SlideShare a Scribd company logo
Secure Software DevelopmentSecure Software Development
Adoption StrategyAdoption Strategy
Narudom Roongsiriwong, CISSP
WhoAmI
●
Lazy Blogger
– Japan, Security, FOSS, Politics, Christian
– http://narudomr.blogspot.com
●
Information Security since 1995
●
Web Application Development since 1998
●
Head of IT Security and Solution Architecture, Kiatnakin Bank PCL (KKP)
●
Consultant for OWASP Thailand Chapter
●
Committee Member of Cloud Security Alliance (CSA), Thailand Chapter
●
Consulting Team Member for National e-Payment project
●
Contact: narudom.roongsiriwong@owasp.org
Background
●
June 2014 – Invitation from Kiatnakin Bank to discuss how to improve in-
house software security.
●
August 2014 – 5-Day Training for KK developers about concept,
requirement, design and implementation of the application security
●
December 2014 – Joining KK as VP, Head of IT Security, no team member.
●
January 2015 – First report on secure code review, Corporate Internet
Banking system
●
February 2015 – First release of KK secure coding guideline, adapted
from OWASP Testing Guide, PCI DSS and other best practices
●
March 2015 – KK SDLC regulation announcement, including secure
development life cycle
●
May 2015 – KK application log specification released
Application Security Training at KK, August 2014
What Are Application Security Risks?
Source: OWASP: Open Web Application Security Project
OWASP Top 10 2013 Risk
Source: OWASP: Open Web Application Security Project
Security controls cannot
deal with broken
business logic such as
A2, A4 and A7
Security controls cannot
deal with broken
business logic such as
A2, A4 and A7
Software weaknesses
reduction down to zero
is possible
Software weaknesses
reduction down to zero
is possible
Reduce Security Weaknesses vs
Increase Security Controls
Source: Patrick Thomas (twitter @coffeetocode)
Security as an Afterthought
Relative cost of security fixes, based on time of detection
Source: The National Institute of Standards and Technology (NIST)
Implementation Challenges
How Can We Start?
>>> Set the Goal
●
Which level of secure software development we
want to achieve?
– Minimal – OWASP Top 10 Proactive Controls
– Intermediate – Microsoft Security Development
Lifecycle
– Expert – OpenSAMM (OWASP’s Software Assurance
Maturity Model)
●
Is that level sufficient for our business?
●
How much our confidence to achieve that level?
Option#1: OWASP Top 10 Proactive Controls
C1: Verify for Security Early and Often
C2: Parameterize Queries
C3: Encode Data
C4: Validate All Inputs
C5: Implement Identity and
Authentication Controls
C6: Implement Appropriate Access
Controls
C7: Protect Data
C8: Implement Logging and Intrusion
Detection
C9: Leverage Security Frameworks and
Libraries
C10: Error and Exception Handling
Source: https://www.owasp.org/index.php/OWASP_Proactive_Controls
Option#2: Security Development Lifecycle
https://www.microsoft.com/en-us/sdl
Option#3: OWASP’s Software Assurance
Maturity Model
Source: OWASP’s Software Assurance Maturity Model (OpenSAMM)
>>> Build A-Team
●
Mentors
●
Software Security
Architects
●
Security Designers
●
Secure Code
Reviewers
●
Application
Penetration Testers
>>> Establish Processes
●
Embed security gates in the existing processes
– Project Kick Of
– Requirement Gathering
– Solution Design
– Architecture Review
– Incident Response
●
Create additional processes
– Code Review
– Application Penetration Testing
– Production System Security Configuration Review
>>> Set Up Baseline
●
Desired frameworks, for example
– Java: Spring + Hibernate
– .NET: MVC (Web), Entity
Framework
●
Development guidelines
– Secure software requirement
– Security patterns
– Standard application log
specification
>>> Introduce Design Concept
●
Need to Know
●
Least Privilege
●
Separation of Duties
●
Defense in Depth
●
Fail Secure / Fail Safe
●
Economy of
Mechanisms
●
Complete Mediation
●
Open Design
●
Least Common
Mechanisms
●
Psychological
Acceptability
●
Leveraging Existing
Components
Set Security Checkpoint
●
Business Requirement Sign Of
●
Solution Architect Review
●
Code Review
●
Application Penetration Testing
●
Change Advisory Board
>>> Share Knowledge
>>> Lead the Change
The Big
Opportunity
For Example: Using John P. Cotter’s
“Eight Steps to Transforming Your Organization”
Lessons Learned
●
Making developers know security is easier than
making security persons know software
development.
●
Keys of secure software development adoption
– Repeat design concepts regularly
– Use security patterns
– Set security checkpoints
– Guide developers to fix security bugs
– Get top management supports
Secure Software Development Adoption Strategy

