SlideShare a Scribd company logo
Seven Touch points for Software
Security
• The touch points are one of the three pillars of
software security
• You don't have to adopt all seven touchpoints
to begin to build security in (though doing so
is highly recommended).
• The figure above shows the seven touchpoints
ordered according to effectiveness and
importance
• The touchpoints are designed to fill the gap
between the state of the art and the state of
the practice-something that can be done only
through the common adoption of best
practices
• Touchpoints are a mix of destructive and
constructive activities.
• Destructive activities are about attacks,
exploits, and breaking software.
• These kinds of things are represented by the
black hat (offense).
• Constructive activities are about design,
defense, and functionality.
• These are represented by the white hat
(defense).
• Both hats are necessary.
• Here are the touchpoints, in order of
effectiveness:
• 1. Code review
• 2. Architectural risk analysis
• 3. Penetration testing
• 4. Risk-based security tests
• 5. Abuse cases
• 6. Security requirements
• 7. Security operations
• 1. Code Review (Tools) Artifact: Code Example of risks found: Buffer
overflow on line 42
• All software projects produce at least one artifactcode.
• This fact moves code review to the number one slot on our list.
• At the code level, the focus is on implementation bugs, especially
those that static analysis tools that scan source code for common
vulnerabilities can discover.
• Several tools vendors now address this space.
• Code review is a necessary but not sufficient practice for achieving
secure software.
• Security bugs (especially in C and C++) are a real problem, but
architectural flaws are just as big a problem.
• you'll learn how to review code with static analysis tools in next
upcoming units
• Doing code review alone is an extremely useful
activity, but given that this kind of review can
only identify bugs, the best a code review can
uncover is around 50% of the security problems.
• Architectural problems are very difficult (and
mostly impossible) to find by staring at code.
• This is especially true for modern systems made
of hundreds of thousands of lines of code.
• A comprehensive approach to software security
involves holistically combining both code review
and architectural analysis.
• 2. Architectural Risk Analysis Artifact: Design
and specification
• Examples of risks found: Poor
compartmentalization and protection of
critical data; failure of a Web Service to
authenticate calling code and its user and to
make access control decisions based on
proper context
• At the design and architecture level, a system
must be coherent and present a unified
security front
• Designers, architects, and analysts should
clearly document assumptions and identify
possible attacks.
• At both the specifications-based architecture
stage and at the class-hierarchy design stage,
architectural risk analysis is a necessity.
• At this point, security analysts uncover and
rank architectural flaws so that mitigation can
begin.
• Disregarding risk analysis at this level will lead
to costly problems down the road.
• Note that risks crop up during all stages of the
software lifecycle, so a constant risk
management thread, with recurring risk-
tracking and monitoring activities, is highly
recommended.
• Chapter 2 describes the RMF process and how
to apply it. Chapter 5 teaches about
architectural risk analysis and will help you
ferret out flaws in software architecture.
Penetration Testing
Artifact: System in its environment
Example of risks found: Poor handling of program state in Web
interface
• Penetration testing is extremely useful, especially if an architectural
risk analysis informs the tests.
• The advantage of penetration testing is that it gives a good
understanding of fielded software in its real environment.
• Software that fails during the kind of canned black box testing
practiced by prefab application security testing tools is truly bad.
Thus, passing a low-octane penetration test reveals little about your
actual security posture, but failing a canned penetration test
indicates that you're in very deep trouble indeed.
• thank you
Risk-Based Security Testing
• Artifact: Units and system
• Example of risks found: Extent of data leakage
possible by leveraging data protection risk
• Security testing must encompass two strategies:
• (1) testing of security functionality with standard
functional testing techniques and
• (2) risk-based security testing based on attack
patterns, risk analysis results, and abuse cases.
• A good security test plan embraces both strategies.
• Security problems aren't always apparent, even when
you probe a system directly, so standard-issue quality
assurance is unlikely to uncover all critical security issues.
• QA is about making sure good things happen. Security
testing is about making sure bad things don't happen.
• Thinking like an attacker is essential.
• Guiding security testing with knowledge of software
architecture, common attacks, and the attacker's mindset
is thus extremely important.
Security Operations
Artifact: Fielded system
• Example of risks found: Insufficient logging to prosecute
a known attacker
• Software security can benefit greatly from network
security.
• Well-integrated security operations allow and encourage
network security professionals to get involved in applying
the touchpoints, providing experience and security
wisdom that might otherwise be missing from the
development team.
• Battle-scarred operations people carefully set up
and monitor fielded systems during use to enhance
the security posture.
• Attacks do happen, regardless of the strength of
design and implementation, so understanding
software behavior that leads to successful attack is
an essential defensive technique.
• Knowledge gained by understanding attacks and
exploits should be cycled back into software
development.
Abuse Cases
Artifact: Requirements and use cases
• Example of risks found: Susceptibility to well-known
tampering attack
• Building abuse cases is a great way to get into the mind
of the attacker.
• Similar to use cases, abuse cases describe the system's
behavior under attack
• Building abuse cases requires explicit coverage of what
should be protected, from whom, and for how long.
Security Requirements
Artifact: Requirements
• Example of risks found: No explicit description
of data protection needs
• Security must be explicitly worked into the
requirements level.
• Good security requirements cover both overt
functional security (say, the use of applied
cryptography)
• emergent characteristics (best captured by
abuse cases and attack patterns).
• The art of identifying and maintaining
security requirements is a complex
undertaking that deserves broad treatment.
Ad

