SlideShare a Scribd company logo
© 2019 VERACODE INC.
Supply Chain Security
for
Modern Development
C h r i s W y s o p a l
C T O & c o - f o u n d e r
V e r a c o d e
O c t o b e r 2 3 , 2 0 1 9
D e v S e c O p s - L o n d o n G a t h e r i n g
© 2019 VERACODE INC.
Unites States Senate testimony. May 19, 1998
One of the 1st vulnerability researchers at the hacker think tank, L0pht in 90’s.
© 2019 VERACODE INC.
IMPROVE THE
SECURITY OF
YOUR PRODUCT
BY BREAKING
INTO IT
SEPTEMBER 22, 1997
© 2019 VERACODE INC.
© 2019 VERACODE INC.
© 2019 VERACODE INC.
Impacts from Application Security Vulnerability
How to Make Application Security a Competitive Advantage, IDG
Market Survey, March 2018
Impacts from application security vulnerability
© 2019 VERACODE INC.
© 2019 VERACODE INC.
© 2019 VERACODE INC.
Evaluating the Security of Software
Code
Developer
Training
Assessment
Target
1st Party
Code
Open
Sourced
Code
Secure
Coding
How to Fix
Scan
Frequency
Integrated
Scanning
Pre- / Post-
Production
© 2019 VERACODE INC.
Security
DevSecOps is becoming the norm.
© 2019 VERACODE INC.
DevSecOps Indicator:
Percentage of Scans by Account Type
SOURCE: Veracode, State of Software Security Volume 8, 2017-10-18
0%
100%
2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019
API Account User Account
64%
© 2019 VERACODE INC.
DevSecOps Indicator:
Average Number of Scans Per Application
SOURCE: Veracode, State of Software Security Volume 8, 2017-10-18
7.5
10.9
14.5
21.9
2015
2016
2017
2018
© 2019 VERACODE INC.
DevSecOps Effect
© 2019 VERACODE INC.
DevSecOps Improves Time To Remediate
© 2019 VERACODE INC.
Vulnerable Modules/Libraries
Thousands of CVEs in open source packages
Need to be continuous about library and package inspection and
monitoring
How fast can you determine if a new vulnerability in an open source
package effects one of your apps?
How fast can you rebuild and redeploy?
© 2019 VERACODE INC.
Strategy – Security Champions
Eyes and ears of security
Specialized training
– Basic security concepts
– Threat modeling
– Grooming guidelines
– Secure code review training
– Security controls
– CTF Exercises
Escalate when necessary
© 2019 VERACODE INC.
Validating a Secure Development Process
Code
Security
Developer
Training
Verified Standard
Security Baseline
Verified Team
Secure Coding Culture
Verified Continuous
Business-Driven Maturity
Application Security Maturity
Assessmen
t Target
No Very High Flaws
Assess 1st Party Code
No Very High Flaws
No High Flaws
No Very High Flaws
No High Flaws
No Medium Flaws
Assess 1st Party Code
Assess 3rd Party Code
Integrated Scanning
Assess 1st Party Code
Assess 3rd Party Code
Security Champion
Security Champion
Secure Coding
Training
Veracode Verified
© 2019 VERACODE INC.
A Roadmap to Compliance
© 2019 VERACODE INC.
Roadmap to Self-Regulation
Incentive-based
Outcomes
Prescriptive & Directive
not
not
not
Punishment-based
Technology
Point-in-time
© 2019 VERACODE INC.
But what about?
• Threat modeling
• Code review
• Manual penetration tests
Use information from multiple trusted sources to feed into one score.
Like a credit rating!
© 2019 VERACODE INC.
A Software FICO?
1. Code Security
2. Developer Training
3. Assessment Target
4. Threat Modelling
5. Manual Penetration Testing
1. Payment History: 35%
2. Amounts Owed: 30%
3. Length of Credit History: 15%
4. New Credit: 10%
5. Types of Credit in Use: 10%
© 2019 VERACODE INC.
C h r i s W y s o p a l
c w y s o p a l @ v e r a c o d e . c o m
@ w e l d p o n d
https://www.veracode.com/verified/directory

More Related Content

PDF
Veracode ciso riyadh
Salil Kumar Subramony
 
PPTX
Iphone application development trends for 2016
Jeet7Banerjee
 
PDF
Introduction to Cybersecurity-certificate - Cisco SIgn
Abdul Wahab
 
PDF
Certificate of Course Completion "Introduction to Cybersecurity" powered by C...
Angelo Settembre
 
PDF
Code Intelligence - NOAH19 Berlin
NOAH Advisors
 
PPTX
How to create a business case for expanding your AppSec program
Colin Domoney
 
