SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Magic Numbers An In-Depth Guide to the 5 Key Performance Indicators for Software Security Assurance       v1.3.2 Rafal Los – HP Security Evangelist @Wh1t3Rabbit Rafal @HP.com … cell: +1 (404) 606-6056
Proceedings 2 Background Essential KPIs Applications Practical 1 2 3 4 Understand the need for business-level intelligence Identify essential KPIs, their definitions, components Applying the 5 Essential KPIs to Enterprise Programs A practical example of real-life application of KPIs
Background Metrics, KPIs, and Information Security 3
When I first came here, this was all swamp. Everyone said I was daft to build a castle on a swamp, but I built in all the same, just to show them.It sank into the swamp.So I built a second one. That sank into the swamp. So I built a third. That burned down, fell over, then sank into the swamp.But the fourth one stayed up. And that's what you're going to get, Lad, the strongest castle in all of England.  Monty Python & the Holy Grail (King of Swamp Castle)
Yes.Software Security Assurance programs have been known to fail in spite of their success…
Security Metrics Primer 6 INFORMATION SECURITY HAS HAD A ROUGH RELATIONSHIP WITH METRICS Three core issues with metrics in security: Very little actuarial data to support initiatives Virtually no data supporting likelihood of being successfully attacked Incorrect, hasty use of metrics as intelligence Vulnerabilities being used as risks Metrics – math without context “It hasn’t happened to me” being used as a metric Many victims don’t know, or won’t admit it
7 Information Security hasn’t capitalized on available metrics … can KPIs save the day?
KPI Primer 8 A key performance indicator (KPI) is a measure of performance, commonly used to help an organization define and evaluate how successful it is, typically in terms of making progress towards its long-term organizational goals.
KPI Primer 9 A key performance indicator (KPI) is a measure of performance, commonly used to help an organization define and evaluate how successful it is, typically in terms of making progress towards its long-term organizational goals.
Business vs. IT Goals IT Security Goals [App Sec] Business Goals What are Business Goals? Test 100% web applications Zero vulnerabilities in production web applications SDLC-integrated security processes Continual environment scanning for new vulnerabilities Developer education & training Automate testing & compliance 10
Organizations act on risk.Risk is bad, but in "shades of gray".Application vulnerabilities contribute to IT riskIT risk is a factor of overall organizational riskOrganizational goal: Reduce IT risk to acceptable level. Mindset reset 11
Tough Questions 12 Will it be possible to perform an analysis of 100% of enterprise applications? Will a zero vulnerability metric be reachable, practical or even desirable? Is vulnerability reduction the same as risk reduction?
Enterprise Application Security Program Challenges 13 Challenges Get funded  Justify required resources Find vulnerabilities  Bugs in business critical apps Removing defects  Decrease risks with a budget Proving success How do you prove success? Resources Security vulnerability metrics Application registries Defect tracking systems Data from tools, human testing
Essential KPIs Proving Success with Advanced Metrics 14
The 5 Key Performance Indicators (KPIs) 15 WRT– Weighted Risk Trend DRW– Defect Remediation Window RDR– Rate of Defect Recurrence SCM– Specific Coverage Metric SQR– Security to Quality defect Ratio KPIs provide business-level context to security-generated data KPIs answer the “so what?” question Each additional KPI indicates a step forward in program maturity None of these KPIs draw strictly from security data
KPI #1 – Weighted Risk Trend 16 Maturity Rank: 1 A business-based representation of risk from vetted application security defects over a specified time-period, or repeated iterations of application development. Formula: [(Multipliercritical x defects) + (Multiplierhigh x defects) + (Multipliermedium x defects) + (Multiplierlow x defects)] x *Criticalitybusiness Requirements Web application registry with business-level criticality assigned *Pull business criticality rating from DR documents Vetted web applications security defects by criticality level Mathematic plot capability
KPI #2 – Defect Remediation Window 17 Maturity Rank: 2 The length of time from when a vetted application security defect is identified until it is verified closed. Requirements Defect tracking system, tracking application security vulnerabilities in development, testing, and production environments Self-service testing, bug tracking, and reporting capabilities Cooperative security enablement thru development, QA, OPS teams
KPI #3 – Rate of Defect Recurrence 18 Maturity Rank: 3 The rate, over time, at which previously closed application security defects are re-introduced into a given application, organization, or other logical unit. Requirements Advanced defect tracking system Advanced application security testing capabilities Capabilities to identify similar or like defects across an application or logical trackable unit
KPI #4 – Specific Coverage Metric 19 Maturity Rank: 4 The flow-based or component-based coverage of total functionality that application security testing has achieved. Total functionality = known functionality + discovered functionality*  Requirements Method for measuring total application surface (UI, API, code-level coverage methods) plus *advanced application discovery tools Advanced security testing capabilities using flow-based, data-driven methodology for completeness Integration with Quality Assurance for functional specification coverage
KPI #5 – Security to Quality Defect Ratio 20 Maturity Rank: 4 The ratio of security defects to the total number of software quality defects being generated (functional + performance + security). Formula:            Ds = Total Security defects; Dt = Total Overall Quality defects Ds Dt Requirements Mature defect reporting system (tracking combined quality defects) ,[object Object]
Performance as a quality defect
Functional (+related) as a quality defectTight cooperation of Information Security & Quality Assurance
KPI Facts KPI: WRT KPI: DRW KPI: RDR Metric is best graphed Risk trend will decrease over time similar to 1/x Each defect criticality must have a non-linear factor assigned Critical = 10 High = 5 Medium = 2 Low = 1 Application business criticality must be rigidly defined Business critical Critical Important… #1 most critical KPI DRW will be potentially very large at first Critical to shrink this metric as quickly as possible Can be used to target education where needed Important to note type of defect remediated (complex defects take longer to fix) Reappearing defects measure internal development confusion Recurring defects should prompt a systemic investigation into root-cause Critical for identifying poorly-run development organizations 21
KPI Facts KPI: SCM KPI: SQR Most difficult KPI to achieve Most organizations cannot identify even known attack surface coverage Flow-driven & data-driven methodology is required to fully test known attack surface Exploratory testing required to discover “unknown functionality” Final step in organizational maturity with respect to security testing Demonstrates security adoption as a component of overall software quality 22
Applications Applying the KPIs 23
Applying KPIs to Web ApplicationSecurity Programs What You Want What You Have
Failures of Common Metrics Common Metrics Failure Mode(s) Options? Number of vulnerabilities found Number of pages scanned/tested Critical vulnerabilities found Critical vulnerabilities fixed So what? No context! So what? Do “pages” matter? Business-critical? Or IT-critical? Or…? Business-critical? Or IT-critical? Or…? Business Context. KPIsprovide business context to standard metrics reporting practices. 25
When Metrics Aren’t Enough KPIsAnswer Objective Combine metrics with business-level context Provide direct feedback to the business to target ongoing effort Track program effectiveness including education, corporate remediation strategies Consolidate technical metrics into business-level dashboards Successfully break the “security silo” ,[object Object]
Remove subjectivity of metrics by providing business context
Bring IT Security into higher-level business discussion
Unify “testing” methodologies26
Practical Real-life KPI use-case 27
Current Situation ,[object Object]
Security testing some web applications pre-production
Difficult to halt critical applications