More Related Content

What's hot (20)

PDF
Embedded System Security: Learning from Banking and Payment Industry
Narudom Roongsiriwong, CISSP
 
PDF
How Good Security Architecture Saves Corporate Workers from COVID-19
Narudom Roongsiriwong, CISSP
 
PDF
Secure Code Reviews
Marco Morana
 
PDF
Threat Intelligence Is Like Three Day Potty Training
Priyanka Aash
 
PDF
How To Avoid The Top Ten Software Security Flaws
Priyanka Aash
 
PDF
Making Threat Intelligence Actionable Final
Priyanka Aash
 
PPTX
OWASP Mobile TOP 10 2014
Islam Azeddine Mennouchi
 
PDF
Implementing An Automated Incident Response Architecture
Priyanka Aash
 
PPTX
Career In Information security
Anant Shrivastava
 
PDF
Achieving Defendable Architectures Via Threat Driven Methodologies
Priyanka Aash
 
PDF
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Priyanka Aash
 
PPT
Risky project Enterprise
Intaver Insititute
 
PDF
Understanding the “Why” in Enterprise Application Security Strategy
Priyanka Aash
 
PDF
Westjets Security Architecture Made Simple We Finally Got It Right
Priyanka Aash
 
PPTX
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
AlienVault
 
PDF
OWASP Top 10 for Mobile
Appvigil - Mobile App Security Scanner
 
PDF
Threat Detection using Analytics & Machine Learning
Priyanka Aash
 
PPTX
What is Penetration Testing?
btpsec
 
PPT
3.Secure Design Principles And Process
phanleson
 
PDF
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
All Things Open
 
Embedded System Security: Learning from Banking and Payment Industry
Narudom Roongsiriwong, CISSP
 
How Good Security Architecture Saves Corporate Workers from COVID-19
Narudom Roongsiriwong, CISSP
 
Secure Code Reviews
Marco Morana
 
Threat Intelligence Is Like Three Day Potty Training
Priyanka Aash
 
How To Avoid The Top Ten Software Security Flaws
Priyanka Aash
 
Making Threat Intelligence Actionable Final
Priyanka Aash
 
OWASP Mobile TOP 10 2014
Islam Azeddine Mennouchi
 
Implementing An Automated Incident Response Architecture
Priyanka Aash
 
Career In Information security
Anant Shrivastava
 
Achieving Defendable Architectures Via Threat Driven Methodologies
Priyanka Aash
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Priyanka Aash
 
Risky project Enterprise
Intaver Insititute
 
Understanding the “Why” in Enterprise Application Security Strategy
Priyanka Aash
 
Westjets Security Architecture Made Simple We Finally Got It Right
Priyanka Aash
 
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
AlienVault
 
Threat Detection using Analytics & Machine Learning
Priyanka Aash
 
What is Penetration Testing?
btpsec
 
3.Secure Design Principles And Process
phanleson
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
All Things Open
 

Viewers also liked (20)