PDF
MMV Webinar 3. Cybersecurity Perspectives. March 2018
Match-Maker Ventures
 
PDF
ANTI-ANTI-CODE-MODIFICATION MiSSConf(SP5) 2019
Boonpoj Thongakaraniroj
 
Veracode ciso riyadh
Salil Kumar Subramony
 
Iphone application development trends for 2016
Jeet7Banerjee
 
Introduction to Cybersecurity-certificate - Cisco SIgn
Abdul Wahab
 
Certificate of Course Completion "Introduction to Cybersecurity" powered by C...
Angelo Settembre
 
Code Intelligence - NOAH19 Berlin
NOAH Advisors
 
How to create a business case for expanding your AppSec program
Colin Domoney
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
Match-Maker Ventures
 
ANTI-ANTI-CODE-MODIFICATION MiSSConf(SP5) 2019
Boonpoj Thongakaraniroj
 

Similar to DSO-LG Oct 2019: Modern Software Delivery: Supply Chain Security Critical (Chris Wysopal) (20)

PDF
application-security-fallacies-and-realities-veracode
sciccone
 
PDF
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
NowSecure
 
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Synopsys Software Integrity Group
 
PDF
Selling Your Organization on Application Security
Veracode
 
PDF
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Perforce
 
PDF
Web Application Security - Everything You Should Know
Narola Infotech
 
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
lior mazor
 
PPTX
Automotive Cybersecurity: The Gap Still Exists
OnBoard Security, Inc. - a Qualcomm Company
 
PDF
Approaches to Cyber Resilience and Supply Chain Assurance
Leonardo
 
PDF
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Capgemini
 
PDF
Security Testing Trends for 2020
TestingXperts
 
PPTX
Nsc42 the security phoenix
NSC42 Ltd
 
PDF
Global Market Leader Award 2009
Kim Jensen
 
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
PPTX
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
PDF
ICT eGuide: Switching foundation technology for better cyber security
Niamh Hughes
 
PPTX
Alfresco Virtual DevCon 2020 - Security First!
Jason Jolley
 
PDF
Top 6 Web Application Security Best Practices.pdf
SolviosTechnology
 
PDF
COVID-19 free penetration tests by Pentest-Tools.com
Pentest-Tools.com
 
PDF
Cenzic_AppSecTrends_Q1-Q2-2009
diTii
 
application-security-fallacies-and-realities-veracode
sciccone
 
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
NowSecure
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Synopsys Software Integrity Group
 
Selling Your Organization on Application Security
Veracode
 
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Perforce
 
Web Application Security - Everything You Should Know
Narola Infotech
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
lior mazor
 
Automotive Cybersecurity: The Gap Still Exists
OnBoard Security, Inc. - a Qualcomm Company
 
Approaches to Cyber Resilience and Supply Chain Assurance
Leonardo
 
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Capgemini
 
Security Testing Trends for 2020
TestingXperts
 
Nsc42 the security phoenix
NSC42 Ltd
 
Global Market Leader Award 2009
Kim Jensen
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
ICT eGuide: Switching foundation technology for better cyber security
Niamh Hughes
 
Alfresco Virtual DevCon 2020 - Security First!
Jason Jolley
 
Top 6 Web Application Security Best Practices.pdf
SolviosTechnology
 
COVID-19 free penetration tests by Pentest-Tools.com
Pentest-Tools.com
 
Cenzic_AppSecTrends_Q1-Q2-2009
diTii
 
Ad

More from Michael Man (20)

PPTX
5 things i wish i knew about sast (DSO-LG July 2021)
Michael Man
 
PDF
K8S Certifications - Exam Cram
Michael Man
 
PDF
DSO-LG 2021 Reboot: Policy As Code (Anders Eknert)
Michael Man
 
PDF
DSO-LG March 2018: The mechanics behind how attackers exploit simple programm...
Michael Man
 
PPTX
Extract Oct 2019: DSO-LG Rolling Slides
Michael Man
 
PPTX
Sept 2019 - DSO-LG Tooling Examples
Michael Man
 
PPTX
DevSecOps Manchester - May 2019
Michael Man
 
PDF
Chris Rutter: Avoiding The Security Brick
Michael Man
 
PPTX
Extract: DevSecOps - London Gathering (March 2019)
Michael Man
 
PDF
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
Michael Man
 
PDF
Matt Turner: Istio, The Packet's-Eye View (DevSecOps - London Gathering, Janu...
Michael Man
 