Weitere ähnliche Inhalte

Was ist angesagt?

From Curriculum to Career – Plotting the course with SFIA Susan Bailey
From Curriculum to Career – Plotting the course with SFIA Susan BaileyFrom Curriculum to Career – Plotting the course with SFIA Susan Bailey
From Curriculum to Career – Plotting the course with SFIA Susan Bailey
SFIA User Forum
 
Stephen Cannoo Business Analyst skills matrix v2.0
Stephen Cannoo Business Analyst skills matrix v2.0Stephen Cannoo Business Analyst skills matrix v2.0
Stephen Cannoo Business Analyst skills matrix v2.0
Stephen Cannoo
 
Recruit and retain IT professionals Gary Fay
Recruit and retain IT professionals Gary FayRecruit and retain IT professionals Gary Fay
Recruit and retain IT professionals Gary Fay
SFIA User Forum
 
Introducing agilealm
Introducing agilealmIntroducing agilealm
Introducing agilealm
Matt Holitza
 

Was ist angesagt? (20)

Office Add-ins community call-May 2019
Office Add-ins community call-May 2019Office Add-ins community call-May 2019
Office Add-ins community call-May 2019
 
Proven Strategies to Fuel Your Design Team
Proven Strategies to Fuel Your Design TeamProven Strategies to Fuel Your Design Team
Proven Strategies to Fuel Your Design Team
 
Project Management by Shauna Cox
Project Management by Shauna CoxProject Management by Shauna Cox
Project Management by Shauna Cox
 
Information Capabilities Framework (ICF)
Information Capabilities Framework (ICF)Information Capabilities Framework (ICF)
Information Capabilities Framework (ICF)
 
.Solvas ALLL+ information
.Solvas ALLL+ information.Solvas ALLL+ information
.Solvas ALLL+ information
 
