SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Seven Touch points for Software
Security
• The touch points are one of the three pillars of
software security
• You don't have to adopt all seven touchpoints
to begin to build security in (though doing so
is highly recommended).
• The figure above shows the seven touchpoints
ordered according to effectiveness and
importance
• The touchpoints are designed to fill the gap
between the state of the art and the state of
the practice-something that can be done only
through the common adoption of best
practices
• Touchpoints are a mix of destructive and
constructive activities.
• Destructive activities are about attacks,
exploits, and breaking software.
• These kinds of things are represented by the
black hat (offense).
• Constructive activities are about design,
defense, and functionality.
• These are represented by the white hat
(defense).
• Both hats are necessary.
• Here are the touchpoints, in order of
effectiveness:
• 1. Code review
• 2. Architectural risk analysis
• 3. Penetration testing
• 4. Risk-based security tests
• 5. Abuse cases
• 6. Security requirements
• 7. Security operations
• 1. Code Review (Tools) Artifact: Code Example of risks found: Buffer
overflow on line 42
• All software projects produce at least one artifactcode.
• This fact moves code review to the number one slot on our list.
• At the code level, the focus is on implementation bugs, especially
those that static analysis tools that scan source code for common
vulnerabilities can discover.
• Several tools vendors now address this space.
• Code review is a necessary but not sufficient practice for achieving
secure software.
• Security bugs (especially in C and C++) are a real problem, but
architectural flaws are just as big a problem.
• you'll learn how to review code with static analysis tools in next
upcoming units
• Doing code review alone is an extremely useful
activity, but given that this kind of review can
only identify bugs, the best a code review can
uncover is around 50% of the security problems.
• Architectural problems are very difficult (and
mostly impossible) to find by staring at code.
• This is especially true for modern systems made
of hundreds of thousands of lines of code.
• A comprehensive approach to software security
involves holistically combining both code review
and architectural analysis.
• 2. Architectural Risk Analysis Artifact: Design
and specification
• Examples of risks found: Poor
compartmentalization and protection of
critical data; failure of a Web Service to
authenticate calling code and its user and to
make access control decisions based on
proper context
• At the design and architecture level, a system
must be coherent and present a unified
security front
• Designers, architects, and analysts should
clearly document assumptions and identify
possible attacks.
• At both the specifications-based architecture
stage and at the class-hierarchy design stage,
architectural risk analysis is a necessity.
• At this point, security analysts uncover and
rank architectural flaws so that mitigation can
begin.
• Disregarding risk analysis at this level will lead
to costly problems down the road.
• Note that risks crop up during all stages of the
software lifecycle, so a constant risk
management thread, with recurring risk-
tracking and monitoring activities, is highly
recommended.
• Chapter 2 describes the RMF process and how
to apply it. Chapter 5 teaches about
architectural risk analysis and will help you
ferret out flaws in software architecture.
Penetration Testing
Artifact: System in its environment
Example of risks found: Poor handling of program state in Web
interface
• Penetration testing is extremely useful, especially if an architectural
risk analysis informs the tests.
• The advantage of penetration testing is that it gives a good
understanding of fielded software in its real environment.
• Software that fails during the kind of canned black box testing
practiced by prefab application security testing tools is truly bad.
Thus, passing a low-octane penetration test reveals little about your
actual security posture, but failing a canned penetration test
indicates that you're in very deep trouble indeed.
• thank you
Risk-Based Security Testing
• Artifact: Units and system
• Example of risks found: Extent of data leakage
possible by leveraging data protection risk
• Security testing must encompass two strategies:
• (1) testing of security functionality with standard
functional testing techniques and
• (2) risk-based security testing based on attack
patterns, risk analysis results, and abuse cases.
• A good security test plan embraces both strategies.
• Security problems aren't always apparent, even when
you probe a system directly, so standard-issue quality
assurance is unlikely to uncover all critical security issues.
• QA is about making sure good things happen. Security
testing is about making sure bad things don't happen.
• Thinking like an attacker is essential.
• Guiding security testing with knowledge of software
architecture, common attacks, and the attacker's mindset
is thus extremely important.
Security Operations
Artifact: Fielded system
• Example of risks found: Insufficient logging to prosecute
a known attacker
• Software security can benefit greatly from network
security.
• Well-integrated security operations allow and encourage
network security professionals to get involved in applying
the touchpoints, providing experience and security
wisdom that might otherwise be missing from the
development team.
• Battle-scarred operations people carefully set up
and monitor fielded systems during use to enhance
the security posture.
• Attacks do happen, regardless of the strength of
design and implementation, so understanding
software behavior that leads to successful attack is
an essential defensive technique.
• Knowledge gained by understanding attacks and
exploits should be cycled back into software
development.
Abuse Cases
Artifact: Requirements and use cases
• Example of risks found: Susceptibility to well-known
tampering attack
• Building abuse cases is a great way to get into the mind
of the attacker.
• Similar to use cases, abuse cases describe the system's
behavior under attack
• Building abuse cases requires explicit coverage of what
should be protected, from whom, and for how long.
Security Requirements
Artifact: Requirements
• Example of risks found: No explicit description
of data protection needs
• Security must be explicitly worked into the
requirements level.
• Good security requirements cover both overt
functional security (say, the use of applied
cryptography)
• emergent characteristics (best captured by
abuse cases and attack patterns).
• The art of identifying and maintaining
security requirements is a complex
undertaking that deserves broad treatment.