PDF
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
Michael Man
 
PDF
August 2018: DevSecOps - London Gathering
Michael Man
 
PPTX
DevSecOps - London Gathering : June 2018
Michael Man
 
PDF
Continuous Security: From tins to containers - now what!
Michael Man
 
PDF
The mechanics behind how attackers exploit simple programming mistakes ...
Michael Man
 
PDF
Secret Management Journey - Here Be Dragons aka Secret Dragons
Michael Man
 
PPTX
DevSecOps March 2018 - Extract
Michael Man
 
PDF
DevSecOps The Evolution of DevOps
Michael Man
 
PDF
Dynaminet -DevSecOps
Michael Man
 
5 things i wish i knew about sast (DSO-LG July 2021)
Michael Man
 
K8S Certifications - Exam Cram
Michael Man
 
DSO-LG 2021 Reboot: Policy As Code (Anders Eknert)
Michael Man
 
DSO-LG March 2018: The mechanics behind how attackers exploit simple programm...
Michael Man
 
Extract Oct 2019: DSO-LG Rolling Slides
Michael Man
 
Sept 2019 - DSO-LG Tooling Examples
Michael Man
 
DevSecOps Manchester - May 2019
Michael Man
 
Chris Rutter: Avoiding The Security Brick
Michael Man
 
Extract: DevSecOps - London Gathering (March 2019)
Michael Man
 
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
Michael Man
 
Matt Turner: Istio, The Packet's-Eye View (DevSecOps - London Gathering, Janu...
Michael Man
 
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
Michael Man
 
August 2018: DevSecOps - London Gathering
Michael Man
 
DevSecOps - London Gathering : June 2018
Michael Man
 
Continuous Security: From tins to containers - now what!
Michael Man
 
The mechanics behind how attackers exploit simple programming mistakes ...
Michael Man
 
Secret Management Journey - Here Be Dragons aka Secret Dragons
Michael Man
 
DevSecOps March 2018 - Extract
Michael Man
 
DevSecOps The Evolution of DevOps
Michael Man
 
Dynaminet -DevSecOps
Michael Man
 
Ad

Recently uploaded (20)

PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
The Future of Artificial Intelligence (AI)
Mukul
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Doc9.....................................
SofiaCollazos
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 

DSO-LG Oct 2019: Modern Software Delivery: Supply Chain Security Critical (Chris Wysopal)

  • 1. © 2019 VERACODE INC. Supply Chain Security for Modern Development C h r i s W y s o p a l C T O & c o - f o u n d e r V e r a c o d e O c t o b e r 2 3 , 2 0 1 9 D e v S e c O p s - L o n d o n G a t h e r i n g
  • 2. © 2019 VERACODE INC. Unites States Senate testimony. May 19, 1998 One of the 1st vulnerability researchers at the hacker think tank, L0pht in 90’s.
  • 3. © 2019 VERACODE INC. IMPROVE THE SECURITY OF YOUR PRODUCT BY BREAKING INTO IT SEPTEMBER 22, 1997
  • 6. © 2019 VERACODE INC. Impacts from Application Security Vulnerability How to Make Application Security a Competitive Advantage, IDG Market Survey, March 2018 Impacts from application security vulnerability
  • 9. © 2019 VERACODE INC. Evaluating the Security of Software Code Developer Training Assessment Target 1st Party Code Open Sourced Code Secure Coding How to Fix Scan Frequency Integrated Scanning Pre- / Post- Production
  • 10. © 2019 VERACODE INC. Security DevSecOps is becoming the norm.
  • 11. © 2019 VERACODE INC. DevSecOps Indicator: Percentage of Scans by Account Type SOURCE: Veracode, State of Software Security Volume 8, 2017-10-18 0% 100% 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 API Account User Account 64%
  • 12. © 2019 VERACODE INC. DevSecOps Indicator: Average Number of Scans Per Application SOURCE: Veracode, State of Software Security Volume 8, 2017-10-18 7.5 10.9 14.5 21.9 2015 2016 2017 2018
  • 13. © 2019 VERACODE INC. DevSecOps Effect
  • 14. © 2019 VERACODE INC. DevSecOps Improves Time To Remediate
  • 15. © 2019 VERACODE INC. Vulnerable Modules/Libraries Thousands of CVEs in open source packages Need to be continuous about library and package inspection and monitoring How fast can you determine if a new vulnerability in an open source package effects one of your apps? How fast can you rebuild and redeploy?
  • 16. © 2019 VERACODE INC. Strategy – Security Champions Eyes and ears of security Specialized training – Basic security concepts – Threat modeling – Grooming guidelines – Secure code review training – Security controls – CTF Exercises Escalate when necessary
  • 17. © 2019 VERACODE INC. Validating a Secure Development Process Code Security Developer Training Verified Standard Security Baseline Verified Team Secure Coding Culture Verified Continuous Business-Driven Maturity Application Security Maturity Assessmen t Target No Very High Flaws Assess 1st Party Code No Very High Flaws No High Flaws No Very High Flaws No High Flaws No Medium Flaws Assess 1st Party Code Assess 3rd Party Code Integrated Scanning Assess 1st Party Code Assess 3rd Party Code Security Champion Security Champion Secure Coding Training Veracode Verified
  • 18. © 2019 VERACODE INC. A Roadmap to Compliance
  • 19. © 2019 VERACODE INC. Roadmap to Self-Regulation Incentive-based Outcomes Prescriptive & Directive not not not Punishment-based Technology Point-in-time
  • 20. © 2019 VERACODE INC. But what about? • Threat modeling • Code review • Manual penetration tests Use information from multiple trusted sources to feed into one score. Like a credit rating!
  • 21. © 2019 VERACODE INC. A Software FICO? 1. Code Security 2. Developer Training 3. Assessment Target 4. Threat Modelling 5. Manual Penetration Testing 1. Payment History: 35% 2. Amounts Owed: 30% 3. Length of Credit History: 15% 4. New Credit: 10% 5. Types of Credit in Use: 10%
  • 22. © 2019 VERACODE INC. C h r i s W y s o p a l c w y s o p a l @ v e r a c o d e . c o m @ w e l d p o n d https://www.veracode.com/verified/directory

