© 2016 by RayLai, Confidential and Proprietary© 2016 by RayLai, Confidential and Proprietary
Continuous Security
Testing
Ray Lai
Dec 7, 2016 (Version 0.2)
© 2016 by RayLai, Confidential and Proprietary
Synopsis
This session addresses the technology
challenges of continuous security
testing to “deliver securely,” and
discusses best practices and tooling
based on first hand experience in both
enterprise and startup environment.
© 2016 by RayLai, Confidential and Proprietary
The Problem
How to complete security testing whenever
a build is initiated
Develop
Security testDeploy
Impact
US$10,000 / bug fixed
US$4M data breach (2016)
Damage to brand
© 2016 by RayLai, Confidential and Proprietary
Security Testing: Now and Then
People
• Professional/consultants
Technology
• Commercial tools
Process
• Central governance
• Testing before SW release
Before/Now Desired State
People
• Engineering community
Technology
• Open source tools
• UI and API security testing
Process
• Self-serve
• Continuous: at build/deploy
time
© 2016 by RayLai, Confidential and Proprietary
How
© 2016 by RayLai, Confidential and Proprietary
What is “Continuous Security Testing”?
Continuous Security Testing = New Tools?
© 2016 by RayLai, Confidential and Proprietary
Continuous Security Testing: Point of View
App Source
Codes
Objectives
• Efficiency
• Feedback loop for developers
Security
Metrics
Automated
Security
Testing
Web App
Vulnerability
Scanning
Threat
Modeling
Secure Build
Build PipelineInput Output
Stakeholders
• DevOps
• Developers
• Quality engineers
• Security
• Static code analysis
• Vuln scanning
• App assessment
• Pen test
• Risk assessment
• Compliance
• Operations review
• Defect reports
• Threat modeling
Challenges:false positives/noise,long build time
© 2016 by RayLai, Confidential and Proprietary
Continuous Security Testing: Paradigm Shift
Testing approach
• Network vs app security
• Front-end vs backend;
integrated test
Tools
• Enterprise (integrated), On-
premise
Execution
• Testing separated from build
pipeline
Old New
Testing approach
• Testing how apps and
systems are connected
Tools
• Cloud-based, per pay use
• Single-purpose, open source
Execution
• DevOps: Test in build phase
© 2016 by RayLai, Confidential and Proprietary
How to Deliver Securely?
Exercise 1
You have just completed
functional and security
testing for your flagship app
and platform. However, a
security researcher informs
you that they can reset user
password via SMS, and
take over a user’s account.
Options
1. Extend test coverage
(resources)
2. Enforce pen test before
release (professionals)
3. Educate engineers (training)
How would you do differently to deliver
securely?
© 2016 by RayLai, Confidential and Proprietary
How to Deliver Securely?
Exercise 2
A security researcher
reports a Cross-site
Scripting (XSS) issue in
your portal, with XSS
examples in existing static
Web pages. Your dev team
argues that XSS on static
Web pages is not harmful,
and any fix will take them at
least 1 month.
Options
1. Validate if this is a fire drill
(risk management, education)
2. Fix any XSS defect
(resources)
3. Enforce pen test before
release (professionals)
How would you do differently to deliver
securely?
© 2016 by RayLai, Confidential and Proprietary
How to Deliver Securely?
Exercise 3
Amazon AWS notifies your
security team that your
standalone test VM (AMI)
has been compromised.
While your app team argues
that it is an isolated
instance, AWS finds traces
that it was used to access
other AMI instances without
permission, and also
becomes a DDOS agent.
Options
1. Introduce security controls
and security testing for cloud
apps (technology, resources)
2. Enforce pen test before
release (professionals)
3. Raise awareness (education)
How would you do differently to deliver
securely?
© 2016 by RayLai, Confidential and Proprietary
How to Deliver Securely?
Recommendation (Past) Continuous Security Testing
Exercise 1
(password
reset)
Threat modeling
Test for trusted boundaries
(connected security)
In build pipeline, spin an app instance
to test for end-to-end flow.