PDF
Secure PHP Coding
Narudom Roongsiriwong, CISSP
 
PDF
AnyID: Security Point of View
Narudom Roongsiriwong, CISSP
 
ODP
Unlock Security Insight from Machine Data
Narudom Roongsiriwong, CISSP
 
PPTX
Payment Card System Overview
Narudom Roongsiriwong, CISSP
 
PPT
Risk Management in Project Management
Narudom Roongsiriwong, CISSP
 
PDF
AnyID and Privacy
Narudom Roongsiriwong, CISSP
 
PPTX
Secure Software Development Life Cycle
Maurice Dawson
 
PDF
Database Firewall with Snort
Narudom Roongsiriwong, CISSP
 
PPTX
Database security
Software Engineering
 
PPTX
Intrusion Detection System(IDS)
shraddha_b
 
PPTX
Business continuity & disaster recovery planning (BCP & DRP)
Narudom Roongsiriwong, CISSP
 
PPT
Database Security
alraee
 
PDF
RevBoss Overview -- Sales Development Software & Services
Eric Boggs
 
XLSX
Stock Analysis
pmf153
 
PPTX
Hacking Your Way to Better Security - PHP South Africa 2016
Colin O'Dell
 
PDF
AppSec Awareness: A Blueprint for Security Culture Change
Priyanka Aash
 
PDF
Secure Software Development – COBIT5 Perspective
SPIN Chennai
 
PDF
A5-Security misconfiguration-OWASP 2013
Sorina Chirilă
 
PDF
Getting Started With SlideShare
SlideShare
 
PPTX
OWASP Top 10 Proactive Controls
Katy Anton
 
Secure PHP Coding
Narudom Roongsiriwong, CISSP
 
AnyID: Security Point of View
Narudom Roongsiriwong, CISSP
 
Unlock Security Insight from Machine Data
Narudom Roongsiriwong, CISSP
 
Payment Card System Overview
Narudom Roongsiriwong, CISSP
 
Risk Management in Project Management
Narudom Roongsiriwong, CISSP
 
AnyID and Privacy
Narudom Roongsiriwong, CISSP
 
Secure Software Development Life Cycle
Maurice Dawson
 
Database Firewall with Snort
Narudom Roongsiriwong, CISSP
 
Database security
Software Engineering
 
Intrusion Detection System(IDS)
shraddha_b
 
Business continuity & disaster recovery planning (BCP & DRP)
Narudom Roongsiriwong, CISSP
 
Database Security
alraee
 
RevBoss Overview -- Sales Development Software & Services
Eric Boggs
 
Stock Analysis
pmf153
 
Hacking Your Way to Better Security - PHP South Africa 2016
Colin O'Dell
 
AppSec Awareness: A Blueprint for Security Culture Change
Priyanka Aash
 
Secure Software Development – COBIT5 Perspective
SPIN Chennai
 
A5-Security misconfiguration-OWASP 2013
Sorina Chirilă
 
Getting Started With SlideShare
SlideShare
 
OWASP Top 10 Proactive Controls
Katy Anton
 
Ad

Similar to Secure Software Development Adoption Strategy (20)

PDF
Software Security Initiative And Capability Maturity Models
Marco Morana
 
PDF
Getting Executive Support for a Software Security Program
Cigital
 
PDF
OWASP Secure Coding Quick Reference Guide
Aryan G
 
PPT
六合彩香港-六合彩
baoyin
 
KEY
Application Security Done Right
pvanwoud
 
PPTX
How to develop an AppSec culture in your project
99X Technology
 
PPTX
Building an AppSec Culture
Nirosh Jayaratnam
 
PDF
OWASP Secure Coding Practices - Quick Reference Guide
Ludovic Petit
 
PPTX
Web Application Security Strategy
Network Intelligence India
 
PPT
Appsec2013 presentation-dickson final-with_all_final_edits
drewz lin
 
PPT
3830100.ppt
azida3
 
PDF
Secure coding guidelines
Zakaria SMAHI
 
PPT
OWASP - Building Secure Web Applications
alexbe
 
PPTX
Aligning Application Security to Compliance
Security Innovation
 
PDF
Security in the Software Development Life Cycle (SDLC)
Frances Coronel
 
PPT
OWASP: Building Secure Web Apps
mlogvinov
 
PPT
Integration into the Secure SDLC Process.ppt
Imam Halim Mursyidin
 
PDF
Matteo meucci Software Security - Napoli 10112016
Minded Security
 
PDF
Application Security on a Dime: A Practical Guide to Using Functional Open So...
POSSCON
 
