SlideShare a Scribd company logo
1 of 18
Sympathy for the
Developer
Sarah Gibson
Allow me to introduce myself
So, I work at Veracode.
We scan a lot of applications.
I’ve been working with scan results, of one kind of another, for
the past five year.
Also about a year ago
I needed a research topic for Ming Chow’s security class at
Tufts University.
Thought about “fixing” WebGoat.
He asked me to think about something else.
State of Software Security
Veracode has a lot of data
Mostly annual report on trends across applications we scan.
Some findings are surprisingly consistent over time.
https://www.veracode.com/sites/default/files/Resources/Reports/state-of-
software-security-volume-7-veracode-report.pdf
SQL Injection
Flaw type I wanted to fix in WebGoat.
Fairly prevalent.
Veracode finds it in static scans, and can detect fixes.
I had made some assumptions
Looked at flaw prevalence data over previous SOSS reports.
The number didn’t change very much.
Why was it so flat? For years?
Measuring the prevalence of SQLi
The measurement refers to the presence of at least one SQL
injection flaw on first static scan.
It is one of the standard measurements that gets reported in
the SOSS.
Everyone Poops
Flaws happen.
We know bugs happen.
Why pretend that security flaws are different?
SQLi prevalence on first scan
All first static scans between
2013 and first half of 2017.
Mean: 31.9%
SD: 0.36%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
2013 2014 2015 2016 2017
With SQLi Without SQLi
SQLi prevalence rate across orgs
Same data, but looking across
17 randomly selected
organizations.
Fix rate by application on 3rd scan
App fix rate
Some/All fixed flaws 44%
No net-fixed flaws 56%
Good News
The overall flaw fix rate is
greater than the introduction
rate.
Room to Play
As scans move to sandboxes,
the prevalence of SQLi in
policy scans on first scan goes
down.
Prevalence for all first scans
remains the same.
Fix rates in context
Study published by O’Reilly and SIG.
Survey questions about use of code quality tools.
~32% of respondents reported fixing 80%+ of issues found
using code quality tools.
Only 11% of respondents reported fixing less than 20% of the
issues.
https://www.sig.eu/insight/improving-code-quality/
Does anything affect fix rates?
2016 State of Software Security did report on two factors
that appear to influence fix rates.
1. Remediation Coaching
2. eLearning subscriptions
https://www.veracode.com/sites/default/files/Resources/Reports/state-of-
software-security-volume-7-veracode-report.pdf
It's like we're helping.
Developers fix flaws when they’re found.
When developers have access to consequence
free scans, learning tools and help, fix rates get
even better.
Security working in conjunction with
development can allow both teams to succeed.
Conclusions
Flaws happen.
Devs will work to fix findings, they do even better with
friendly assistance.
Look for flaws. Please.
Thanks! Any Questions?

More Related Content

What's hot

Supporting Change Impact Analysis Using a Recommendation System - An Industri...
Supporting Change Impact Analysis Using a Recommendation System - An Industri...Supporting Change Impact Analysis Using a Recommendation System - An Industri...
Supporting Change Impact Analysis Using a Recommendation System - An Industri...Markus Borg
 
Penetration Testing
Penetration TestingPenetration Testing
Penetration Testingjananya213
 
INAIL e la cultura cybersecurity: Sonatype Advanced Development Pack
INAIL e la cultura cybersecurity: Sonatype Advanced Development PackINAIL e la cultura cybersecurity: Sonatype Advanced Development Pack
INAIL e la cultura cybersecurity: Sonatype Advanced Development PackEmerasoft, solutions to collaborate
 
Microsoft: Open Source at Scale
Microsoft: Open Source at ScaleMicrosoft: Open Source at Scale
Microsoft: Open Source at ScaleShane Coughlan
 
Prioritizing the Devices to Test Your App On: A Case Study of Android Game Apps
Prioritizing the Devices to Test Your App On: A Case Study of Android Game AppsPrioritizing the Devices to Test Your App On: A Case Study of Android Game Apps
Prioritizing the Devices to Test Your App On: A Case Study of Android Game AppsSAIL_QU
 
The Hidden Risk of Component Based Software Development
The Hidden Risk of Component Based Software DevelopmentThe Hidden Risk of Component Based Software Development
The Hidden Risk of Component Based Software DevelopmentSonatype
 