Exercise 2
(XSS)
Resolve any XSS defects
Raise awareness
Include UI testing for XSS in
automated test suite (build process).
Exercise 3
(compromised
AMI)
Cloud security testing –
production pen test
Cloud security controls
In build pipeline, spin an AMI instance
to test AWS security policies and
controls.
This is what I would do differently...
© 2016 by RayLai, Confidential and Proprietary
Recommendation
• Continuous security testing is a journey (various maturity levels)
– Identify your low hanging fruits and priorities
– Building community is an art (e.g. contents, outcome and appropriate
engagement)
• Be open mind about changes in execution approach
– DevOps -> build pipeline for security
– Gradual shift from commercial, integrated tools to open source tools
• Be prepared for the next big wave
– Emerging security challenges in IoT and block chain technologies
© 2016 by RayLai, Confidential and Proprietary
Appendix: Best Practices
© 2016 by RayLai, Confidential and Proprietary
What to Prioritize
https://techcrunch.com/2015/01/22/security-for-startups-in-10-steps/
Prioritize
Security culture
Secure platform
Your Website is front-door
Secure coding
Security controls
Plan for failure
Physical security
Be open with public
Email with multi-factor auth
Threats
© 2016 by RayLai, Confidential and Proprietary
Which Tools to Use
brakerman
Static Code Analysis /
Vulnerability Scanners
Cloud / Infrastructure Security
Data SecurityConnected Systems
WhatWeb Web Scanner
w3af
OSSEC Arachni
findBugs
FlawFinder
PMD
© 2016 by RayLai, Confidential and Proprietary
What to Test
Major Security Vulnerabilities Static Code
Analysis
Web App Scan Pen Test
OWASP Top 10 Partial Partial Partial
HeartBleed-type SSL Issues No No Partial
DOS, e.g. due to memory leakage Partial
(Memory
leakage)
Partial Partial
DDOS, e.g. bot attack No No Partial
Cloud hosting security issues No Limited Yes
NoSQL database security issues No No Partial
IoT security issues No Varies Varies
Blockchain security issues No No Varies
© 2016 by RayLai, Confidential and Proprietary
What to Test (cont’d)
OWASP Top 10 Static Code
Analysis
Web App Scan Pen Test
A1 Injection X X X
A2 Broken Auth and Session Management X X
A3 Cross-site Scripting (XSS) Partial X X
A4 Insecure Direct Object References Partial X
A5 Security Misconfiguration X X
A6 Sensitive Data Exposure Partial X
A7 Missing Function Level Access Control X Partial
A8 Cross-Site Request Forgery (CSRF) X X
A9 Using Components with Known
Vulnerabilities
Partial
A10 Unvalidated Redirects and Forwards Partial X
© 2016 by RayLai, Confidential and Proprietary
How to Execute (Build Pipeline for Security)
Web App
Scan
Deploy to
Production
Security
Assessment
Deploy to
Production
Build
Pipeline
Penetration
Test
Runtime
Container
Security
Test Client
Web App
Scan
BeforeNew
Separate, serial events
Continuous integration process to create temporary containers for security testing
© 2016 by RayLai, Confidential and Proprietary
Security Build Pipeline (Example)
App
Container
Jenkins Server
App
Container
Docker Swarm
App
Container
Security
Scanner
(Docker)
Shared Data Container / Data Volume
AppsData
Pre-requisites
• Apps deployed in docker containers
• App data (synthetic or scrubbed
production data) in shared data
containers
• Parallelize testing tasks in Jenkins
Jenkins Setup
• Create docker swarm (apps and data)
• Launch docker swarm
• Create security test client (security
scanner)
• Launch security test client
• Post test results in shared data
container or data volume
• Shut down all docker containers
Gauntlt, ClamAV, Brakerman,
OWASP ZAP
© 2016 by RayLai, Confidential and Proprietary
What to Look For: Web App Security Testing
Session Management
• HTTPOnly and SECURE
flags (cookies)
UI and App
• XSS, CSRF
Data
• Injection vulnerabilities
Traditional Approach What’s New
API
• API token robustness;
playback and Man-in-the-
middle attacks
Data theft
• Data privacy issues (in transit
or at rest)
NoSQL database
• Access control issues
© 2016 by RayLai, Confidential and Proprietary
What to Look For: Platform and Cloud
Platform Infrastructure
• Network security, e.g. port
scan, mis-configuration
• Default passwords and
settings
Identity management
• SSO; access control
Compliance
• Security certification, e.g. PCI
Traditional Approach What’s New
Platform Stack
• Timely patches
• Core security, e.g.
