SlideShare a Scribd company logo
A successful SAST tool implementation
By Assaf Pilo – Director of Sales and Marketing, Checkmarx
assafp@checkmarx.com, Jan 2012

The development world has come to realize that the way we build applications opens the door to hackers.
We are starting to realize that it is the code itself that is enabling the attacks. It’s the responsibility of the
development team to build software that is inherently impervious to attack. Catching and dealing with
security defects earlier in the development lifecycle is much more economical than dealing with them once
the applications have been deployed.
Traditionally, the responsibility of security in development had been left to specialists who had their own
tools to provide security guidance to development. This approach, while often effective had proved costly,
and more importantly, did not easily integrate into a software team’s process. And there were technical
problems: Current static analysis tools generated significant false positive results. This further
exacerbated the problem by forcing teams to track down problems that do not actually exist.
Recently there have been fundamental changes in the static security analysis tool arena. They are
usability, efficiency and false positive reporting. These changes address the major issues that developers
have shied away from the earlier tools: These next generation tools are designed to integrate with normal
software engineering workflows, accurately report on security defects, and suggest techniques for repair
that fit the engineer’s development and testing process. These tools, typified by CxEnterprise from
Checkmarx, allow static analysis to integrate with the development teams IDEs and allow security analysis
to take place as part of their normal iterative design, code, test, and analysis process. Integrating in this
manner allows the users to solve real problems, and get smarter in the process. Users gain insight to what
secure code looks like, and how to incorporate that knowledge into future activities.
Once you have chosen a tool, you will be able to complete comprehensive code audits with minimum effort
and fewer resources. In matter of minutes you can now scan for OWASP, SANS, CWE, PCI as well as other
standards and regulations and discover security vulnerabilities.
A common question among organizations that are considering implementing a SAST tool is how to plan
and prepare a smooth implementation and be able to prevail over the expected obstacles.
In order to do so, you should be able to answer these questions:


Who should be the SAST tool owner in your organization?



What type of license, and how many are needed for your organization? How should the licenses be
distributed among the different roles and development teams?



What resources are necessary in order to deploy the tool, and how long will it take?



Which users should be trained, and what is the appropriate training level for each role?



Scan methodology:
o What scan model should be implemented? Central or full SDLC?
o Who is responsible for scanning the projects?
o Who is responsible for reviewing and fixing results?
o How do you verify that the code has been fixed according to the findings?
www.checkmarx.com
A successful SAST tool implementation
By Assaf Pilo – Director of Sales and Marketing, Checkmarx
assafp@checkmarx.com, Jan 2012



Results:
o How to avoid an overflow of results?
o Classification and prioritization of results (company and specific projects).
o Choosing the right scan presets (OWASP, SANS, PCI etc.).
o Dealing with “false positives” (are they really false positives?).



How can you increase the ROI and reduce the TCO?

There are 2 main scanning models:
i.

Central Scanning Model – recommended for deployment phase #1

ii.

Full SDLC Scanning Model – recommended for deployment phase #2

www.checkmarx.com
A successful SAST tool implementation
By Assaf Pilo – Director of Sales and Marketing, Checkmarx
assafp@checkmarx.com, Jan 2012

Central Scanning is the best way to begin using a SAST tool. The main effort is in installing the system
and training a few selected people, primarily the security team. Productivity is immediate, as the tool will
begin producing audit reports soon after the installation is completed.
A Central Scanning model can be implemented and used in 2 modes:
i.

The security engineer centrally scans the projects for all development units.

ii.

Automated scanning; scheduled scans and/or automated build scans.

In a Central Scanning model, developers can review results either by using the tool’s IDE plug-in, client, or
different report formats. It should be decided whether the developers receive raw results, or
alternatively, after someone has reviewed, prioritized and forwarded a customized report for them.
A few key elements are needed for successful central scanning:
i.

Rapid and effective deployment and training. It should take no longer than 3 days to fully
install the system and train a handful of users.

ii.

Simple installation and connectivity – a SAST server which is IDE indifferent and platform
independent, allows scanning different languages without installing and updating the different
compilers. All that is needed for scanning is access to the source code repository.

iii.

Ability to scan non compiled code – allows simple scan setup, without the need to contact and
communicate with the developing teams in order to obtain the different project components
(DLL’s, JAR’s, libraries etc.).

iv.

User friendly UI – using the same UI for all the different languages makes life easier, especially if a
web UI is used, in which case you do not need to install any client or change your end-users PC
image. A web UI also permits the running of the tool from any operating system.

v.