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...Tim Menzies
 
Invited paper: A Trust Behavior based Recommender System for Software Usage b...
Invited paper: A Trust Behavior based Recommender System for Software Usage b...Invited paper: A Trust Behavior based Recommender System for Software Usage b...
Invited paper: A Trust Behavior based Recommender System for Software Usage b...phonecom
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
 
Webinar: Systems Failures Fuel Security-Focused Design Practices
Webinar: Systems Failures Fuel Security-Focused Design PracticesWebinar: Systems Failures Fuel Security-Focused Design Practices
Webinar: Systems Failures Fuel Security-Focused Design PracticesSynopsys Software Integrity Group
 
Fortner_OSCARPresentation
Fortner_OSCARPresentationFortner_OSCARPresentation
Fortner_OSCARPresentationAshley Fortner
 
Software Testing Principal
Software Testing PrincipalSoftware Testing Principal
Software Testing PrincipalManisha Kapase
 
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Programbugcrowd
 
The State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementThe State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementSBWebinars
 
Celebrating 30 years of ISSRE
Celebrating 30 years of ISSRECelebrating 30 years of ISSRE
Celebrating 30 years of ISSREISSREConf
 
Celebrating 30 years of ISSRE
Celebrating 30 years of ISSRECelebrating 30 years of ISSRE
Celebrating 30 years of ISSREISSREConf
 
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)SolarWinds
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Security Conference
 

What's hot (20)

Supporting Change Impact Analysis Using a Recommendation System - An Industri...
Supporting Change Impact Analysis Using a Recommendation System - An Industri...Supporting Change Impact Analysis Using a Recommendation System - An Industri...
Supporting Change Impact Analysis Using a Recommendation System - An Industri...
 
Penetration Testing
Penetration TestingPenetration Testing
Penetration Testing
 
INAIL e la cultura cybersecurity: Sonatype Advanced Development Pack
INAIL e la cultura cybersecurity: Sonatype Advanced Development PackINAIL e la cultura cybersecurity: Sonatype Advanced Development Pack
INAIL e la cultura cybersecurity: Sonatype Advanced Development Pack
 
Microsoft: Open Source at Scale
Microsoft: Open Source at ScaleMicrosoft: Open Source at Scale
Microsoft: Open Source at Scale
 
Prioritizing the Devices to Test Your App On: A Case Study of Android Game Apps
Prioritizing the Devices to Test Your App On: A Case Study of Android Game AppsPrioritizing the Devices to Test Your App On: A Case Study of Android Game Apps
Prioritizing the Devices to Test Your App On: A Case Study of Android Game Apps
 
The Hidden Risk of Component Based Software Development
The Hidden Risk of Component Based Software DevelopmentThe Hidden Risk of Component Based Software Development
The Hidden Risk of Component Based Software Development
 
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
Make the Most of Your Time: How Should the Analyst Work with Automated Tracea...
 
Invited paper: A Trust Behavior based Recommender System for Software Usage b...
Invited paper: A Trust Behavior based Recommender System for Software Usage b...Invited paper: A Trust Behavior based Recommender System for Software Usage b...
Invited paper: A Trust Behavior based Recommender System for Software Usage b...
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
Webinar: Systems Failures Fuel Security-Focused Design Practices
Webinar: Systems Failures Fuel Security-Focused Design PracticesWebinar: Systems Failures Fuel Security-Focused Design Practices
Webinar: Systems Failures Fuel Security-Focused Design Practices
 
Fortner_OSCARPresentation
Fortner_OSCARPresentationFortner_OSCARPresentation
Fortner_OSCARPresentation
 
Software Testing Principal
Software Testing PrincipalSoftware Testing Principal
Software Testing Principal
 
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
 
The State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementThe State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities Management
 
Infograph
InfographInfograph
Infograph
 
Celebrating 30 years of ISSRE
Celebrating 30 years of ISSRECelebrating 30 years of ISSRE
Celebrating 30 years of ISSRE
 
Celebrating 30 years of ISSRE
Celebrating 30 years of ISSRECelebrating 30 years of ISSRE
Celebrating 30 years of ISSRE
 
