Thoughts & Experiences
d0kt0r @ 0xOPOSEC
0XOPOSEC - d0kt0r
Freelance Information Security Consultant
PhD Student @ FCUP
“We do what we must because we can.” – Aperture Science
Email: dm@dm-advisory.eu
Disclaimer: This is not a Technical talk
Disclaimer2: Not reinventing the wheel here
Disclaimer3: not an OWASP pitch
Information Security World
Information Security World
AppSec
Information Security World
AppSec
Security Architecture Teams
Security Assessments Teams
Development Teams
IR Teams
The Model
The Software Assurance Maturity Model (SAMM) is an open framework that provides an effective and measurable way for all types of organizations to analyze and improve their software security posture.
2.0 Version
"Your first step towards improvement, is to measure where you are now."
The Model
Measurable
Defined maturity levels across business practices
Actionable
Clear pathways for improving maturity levels
Versatile
Technology, process, and organization agnostic
The Model
The Model
Core activities that any organization does to develop software.
Organizational Scope
Application Specific
The Model
The Model
Security Testing Practice
The Model
One Question per Activity (total 90 questions)
Quality
Coverage
The Model
OWASP SAMM Toolbox available online (SAMMY) or Excel:
Security Testing Maturity Score =
SUM(AVG(StreamALevel1,StreamBLevel1)+AVG(StreamALeve2,StreamBLevel2)+AVG(StreamALevel3,StreamBLevel3))
The Model
The Model
Helpful metrics to "sell" the investment for security programme and/or guide the next iteration of the programme
Implementation
PREPARE
ASSESS
SET THE TARGET
DEFINE THE PLAN
IMPLEMENT
ROLL OUT
Implementation
PREPARE
*hint*: you may want to start gathering information about your environment and apps: typology, support model, status, location, criticality, data, etc.............
build a stakeholder maps and set comms channels (Steerco, newsletter,..)
Implementation
PREPARE
ASSESS
Implementation
PREPARE
Software development process maturity will impact your approach
ASSESS
SET THE TARGET
*hint*: be realistic - important to respect dev/op team bandwidth; consider constraints: budget, timing, resources, organizational limitations, etc.
Implementation
PREPARE
ASSESS
SET THE TARGET
DEFINE THE PLAN
*hint*: OWASP has tons of open-source tools to support the implementation of all security practices with 0 cost
Implementation
PREPARE
...work
ASSESS
SET THE TARGET
DEFINE THE PLAN
IMPLEMENT
*hint*: really work;
you can measure progress!
Implementation
PREPARE
ASSESS
SET THE TARGET
DEFINE THE PLAN
IMPLEMENT
ROLL OUT
*hint*: build a service catalogue (AppSecaaService); do not scale if doesn't work; rethink and repeat
(key advantage of SAMM)
Experimentation
Problem #1: User Access is rarely mentioned in the model:
What about internal client user access?
Experimentation
To be published soon on: https://github.com/DM-Advisory/
User Access Management
Experimentation
Problem #2: One of the main problem for Information Security teams is:
Bandwidth
Solution? Automate & Delegate
Model solution: Security Champions
but, in some realities SC does not solve all of our problems (outsourced, third parties,etc.)
Experimentation
Solution: Project Management Gamification
Experimentation
Solution: Project Management Gamification
Experimentation
Solution: Project Management Gamification
Experimentation
Solution: Project Management Gamification
Experimentation
Solution: Project Management Gamification
Experimentation
Solution: Project Management Gamification
Each control and activity from the model performed adds points -> If reaches a baseline the project is ready for go-live!
+20
+20
+20
+20
+20
Thank you!
Q&A
Credits to OWASP Foundation
Thanks to MG;FF;MT;CB for helping implementing the model