Editor's Notes

  • #3: This month it is 20 years since the L0pht testisfied in the Senate. This was 5 years into the change, asked hackers to give a take on government computer security. How did we get here? We made trouble. Trouble for vendors. Trouble for businesses. We didn’t do anything illegal but we made many people angry with us. Some would say today I am still making the CSO of Oracle, Mary Ann Davidson angry at me but that is a story for another day. Talked about the risk of targeting internet infrastructure. Said we could take the internet down in 30 minutes Testified with our hacker names due to not wanting to lose our day jobs. We didn’t think this through as their would be cameras. Jig was up next day at work.
  • #4: This is a picture of the L0pht crew in the L0pht hobbit reverse engineers Microsoft SMB, dinner with paul leech and steve lipner L0pht builds a lab environment to hack software Mudge and Bruce Schneier find NTLM protocol weak L0phtCrack can brute force NTLM hashes and network protocol Microsoft sets up PSRT and L0pht is one of the first to coordinate disclosure.
  • #5: Some people called us sell outs. The dream was to get paid to do what we loved doing. It didn’t work out quite as we had hoped. Got to work with some amazing people and projects. Besides l0pht members like Mudge and Kingpin I got to work with Alex Stamos, CISO of Yahoo and then Facebook, Window Snyder who was CISO of Mozilla. Got to help Microsoft build in security into their products in the early 2000’s. This included teaching Microsoft Threat Modeling.
  • #6: Founded with Christien Rioux, Dildog from L0pht and Cult of the Dead Cow. There is a book out now on the history of Cult of the Dead Cow called “Cult of the Dead Cow”. It has a chapter on L0pht, @stake, and Veracode. Founded Veracode to automate the processes we did at @stake. Veracode automates code review and manual pen testing. This makes it possible for developers to build secure software without needing a security team. I realized there were many, many developers writing a lot of software and there were not enough security experts to help them do it securely.
  • #8: Poor performance at the start of testing is true not only for in-house enterprise software, but also commercial off-the-shelf software. In fact, commercially developed software tends to do worse than internally coded applications upon first scan.
  • #14: When examining the Iceberg effect further, we found an unevenness in the size of security debt. Upon further analysis, it was clear the discrepancy in iceberg size was in relations to more frequent scanning. In fact, those that scanned an applications 300+ times a year had 5X less security debt and 3X higher fix rate.
  • #15: To better understand why this is, we looked at the impact of frequent scanning on time to remediate. Companies that scan roughly once a day saw a 72% reduction in MedianTTR. Knowing this as well as the fact that vulnerabilities not addressed soon after being found tend to be added to the security debt pile, led to the conclusion that companies scanning more frequently find and fix faster so that they are not adding to their security debt. But what about the debt they’ve already accumulated before the company had a DevSecOps program? We also saw evidence that having a dedicated program for addressing flaws in the development cycle, as well as creating a program for addressing old vulnerabilities helped melt the iceberg.
  • #17: CIA – Confidentiality, Integrity, Availability Mistrust the Client, Server-side controls, Default Deny Approach, white list vs black list Fail Securely