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
 

Similar to Sympathy for the Developer

We are excited to announce that our new State of Software Security (SOSS) rep...
We are excited to announce that our new State of Software Security (SOSS) rep...We are excited to announce that our new State of Software Security (SOSS) rep...
We are excited to announce that our new State of Software Security (SOSS) rep...Ampliz
 
The State of Software Security 2022 SOSS - Solution
The  State of Software Security 2022 SOSS - SolutionThe  State of Software Security 2022 SOSS - Solution
The State of Software Security 2022 SOSS - SolutionNeelKamalSingh8
 
EXTENT-2016: The Future of Software Testing
EXTENT-2016:	 The Future of Software TestingEXTENT-2016:	 The Future of Software Testing
EXTENT-2016: The Future of Software TestingIosif Itkin
 
When do software issues get reported in large open source software
When do software issues get reported in large open source softwareWhen do software issues get reported in large open source software
When do software issues get reported in large open source softwareRAKESH RANA
 
When do software issues get reported in large open source software - Rakesh Rana
When do software issues get reported in large open source software - Rakesh RanaWhen do software issues get reported in large open source software - Rakesh Rana
When do software issues get reported in large open source software - Rakesh RanaIWSM Mensura
 
DevSecOps: Minimizing Risk, Improving Security
DevSecOps: Minimizing Risk, Improving SecurityDevSecOps: Minimizing Risk, Improving Security
DevSecOps: Minimizing Risk, Improving SecurityFranklin Mosley
 
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...Denim Group
 
Road ahead for performance testing
Road ahead for performance testingRoad ahead for performance testing
Road ahead for performance testingDeb Hota
 
Avcomparatives Survey 2011
Avcomparatives Survey 2011Avcomparatives Survey 2011
Avcomparatives Survey 2011Anatoliy Tkachev
 
JDO 2019: Data Science for Developers - Matthew Renze
JDO 2019: Data Science for Developers -  Matthew RenzeJDO 2019: Data Science for Developers -  Matthew Renze
JDO 2019: Data Science for Developers - Matthew RenzePROIDEA
 
10 Software Testing Trends 2019
10 Software Testing Trends 201910 Software Testing Trends 2019
10 Software Testing Trends 2019Rock Interview
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...EC-Council
 
Nii shonan-meeting-gsrm-20141021 - コピー
Nii shonan-meeting-gsrm-20141021 - コピーNii shonan-meeting-gsrm-20141021 - コピー
Nii shonan-meeting-gsrm-20141021 - コピーHironori Washizaki
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools usedZoe Gilbert
 
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...AnnaBtki
 
Quality Assurance and mobile applications!
Quality Assurance and mobile applications!Quality Assurance and mobile applications!
Quality Assurance and mobile applications!Bagaria Swati
 
Evento - Fintech Districht - Pierguido Iezzi - SWASCAN
Evento - Fintech Districht - Pierguido Iezzi - SWASCANEvento - Fintech Districht - Pierguido Iezzi - SWASCAN
Evento - Fintech Districht - Pierguido Iezzi - SWASCANSWASCAN
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chain2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chainCameron Townshend
 

Similar to Sympathy for the Developer (20)

We are excited to announce that our new State of Software Security (SOSS) rep...
We are excited to announce that our new State of Software Security (SOSS) rep...We are excited to announce that our new State of Software Security (SOSS) rep...
We are excited to announce that our new State of Software Security (SOSS) rep...
 
The State of Software Security 2022 SOSS - Solution
The  State of Software Security 2022 SOSS - SolutionThe  State of Software Security 2022 SOSS - Solution
The State of Software Security 2022 SOSS - Solution
 
EXTENT-2016: The Future of Software Testing
EXTENT-2016:	 The Future of Software TestingEXTENT-2016:	 The Future of Software Testing
EXTENT-2016: The Future of Software Testing
 
When do software issues get reported in large open source software
When do software issues get reported in large open source softwareWhen do software issues get reported in large open source software
When do software issues get reported in large open source software
 
When do software issues get reported in large open source software - Rakesh Rana
When do software issues get reported in large open source software - Rakesh RanaWhen do software issues get reported in large open source software - Rakesh Rana
When do software issues get reported in large open source software - Rakesh Rana
 