Building an effective workflow which defines the organization’s security policy, best coding
practices, scan schedules, remediation policy and responsibilities.

There are different approaches to Central Scanning, but here are some of the recommended basics:


Choose no more than 5-10 applications to scan for the first 2-3 months. You will find it easier to
review and discuss the results (you should have plenty on your first scans) with the development
teams or projects.



Scan both projects and security issues, from high priority downward:
o
o



High priority applications  low priority
High risk vulnerabilities presets  medium threat  low threat  best coding

Train the developers and make sure they are familiar with the scanned vulnerabilities, as well as
with the tool and the way results are presented.

After you have accumulated some mileage with your SAST tool in the Central Scanning model, it’s time to
consider a Full SDLC, getting the development teams more involved in reviewing, and remediating the
code.

www.checkmarx.com
A successful SAST tool implementation
By Assaf Pilo – Director of Sales and Marketing, Checkmarx
assafp@checkmarx.com, Jan 2012

The Full SDLC Scanning model clearly shows that your organization has matured and is taking
responsibility by practicing secure coding throughout the coding stage. By scanning the code as it is being
developed, the organization can expect some major benefits:
i.

Fixing fewer findings as the code is being developed. Once ready for release, projects will have
fewer issues to fix in preparation for production.

ii.

By providing a SAST tool for developers to use, a steep learning curve is often achieved, as they
tend to better understand the vulnerabilities and their causes, as well as how to avoid them in the
future.

iii.

The majority of technical vulnerabilities can be easily detected and fixed during the coding stage.
This results in fewer complex and business logic issues for regulatory audits or penetration
testing (if practiced).

Here are some of the recommended distributed scanning basics:


Train the trainers; power users on each development team. Once they will have the knowledge,
they will be able to run scans, review results and provide support to their respective teams.



Train the developers and make sure they are comfortable with the scanned vulnerabilities, as
well as with the tool and the way results are presented.



Build a clear process and security policy, so that developers understand what is expected from
them; when and what to scan, and what to do with the findings, etc.



Gradually deploy the developers UI’s, adding a few teams at a time.

Maximizing the ROI while reducing the TCO is extremely relevant in today’s economy. Some of the
factors that should be taken into consideration are:
i.

Licensing costs – granular licensing model enabling low entry price

ii.

Infrastructure costs – standard hardware and 3rd party software

iii.

Deployment and training costs – just a few days to full production

iv.

Implementation costs – flexible and quick customization process

v.

Operational costs – less management and administration needed

vi.

Full SDLC – enablement due to non-required build and support of partial code scanning

vii.

Tool productivity – large number of scans per month, high precision and effective remediation

Checkmarx experts have implemented hundreds of systems around the globe, experiencing a large variety
of verticals, companies, development environments and organizational models.
We are more than ready to share our experience with you and your company, so that you too can
successfully deploy and use our SAST technology and improve your secure coding methodology.

www.checkmarx.com

More Related Content

What's hot (20)

PPTX
DEVSECOPS.pptx
MohammadSaif904342
 
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
PPTX
Threat modelling(system + enterprise)
abhimanyubhogwan
 
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
PPTX
Static Analysis Security Testing for Dummies... and You
Kevin Fealey
 
PDF
DevSecOps and the CI/CD Pipeline
James Wickett
 
PDF
Building a Security Architecture
Cisco Canada
 
PPTX
AppSec & DevSecOps Metrics: Key Performance Indicators (KPIs) to Measure Success
Robert Grupe, CSSLP CISSP PE PMP
 
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
PPTX
Risk Assessment and Threat Modeling
sedukull
 
PPTX
Intro to Security in SDLC
Tjylen Veselyj
 
PDF
The State of DevSecOps
DevOps Indonesia
 
PDF
DevSecOps What Why and How
NotSoSecure Global Services
 
PDF
Demystifying DevSecOps
Archana Joshi
 
PDF
Need of SIEM when You have SOAR
Siemplify
 
PPTX
DEVSECOPS: Coding DevSecOps journey
Jason Suttie
 
PDF
DevSecOps Implementation Journey
DevOps Indonesia
 
PDF
DevSecOps: Key Controls for Modern Security Success
Puma Security, LLC
 
PDF
DevSecOps in Baby Steps
Priyanka Aash
 
DEVSECOPS.pptx
MohammadSaif904342
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
Threat modelling(system + enterprise)
abhimanyubhogwan
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
Static Analysis Security Testing for Dummies... and You
Kevin Fealey
 