PPT
Software Security Engineering
Marco Morana
 
Software Security Initiative And Capability Maturity Models
Marco Morana
 
Getting Executive Support for a Software Security Program
Cigital
 
OWASP Secure Coding Quick Reference Guide
Aryan G
 
六合彩香港-六合彩
baoyin
 
Application Security Done Right
pvanwoud
 
How to develop an AppSec culture in your project
99X Technology
 
Building an AppSec Culture
Nirosh Jayaratnam
 
OWASP Secure Coding Practices - Quick Reference Guide
Ludovic Petit
 
Web Application Security Strategy
Network Intelligence India
 
Appsec2013 presentation-dickson final-with_all_final_edits
drewz lin
 
3830100.ppt
azida3
 
Secure coding guidelines
Zakaria SMAHI
 
OWASP - Building Secure Web Applications
alexbe
 
Aligning Application Security to Compliance
Security Innovation
 
Security in the Software Development Life Cycle (SDLC)
Frances Coronel
 
OWASP: Building Secure Web Apps
mlogvinov
 
Integration into the Secure SDLC Process.ppt
Imam Halim Mursyidin
 
Matteo meucci Software Security - Napoli 10112016
Minded Security
 
Application Security on a Dime: A Practical Guide to Using Functional Open So...
POSSCON
 
Software Security Engineering
Marco Morana
 
Ad

More from Narudom Roongsiriwong, CISSP (11)

PDF
Biometric Authentication.pdf
Narudom Roongsiriwong, CISSP
 
PDF
Security Shift Leftmost - Secure Architecture.pdf
Narudom Roongsiriwong, CISSP
 
PDF
Secure Design: Threat Modeling
Narudom Roongsiriwong, CISSP
 
PDF
Security Patterns for Software Development
Narudom Roongsiriwong, CISSP
 
PDF
Secure Software Design for Data Privacy
Narudom Roongsiriwong, CISSP
 
PDF
Blockchain and Cryptocurrency for Dummies
Narudom Roongsiriwong, CISSP
 
PPTX
National Digital ID Platform Technical Forum
Narudom Roongsiriwong, CISSP
 
PDF
Secure Your Encryption with HSM
Narudom Roongsiriwong, CISSP
 
PDF
CarbonCredit-V4
Narudom Roongsiriwong, CISSP
 
Biometric Authentication.pdf
Narudom Roongsiriwong, CISSP
 
Security Shift Leftmost - Secure Architecture.pdf
Narudom Roongsiriwong, CISSP
 
Secure Design: Threat Modeling
Narudom Roongsiriwong, CISSP
 
Security Patterns for Software Development
Narudom Roongsiriwong, CISSP
 
Secure Software Design for Data Privacy
Narudom Roongsiriwong, CISSP
 
Blockchain and Cryptocurrency for Dummies
Narudom Roongsiriwong, CISSP
 
National Digital ID Platform Technical Forum
Narudom Roongsiriwong, CISSP
 
Secure Your Encryption with HSM
Narudom Roongsiriwong, CISSP
 

Recently uploaded (20)

PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
July Patch Tuesday
Ivanti
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 