DevSecOps: Minimizing Risk, Improving Security
DevSecOps: Minimizing Risk, Improving SecurityDevSecOps: Minimizing Risk, Improving Security
DevSecOps: Minimizing Risk, Improving Security
 
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
 
Road ahead for performance testing
Road ahead for performance testingRoad ahead for performance testing
Road ahead for performance testing
 
Avcomparatives Survey 2011
Avcomparatives Survey 2011Avcomparatives Survey 2011
Avcomparatives Survey 2011
 
JDO 2019: Data Science for Developers - Matthew Renze
JDO 2019: Data Science for Developers -  Matthew RenzeJDO 2019: Data Science for Developers -  Matthew Renze
JDO 2019: Data Science for Developers - Matthew Renze
 
10 Software Testing Trends 2019
10 Software Testing Trends 201910 Software Testing Trends 2019
10 Software Testing Trends 2019
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
 
Nii shonan-meeting-gsrm-20141021 - コピー
Nii shonan-meeting-gsrm-20141021 - コピーNii shonan-meeting-gsrm-20141021 - コピー
Nii shonan-meeting-gsrm-20141021 - コピー
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
 
Quality Assurance and mobile applications!
Quality Assurance and mobile applications!Quality Assurance and mobile applications!
Quality Assurance and mobile applications!
 
Evento - Fintech Districht - Pierguido Iezzi - SWASCAN
Evento - Fintech Districht - Pierguido Iezzi - SWASCANEvento - Fintech Districht - Pierguido Iezzi - SWASCAN
Evento - Fintech Districht - Pierguido Iezzi - SWASCAN
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chain2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chain
 
Software Testing ppt
Software Testing pptSoftware Testing ppt
Software Testing ppt
 

Recently uploaded

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 

Recently uploaded (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 

Sympathy for the Developer

  • 2. Allow me to introduce myself So, I work at Veracode. We scan a lot of applications. I’ve been working with scan results, of one kind of another, for the past five year.
  • 3. Also about a year ago I needed a research topic for Ming Chow’s security class at Tufts University. Thought about “fixing” WebGoat. He asked me to think about something else.
  • 4. State of Software Security Veracode has a lot of data Mostly annual report on trends across applications we scan. Some findings are surprisingly consistent over time. https://www.veracode.com/sites/default/files/Resources/Reports/state-of- software-security-volume-7-veracode-report.pdf
  • 5. SQL Injection Flaw type I wanted to fix in WebGoat. Fairly prevalent. Veracode finds it in static scans, and can detect fixes.
  • 6. I had made some assumptions Looked at flaw prevalence data over previous SOSS reports. The number didn’t change very much. Why was it so flat? For years?
  • 7. Measuring the prevalence of SQLi The measurement refers to the presence of at least one SQL injection flaw on first static scan. It is one of the standard measurements that gets reported in the SOSS.
  • 8. Everyone Poops Flaws happen. We know bugs happen. Why pretend that security flaws are different?
  • 9. SQLi prevalence on first scan All first static scans between 2013 and first half of 2017. Mean: 31.9% SD: 0.36% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 2013 2014 2015 2016 2017 With SQLi Without SQLi
  • 10. SQLi prevalence rate across orgs Same data, but looking across 17 randomly selected organizations.
  • 11. Fix rate by application on 3rd scan App fix rate Some/All fixed flaws 44% No net-fixed flaws 56%
  • 12. Good News The overall flaw fix rate is greater than the introduction rate.
  • 13. Room to Play As scans move to sandboxes, the prevalence of SQLi in policy scans on first scan goes down. Prevalence for all first scans remains the same.
  • 14. Fix rates in context Study published by O’Reilly and SIG. Survey questions about use of code quality tools. ~32% of respondents reported fixing 80%+ of issues found using code quality tools. Only 11% of respondents reported fixing less than 20% of the issues. https://www.sig.eu/insight/improving-code-quality/
  • 15. Does anything affect fix rates? 2016 State of Software Security did report on two factors that appear to influence fix rates. 1. Remediation Coaching 2. eLearning subscriptions https://www.veracode.com/sites/default/files/Resources/Reports/state-of- software-security-volume-7-veracode-report.pdf
  • 16. It's like we're helping. Developers fix flaws when they’re found. When developers have access to consequence free scans, learning tools and help, fix rates get even better. Security working in conjunction with development can allow both teams to succeed.
  • 17. Conclusions Flaws happen. Devs will work to fix findings, they do even better with friendly assistance. Look for flaws. Please.