Weitere ähnliche Inhalte

Was ist angesagt?

Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
أحلام انصارى
 

Was ist angesagt? (20)

Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Web Security
Web SecurityWeb Security
Web Security
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Introduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitIntroduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
 
Firewalls
FirewallsFirewalls
Firewalls
 
Web security
Web securityWeb security
Web security
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
White box ppt
White box pptWhite box ppt
White box ppt
 
"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Ns3
Ns3Ns3
Ns3
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdf
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Program security
Program securityProgram security
Program security
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 

Ähnlich wie Software Security

Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
Cu Nguyen
 
Lecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.pptLecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.ppt
DrBasemMohamedElomda
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
gealehegn
 

Ähnlich wie Software Security (20)

chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systems
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
 
Unit5
Unit5Unit5
Unit5
 
Lecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.pptLecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.ppt
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...
 
Enumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLCEnumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLC
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Reduce Third Party Developer Risks
Reduce Third Party Developer RisksReduce Third Party Developer Risks
Reduce Third Party Developer Risks
 
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
 
black-box testing is a type of software testing in which the tester is not co...
black-box testing is a type of software testing in which the tester is not co...black-box testing is a type of software testing in which the tester is not co...
black-box testing is a type of software testing in which the tester is not co...
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically Guaranteed
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 

Mehr von Integral university, India

Mehr von Integral university, India (17)

Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
U nit 4
U nit 4U nit 4
U nit 4
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Unit4
Unit4Unit4
Unit4
 
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
 
Unit3 MapReduce
Unit3 MapReduceUnit3 MapReduce
Unit3 MapReduce
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Software Security
Software SecuritySoftware Security
Software Security
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
 
Security threats
Security threatsSecurity threats
Security threats
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Software Security