From Curriculum to Career – Plotting the course with SFIA Susan Bailey
From Curriculum to Career – Plotting the course with SFIA Susan BaileyFrom Curriculum to Career – Plotting the course with SFIA Susan Bailey
From Curriculum to Career – Plotting the course with SFIA Susan Bailey
 
Siddhartha-Resume
Siddhartha-ResumeSiddhartha-Resume
Siddhartha-Resume
 
Stephen Cannoo Business Analyst skills matrix v2.0
Stephen Cannoo Business Analyst skills matrix v2.0Stephen Cannoo Business Analyst skills matrix v2.0
Stephen Cannoo Business Analyst skills matrix v2.0
 
Unboxing ASP.NET Core
Unboxing ASP.NET CoreUnboxing ASP.NET Core
Unboxing ASP.NET Core
 
SFIAplus V3
SFIAplus V3SFIAplus V3
SFIAplus V3
 
Accenture Supply Chain Academy
Accenture Supply Chain AcademyAccenture Supply Chain Academy
Accenture Supply Chain Academy
 
REFA methodology
REFA methodologyREFA methodology
REFA methodology
 
Determine Your SAP Hybris Cloud for Customer Tenant Strategy
Determine Your SAP Hybris Cloud for Customer Tenant StrategyDetermine Your SAP Hybris Cloud for Customer Tenant Strategy
Determine Your SAP Hybris Cloud for Customer Tenant Strategy
 
Presentation: "Agile methodologies for Project Management - SCRUM" by Varty K...
Presentation: "Agile methodologies for Project Management - SCRUM" by Varty K...Presentation: "Agile methodologies for Project Management - SCRUM" by Varty K...
Presentation: "Agile methodologies for Project Management - SCRUM" by Varty K...
 
Solution Architecture tips & tricks by Roman Shramkov
Solution Architecture tips & tricks by Roman ShramkovSolution Architecture tips & tricks by Roman Shramkov
Solution Architecture tips & tricks by Roman Shramkov
 
Recruit and retain IT professionals Gary Fay
Recruit and retain IT professionals Gary FayRecruit and retain IT professionals Gary Fay
Recruit and retain IT professionals Gary Fay
 
JBoss Application Server - Curso JBoss JB366
JBoss Application Server - Curso JBoss JB366JBoss Application Server - Curso JBoss JB366
JBoss Application Server - Curso JBoss JB366
 
Hans Eckman: 7 Agile and DevOps Insights I Wish I Knew Earlier
Hans Eckman: 7 Agile and DevOps Insights I Wish I Knew EarlierHans Eckman: 7 Agile and DevOps Insights I Wish I Knew Earlier
Hans Eckman: 7 Agile and DevOps Insights I Wish I Knew Earlier
 
TSU CMM CMMI
TSU CMM CMMITSU CMM CMMI
TSU CMM CMMI
 
Introducing agilealm
Introducing agilealmIntroducing agilealm
Introducing agilealm
 

Andere mochten auch (6)

Energy conference 2015 04022015 3
Energy conference 2015 04022015 3Energy conference 2015 04022015 3
Energy conference 2015 04022015 3
 
Kpi for qa
Kpi for qaKpi for qa
Kpi for qa
 
Quality Metrics
Quality MetricsQuality Metrics
Quality Metrics
 
10 principles for designing quality control scorecard and KPIs
10 principles for designing quality control scorecard and KPIs10 principles for designing quality control scorecard and KPIs
10 principles for designing quality control scorecard and KPIs
 
KRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & ITKRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & IT
 
Quality Process KPIs Metrics
Quality Process KPIs MetricsQuality Process KPIs Metrics
Quality Process KPIs Metrics
 

Ähnlich wie Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2

Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
Tyler Shields
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
Ryan Faircloth
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 

Ähnlich wie Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2 (20)

Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t Ignore
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
 
CAST HIGHLIGHT - Overview & Demos
CAST HIGHLIGHT - Overview & DemosCAST HIGHLIGHT - Overview & Demos
CAST HIGHLIGHT - Overview & Demos
 
ISACA 2016 Application Security RGJ
ISACA 2016 Application Security RGJISACA 2016 Application Security RGJ
ISACA 2016 Application Security RGJ
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous Delivery
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 

Mehr von Rafal Los

Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...
Rafal Los
 

Mehr von Rafal Los (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfThe 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
 
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityIrrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
 
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
 
Lies, Fables and Security Metrics
Lies, Fables and Security MetricsLies, Fables and Security Metrics
Lies, Fables and Security Metrics
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning wars
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
 
Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterprise
 
Making Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessMaking Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in Business
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with Automation
 
Ultimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelUltimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI Model
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2

  • 1. Magic Numbers An In-Depth Guide to the 5 Key Performance Indicators for Software Security Assurance v1.3.2 Rafal Los – HP Security Evangelist @Wh1t3Rabbit Rafal @HP.com … cell: +1 (404) 606-6056
  • 2. Proceedings 2 Background Essential KPIs Applications Practical 1 2 3 4 Understand the need for business-level intelligence Identify essential KPIs, their definitions, components Applying the 5 Essential KPIs to Enterprise Programs A practical example of real-life application of KPIs
  • 3. Background Metrics, KPIs, and Information Security 3
  • 4. When I first came here, this was all swamp. Everyone said I was daft to build a castle on a swamp, but I built in all the same, just to show them.It sank into the swamp.So I built a second one. That sank into the swamp. So I built a third. That burned down, fell over, then sank into the swamp.But the fourth one stayed up. And that's what you're going to get, Lad, the strongest castle in all of England.  Monty Python & the Holy Grail (King of Swamp Castle)
  • 5. Yes.Software Security Assurance programs have been known to fail in spite of their success…
  • 6. Security Metrics Primer 6 INFORMATION SECURITY HAS HAD A ROUGH RELATIONSHIP WITH METRICS Three core issues with metrics in security: Very little actuarial data to support initiatives Virtually no data supporting likelihood of being successfully attacked Incorrect, hasty use of metrics as intelligence Vulnerabilities being used as risks Metrics – math without context “It hasn’t happened to me” being used as a metric Many victims don’t know, or won’t admit it
  • 7. 7 Information Security hasn’t capitalized on available metrics … can KPIs save the day?
  • 8. KPI Primer 8 A key performance indicator (KPI) is a measure of performance, commonly used to help an organization define and evaluate how successful it is, typically in terms of making progress towards its long-term organizational goals.
  • 9. KPI Primer 9 A key performance indicator (KPI) is a measure of performance, commonly used to help an organization define and evaluate how successful it is, typically in terms of making progress towards its long-term organizational goals.
  • 10. Business vs. IT Goals IT Security Goals [App Sec] Business Goals What are Business Goals? Test 100% web applications Zero vulnerabilities in production web applications SDLC-integrated security processes Continual environment scanning for new vulnerabilities Developer education & training Automate testing & compliance 10
  • 11. Organizations act on risk.Risk is bad, but in "shades of gray".Application vulnerabilities contribute to IT riskIT risk is a factor of overall organizational riskOrganizational goal: Reduce IT risk to acceptable level. Mindset reset 11
  • 12. Tough Questions 12 Will it be possible to perform an analysis of 100% of enterprise applications? Will a zero vulnerability metric be reachable, practical or even desirable? Is vulnerability reduction the same as risk reduction?
  • 13. Enterprise Application Security Program Challenges 13 Challenges Get funded  Justify required resources Find vulnerabilities  Bugs in business critical apps Removing defects  Decrease risks with a budget Proving success How do you prove success? Resources Security vulnerability metrics Application registries Defect tracking systems Data from tools, human testing
  • 14. Essential KPIs Proving Success with Advanced Metrics 14
  • 15. The 5 Key Performance Indicators (KPIs) 15 WRT– Weighted Risk Trend DRW– Defect Remediation Window RDR– Rate of Defect Recurrence SCM– Specific Coverage Metric SQR– Security to Quality defect Ratio KPIs provide business-level context to security-generated data KPIs answer the “so what?” question Each additional KPI indicates a step forward in program maturity None of these KPIs draw strictly from security data
  • 16. KPI #1 – Weighted Risk Trend 16 Maturity Rank: 1 A business-based representation of risk from vetted application security defects over a specified time-period, or repeated iterations of application development. Formula: [(Multipliercritical x defects) + (Multiplierhigh x defects) + (Multipliermedium x defects) + (Multiplierlow x defects)] x *Criticalitybusiness Requirements Web application registry with business-level criticality assigned *Pull business criticality rating from DR documents Vetted web applications security defects by criticality level Mathematic plot capability
  • 17. KPI #2 – Defect Remediation Window 17 Maturity Rank: 2 The length of time from when a vetted application security defect is identified until it is verified closed. Requirements Defect tracking system, tracking application security vulnerabilities in development, testing, and production environments Self-service testing, bug tracking, and reporting capabilities Cooperative security enablement thru development, QA, OPS teams
