Developing Construction Workers for Securely Built Software
James R Lindley CISSP, ISSAP, ISSEP, ISSMP, CISA, PMP, SSE-CMM Team Chief, IRS Penetration Testing and Code Analysis
Tuesday, March 18, 2014,11:05 -11:40
Developing Construction Workers for Securely Built Software James - - PowerPoint PPT Presentation
Developing Construction Workers for Securely Built Software James R Lindley CISSP, ISSAP, ISSEP, ISSMP, CISA, PMP, SSE-CMM Team Chief, IRS Penetration Testing and Code Analysis Tuesday, March 18, 2014,11:05 -11:40 Three Types of Security
James R Lindley CISSP, ISSAP, ISSEP, ISSMP, CISA, PMP, SSE-CMM Team Chief, IRS Penetration Testing and Code Analysis
Tuesday, March 18, 2014,11:05 -11:40
Three Types of Security Personnel
1. Those who advise on security 2. Those who audit security 3. Those who create security Types 1 and 2 are usually in cybersecurity. Type 3 is in application development and operations.
curricula are focused on types 1 and 2.
into non-security curricula for type 3 via non-integrated classes. We’re going to look at a suggested better way to train type 3.
3/27/2014 2014 FISSEA Conference 2
and penetration testers outside DHS
analyses of source code placed on IRS systems
White Box code penetration testing
and other code sets as directed
3/27/2014 3 2014 FISSEA Conference
does that quality emerge?
project managers recognize and demand the skills and tools relevant to that quality.
3/27/2014 2014 FISSEA Conference 4
3/27/2014 2014 FISSEA Conference 5
– Earned Value Management – Quality Assurance
3/27/2014 2014 FISSEA Conference 6
Models - Sequential vs. Iterative
(Looped) Sequential Boehm and Agile
3/27/2014 2014 FISSEA Conference 7
Feasibility Analysis (Requirements) Design
Construction & Testing
Installation Operations & Maintenance
software by doing it and helping others do it. Through this work we have come to value:
– Individuals and interactions over processes and tools – Working software over comprehensive documentation – Customer collaboration over contract negotiation – Responding to change over following a plan
right, we value the items on the left more.
3/27/2014 2014 FISSEA Conference 8
Suitability of different development methods
Agile home ground Plan-driven home ground Formal methods Low criticality High criticality Extreme criticality Senior developers Junior developers Senior developers Requirements change often Requirements do not change often Limited requirements, limited features see Wirth's law Small number of developers Large number of developers Requirements that can be modeled
3/27/2014 2014 FISSEA Conference 9
3/27/2014 2014 FISSEA Conference 10
Enterprise Life Cycle model (policy)
architectural phases (Requirements, Specification, and Design)
and climb the waterfall ladder.
policy.
3/27/2014 2014 FISSEA Conference 11
security scan for project exit approval
– Action: application development executives brought on board – Action: software project managers offered source code scanning tool for in-development software – Action: training on tool and security assessment for code writers
weak software project management skills
– Action: Develop course to teach secure software construction to project managers – Action: Develop courses for each of the phase practitioners
3/27/2014 2014 FISSEA Conference 12
brought on board
source code scanning tool for in-development software
for code writers
3/27/2014 2014 FISSEA Conference 13
construction to project managers
practitioners – Requirement Elicitors – Specification Writers – Designers (Data and Software) – Code Writers – Quality Assessment
3/27/2014 2014 FISSEA Conference 14
workers in a particular industry along the lines of the particular craft or trade that they work in by class or skill level. It contrasts with industrial unionism, in which all workers in the same industry are organized into the same union, regardless of differences in skill.
3/27/2014 2014 FISSEA Conference 15
A Human Capital Crisis in Cybersecurity Technical Proficiency Matters
agencies to define an information technology (IT) security work force improvement program based on role definitions
in defining specialized IT security roles, especially as understood by managers without a security background or training.
3/27/2014 2014 FISSEA Conference 16
3/27/2014 2014 FISSEA Conference 17
I am a dry pipe plumbing inspector
Engineering)
and a specialized inspector
– Requirements – Specification – Design – Code writing – Install and configure – Operations – Decommission
3/27/2014 2014 FISSEA Conference 18
If You Build It Correctly, Security Will Come
from what does software security emerge? ***The quality of all surrounding processes***
project.
3/27/2014 2014 FISSEA Conference 19
3/27/2014 2014 FISSEA Conference 20
Software is a Synergistic Effort
3/27/2014 2014 FISSEA Conference 21
functional)
specialists)
3/27/2014 2014 FISSEA Conference 22
– Regulatory – Environmental – Customer – Users – Project Team
– Strategic Debrief – Interrogation – Document Research and Analysis
3/27/2014 2014 FISSEA Conference 23
solution descriptions for problem requirements
3/27/2014 2014 FISSEA Conference 24
– Schema – Data Item Dictionary – Detail-oriented
– UML skills – Function Point Design = Earned Value Management – Vision of the whole
3/27/2014 2014 FISSEA Conference 25
practices
employees using the standard
3/27/2014 2014 FISSEA Conference 26
Maturity Model (BSIMM)
part of the application development (AD) team and processes.
scenarios
agency cyber-security penetration testing and code analysis team
3/27/2014 2014 FISSEA Conference 27
application development and cybersecurity personnel.
already have available
to community colleges and in-house programs)
IAW the organization policies
3/27/2014 2014 FISSEA Conference 28
process phases
with a focus on securely constructed software
practitioners in designing and testing for secure software construction
3/27/2014 2014 FISSEA Conference 29
for the other
mandate to document the security that we are not mandated to produce.
3/27/2014 2014 FISSEA Conference 30
3/27/2014 2014 FISSEA Conference 31