Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2004 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.

Similar presentations


Presentation on theme: "Copyright © 2004 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation."— Presentation transcript:

1

2 Copyright © 2004 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation OWASP AppSec June 2004 NYC http://www.owasp.org ISO 17799 Project Review Stan Guzik, CISSP, MCP Chief Technology Officer Immediatech Corp. ISO 17799 Project Lead sguzik@immediatech.com

3 OWASP AppSec 2004 2 What Will Be Covered?  Background On The ISO 17799 Project  What Is Information Security?  Information Security Threats  Developing Security Management Policies/Procedures  What Is The ISO 17799?  ISO 17799 OWASP Project Details  Implementation Example  Critical Success Factors  OWASP Needs Your Feedback  References

4 OWASP AppSec 2004 3 Background On The ISO 17799 Project  OWASP Holistic Approach To Security  Top Ten  Guide  Testing  WebGoat  ISO 17799  Challenges Of Today’s Web Applications  Security - CIA  24x7x365 uptime  Fast and easy to use  Integration with external systems  Fast SDLC due to market pressures  Bug free  Customers expect it at no/low cost

5 OWASP AppSec 2004 4 Background On The ISO 17799 Project  Management Of Web Applications In Production  Traditional IT organizations are not familiar with web app security management  Auditors as head of IT (EDP)  Internet applications  20 Year old policy/procedures do not apply  Benefits Of Applying ISO 17799  Increased security  Increased uptime  ROI – Fighting Fires  Keep your job

6 OWASP AppSec 2004 5 What Is Information Security?  Information Is An Asset – Value  Information Protection – Ensure Business Continuity, minimize damage, legal requirements  Information Forms – Electronic, Paper, Spoken, and etc…  Information Preservation  Confidentiality – Information is not disclosed to unauthorized subjects  Integrity – Accuracy and completeness of information and only modified by authorized subjects  Availability – Authorized subjects are granted assess to information. (SLA)  Information Security Controls – Policies, procedures, practices, organizational structure, and HW/SW.

7 OWASP AppSec 2004 6 Information Security Threats  Viruses  Hackers  Espionage  Sabotage  Vandalism  Fire  Flood  Employee With A Big Mouth (HR Info)

8 OWASP AppSec 2004 7 Information Security Threats  Today Organizations Are More Vulnerable  Interconnected public and private networks  System complexities in achieving access controls  Lack of security conscious developers – focus on functionality & performance.  Shorter Time To Market  Supplement Secure Applications With Appropriate Security Management Policies/Procedures  Secure applications running in an unsecured environments  Secure applications and a secured environment running with insecure operations  Etc…

9 OWASP AppSec 2004 8 Develop Security Management Policies/Procedures  Legal, Regulatory, Contractual Requirements, Due Diligence  Risk Assessment – Threats to Assets  The likelihood a threat will occur and evaluate its impact on an asset  Quantitative Risk Assessment –Annual Loss Expectancy (ALE) – Yearly cost of all instances of a specific realized threat against a specific asset: »ALE = ARO * SLE –Annual Rate of Occurrence (ARO) – Expected frequency that a specific threat or risk will occur (probability determination) –Single Loss Expectancy (SLE) –- Cost associated with a single realized risk against a specific asset. »SLE = Asset Value * EF –Exposure Factor (EF) – Loss Potential of a specific asset by a realized risk –Example – DOS Web Application (Input Validation) »Asset Values = $2,000,000 »EF = 20% »SLE =$2,000,000 * 20% = $400,000 »ARO = 10% »ALE = 10% * $400,000 = $40,000

10 OWASP AppSec 2004 9  Qualitative Risk Assessment –Scenario/Judgment Based –Experience Based …  Risk Assessment Results  Determine the appropriate management actions  Set priorities for managing information security risk  Implement controls to protect against realized risk Develop Security Management Policies/Procedures

11 OWASP AppSec 2004 10  Select Appropriate Security Controls  Implement controls to ensure risks are reduced to an acceptable level.  Controls should be selected based on the cost of implementation in relation to the risk being reduced and the potential losses if a security breach occurs. Develop Security Management Policies/Procedures

12 OWASP AppSec 2004 11 What Is The ISO 17799 Standard?  ISO – International Organization for Standardization  Complete Set Of Controls To Ensure The Best Practices For Information Security  The Major Standard - Internationally Recognized Information Security Standard  Guideline - Guiding principle providing a good starting point for implementing information security. They are either based on essential legislative requirements or considered to be common best practices for information security.  Legislative Controls  12.1.4 – Data Protection and Privacy of Personal Information  12.1.3 – Safeguarding of Organizational Records  12.1.2 – Intellectual Property Rights  Best Practices  3.1 – Information Security Policy Document  4.1.3 – Allocation of Information Security Responsibilities  6.2.1 – Information Security Education and Training  6.3.1 – Reporting Security Incidents  11.1 Business Continuity Management

13 OWASP AppSec 2004 12 What Is The ISO 17799 Standard?  10 Sections  Security Policy – To provide management direction & support for information security  Organizational Security – Manage information security within the organization  Asset Classification and Control – To maintain appropriate protection of organizational assets  Personnel Security – To reduce the risk of human error, theft, fraud or misuse of facilities  Physical & Environmental Security – To prevent unauthorized access, damage and interference to business premises and information  Communications and Operations Management – To ensure the correct and secure operations of information processing facilities  Access Control – Control access to information  System Development and Maintenance – To ensure security is built into information systems  Business Continuity Management – To counteract interruptions to business activities and to protect critical business processes from the effects of major failures or disasters  Compliance – To avoid breaches of any criminal and civil law, statutory, regulatory or contractual

14 OWASP AppSec 2004 13 ISO 17799 OWASP Project Details  Documentation Project  Toolbox Of Sample Templates Of ISO 17799 Policies & Procedures  What Exists Today  ISO 17799 Is A Standard Not a tool  Not Many Publicly Available Templates  Commercial Licensed Templates Are Poor Quality

15 OWASP AppSec 2004 14 Implementation Example  8.1.2 Operational Change Control  Inadequate control may cause system or security failures  Formal management responsibilities and procedures should be in place  Operational programs subject to strict change control  Current State Of Project  Many templates  Todo: Pull all templates together into a consistent format and publish

16 OWASP AppSec 2004 15 Critical Success Factors  Targeted Risk Assessment  Implement Good Controls  Use Already Proven Policies & Procedures  Training & Awareness  Get Some More Sleep At Night!!!

17 OWASP AppSec 2004 16 OWASP Needs Your Feedback!  Send Us Your Templates  Modifications To Existing Templates  Can you get involved?

18 OWASP AppSec 2004 17 References  ISO/IEC 17799:2000(E)  CISSP:Certified Information Systems Security Professional Study Guide, Ed Tittel  OWASP ISO 17799 Project


Download ppt "Copyright © 2004 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation."

Similar presentations


Ads by Google