Secure Software Development Adoption Strategy

  • 1. Secure Software DevelopmentSecure Software Development Adoption StrategyAdoption Strategy Narudom Roongsiriwong, CISSP
  • 2. WhoAmI ● Lazy Blogger – Japan, Security, FOSS, Politics, Christian – http://narudomr.blogspot.com ● Information Security since 1995 ● Web Application Development since 1998 ● Head of IT Security and Solution Architecture, Kiatnakin Bank PCL (KKP) ● Consultant for OWASP Thailand Chapter ● Committee Member of Cloud Security Alliance (CSA), Thailand Chapter ● Consulting Team Member for National e-Payment project ● Contact: [email protected]
  • 3. Background ● June 2014 – Invitation from Kiatnakin Bank to discuss how to improve in- house software security. ● August 2014 – 5-Day Training for KK developers about concept, requirement, design and implementation of the application security ● December 2014 – Joining KK as VP, Head of IT Security, no team member. ● January 2015 – First report on secure code review, Corporate Internet Banking system ● February 2015 – First release of KK secure coding guideline, adapted from OWASP Testing Guide, PCI DSS and other best practices ● March 2015 – KK SDLC regulation announcement, including secure development life cycle ● May 2015 – KK application log specification released
  • 4. Application Security Training at KK, August 2014
  • 5. What Are Application Security Risks? Source: OWASP: Open Web Application Security Project
  • 6. OWASP Top 10 2013 Risk Source: OWASP: Open Web Application Security Project
  • 7. Security controls cannot deal with broken business logic such as A2, A4 and A7 Security controls cannot deal with broken business logic such as A2, A4 and A7 Software weaknesses reduction down to zero is possible Software weaknesses reduction down to zero is possible Reduce Security Weaknesses vs Increase Security Controls
  • 8. Source: Patrick Thomas (twitter @coffeetocode)
  • 9. Security as an Afterthought Relative cost of security fixes, based on time of detection Source: The National Institute of Standards and Technology (NIST) Implementation Challenges
  • 10. How Can We Start?
  • 11. >>> Set the Goal ● Which level of secure software development we want to achieve? – Minimal – OWASP Top 10 Proactive Controls – Intermediate – Microsoft Security Development Lifecycle – Expert – OpenSAMM (OWASP’s Software Assurance Maturity Model) ● Is that level sufficient for our business? ● How much our confidence to achieve that level?
  • 12. Option#1: OWASP Top 10 Proactive Controls C1: Verify for Security Early and Often C2: Parameterize Queries C3: Encode Data C4: Validate All Inputs C5: Implement Identity and Authentication Controls C6: Implement Appropriate Access Controls C7: Protect Data C8: Implement Logging and Intrusion Detection C9: Leverage Security Frameworks and Libraries C10: Error and Exception Handling Source: https://www.owasp.org/index.php/OWASP_Proactive_Controls
  • 13. Option#2: Security Development Lifecycle https://www.microsoft.com/en-us/sdl
  • 14. Option#3: OWASP’s Software Assurance Maturity Model Source: OWASP’s Software Assurance Maturity Model (OpenSAMM)
  • 15. >>> Build A-Team ● Mentors ● Software Security Architects ● Security Designers ● Secure Code Reviewers ● Application Penetration Testers
  • 16. >>> Establish Processes ● Embed security gates in the existing processes – Project Kick Of – Requirement Gathering – Solution Design – Architecture Review – Incident Response ● Create additional processes – Code Review – Application Penetration Testing – Production System Security Configuration Review
  • 17. >>> Set Up Baseline ● Desired frameworks, for example – Java: Spring + Hibernate – .NET: MVC (Web), Entity Framework ● Development guidelines – Secure software requirement – Security patterns – Standard application log specification
  • 18. >>> Introduce Design Concept ● Need to Know ● Least Privilege ● Separation of Duties ● Defense in Depth ● Fail Secure / Fail Safe ● Economy of Mechanisms ● Complete Mediation ● Open Design ● Least Common Mechanisms ● Psychological Acceptability ● Leveraging Existing Components
  • 19. Set Security Checkpoint ● Business Requirement Sign Of ● Solution Architect Review ● Code Review ● Application Penetration Testing ● Change Advisory Board
  • 21. >>> Lead the Change The Big Opportunity For Example: Using John P. Cotter’s “Eight Steps to Transforming Your Organization”
  • 22. Lessons Learned ● Making developers know security is easier than making security persons know software development. ● Keys of secure software development adoption – Repeat design concepts regularly – Use security patterns – Set security checkpoints – Guide developers to fix security bugs – Get top management supports