DevSecOps and the CI/CD Pipeline
James Wickett
 
Building a Security Architecture
Cisco Canada
 
AppSec & DevSecOps Metrics: Key Performance Indicators (KPIs) to Measure Success
Robert Grupe, CSSLP CISSP PE PMP
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Risk Assessment and Threat Modeling
sedukull
 
Intro to Security in SDLC
Tjylen Veselyj
 
The State of DevSecOps
DevOps Indonesia
 
DevSecOps What Why and How
NotSoSecure Global Services
 
Demystifying DevSecOps
Archana Joshi
 
Need of SIEM when You have SOAR
Siemplify
 
DEVSECOPS: Coding DevSecOps journey
Jason Suttie
 
DevSecOps Implementation Journey
DevOps Indonesia
 
DevSecOps: Key Controls for Modern Security Success
Puma Security, LLC
 
DevSecOps in Baby Steps
Priyanka Aash
 

Viewers also liked (12)

PPTX
DevOps & Security: Here & Now
Checkmarx
 
PDF
Devops security-An Insight into Secure-SDLC
Suman Sourav
 
PDF
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
DevOpsDays Tel Aviv
 
PDF
DevSecOps in Baby Steps
Priyanka Aash
 
PPTX
Graph Visualization - OWASP NYC Chapter
Checkmarx
 
PDF
[ITAS.VN]CxSuite Enterprise Edition
ITAS VIETNAM
 
PDF
Application Security Guide for Beginners
Checkmarx
 
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
PPTX
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
PDF
Application Security Management with ThreadFix
Virtual Forge
 
PDF
Happy New Year!
Checkmarx
 
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Achim D. Brucker
 
DevOps & Security: Here & Now
Checkmarx
 
Devops security-An Insight into Secure-SDLC
Suman Sourav
 
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
DevOpsDays Tel Aviv
 
DevSecOps in Baby Steps
Priyanka Aash
 
Graph Visualization - OWASP NYC Chapter
Checkmarx
 
[ITAS.VN]CxSuite Enterprise Edition
ITAS VIETNAM
 
Application Security Guide for Beginners
Checkmarx
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
Application Security Management with ThreadFix
Virtual Forge
 
Happy New Year!
Checkmarx
 
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Achim D. Brucker
 
Ad

Similar to A Successful SAST Tool Implementation (20)

PDF
The App Sec How-To: Choosing a SAST Tool
Checkmarx
 
PDF
Rolling Out An Enterprise Source Code Review Program
Denim Group
 
PPTX
Static Application Security Testing Strategies for Automation and Continuous ...
Kevin Fealey
 
PPTX
5 things i wish i knew about sast (DSO-LG July 2021)
Michael Man
 
PDF
Shift Left Security
BATbern
 
PDF
10 Steps To Secure Agile Development
Checkmarx
 
PDF
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
 
PPTX
Jason Kent - AppSec Without Additional Tools
centralohioissa
 
PPTX
Software Analytics: Towards Software Mining that Matters (2014)
Tao Xie
 
PDF
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Black Duck by Synopsys
 
PDF
Application Assessment Techniques
Denim Group
 
PDF
Security Checkpoints in Agile SDLC
Rahul Raghavan
 
PDF
The Future of DevSecOps
Stefan Streichsbier
 
PDF
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Perforce
 
PDF
685163main 2 4-a-swat_extendingbenefitsofstaticcodeanalysistools_final
Šumadin Šumić
 
PDF
DevSecOps: Essential Tooling to Enable Continuous Security(25m ADDO)
Rich Mills
 
PPTX
Digital Product Security
SoftServe
 
PDF
Analyst Resources for Chief Information Security Officers (CISOs)
Synopsys Software Integrity Group
 
PPTX
SAST_QSDL
Ivan Elkin
 
PDF
Deploying Static Application Security Testing on a Large Scale
Achim D. Brucker
 
The App Sec How-To: Choosing a SAST Tool
Checkmarx
 
Rolling Out An Enterprise Source Code Review Program
Denim Group
 
Static Application Security Testing Strategies for Automation and Continuous ...
Kevin Fealey
 
5 things i wish i knew about sast (DSO-LG July 2021)
Michael Man
 
Shift Left Security
BATbern
 
10 Steps To Secure Agile Development
Checkmarx
 
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
 
Jason Kent - AppSec Without Additional Tools
centralohioissa
 
Software Analytics: Towards Software Mining that Matters (2014)
Tao Xie
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Black Duck by Synopsys
 
Application Assessment Techniques
Denim Group
 
Security Checkpoints in Agile SDLC
Rahul Raghavan
 
The Future of DevSecOps
Stefan Streichsbier
 
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Perforce
 
685163main 2 4-a-swat_extendingbenefitsofstaticcodeanalysistools_final
Šumadin Šumić
 
