application security as a service start your application
play

Application Security as a Service: Start Your Application Security - PowerPoint PPT Presentation

Application Security as a Service: Start Your Application Security Initiative in Less than a Day David Harper Practice Principal Fortify on Demand #MicroFocusCyberSummit Agenda The Application Security Problem Security Gate Secure DevOps


  1. Application Security as a Service: Start Your Application Security Initiative in Less than a Day David Harper Practice Principal – Fortify on Demand #MicroFocusCyberSummit

  2. Agenda The Application Security Problem Security Gate Secure DevOps Best Practice Approach Q&A 3

  3. The Application Security Problem

  4. The Majority of Security Breaches Today are From Application Vulnerabilities 80% 90% Percentage of applications containing at Security incidents from exploits against least one critical or high vulnerability. 1 defects in the design or code of software. 2 1 2017 Application Security Research Update” by the HPE Software Security Research team, 2017 5 2 U.S . Department of Homeland Security’s U.S. Computer Emergency Response Team (US -CERT)

  5. Today’s business needs are dramatically increasing the number of applications and the frequency of releases 2020+ 2015 App App 2010 Number of Applications Release Frequency 6

  6. Background Applications are being driven by the business not IT Commissioned by the Capturing personal data is Applications are business the norm proliferating  Focus on “wow factor” and  Key to building the direct  Websites, Facebook marketing related customer relationship applications, Mobile functionality applications, Cloud  Relies on trust between applications  Frequently developed by customer and the brand small boutique  Marketing Campaigns ran consultancies outside normal process, no governance  Intense pressure on timescales  Do you even know how many applications you  Little thought given to non- have? functional requirements

  7. Customer Challenges with Application Security Difficult to train and retain Lack of resources and Growing number of applications AppSec experts, developers expertise and attacks Rapid release cycles and Compliance requirements Securing outsourced, increasing pressure to push apps 3rd party and open source code into production faster

  8. Security Challenge Key Requirements Identify and fix application Implement security issues before Cost Effective application goes into solution rapidly production  Systematic  No complex  Cheaper than existing hardware/software approach  Support all types to install of applications  Predictable  No need to hire, train  Support all development and retain a team of approaches application security experts  No impact on time to market  Scale rapidly to test all applications

  9. Security Gate

  10. Fortify on Demand Security Gate Secure ALL your applications before deployment  Web, Facebook, Mobile, Cloud  In-house, out-sourced, third-party Security Testing Service Code Test Deploy Contract/Outsource Procure Security Gate

  11. Fortify on Demand Cloud-based Application Security Testing Platform Simple Fast Flexible Launch your application security Scale to test all applications in your  Tests all types of applications initiative in < 1 day organization  Web, Facebook, Mobile, Cloud,  No hardware or software investments  1 day turn-around on application Desktop… or maintenance security results  In-house, open source and third  No experts to hire, train and retain  Support 1000s of applications party, commercial applications  OWASP, PCI DSS, FISMA

  12. But can it keep up with DevOps? 3 minutes Average Software 12 months 3 weeks Release Cycle (anticipated) Source: https://medium.com/data-ops/how-software-teams-accelerated-average-release-frequency-from-three-weeks-to-three-minutes-d2aaa9cca918

  13. Secure DevOps

  14. What exactly is DevOps? Means different things to different people DevOps aims to bring applications to market rapidly through:  Cross-functional empowered teams (Business, Dev, Ops, QA) with full lifecycle responsibility for delivering a service Merging of Dev & IT Ops  Rapid code release cycles (working together) Continuous Increased  But large variation in release frequency Integration Agility/Flexibility  Agile Development  Trunk-based with Feature Flags Lean Automation Defining  Service Orientated Architecture on a cloud-based infrastructure Characteristics of DevOps  Tool-chain automation  Continuous Integration/Continuous Testing/Continuous Delivery Faster Time-to- Modern Development Development Security is perceived an inhibitor More Robust Dynamic Apps  Penetration test based release gate is too slow

  15. Secure DevOps Addressing the challenge Best way to deliver secure applications is to build security in  See Software Assurance Maturity Model (SAMM)  With DevOps it’s the only way to deliver secure applications Address security early  Developer Education  Static Application Security Testing(SAST) Security gates still have their place  Dynamic Application Security Testing (DAST) baseline and critical releases Add compensating controls  DAST in production  Runtime Application Self Protection (RASP)

  16. Secure Development Life-Cycle Initiate Define Design Develop Test Implement Operate Strategy & Metrics Policy & Compliance Governance Education & Guidance Threat Assessment Construction Security Requirements Secure Architecture Design Review Verification Code Review Security Testing Issue Management Environment Operations Hardening Operational Enablement See www.opensamm.org

  17. Secure DevOps with Fortify on Demand Application Security Testing on Demand Powered by Industry leading Fortify products Secure DevOps  Fortify SCA – SAST eLearning  With Sonatype SAST Component RASP  Security Assistant – SAST Analysis  WebInspect – DAST  Application Defender – RASP DevOps Available on Demand SAST DAST Baseline  Supported by Security Experts  Quick to get started  Rapid Results SAST  Grows with your business SAST Continuous in IDE  Global datacentres and support Integration Fully integrated in the DevOps Toolchain

  18. Fortify on Demand Role-based Secure DevOps Training Role-based Training  Developers  .NET, Java, C/C++, PHP  Mobile Developers  iOS & Android  Project Managers  QA eLearning  Low cost  Easier to schedule  Highly-scalable  Easy to manage  Easy to enforce

  19. Fortify on Demand Component Analysis with Sonatype Use secure components  Component selection  Version selection

  20. Fortify on Demand Baseline Static Application Security Testing Full test with Fortify SCA  Industry leading SAST  Comprehensive  Accurate Results validation  Ensure full coverage Manual audit by Security Expert  Remove false positives

  21. Fortify Security Assistant Real-time light-weight analysis of code in IDE Eclipse or Visual Studio Plug-in  Inline analysis of the source code as the developer types  Instant results  Continuous Feedback  Not a replacement for a full assessment but catches a significant subset of vulnerabilities. FoD IDE initiated automated scan option for non-supported languages  Component level scan  <100k TLOC 10 mins

  22. Fortify on Demand SAST as part of Continuous Integration Jenkins Plug-in  Invoke SCA scan  Based on baseline scan  Automated results audit using Fortify Scan Analytics  Wait for scan to complete  Returns Pass or Fail based on organizations security policy  Option to publish any new security vulnerabilities into Jira. Visual Studio TFS integration also available Command-line option for other CI tools

  23. Fortify on Demand Dynamic Application Security Testing Baseline DAST DAST for security critical releases Use DAST in production

  24. Application Defender Runtime Application Self-protection Core component of your infrastructure  All environments  Part of your deployment process Compensating Control  Monitors execution of application  Looks for abnormal behavior within application  Monitor or Block  Feedback Integrated with Fortify on Demand  Enable protection based on assessment findings

  25. Best Practice Approach

  26. Implement a Security Gate First Puts security in control  Establish policy  Monitor compliance  Handle exceptions Fortify on Demand addresses the key customer challenges  Lack of in-house resources  Massive scalability Proven approach to reduce application security risk Fast enough for most application developments today 27

  27. Secure DevOps Lifecycle as a Compensating Control DevOps teams can earn the right to be exempt from the gate  Passed security gate with initial version  Secure DevOps lifecycle validated by security  Completeness  Not just CI/CD integration  Effectiveness  Finding vulnerabilities is not enough!  Periodic security gate tests 28

  28. Q&A

  29. #MicroFocusCyberSummit Thank You.

  30. #MicroFocusCyberSummit

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend