Presentation is loading. Please wait.

Presentation is loading. Please wait.

Software Security and Procurement John Ritchie, DAS Enterprise Security Office.

Similar presentations


Presentation on theme: "Software Security and Procurement John Ritchie, DAS Enterprise Security Office."— Presentation transcript:

1 Software Security and Procurement John Ritchie, DAS Enterprise Security Office

2 2 Introduction What's my experience? –Not a procurement specialist –Information security, software, vendors, procurement projects Why am I talking to you? –Describe procurement role in software security

3 3 Agenda Problem statement –Insecure applications –Procurement lever Procurement tools for security –RFP, contract Procurement scenarios –Considerations for different procurement types

4 4 What's the problem? Sea-change in “hacking” –Past: hobby hackers –Present: Internet crime wave –Future: cyber warfare Plus –poor programming practices –insecure, buggy applications Equals...

5 5 What's the solution? No one solution, but... Software vendor culture change –Better education –Better development practices –Shift from “release it now, fix it later” mentality

6 6 How can we help? Leverage market forces –Customer expectations We don't accept defective cars, why should we accept defective software? –Vendor competition –Exercise clout Incorporate software security requirements into procurement process

7 7 What do you mean by “requirements?” Secure development practices –Personnel Background checks Training –Development processes Secure coding Configuration management –Testing Source code Vulnerability testing –Maintenance Notification of updates Patch testing Tracking security issues

8 8 Procurement tools for better security RFP process Contract security language

9 9 Tools: RFP process Security requirements definition –Security features: be explicit –Vendor security practices Software development Software maintenance Security responsiveness –Which ones are mandatory and which ones are desirable? Compare responses

10 10 Vendor Security Practices Software development –Is security integrated into the SDLC? –What training do developers get? Software maintenance –Why and when are patches released? –How are customers notified? Security responsiveness –Proactive or reactive? –What mechanisms for bug reporting and response?

11 11 Tools: Contract Language Incorporates software security requirements into legal agreement Growing movement Requires clout Reinforced by regulations –Payment Card Industry (PCI), Oregon Consumer Identity Theft Prevention Act (OCITPA)

12 12 Sample Language: New York State Sample application security procurement language –http://www.sans.org/appseccontract/ Covers all areas of software security responsibility Meeting resistance from software industry

13 13 Procurement Security Considerations Differ based on type of procurement –Software purchase Commercial Off-The-Shelf (COTS) Custom development –Outsourcing of services Not just software –Software as a service e.g. TurboTax Online Disclaimer: these lists are not exhaustive!

14 14 COTS Software Clout is key –Big markets: U.S. Government? Security requirements definition in RFP is important –Possible product differentiator Contract security language –Growing role Major vendors starting to “see the light”

15 15 Custom Software Software security and vendor requirements need to be specific and detailed Education may be necessary Possible vendor differentiator Ongoing patching and support is important

16 16 Outsourcing Services and hosting as well as software Define security goals and policies Ensure outsourcing maintains the same level of compliance Beware of sub-outsourcing

17 17 Software as a service Who controls the data? Is security adequate for all types of data? –Map to data classification Ensure service maintains compliance with policies and security goals Don't forget e-Discovery

18 18 Challenges Procurement complexity Lack of expertise Vendor resistance Software cost

19 19 Summary Trend pushing security responsibility toward software vendors We will see more of: –Detailed security practices specified in RFPs –Security practices agreement in contracts

20 20 Further Reading NY sample procurement contract language – http://www.sans.org/appseccontract/ OWASP Secure Software Contract Annex –https://www.owasp.org/index.php/OWASP_Secure_Software_Contract_Annex BITS Financial Services Roundtable Software Security Toolkit – includes sample procurement language and sample business requirements –http://www.bits.org/downloads/Publications Page/bitssummittoolkit.pdf This presentation is available under “Presentations” on the ESO website: –http://www.oregon.gov/DAS/EISPD/ESO/Pub.shtml


Download ppt "Software Security and Procurement John Ritchie, DAS Enterprise Security Office."

Similar presentations


Ads by Google