DevSecOps: Essential Tooling to Enable Continuous Security(25m ADDO)
Rich Mills
 
Digital Product Security
SoftServe
 
Analyst Resources for Chief Information Security Officers (CISOs)
Synopsys Software Integrity Group
 
SAST_QSDL
Ivan Elkin
 
Deploying Static Application Security Testing on a Large Scale
Achim D. Brucker
 
Ad

More from Checkmarx (8)

PDF
The Web AppSec How-To: The Defender's Toolbox
Checkmarx
 
PDF
10 Tips to Keep Your Software a Step Ahead of the Hackers
Checkmarx
 
PDF
The 5 Biggest Benefits of Source Code Analysis
Checkmarx
 
PDF
A Platform for Application Risk Intelligence
Checkmarx
 
PDF
How Virtual Compilation Transforms Static Code Analysis
Checkmarx
 
PDF
Source Code vs. Binary Code Analysis
Checkmarx
 
PDF
AppSec How-To: Achieving Security in DevOps
Checkmarx
 
PDF
The Security State of The Most Popular WordPress Plug-Ins
Checkmarx
 
The Web AppSec How-To: The Defender's Toolbox
Checkmarx
 
10 Tips to Keep Your Software a Step Ahead of the Hackers
Checkmarx
 
The 5 Biggest Benefits of Source Code Analysis
Checkmarx
 
A Platform for Application Risk Intelligence
Checkmarx
 
How Virtual Compilation Transforms Static Code Analysis
Checkmarx
 
Source Code vs. Binary Code Analysis
Checkmarx
 
AppSec How-To: Achieving Security in DevOps
Checkmarx
 
The Security State of The Most Popular WordPress Plug-Ins
Checkmarx
 

Recently uploaded (20)

PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Complete Network Protection with Real-Time Security
L4RGINDIA
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
July Patch Tuesday
Ivanti
 
Complete Network Protection with Real-Time Security
L4RGINDIA
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 