  • 18. KPI #3 – Rate of Defect Recurrence 18 Maturity Rank: 3 The rate, over time, at which previously closed application security defects are re-introduced into a given application, organization, or other logical unit. Requirements Advanced defect tracking system Advanced application security testing capabilities Capabilities to identify similar or like defects across an application or logical trackable unit
  • 19. KPI #4 – Specific Coverage Metric 19 Maturity Rank: 4 The flow-based or component-based coverage of total functionality that application security testing has achieved. Total functionality = known functionality + discovered functionality* Requirements Method for measuring total application surface (UI, API, code-level coverage methods) plus *advanced application discovery tools Advanced security testing capabilities using flow-based, data-driven methodology for completeness Integration with Quality Assurance for functional specification coverage
  • 20.
  • 21. Performance as a quality defect
  • 22. Functional (+related) as a quality defectTight cooperation of Information Security & Quality Assurance
  • 23. KPI Facts KPI: WRT KPI: DRW KPI: RDR Metric is best graphed Risk trend will decrease over time similar to 1/x Each defect criticality must have a non-linear factor assigned Critical = 10 High = 5 Medium = 2 Low = 1 Application business criticality must be rigidly defined Business critical Critical Important… #1 most critical KPI DRW will be potentially very large at first Critical to shrink this metric as quickly as possible Can be used to target education where needed Important to note type of defect remediated (complex defects take longer to fix) Reappearing defects measure internal development confusion Recurring defects should prompt a systemic investigation into root-cause Critical for identifying poorly-run development organizations 21
  • 24. KPI Facts KPI: SCM KPI: SQR Most difficult KPI to achieve Most organizations cannot identify even known attack surface coverage Flow-driven & data-driven methodology is required to fully test known attack surface Exploratory testing required to discover “unknown functionality” Final step in organizational maturity with respect to security testing Demonstrates security adoption as a component of overall software quality 22
  • 26. Applying KPIs to Web ApplicationSecurity Programs What You Want What You Have
  • 27. Failures of Common Metrics Common Metrics Failure Mode(s) Options? Number of vulnerabilities found Number of pages scanned/tested Critical vulnerabilities found Critical vulnerabilities fixed So what? No context! So what? Do “pages” matter? Business-critical? Or IT-critical? Or…? Business-critical? Or IT-critical? Or…? Business Context. KPIsprovide business context to standard metrics reporting practices. 25
  • 28.
  • 29. Remove subjectivity of metrics by providing business context
  • 30. Bring IT Security into higher-level business discussion
  • 32. Practical Real-life KPI use-case 27
  • 33.
  • 34. Security testing some web applications pre-production
  • 35. Difficult to halt critical applications
  • 36. Metrics collected, reported ad-hoc (per test)Complaints Example Application “the large financial” No way to prioritize effort Difficult to demonstrate if program spend is making a positive impact Impossible to have business-level conversation on security vulnerabilities in go-live applications No way of knowing what actual coverage is being achieved by security testing Result: Business down-plays security’s role 28
  • 37. Example Application “the large financial” 29 Right Now Applied KPI – Weighted Risk Trend (WRT) Application registry + business ranking to prioritize application testing Business context to go/no-go decisions for critical defects Demonstrate risk reduction in business-critical applications over time Demonstrate program spend effectiveness Near Future Applied KPI – Defect Remediation Window (DRW) Produce baseline for defect remediation times Implement program plan to prevent security defects from making it to production Demonstrate program effectiveness by shrinking remediation window(s)
  • 38. 30 More vulnerabilities = more risk?
  • 39. 31 App criticality + defects = more risk Context here
  • 40. Example Application “the large financial” 32 KPIs mean measurable gains Break the “security silo” Improve security team’s posture in the business Apply business context to measure risk Make key go/no-go decisions intelligently with business support
  • 41. 33 Data is raw information Metrics are refined data KPIs are metrics with business-context Business context makes security relevant.
  • 42. The 5 Key Performance Indicators (KPIs) 34 WRT– Weighted Risk Trend DRW– Defect Remediation Window RDR– Rate of Defect Recurrence SCM– Specific Coverage Metric SQR– Security to Quality defect Ratio KPIs are the difference between technical data points, and the actionable intelligence that information security needs.
  • 43. Rafal Los - Security Evangelist, HP Email: Rafal@HP.com Direct: +1 (404) 606-6056 Twitter: Twitter.com/Wh1t3Rabbit Blog: HP.com/go/White-Rabbit 35

Hinweis der Redaktion

  1. Multipliers are key hereShould be non-linearExplain what each “multiplier” is…Explain what the “Criticality-to-the-business” multiplier is… why is it importantWhere does it come from?