENT DATA COMPLIANCE AUDIT DATA DEFECT TRIAGE 20 BSIMM OpenSAMM CHECK
  • 21. STEP 4 - ACT 21
  • 22. EVOLVE USING FRAMEWORKS MITIGATION ROADMAPRESPOND TO CHANGES PROJECT MANAGEMENT TOOL - SSI 22 ACT
  • 23. TO SUM IT ALL UP 23 PLAN DO CHECK ACT Prepare to Kick Start / Improve your SSI Take Control and Implement your SSI Measure Success of your SSI Identify Continuous Improvements of your SSI
  • 24. BEFORE WE END… ➤ Having trouble mapping security, compliance, legal, risk mandates? ➤ Have product releases been blocked or delayed owing to open security issues? ➤ Realise security is important, but just not able to catch up with deployments? ➤ Had trouble optimising / securing additional security budgets? ➤ You know you’ve done some great stuff on the security front, but just can’t convince your customers? 24
  • 26. OPEN HOUSE Questions , Clarifications et all….. 26