SLIDE 4 Suggestions for Improving Security Testing
1. Start with threat modeling to focus effort on risks relevant to your system.
- Store the threat model with your engineering documentation.
- Review the threat model periodically, and update it as the attack surface changes.
- If a security incident occurs, highlight the attacker’s actions in the threat model.
2. Choose feedback methods that emphasize the action you want.
- Archival: PDF reports & e-mails
- Manager’s attention: Dashboards, e-mailed spreadsheet
- Fix before deploying: build failure, chat notification, pull request status/comment
3. Create an internal “how-to” guide for what to do when fixing a security bug.
- OWASP is a great reference.
4. Plan to triage existing, but previously unknown, vulnerabilities when introducing new tools.
- Consider first results to be “security backlog.”
- Establish policy of “No new security issues.”
5. Define success measures that relate to business objectives.
- Cost (time and fees) of unplanned security events
- Time to perform security assessment
- Time to fix vulnerabilities (total age by severity)
- Number of vulnerabilities detected and released knowingly.
6. Create post-deployment security health checks.
- TLS configuration (ciphers, certificate validity)
- HTTP security headers
7. Tag security tests in unit, integration, system test suites.
- Authentication, authorization, session management
- User registration, password recovery
- Financial transactions - checkout, coupon redemption
8. Include abuse cases in user stories.
- “As an administrator, I should not be able to view a user’s payment card data.”
9. Automatically collect and archive evidence of compliance.
- Git logs
- Test results
- Pull request discussions
- Deployment history
- 10. Be specific with penetration testers.
- “This is everything we know to be running. Verify that we have no other exposures.”
- “We just started running our apps in containers. Can you try to compromise the host OS from a container?”
Additional Resources
- OWASP Application Security Verification Standard (ASVS)
https://github.com/OWASP/ASVS
- DevOps Audit Defense Toolkit
http://images.itrevolution.com/documents/DevOps_Audit_Defense_Toolkit_v1.0.pdf
- Verizon Data Breach Investigations Report
https://enterprise.verizon.com/resources/reports/dbir/
https://cheatsheetseries.owasp.org/