Heartbleed bug
• DDOS
Data security
• Storage security, e.g. S3
Compliance
• Public cloud (e.g. AWS)
security policies and controls
© 2016 by RayLai, Confidential and Proprietary
How to Measure Success
Defect
Density
Threat Model
Custom Risk
Scores
OWASP Top
10
WhiteHat WSI
Security Index
Cenzic HARM
Scores
HP Fortify
Scores
Internal Metrics
Financial management
app has a defect density
of 15.23 (5M LOC)
25 attack vectors Biz risks: 5.2
Tech risks: 7.9
Tech risks reflect # of
total vulnerabilities
from scanning/testing
Industry
Example:
For benchmarking
© 2016 by RayLai, Confidential and Proprietary
How Do I Get Trained
Traditional Channels What’s New
Security Certification
• CEH, CISSP, etc.
Conferences
• RSA, OWASP AppSec,
BlackHat, DEFCON, etc.
Product training
• E.g. Fortify
Online Resources for the
Impatient
• Youtube
• Udemy, Coursera, etc.
Community
• Meetups or user groups, e.g.
OWASP

More Related Content

PDF
DevSecOps: Minimizing Risk, Improving Security
PPTX
Introduction to DevSecOps
PDF
SecDevOps Risk Workflow - v0.6
PDF
Using threat models to control project brief
PPTX
Simplify Dev with Complicated Security Tools
PDF
Legacy-SecDevOps (AppSec Management Debrief)
PDF
Application Security on a Dime: A Practical Guide to Using Functional Open So...
PDF
DevSecOps in Baby Steps
DevSecOps: Minimizing Risk, Improving Security
Introduction to DevSecOps
SecDevOps Risk Workflow - v0.6
Using threat models to control project brief
Simplify Dev with Complicated Security Tools
Legacy-SecDevOps (AppSec Management Debrief)
Application Security on a Dime: A Practical Guide to Using Functional Open So...
DevSecOps in Baby Steps

What's hot (20)

PDF
Take Control: Design a Complete DevSecOps Program
PPTX
You Build It, You Secure It: Introduction to DevSecOps
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
Introduction to DevSecOps
PDF
SecDevOps - The Operationalisation of Security
PDF
Threat modeling with architectural risk patterns
PDF
DevSecOps | DevOps Sec
PDF
2019 DevSecOps Reference Architectures
PDF
DevSecOps: Key Controls for Modern Security Success
PPTX
How to get the best out of DevSecOps - an operations perspective
PPTX
SecDevOps 2.0 - Managing Your Robot Army
PPTX
DevSecOps without DevOps is Just Security
PPTX
Third Party Performance (Velocity, 2014)
PDF
Better Security Testing: Using the Cloud and Continuous Delivery
PDF
Security champions v1.0
PDF
Devops Indonesia - DevSecOps - The Open Source Way
PDF
Secure Coding for Java - An Introduction
PPTX
AllDayDevOps 2019 AppSensor
PPT
Introduction To OWASP
Take Control: Design a Complete DevSecOps Program
You Build It, You Secure It: Introduction to DevSecOps
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Introduction to DevSecOps
SecDevOps - The Operationalisation of Security
Threat modeling with architectural risk patterns
DevSecOps | DevOps Sec
2019 DevSecOps Reference Architectures
DevSecOps: Key Controls for Modern Security Success
How to get the best out of DevSecOps - an operations perspective
SecDevOps 2.0 - Managing Your Robot Army
DevSecOps without DevOps is Just Security
Third Party Performance (Velocity, 2014)
Better Security Testing: Using the Cloud and Continuous Delivery
Security champions v1.0
Devops Indonesia - DevSecOps - The Open Source Way
Secure Coding for Java - An Introduction
AllDayDevOps 2019 AppSensor
Introduction To OWASP
Ad

Similar to Continuous Security Testing (20)

PDF
DevSecOps: essential tooling to enable continuous security 2019-09-16
PDF
Pragmatic Pipeline Security
ODP
Making security-agile matt-tesauro
PDF
DevSecOps: Essential Tooling to Enable Continuous Security(25m ADDO)
PDF
Including security in devops
PPTX
Security as Code
PDF
Agile Relevance in the age of Continuous Everything ....
PDF
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
PPTX
Cloud Application Security: Lessons Learned
PDF
IANS information security forum 2019 summary
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
PPTX
Cloud Application Security: Lessons Learned
ODP
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
PDF
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
PDF
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
PPTX
[Rakuten TechConf2014] [Fukuoka] Security checking which is as a part of Cont...
ODP
Testing at-cloud-speed sans-app-sec-austin-2013
PDF
Scaling security in a cloud environment v0.5 (Sep 2017)
PPTX
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
PDF
The DevSecOps Builder’s Guide to the CI/CD Pipeline
DevSecOps: essential tooling to enable continuous security 2019-09-16
Pragmatic Pipeline Security
Making security-agile matt-tesauro
DevSecOps: Essential Tooling to Enable Continuous Security(25m ADDO)
Including security in devops
Security as Code
Agile Relevance in the age of Continuous Everything ....
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Cloud Application Security: Lessons Learned
IANS information security forum 2019 summary
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Cloud Application Security: Lessons Learned
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps
[Rakuten TechConf2014] [Fukuoka] Security checking which is as a part of Cont...
Testing at-cloud-speed sans-app-sec-austin-2013
Scaling security in a cloud environment v0.5 (Sep 2017)
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
The DevSecOps Builder’s Guide to the CI/CD Pipeline
Ad

Recently uploaded (20)

PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Five Habits of High-Impact Board Members
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Hybrid model detection and classification of lung cancer
PDF
Unlock new opportunities with location data.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Enhancing emotion recognition model for a student engagement use case through...
Group 1 Presentation -Planning and Decision Making .pptx
Getting started with AI Agents and Multi-Agent Systems
Benefits of Physical activity for teenagers.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Hindi spoken digit analysis for native and non-native speakers
Taming the Chaos: How to Turn Unstructured Data into Decisions
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Five Habits of High-Impact Board Members
CloudStack 4.21: First Look Webinar slides
Final SEM Unit 1 for mit wpu at pune .pptx
DP Operators-handbook-extract for the Mautical Institute
Hybrid model detection and classification of lung cancer
Unlock new opportunities with location data.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
1 - Historical Antecedents, Social Consideration.pdf
Developing a website for English-speaking practice to English as a foreign la...
sustainability-14-14877-v2.pddhzftheheeeee
observCloud-Native Containerability and monitoring.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf

Continuous Security Testing

  • 1. © 2016 by RayLai, Confidential and Proprietary© 2016 by RayLai, Confidential and Proprietary Continuous Security Testing Ray Lai Dec 7, 2016 (Version 0.2)
  • 2. © 2016 by RayLai, Confidential and Proprietary Synopsis This session addresses the technology challenges of continuous security testing to “deliver securely,” and discusses best practices and tooling based on first hand experience in both enterprise and startup environment.
  • 3. © 2016 by RayLai, Confidential and Proprietary The Problem How to complete security testing whenever a build is initiated Develop Security testDeploy Impact US$10,000 / bug fixed US$4M data breach (2016) Damage to brand
  • 4. © 2016 by RayLai, Confidential and Proprietary Security Testing: Now and Then People • Professional/consultants Technology • Commercial tools Process • Central governance • Testing before SW release Before/Now Desired State People • Engineering community Technology • Open source tools • UI and API security testing Process • Self-serve • Continuous: at build/deploy time
  • 5. © 2016 by RayLai, Confidential and Proprietary How
  • 6. © 2016 by RayLai, Confidential and Proprietary What is “Continuous Security Testing”? Continuous Security Testing = New Tools?
  • 7. © 2016 by RayLai, Confidential and Proprietary Continuous Security Testing: Point of View App Source Codes Objectives • Efficiency • Feedback loop for developers Security Metrics Automated Security Testing Web App Vulnerability Scanning Threat Modeling Secure Build Build PipelineInput Output Stakeholders • DevOps • Developers • Quality engineers • Security • Static code analysis • Vuln scanning • App assessment • Pen test • Risk assessment • Compliance • Operations review • Defect reports • Threat modeling Challenges:false positives/noise,long build time
  • 8. © 2016 by RayLai, Confidential and Proprietary Continuous Security Testing: Paradigm Shift Testing approach • Network vs app security • Front-end vs backend; integrated test Tools • Enterprise (integrated), On- premise Execution • Testing separated from build pipeline Old New Testing approach • Testing how apps and systems are connected Tools • Cloud-based, per pay use • Single-purpose, open source Execution • DevOps: Test in build phase
  • 9. © 2016 by RayLai, Confidential and Proprietary How to Deliver Securely? Exercise 1 You have just completed functional and security testing for your flagship app and platform. However, a security researcher informs you that they can reset user password via SMS, and take over a user’s account. Options 1. Extend test coverage (resources) 2. Enforce pen test before release (professionals) 3. Educate engineers (training) How would you do differently to deliver securely?
  • 10. © 2016 by RayLai, Confidential and Proprietary How to Deliver Securely? Exercise 2 A security researcher reports a Cross-site Scripting (XSS) issue in your portal, with XSS examples in existing static Web pages. Your dev team argues that XSS on static Web pages is not harmful, and any fix will take them at least 1 month. Options 1. Validate if this is a fire drill (risk management, education) 2. Fix any XSS defect (resources) 3. Enforce pen test before release (professionals) How would you do differently to deliver securely?
  • 11. © 2016 by RayLai, Confidential and Proprietary How to Deliver Securely? Exercise 3 Amazon AWS notifies your security team that your standalone test VM (AMI) has been compromised. While your app team argues that it is an isolated instance, AWS finds traces that it was used to access other AMI instances without permission, and also becomes a DDOS agent. Options 1. Introduce security controls and security testing for cloud apps (technology, resources) 2. Enforce pen test before release (professionals) 3. Raise awareness (education) How would you do differently to deliver securely?
  • 12. © 2016 by RayLai, Confidential and Proprietary How to Deliver Securely? Recommendation (Past) Continuous Security Testing Exercise 1 (password reset) Threat modeling Test for trusted boundaries (connected security) In build pipeline, spin an app instance to test for end-to-end flow. Exercise 2 (XSS) Resolve any XSS defects Raise awareness Include UI testing for XSS in automated test suite (build process). Exercise 3 (compromised AMI) Cloud security testing – production pen test Cloud security controls In build pipeline, spin an AMI instance to test AWS security policies and controls. This is what I would do differently...
