13
UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

Embed Size (px)

Citation preview

Page 1: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

UISGCON11

December 4 t h 2015

Svavar Ingi HermannssonCISSP, CISA, CISM

THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE

CYCLE

Page 2: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

$whoamiUseful StandardsBuilding blocksAdding more security

OVERVIEW

Page 3: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

Svavar has been specializing in IT security and software development for the last 18 years and has held various roles in programming and IT Security consulting with vast experience in penetration testing, vulnerabil ity assessment, code auditing, information security management - including ISO/IEC 27001, PCIDSS and PADSS. These roles include a manager posit ion at KPMG, as well as a CISO position at DH samskipti. Svavar has taught classes on computer security at the University of Iceland and the University of Reykjavik.

Svavar was the chairman of the information security focus group at the Icelandic Computer Society from 2007-2012. He has given talks at multiple events in Iceland, the UK, Germany and the US, including OWASP, BSides and Hacker Halted Europe.

Svavar holds various certifi cations, including CISSP, CISA and CISM.

WHO AM I?

Page 4: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

Why do we standardize?USEFUL STANDARDS

Page 5: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

USEFUL STANDARDS

Security Policy, Access Control, Backups, BCP (more)

ISO/IEC 27034 Information technology -- Security techniques -- Application security

Page 6: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

USEFUL STANDARDS

OpenSAMM (Softare Assurance Maturity Model – curtesy of OWASP)

Page 7: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

How to build a strong foundation?

BUILDING BLOCKS

Page 8: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

Expected implementation time for an SME 2 – 3 years

BUILDING BLOCKS

Page 9: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

Decide on a software development methodology Agile / SCRUM?

Formalize Digitize

Source Control System Pick one Decide how to use it Branching? Release Versioning

Connect the two

BUILDING BLOCKS

Page 10: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

Separate Development / Testing / Production Separation of duties

BUILDING BLOCKS

Page 11: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

Adding security to the SDLC Start differentiating between bugs and security bugs. Secure coding training Secure coding Practices Add a design + design review part (assistant from Security

Architects) Add Threat modeling (STRIDE) Code auditing with focus on IT security Security testing prior to release

ADDING MORE SECURITY

Page 12: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

CISO Security notifications Security portal / vulnerability management Incident response Bug bounties

ADDING MORE SECURITY

Page 13: UISGCON11 December 4 th 2015 Svavar Ingi Hermannsson CISSP, CISA, CISM THE JOURNEY TO A SECURE SOFTWARE DEVELOPMENT LIFE CYCLE

Any [email protected]

THANK YOU!

http://www.xkcd.com/