A Successful SAST Tool Implementation

  • 1. A successful SAST tool implementation By Assaf Pilo – Director of Sales and Marketing, Checkmarx [email protected], Jan 2012 The development world has come to realize that the way we build applications opens the door to hackers. We are starting to realize that it is the code itself that is enabling the attacks. It’s the responsibility of the development team to build software that is inherently impervious to attack. Catching and dealing with security defects earlier in the development lifecycle is much more economical than dealing with them once the applications have been deployed. Traditionally, the responsibility of security in development had been left to specialists who had their own tools to provide security guidance to development. This approach, while often effective had proved costly, and more importantly, did not easily integrate into a software team’s process. And there were technical problems: Current static analysis tools generated significant false positive results. This further exacerbated the problem by forcing teams to track down problems that do not actually exist. Recently there have been fundamental changes in the static security analysis tool arena. They are usability, efficiency and false positive reporting. These changes address the major issues that developers have shied away from the earlier tools: These next generation tools are designed to integrate with normal software engineering workflows, accurately report on security defects, and suggest techniques for repair that fit the engineer’s development and testing process. These tools, typified by CxEnterprise from Checkmarx, allow static analysis to integrate with the development teams IDEs and allow security analysis to take place as part of their normal iterative design, code, test, and analysis process. Integrating in this manner allows the users to solve real problems, and get smarter in the process. Users gain insight to what secure code looks like, and how to incorporate that knowledge into future activities. Once you have chosen a tool, you will be able to complete comprehensive code audits with minimum effort and fewer resources. In matter of minutes you can now scan for OWASP, SANS, CWE, PCI as well as other standards and regulations and discover security vulnerabilities. A common question among organizations that are considering implementing a SAST tool is how to plan and prepare a smooth implementation and be able to prevail over the expected obstacles. In order to do so, you should be able to answer these questions:  Who should be the SAST tool owner in your organization?  What type of license, and how many are needed for your organization? How should the licenses be distributed among the different roles and development teams?  What resources are necessary in order to deploy the tool, and how long will it take?  Which users should be trained, and what is the appropriate training level for each role?  Scan methodology: o What scan model should be implemented? Central or full SDLC? o Who is responsible for scanning the projects? o Who is responsible for reviewing and fixing results? o How do you verify that the code has been fixed according to the findings? www.checkmarx.com
  • 2. A successful SAST tool implementation By Assaf Pilo – Director of Sales and Marketing, Checkmarx [email protected], Jan 2012  Results: o How to avoid an overflow of results? o Classification and prioritization of results (company and specific projects). o Choosing the right scan presets (OWASP, SANS, PCI etc.). o Dealing with “false positives” (are they really false positives?).  How can you increase the ROI and reduce the TCO? There are 2 main scanning models: i. Central Scanning Model – recommended for deployment phase #1 ii. Full SDLC Scanning Model – recommended for deployment phase #2 www.checkmarx.com
  • 3. A successful SAST tool implementation By Assaf Pilo – Director of Sales and Marketing, Checkmarx [email protected], Jan 2012 Central Scanning is the best way to begin using a SAST tool. The main effort is in installing the system and training a few selected people, primarily the security team. Productivity is immediate, as the tool will begin producing audit reports soon after the installation is completed. A Central Scanning model can be implemented and used in 2 modes: i. The security engineer centrally scans the projects for all development units. ii. Automated scanning; scheduled scans and/or automated build scans. In a Central Scanning model, developers can review results either by using the tool’s IDE plug-in, client, or different report formats. It should be decided whether the developers receive raw results, or alternatively, after someone has reviewed, prioritized and forwarded a customized report for them. A few key elements are needed for successful central scanning: i. Rapid and effective deployment and training. It should take no longer than 3 days to fully install the system and train a handful of users. ii. Simple installation and connectivity – a SAST server which is IDE indifferent and platform independent, allows scanning different languages without installing and updating the different compilers. All that is needed for scanning is access to the source code repository. iii. Ability to scan non compiled code – allows simple scan setup, without the need to contact and communicate with the developing teams in order to obtain the different project components (DLL’s, JAR’s, libraries etc.). iv. User friendly UI – using the same UI for all the different languages makes life easier, especially if a web UI is used, in which case you do not need to install any client or change your end-users PC image. A web UI also permits the running of the tool from any operating system. v. Building an effective workflow which defines the organization’s security policy, best coding practices, scan schedules, remediation policy and responsibilities. There are different approaches to Central Scanning, but here are some of the recommended basics:  Choose no more than 5-10 applications to scan for the first 2-3 months. You will find it easier to review and discuss the results (you should have plenty on your first scans) with the development teams or projects.  Scan both projects and security issues, from high priority downward: o o  High priority applications  low priority High risk vulnerabilities presets  medium threat  low threat  best coding Train the developers and make sure they are familiar with the scanned vulnerabilities, as well as with the tool and the way results are presented. After you have accumulated some mileage with your SAST tool in the Central Scanning model, it’s time to consider a Full SDLC, getting the development teams more involved in reviewing, and remediating the code. www.checkmarx.com
  • 4. A successful SAST tool implementation By Assaf Pilo – Director of Sales and Marketing, Checkmarx [email protected], Jan 2012 The Full SDLC Scanning model clearly shows that your organization has matured and is taking responsibility by practicing secure coding throughout the coding stage. By scanning the code as it is being developed, the organization can expect some major benefits: i. Fixing fewer findings as the code is being developed. Once ready for release, projects will have fewer issues to fix in preparation for production. ii. By providing a SAST tool for developers to use, a steep learning curve is often achieved, as they tend to better understand the vulnerabilities and their causes, as well as how to avoid them in the future. iii. The majority of technical vulnerabilities can be easily detected and fixed during the coding stage. This results in fewer complex and business logic issues for regulatory audits or penetration testing (if practiced). Here are some of the recommended distributed scanning basics:  Train the trainers; power users on each development team. Once they will have the knowledge, they will be able to run scans, review results and provide support to their respective teams.  Train the developers and make sure they are comfortable with the scanned vulnerabilities, as well as with the tool and the way results are presented.  Build a clear process and security policy, so that developers understand what is expected from them; when and what to scan, and what to do with the findings, etc.  Gradually deploy the developers UI’s, adding a few teams at a time. Maximizing the ROI while reducing the TCO is extremely relevant in today’s economy. Some of the factors that should be taken into consideration are: i. Licensing costs – granular licensing model enabling low entry price ii. Infrastructure costs – standard hardware and 3rd party software iii. Deployment and training costs – just a few days to full production iv. Implementation costs – flexible and quick customization process v. Operational costs – less management and administration needed vi. Full SDLC – enablement due to non-required build and support of partial code scanning vii. Tool productivity – large number of scans per month, high precision and effective remediation Checkmarx experts have implemented hundreds of systems around the globe, experiencing a large variety of verticals, companies, development environments and organizational models. We are more than ready to share our experience with you and your company, so that you too can successfully deploy and use our SAST technology and improve your secure coding methodology. www.checkmarx.com