  • 13. © 2016 by RayLai, Confidential and Proprietary Recommendation • Continuous security testing is a journey (various maturity levels) – Identify your low hanging fruits and priorities – Building community is an art (e.g. contents, outcome and appropriate engagement) • Be open mind about changes in execution approach – DevOps -> build pipeline for security – Gradual shift from commercial, integrated tools to open source tools • Be prepared for the next big wave – Emerging security challenges in IoT and block chain technologies
  • 14. © 2016 by RayLai, Confidential and Proprietary Appendix: Best Practices
  • 15. © 2016 by RayLai, Confidential and Proprietary What to Prioritize https://techcrunch.com/2015/01/22/security-for-startups-in-10-steps/ Prioritize Security culture Secure platform Your Website is front-door Secure coding Security controls Plan for failure Physical security Be open with public Email with multi-factor auth Threats
  • 16. © 2016 by RayLai, Confidential and Proprietary Which Tools to Use brakerman Static Code Analysis / Vulnerability Scanners Cloud / Infrastructure Security Data SecurityConnected Systems WhatWeb Web Scanner w3af OSSEC Arachni findBugs FlawFinder PMD
  • 17. © 2016 by RayLai, Confidential and Proprietary What to Test Major Security Vulnerabilities Static Code Analysis Web App Scan Pen Test OWASP Top 10 Partial Partial Partial HeartBleed-type SSL Issues No No Partial DOS, e.g. due to memory leakage Partial (Memory leakage) Partial Partial DDOS, e.g. bot attack No No Partial Cloud hosting security issues No Limited Yes NoSQL database security issues No No Partial IoT security issues No Varies Varies Blockchain security issues No No Varies
  • 18. © 2016 by RayLai, Confidential and Proprietary What to Test (cont’d) OWASP Top 10 Static Code Analysis Web App Scan Pen Test A1 Injection X X X A2 Broken Auth and Session Management X X A3 Cross-site Scripting (XSS) Partial X X A4 Insecure Direct Object References Partial X A5 Security Misconfiguration X X A6 Sensitive Data Exposure Partial X A7 Missing Function Level Access Control X Partial A8 Cross-Site Request Forgery (CSRF) X X A9 Using Components with Known Vulnerabilities Partial A10 Unvalidated Redirects and Forwards Partial X
  • 19. © 2016 by RayLai, Confidential and Proprietary How to Execute (Build Pipeline for Security) Web App Scan Deploy to Production Security Assessment Deploy to Production Build Pipeline Penetration Test Runtime Container Security Test Client Web App Scan BeforeNew Separate, serial events Continuous integration process to create temporary containers for security testing
  • 20. © 2016 by RayLai, Confidential and Proprietary Security Build Pipeline (Example) App Container Jenkins Server App Container Docker Swarm App Container Security Scanner (Docker) Shared Data Container / Data Volume AppsData Pre-requisites • Apps deployed in docker containers • App data (synthetic or scrubbed production data) in shared data containers • Parallelize testing tasks in Jenkins Jenkins Setup • Create docker swarm (apps and data) • Launch docker swarm • Create security test client (security scanner) • Launch security test client • Post test results in shared data container or data volume • Shut down all docker containers Gauntlt, ClamAV, Brakerman, OWASP ZAP
  • 21. © 2016 by RayLai, Confidential and Proprietary What to Look For: Web App Security Testing Session Management • HTTPOnly and SECURE flags (cookies) UI and App • XSS, CSRF Data • Injection vulnerabilities Traditional Approach What’s New API • API token robustness; playback and Man-in-the- middle attacks Data theft • Data privacy issues (in transit or at rest) NoSQL database • Access control issues
  • 22. © 2016 by RayLai, Confidential and Proprietary What to Look For: Platform and Cloud Platform Infrastructure • Network security, e.g. port scan, mis-configuration • Default passwords and settings Identity management • SSO; access control Compliance • Security certification, e.g. PCI Traditional Approach What’s New Platform Stack • Timely patches • Core security, e.g. Heartbleed bug • DDOS Data security • Storage security, e.g. S3 Compliance • Public cloud (e.g. AWS) security policies and controls
  • 23. © 2016 by RayLai, Confidential and Proprietary How to Measure Success Defect Density Threat Model Custom Risk Scores OWASP Top 10 WhiteHat WSI Security Index Cenzic HARM Scores HP Fortify Scores Internal Metrics Financial management app has a defect density of 15.23 (5M LOC) 25 attack vectors Biz risks: 5.2 Tech risks: 7.9 Tech risks reflect # of total vulnerabilities from scanning/testing Industry Example: For benchmarking
  • 24. © 2016 by RayLai, Confidential and Proprietary How Do I Get Trained Traditional Channels What’s New Security Certification • CEH, CISSP, etc. Conferences • RSA, OWASP AppSec, BlackHat, DEFCON, etc. Product training • E.g. Fortify Online Resources for the Impatient • Youtube • Udemy, Coursera, etc. Community • Meetups or user groups, e.g. OWASP