Embedding Security in the SDLC
Jerod Brennen
Founder & Principal Consultant, Brennen Consulting
Software security is
a positive indicator
of software quality.
Step 1: Introduce automated software security scanning
Train developers on the OWASP Top 10 Web Application Security Risks
● OWASP Juice Shop
Static Application Security Testing (SAST)
● SonarQube Community Edition
● Codacy ($180/yr)
Dynamic Application Security Testing (DAST)
● OWASP ZAP
● Burp Suite ($399/yr)
Step 2: Introduce OWASP proactive controls into the SDLC
C1: Define Security Requirements
C2: Leverage Security Frameworks and Libraries
C3: Secure Database Access
C4: Encode and Escape Data
C5: Validate All Inputs
C6: Implement Digital Identity
C7: Enforce Access Controls
C8: Protect Data Everywhere
C9: Implement Security Logging and Monitoring
C10: Handle All Errors and Exceptions
Step 3: Implement the OWASP Application Security
Verification Standard (ASVS)
Level 1 - First steps, automated, or whole of portfolio view
Level 2 - Most applications
Level 3 - High value, high assurance, or high safety
Map to data classification requirements and business criticality
Validate compliance using the OWASP Web Security Testing Guide
Step 4: Implement the OWASP Software Assurance Maturity
Model (SAMM)
Each business function maps to multiple practices
Perform a maturity self-assessment
Train stakeholders on the SAMM model
Governance Design Implementation Verification Operations
Reiterating the value
Step 1 provides immediate visibility to higher risk vulnerabilities that could be present
in your applications today.
Step 2 allows you to shift from reactive scanning to proactive secure coding.
Step 3 ensures that you’re managing software security activity (people, processes, and
technologies) based on risk.
Step 4 enables you to transition to a maturity-based approach to securing the SDLC,
optimizing people, time, and resource allocation.
Resources
https://owasp.org/www-project-juice-shop/
https://www.sonarqube.org/
https://www.codacy.com/
https://www.zaproxy.org/
https://portswigger.net/
https://owasp.org/www-project-proactive-controls/
https://owasp.org/www-project-application-security-verification-standard/
https://owasp.org/www-project-web-security-testing-guide/
https://owasp.org/www-project-samm/
Training Resources
https://www.linkedin.com/learning/instructors/jerod-brennen
Jerod Brennen
https://www.linkedin.com/in/jerodbrennen
jerod@brennenconsulting.com
Thanks much!

More Related Content

PDF
Owasp masvs spain 17
PPTX
Дмитро Терещенко, "How to secure your application with Secure SDLC"
PDF
How the US Navy Approaches DevSecOps with Raise 2.0
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
PPTX
DevSecOps Story with added security controls
PDF
Adopting the DoD Software Factory Model: Insights & How Tos
PPTX
Don't Deploy Into the Dark: DORA Metrics for your K8s GitOps Deployments
PPTX
"Building Trust: Strengthening Your Software Supply Chain Security", Serhii V...
Owasp masvs spain 17
Дмитро Терещенко, "How to secure your application with Secure SDLC"
How the US Navy Approaches DevSecOps with Raise 2.0
AWS live hack: Atlassian + Snyk OSS on AWS
DevSecOps Story with added security controls
Adopting the DoD Software Factory Model: Insights & How Tos
Don't Deploy Into the Dark: DORA Metrics for your K8s GitOps Deployments
"Building Trust: Strengthening Your Software Supply Chain Security", Serhii V...

Similar to Embedding Security in the SDLC (20)

PPTX
Secure SDLC in mobile software development.
PPT
OWASP - Building Secure Web Applications
PDF
DevSecOps
PDF
How to Secure Your Kubernetes Software Supply Chain at Scale
PPTX
ABN AMRO DevSecOps Journey
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
PDF
Brochure Swascan Overview
PDF
Swascan
PDF
Introducing a Security Feedback Loop to your CI Pipelines
PDF
🚨 𝐀𝐫𝐞 𝐘𝐨𝐮 𝐑𝐞𝐚𝐝𝐲 𝐭𝐨 𝐀𝐜𝐞 𝐘𝐨𝐮𝐫 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰? 🚨
PDF
Top 20 DevSecOps Interview Questions.pdf
PDF
𝐓𝐨𝐩 𝟐𝟎 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
PDF
Top 20 DevsecOps Interview Questions.pdf
PDF
Top 20 DevSecOps Interview Questions.pdf
PDF
Top 20 DevSecOps Interview Questions and Answers
PDF
Are You Ready to Ace Your DevSecOps Interview?
PDF
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
PPTX
IBM Relay 2015: Securing the Future
 
