180 likes | 299 Vues
This presentation invites discussion on the current state of security in software development processes. We explore the flaws in relying solely on verification and the limitations of static analysis as a solution. Engaging in time-boxed discussions, we examine training scalability, effective threat modeling, and security requirements. Drawing from the NIST February 2012 report and insights from an Open SAMM assessment, we’ll tackle cultural challenges and resource allocation while seeking to improve our security frameworks. Join us for an interactive session aimed at finding effective solutions in secure SDLC.
E N D
15 minute time-boxed discussions, revisit parked issues at the end
Where we find flaws today Highest ROI Look familiar? Relative cost to fix, based on time of detection Source: NIST
Discussion Question 1:Is there a problem with relying primarily on verification? Isn’t static analysis a “good enough” solution?
Discussion Question 2:Can we effectively scale training, threat modeling?
Discussion Question 3:Can we effectively scale security requirements?
“Incompetent developer” challenge • “Security is special” challenge • Domain-specific vs. domain-agnostic • Fitting a square peg into a round hole Cultural Challenges to Secure SDLC