Editor's Notes

  1. Hi, I’m Sarah I work at Veracode, if you’re not familiar with what we do, we offer application security testing and services to business. Our main testing solutions are static binary analysis, and dynamic web application scanning. We scan a lot. Doing hundreds of thousands of scans in the last year alone (get number). I’ve done a couple different things at Veracode over the past five years, bouncing back and forth between services, operations, and engineering. Getting different perspectives on how people scan, and what we find. This story starts about a year ago, the last time I changed jobs. I moved back to a customer facing role, helping developers understand and fix the flaws we find.
  2. New job and last class of my program at Tufts. I knew Ming “assigned” a research paper each semester, and you just needed to pick an interesting topic. I was starting to help people fix what they find, but didn’t have a lot of experience actually doing that myself. I thought about fixing a known vulnerable web app as a way to get into the mind of a developer having to fix a legacy application. Ming’s review of my proposal asked if I could instead take a look at Veracode’s SOSS reports over the past couple years and see if there was anything interesting in the data over time. (I guess he wasn’t into an auto-ethnographic study of developers receiving security reports)
  3. What is the SOSS? ? Turns out there was something in there. I went looking for changes in fix rates, what I found was a lack of change in flaw introduction rates.
  4. Quick detour.
  5. I was still interested in fix rates. If I wasn’t going to better understand developers by fixing flaws myself, I wanted to see if I could get an understanding through the data. In order to look at fix rates I needed to get an idea about what flaw introduction rates looked like. The flaw prevalence number was really steady, I wasn’t sure how it was measured. At first I assumed it was across all scans in a given year. My first hypothesis was that while flaw introduction rates were going down, flaw fix rates were non-existent. This would suck. I was wrong. Flaw introduction rates were not going down.
  6. So this is why. The prevalence metric is only looking at first scan. It does not look at subsequent scans, and contains no fix data. At all. If it was flat, then developers weren’t reducing flaw introduction rates over time. We spend a lot of time thinking about prevention, and there are organizations that are very proactive in working with their developers on security, was it really flat?
  7. Off by one errors. Etc
  8. I expected all of what has happened in the last five years would have affected the rate of flaw introduction, and it hasn’t. IT’s the same. 150,000 scans SQLi prevalence on first scan is the same as it was in 2013. Kind of huge. Avg Flaw count 44.10363 SD 456.2882 Median 5
  9. Orgs are kept anonymous in data. Pulled first 50 scan entries, removed duplicates, removed those orgs with less than 100 applications. Trend line data? Mean? Clustering around 30%, which is what we would expect if previous graph is representative of the greater population and not just an artifact of something.
  10. Sample description (three scans or more of similar analysis size)* *similar defined as being defined as either a 90% similar set, or those values within one SD of mean.
  11. Individual flaw fix rate 48% Of applications in sample, 44% had a decrease in SQLi flaw count after 3 scans. When including customer mitigations, 51% had a decrease in SQLi flaw count after 3 scans
  12. “Consequence Free” What is the Sandbox feature? What does it allow devs and security to do? This looks like it is affecting policy scan SQLi prevalence, why? Room to experiment, to scan whatever, to learn. To do better.
  13. What is my actual 80% fix rate by third scan number? 23% all fix 34% of the sample looked at had 80% or more of their SQLi flaws fixed by the third scan of similar size. That lines up really nice. That 11% compares to more than a 50% slice of the sample that had less than 20% fixed, no change, or introduced new flaws.
  14. This will change.
  15. Totally recent survey by ESG and Veracode 53% of respondents said that they felt that security and dev were working collaboratively in their org.
  16. “Have some Sympathy” Or some other rolling stones pun. None of this stuff changes the rate at which we make mistakes, however giving access to these tools and resources to developers makes all the difference in the world. Take aways, automated tools to find their own stuff, they will use them and fix things! If you give them coaching, they will fix them faster cause they know what they’re doing. Neither of these things stops mistakes from being written in the first place.