270 likes | 398 Vues
This presentation by Martin Knobloch from Sogeti Netherlands focuses on the crucial importance of implementing Security by Design in software development. It covers the key aspects of awareness, education, and collaboration among all stakeholders to create secure applications. Attendees will learn about secure software development practices, the secure development life cycle, and the role of task forces in promoting security standards across an organization. Join forces to ensure your applications meet security expectations and successfully navigate the landscape of current OWASP projects.
E N D
OWASP Nederland Implementation of Security by Design Martin Knobloch Sogeti Nederland B.V. martin.knobloch@sogeti.nl +31-(0)6 52 32 76 79 2007-01-11
Presentation Objectives • What is…? • Awareness! • Task Force! • Join Forces! • Education! • Get known! • Finish line?
What is…? • What is…? • Security By Design • A Secure Application • Awareness! • Task Force! • Join Forces! • Education! • Get known! • Finish line?
What is… • Security by Design • Secure Software Development Initiative • Applications designed to be secure • Design how to develop secure applications • Everything about designing, developing, testing and implementing secure applications!
What is… • A Secure Application? • How to design, develop a secure application? • How secure has an application to be? • How to prove the application meets the customer expectations and needs of security? 50 current OWAP Projects • 6Release Quality Projects • 15 Beta Status Projects • 15 Alpha Status Projects
What is…? • Secure Development Life Cycle
What is… • A Secure Application.. • An application is secure if the applications behaves as expected at all times!
Awareness! • What is… ? • Awareness! • Who? • Why? • How? • Task Force! • Join Forces! • Education! • Get known! • Finish line?
Awareness! • Who? • Colleagues • Development Staff • Architects / Designers • Developers • Tester • Sales / Business • Management • Customer • Architects • Administrators • Users …each and everyone!
Awareness! • Why? • Colleagues • Development Staff • Sales / Business • Management • Customer • Architects • Administrators • Users
Awareness! • How? • By recognition of their interests, understanding and knowledge of security! • Communicate on the level of their knowledge • Communicate in the scope of their understanding • Communicate in the context of their interests
Task Force! • What is…? • Awareness! • Task Force! • It’s not a one-man-show • Join Forces! • Education! • Get known! • Finish line?
Task Force! • It’s not a one-man-show • Java • Microsoft • Oracle • SAP • CMS • C++ • Uniface • PHP • … • Software Control
Task Force! • Proactive Security Strategy (PaSS)
Join Forces! • What is…? • Awareness! • Task Force! • Join Forces! • Who else is busy with security? • Education! • Get known! • Finish line?
Join Forces! • Business Process • Networking • System Administration • Application Administration
Join Forces! • Company wide security initiatives
Educate! • What is…? • Awareness! • Task Force! • Join Forces! • Educate! • Education • Certification • Get known! • Finish line?
Educate! • Presentations, Courses, Technical meetings • To create awareness! • About Security Threats • About Security Standards • About Best Practices • About Standards • About …
Educate! • Certifications • Get certified • CISSP • Symantec – SCSP • MSCE • Cisco • ISS • RSA • OWASP Top Ten certification?!
Get known! • What is…? • Awareness! • Task Force! • Join Forces! • Education! • Get known! • Make yourself heard! • Finish line?
Get known! • Write! • Papers • Newsletters • Blogs • Talk! • Presentations • Meetings • Lunch • Bother! • Whenever there is a change!
Get known! Make yourself notorious!
Finish line? • What is…? • Awareness! • Task Force! • Join Forces! • Get known! • Education! • Finish line? • When is the job done?
Finish line? • When is the job done? …NEVER!