More Related Content

What's hot (20)

2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
Alfred Ouyang
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
btpsec
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
Eoin Woods
 
Pressman ch-1-software
Pressman ch-1-softwarePressman ch-1-software
Pressman ch-1-software
AlenaDion
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
Daniel Miessler
 
Basic of SSDLC
Basic of SSDLCBasic of SSDLC
Basic of SSDLC
Chitpong Wuttanan
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
n|u - The Open Security Community
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Aparna Bhadran
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
University of Sargodha
 
Information security
Information security Information security
Information security
razendar79
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
BDPA Charlotte - Information Technology Thought Leaders
 
Attack modeling vs threat modelling
Attack modeling vs threat modellingAttack modeling vs threat modelling
Attack modeling vs threat modelling
Invisibits
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
Rotor machine,subsitution technique
Rotor machine,subsitution techniqueRotor machine,subsitution technique
Rotor machine,subsitution technique
kirupasuchi1996
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Computer security design principles
Computer security design principlesComputer security design principles
Computer security design principles
Shaishav Dahal
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
asherad
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Integration testing
Integration testingIntegration testing
Integration testing
queen jemila
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
Alfred Ouyang
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
btpsec
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
Eoin Woods
 
Pressman ch-1-software
Pressman ch-1-softwarePressman ch-1-software
Pressman ch-1-software
AlenaDion
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
Daniel Miessler
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Aparna Bhadran
 
Information security
Information security Information security
Information security
razendar79
 
Attack modeling vs threat modelling
Attack modeling vs threat modellingAttack modeling vs threat modelling
Attack modeling vs threat modelling
Invisibits
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
Rotor machine,subsitution technique
Rotor machine,subsitution techniqueRotor machine,subsitution technique
Rotor machine,subsitution technique
kirupasuchi1996
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Computer security design principles
Computer security design principlesComputer security design principles
Computer security design principles
Shaishav Dahal
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
asherad
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Integration testing
Integration testingIntegration testing
Integration testing
queen jemila
 

Similar to Software Security (20)

chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systems
KashfUlHuda1
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
abhimanyubhogwan
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
Cu Nguyen
 
Unit5
Unit5Unit5
Unit5
Integral university, India
 
Lecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.pptLecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.ppt
DrBasemMohamedElomda
 
Enumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLCEnumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLC
John M. Willis
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...
John M. Willis
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
ssuserfb92ae
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
Security Innovation
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
Christopher Grayson
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
Deep Shankar Yadav
 
Reduce Third Party Developer Risks
Reduce Third Party Developer RisksReduce Third Party Developer Risks
Reduce Third Party Developer Risks
Kevo Meehan
 
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
gealehegn
 
Security Operation Center Usecase for Adoption
Security Operation Center Usecase for AdoptionSecurity Operation Center Usecase for Adoption
Security Operation Center Usecase for Adoption
EricTwum7
 
software engineering introduction is a gateway of engineer
software engineering introduction is a gateway of engineersoftware engineering introduction is a gateway of engineer
software engineering introduction is a gateway of engineer
rajajacobc
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically Guaranteed
Ashley Zupkus
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systems
KashfUlHuda1
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
abhimanyubhogwan
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
Cu Nguyen
 
Lecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.pptLecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.ppt
DrBasemMohamedElomda
 
Enumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLCEnumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLC
John M. Willis
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...
John M. Willis
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
ssuserfb92ae
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
Security Innovation
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
Christopher Grayson
 
Reduce Third Party Developer Risks
Reduce Third Party Developer RisksReduce Third Party Developer Risks
Reduce Third Party Developer Risks
Kevo Meehan
 
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
gealehegn
 
Security Operation Center Usecase for Adoption
Security Operation Center Usecase for AdoptionSecurity Operation Center Usecase for Adoption
Security Operation Center Usecase for Adoption
EricTwum7
 
software engineering introduction is a gateway of engineer
software engineering introduction is a gateway of engineersoftware engineering introduction is a gateway of engineer
software engineering introduction is a gateway of engineer
rajajacobc
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically Guaranteed
Ashley Zupkus
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
Ad

More from Integral university, India (17)

Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
Integral university, India
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
Integral university, India
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Integral university, India
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
Integral university, India
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
Integral university, India
 
U nit 4
U nit 4U nit 4
U nit 4
Integral university, India
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
Integral university, India
 
Unit4
Unit4Unit4
Unit4
Integral university, India
 
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
Integral university, India
 
Unit3 MapReduce
Unit3 MapReduceUnit3 MapReduce
Unit3 MapReduce
Integral university, India
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Integral university, India
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
Integral university, India
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Integral university, India
 
Software Security
Software SecuritySoftware Security
Software Security
Integral university, India
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
Integral university, India
 
Security threats
Security threatsSecurity threats
Security threats
Integral university, India
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
Integral university, India
 
Ad

Recently uploaded (20)

TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 

Software Security

  • 1. Seven Touch points for Software Security
  • 2. • The touch points are one of the three pillars of software security • You don't have to adopt all seven touchpoints to begin to build security in (though doing so is highly recommended).
  • 3. • The figure above shows the seven touchpoints ordered according to effectiveness and importance • The touchpoints are designed to fill the gap between the state of the art and the state of the practice-something that can be done only through the common adoption of best practices
  • 4. • Touchpoints are a mix of destructive and constructive activities. • Destructive activities are about attacks, exploits, and breaking software. • These kinds of things are represented by the black hat (offense).
  • 5. • Constructive activities are about design, defense, and functionality. • These are represented by the white hat (defense). • Both hats are necessary.
  • 6. • Here are the touchpoints, in order of effectiveness: • 1. Code review • 2. Architectural risk analysis • 3. Penetration testing • 4. Risk-based security tests • 5. Abuse cases • 6. Security requirements • 7. Security operations
  • 7. • 1. Code Review (Tools) Artifact: Code Example of risks found: Buffer overflow on line 42 • All software projects produce at least one artifactcode. • This fact moves code review to the number one slot on our list. • At the code level, the focus is on implementation bugs, especially those that static analysis tools that scan source code for common vulnerabilities can discover. • Several tools vendors now address this space. • Code review is a necessary but not sufficient practice for achieving secure software. • Security bugs (especially in C and C++) are a real problem, but architectural flaws are just as big a problem. • you'll learn how to review code with static analysis tools in next upcoming units
  • 8. • Doing code review alone is an extremely useful activity, but given that this kind of review can only identify bugs, the best a code review can uncover is around 50% of the security problems. • Architectural problems are very difficult (and mostly impossible) to find by staring at code. • This is especially true for modern systems made of hundreds of thousands of lines of code. • A comprehensive approach to software security involves holistically combining both code review and architectural analysis.
  • 9. • 2. Architectural Risk Analysis Artifact: Design and specification • Examples of risks found: Poor compartmentalization and protection of critical data; failure of a Web Service to authenticate calling code and its user and to make access control decisions based on proper context • At the design and architecture level, a system must be coherent and present a unified security front
  • 10. • Designers, architects, and analysts should clearly document assumptions and identify possible attacks. • At both the specifications-based architecture stage and at the class-hierarchy design stage, architectural risk analysis is a necessity. • At this point, security analysts uncover and rank architectural flaws so that mitigation can begin. • Disregarding risk analysis at this level will lead to costly problems down the road.
  • 11. • Note that risks crop up during all stages of the software lifecycle, so a constant risk management thread, with recurring risk- tracking and monitoring activities, is highly recommended. • Chapter 2 describes the RMF process and how to apply it. Chapter 5 teaches about architectural risk analysis and will help you ferret out flaws in software architecture.
  • 12. Penetration Testing Artifact: System in its environment Example of risks found: Poor handling of program state in Web interface • Penetration testing is extremely useful, especially if an architectural risk analysis informs the tests. • The advantage of penetration testing is that it gives a good understanding of fielded software in its real environment. • Software that fails during the kind of canned black box testing practiced by prefab application security testing tools is truly bad. Thus, passing a low-octane penetration test reveals little about your actual security posture, but failing a canned penetration test indicates that you're in very deep trouble indeed.
  • 14. Risk-Based Security Testing • Artifact: Units and system • Example of risks found: Extent of data leakage possible by leveraging data protection risk • Security testing must encompass two strategies: • (1) testing of security functionality with standard functional testing techniques and • (2) risk-based security testing based on attack patterns, risk analysis results, and abuse cases. • A good security test plan embraces both strategies.
  • 15. • Security problems aren't always apparent, even when you probe a system directly, so standard-issue quality assurance is unlikely to uncover all critical security issues. • QA is about making sure good things happen. Security testing is about making sure bad things don't happen. • Thinking like an attacker is essential. • Guiding security testing with knowledge of software architecture, common attacks, and the attacker's mindset is thus extremely important.
  • 16. Security Operations Artifact: Fielded system • Example of risks found: Insufficient logging to prosecute a known attacker • Software security can benefit greatly from network security. • Well-integrated security operations allow and encourage network security professionals to get involved in applying the touchpoints, providing experience and security wisdom that might otherwise be missing from the development team.
  • 17. • Battle-scarred operations people carefully set up and monitor fielded systems during use to enhance the security posture. • Attacks do happen, regardless of the strength of design and implementation, so understanding software behavior that leads to successful attack is an essential defensive technique. • Knowledge gained by understanding attacks and exploits should be cycled back into software development.
  • 18. Abuse Cases Artifact: Requirements and use cases • Example of risks found: Susceptibility to well-known tampering attack • Building abuse cases is a great way to get into the mind of the attacker. • Similar to use cases, abuse cases describe the system's behavior under attack • Building abuse cases requires explicit coverage of what should be protected, from whom, and for how long.
  • 19. Security Requirements Artifact: Requirements • Example of risks found: No explicit description of data protection needs • Security must be explicitly worked into the requirements level. • Good security requirements cover both overt functional security (say, the use of applied cryptography)
  • 20. • emergent characteristics (best captured by abuse cases and attack patterns). • The art of identifying and maintaining security requirements is a complex undertaking that deserves broad treatment.