PDF
Better Security Testing: Using the Cloud and Continuous Delivery
PPTX
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
Secure SDLC in mobile software development.
OWASP - Building Secure Web Applications
DevSecOps
How to Secure Your Kubernetes Software Supply Chain at Scale
ABN AMRO DevSecOps Journey
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Brochure Swascan Overview
Swascan
Introducing a Security Feedback Loop to your CI Pipelines
🚨 𝐀𝐫𝐞 𝐘𝐨𝐮 𝐑𝐞𝐚𝐝𝐲 𝐭𝐨 𝐀𝐜𝐞 𝐘𝐨𝐮𝐫 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰? 🚨
Top 20 DevSecOps Interview Questions.pdf
𝐓𝐨𝐩 𝟐𝟎 𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
Top 20 DevsecOps Interview Questions.pdf
Top 20 DevSecOps Interview Questions.pdf
Top 20 DevSecOps Interview Questions and Answers
Are You Ready to Ace Your DevSecOps Interview?
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
IBM Relay 2015: Securing the Future
 
Better Security Testing: Using the Cloud and Continuous Delivery
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
Ad

More from Jerod Brennen (15)

PPTX
The Path to IAM Maturity
PDF
Hacking identity: A Pen Tester's Guide to IAM
PDF
Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF)
PDF
Automating Security Testing with the OWTF
PPTX
Assess all the things
PDF
What you need to know about OSINT
PDF
Running Your Apps Through the "Gauntlt"
PPTX
Common Sense Security Framework
PPTX
Please, Please, PLEASE Defend Your Mobile Apps!
PPTX
Integrating security into the application development process
PDF
Bridging the Social Media Implementation/Audit Gap
PDF
Attacking and Defending Mobile Applications
PDF
Identity and Access Management 101
PDF
DDoS Attack Preparation and Mitigation
PDF
Information Security Management 101
The Path to IAM Maturity
Hacking identity: A Pen Tester's Guide to IAM
Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF)
Automating Security Testing with the OWTF
Assess all the things
What you need to know about OSINT
Running Your Apps Through the "Gauntlt"
Common Sense Security Framework
Please, Please, PLEASE Defend Your Mobile Apps!
Integrating security into the application development process
Bridging the Social Media Implementation/Audit Gap
Attacking and Defending Mobile Applications
Identity and Access Management 101
DDoS Attack Preparation and Mitigation
Information Security Management 101
Ad

Recently uploaded (20)

PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Architecture types and enterprise applications.pdf
PDF
Five Habits of High-Impact Board Members
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
The various Industrial Revolutions .pptx
PPTX
Microsoft Excel 365/2024 Beginner's training
PPTX
Modernising the Digital Integration Hub
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPT
What is a Computer? Input Devices /output devices
PDF
STKI Israel Market Study 2025 version august
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPT
Geologic Time for studying geology for geologist
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
sbt 2.0: go big (Scala Days 2025 edition)
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Architecture types and enterprise applications.pdf
Five Habits of High-Impact Board Members
Zenith AI: Advanced Artificial Intelligence
The various Industrial Revolutions .pptx
Microsoft Excel 365/2024 Beginner's training
Modernising the Digital Integration Hub
Module 1.ppt Iot fundamentals and Architecture
Build Your First AI Agent with UiPath.pptx
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
What is a Computer? Input Devices /output devices
STKI Israel Market Study 2025 version august
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Enhancing plagiarism detection using data pre-processing and machine learning...
NewMind AI Weekly Chronicles – August ’25 Week III
Geologic Time for studying geology for geologist
OpenACC and Open Hackathons Monthly Highlights July 2025
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx

Embedding Security in the SDLC