  • 1. Seven Touch points for Software Security
  • 2. • The touch points are one of the three pillars of software security • You don't have to adopt all seven touchpoints to begin to build security in (though doing so is highly recommended).
  • 3. • The figure above shows the seven touchpoints ordered according to effectiveness and importance • The touchpoints are designed to fill the gap between the state of the art and the state of the practice-something that can be done only through the common adoption of best practices
  • 4. • Touchpoints are a mix of destructive and constructive activities. • Destructive activities are about attacks, exploits, and breaking software. • These kinds of things are represented by the black hat (offense).
  • 5. • Constructive activities are about design, defense, and functionality. • These are represented by the white hat (defense). • Both hats are necessary.
  • 6. • Here are the touchpoints, in order of effectiveness: • 1. Code review • 2. Architectural risk analysis • 3. Penetration testing • 4. Risk-based security tests • 5. Abuse cases • 6. Security requirements • 7. Security operations
  • 7. • 1. Code Review (Tools) Artifact: Code Example of risks found: Buffer overflow on line 42 • All software projects produce at least one artifactcode. • This fact moves code review to the number one slot on our list. • At the code level, the focus is on implementation bugs, especially those that static analysis tools that scan source code for common vulnerabilities can discover. • Several tools vendors now address this space. • Code review is a necessary but not sufficient practice for achieving secure software. • Security bugs (especially in C and C++) are a real problem, but architectural flaws are just as big a problem. • you'll learn how to review code with static analysis tools in next upcoming units
  • 8. • Doing code review alone is an extremely useful activity, but given that this kind of review can only identify bugs, the best a code review can uncover is around 50% of the security problems. • Architectural problems are very difficult (and mostly impossible) to find by staring at code. • This is especially true for modern systems made of hundreds of thousands of lines of code. • A comprehensive approach to software security involves holistically combining both code review and architectural analysis.
  • 9. • 2. Architectural Risk Analysis Artifact: Design and specification • Examples of risks found: Poor compartmentalization and protection of critical data; failure of a Web Service to authenticate calling code and its user and to make access control decisions based on proper context • At the design and architecture level, a system must be coherent and present a unified security front
  • 10. • Designers, architects, and analysts should clearly document assumptions and identify possible attacks. • At both the specifications-based architecture stage and at the class-hierarchy design stage, architectural risk analysis is a necessity. • At this point, security analysts uncover and rank architectural flaws so that mitigation can begin. • Disregarding risk analysis at this level will lead to costly problems down the road.
  • 11. • Note that risks crop up during all stages of the software lifecycle, so a constant risk management thread, with recurring risk- tracking and monitoring activities, is highly recommended. • Chapter 2 describes the RMF process and how to apply it. Chapter 5 teaches about architectural risk analysis and will help you ferret out flaws in software architecture.
  • 12. Penetration Testing Artifact: System in its environment Example of risks found: Poor handling of program state in Web interface • Penetration testing is extremely useful, especially if an architectural risk analysis informs the tests. • The advantage of penetration testing is that it gives a good understanding of fielded software in its real environment. • Software that fails during the kind of canned black box testing practiced by prefab application security testing tools is truly bad. Thus, passing a low-octane penetration test reveals little about your actual security posture, but failing a canned penetration test indicates that you're in very deep trouble indeed.
  • 14. Risk-Based Security Testing • Artifact: Units and system • Example of risks found: Extent of data leakage possible by leveraging data protection risk • Security testing must encompass two strategies: • (1) testing of security functionality with standard functional testing techniques and • (2) risk-based security testing based on attack patterns, risk analysis results, and abuse cases. • A good security test plan embraces both strategies.
  • 15. • Security problems aren't always apparent, even when you probe a system directly, so standard-issue quality assurance is unlikely to uncover all critical security issues. • QA is about making sure good things happen. Security testing is about making sure bad things don't happen. • Thinking like an attacker is essential. • Guiding security testing with knowledge of software architecture, common attacks, and the attacker's mindset is thus extremely important.
  • 16. Security Operations Artifact: Fielded system • Example of risks found: Insufficient logging to prosecute a known attacker • Software security can benefit greatly from network security. • Well-integrated security operations allow and encourage network security professionals to get involved in applying the touchpoints, providing experience and security wisdom that might otherwise be missing from the development team.
  • 17. • Battle-scarred operations people carefully set up and monitor fielded systems during use to enhance the security posture. • Attacks do happen, regardless of the strength of design and implementation, so understanding software behavior that leads to successful attack is an essential defensive technique. • Knowledge gained by understanding attacks and exploits should be cycled back into software development.
  • 18. Abuse Cases Artifact: Requirements and use cases • Example of risks found: Susceptibility to well-known tampering attack • Building abuse cases is a great way to get into the mind of the attacker. • Similar to use cases, abuse cases describe the system's behavior under attack • Building abuse cases requires explicit coverage of what should be protected, from whom, and for how long.
  • 19. Security Requirements Artifact: Requirements • Example of risks found: No explicit description of data protection needs • Security must be explicitly worked into the requirements level. • Good security requirements cover both overt functional security (say, the use of applied cryptography)
  • 20. • emergent characteristics (best captured by abuse cases and attack patterns). • The art of identifying and maintaining security requirements is a complex undertaking that deserves broad treatment.