ISO 29147 How to leverage Dick Hacking Cornerstones of Trust 2014.

Slides:



Advertisements
Similar presentations
Metrics and Databases for Agile Software Development Projects David I. Heimann IEEE Boston Reliability Society April 14, 2010.
Advertisements

Tivoli Service Request Manager
Copyright (C) The Open Group 2014 Securing Global IT Supply Chains and IT Products by Working with Open Trusted Technology Provider™ Accredited Companies.
Weekly Risk Report & Performance Metrics
Chapter 10 Schedule Your Schedule. Copyright 2004 by Pearson Education, Inc. Identifying And Scheduling Tasks The schedule from the Software Development.
ICASAS305A Provide Advice to Clients
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
ISO General Awareness Training
How ISO Standards Relates to Usability:. INTRODUCTION/ Before we can relate the ISO standards to usability, first we need to know what the meaning of.
Date: 03/05/2007 Vendor Management and Metrics. 2 A.T. Kearney X/mm.yyyy/00000 AT Kearney’s IT/Telecom Vendor Facts IT/Telecom service, software and equipment.
Chapter 8 Risk Analysis Management of Computer System Performance.
Computer Security: Principles and Practice
RC14001 ® Update GPCA Responsible Care Committee September 23, 2013.
Static Code Analysis and Governance Effectively Using Source Code Scanners.
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
OHT 2.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 Software Quality assurance (SQA) SWE 333 Dr Khalid Alnafjan
Website Hardening HUIT IT Security | Sep
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
© 2006 Jupitermedia Corporation Webcast TitleSuccessful Rollout Planning 1 January 19, :00pm EST, 11:00am PST George Spafford, President Spafford.
Introduction to the Enterprise Library. Sounds familiar? Writing a component to encapsulate data access Building a component that allows you to log errors.
S/W Project Management
Chapter 2 The process Process, Methods, and Tools
A Framework for Automated Web Application Security Evaluation
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
LAA Judging Criteria & Process 2015
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
NIST Special Publication Revision 1
Information System Design IT60105 Lecture 21 Staff Organization, Risk Management and Software Configuration Management.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
1 1 Vulnerability Assessment of Grid Software Jim Kupsch Associate Researcher, Dept. of Computer Sciences University of Wisconsin-Madison Condor Week 2006.
Service Transition & Planning Service Validation & Testing
APRICOT 2015 Security Day Cooperation between Security Teams and Network Operators: Actionable Intelligence on ShellShock Arnold S. Yoon Information Security.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
Product Stewardship: Putting It into Practice GCWellon, Manager, Responsible Care Methanex Corporation June 2010.
Auditing IT Vulnerabilities IT vulnerabilities are weaknesses or exposures in IT assets or processes that may lead to a business risk or security risk.
Legitimate Vulnerability Markets By: Jeff Wheeler.
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
1 Software Engineering: A Practitioner’s Approach, 6/e Chapter 10a: Architectural Design Software Engineering: A Practitioner’s Approach, 6/e Chapter 10a:
SecSDLC Chapter 2.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
IoT Trust Framework leading to self regulation code of conduct and certification models Craig Spiezle Executive Director & President Online.
Rational Unified Process Fundamentals Best Practices of Software Engineering Rational Unified Process Fundamentals Best Practices of Software Engineering.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Installation and Maintenance of Health IT Systems Unit 8a Troubleshooting; Maintenance and Upgrades; and Interaction with Vendors, Developers, and Users.
A Web Service Software Factory Introduction Don Smith Product Manager patterns & practices.
Configuration & Build Management. Why Software Configuration Management ? The problem: Multiple people have to work on software that is changing More.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Office 365 Security Assessment Workshop
Software Configuration Management
Software Project Configuration Management
CompTIA Security+ Study Guide (SY0-401)
LAA Judging Criteria & Process
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Managing the Project Lifecycle
Business in a Connected World
Quality Management Systems (QMS)
Applied Software Implementation & Testing
Software Quality Engineering
Software Assurance Maturity Model
Figure 6-4: Installation and Patching
Cyber Security Incident Response Playbooks
LAA Judging Criteria & Process
BMC Automation Portal Update
Vulnerability Reporting Process
V1.1 1.
3. Software Quality Management
Anatomy of a Common Cyber Attack
Presentation transcript:

ISO How to leverage Dick Hacking Cornerstones of Trust 2014

Dick Hacking Set up the response program at NetApp Worked on Security issues in products for the last 30 years at CapGemini, Unisys and Zilog Also familiar with SEC 17a4-compliant data retention products Job seeker, currently

I've looked at clouds from both sides now From up and down, and still somehow It's cloud illusions I recall I really don't know clouds at all

Agenda What are ISO and ISO 30111? In-depth How can we use these new standards Benefits to Practitioners Benefits to Vendors

What are they? These standards together form a standardized vendor framework for a response and disclosure process to address Suspected Security Vulnerabilities in products

ISO Addresses how vendors should be responding to and disclosing suspected security vulnerabilities in their product Covers the two ends of the cycle – Specifies how to act on received reports – Specifies what kinds of information to consider including in a disclosure notice – Suggests how to distribute information about the report (internally and externally)

ISO This standard covers the Engineering tasks needed to mitigate any problem(s) validated in a suspected vulnerability report – Triage – Investigation – Resolution Usually internal to the vendor

Goals of Vulnerability Disclosure Ensuring that identified vulnerabilities are addressed Minimizing the risk from vulnerabilities Providing users with sufficient information to evaluate risks from vulnerabilities to their systems Setting expectations to promote positive communication and coordination among involved parties

ISO In Depth Addresses both real and perceived vulnerabilities Prescribes a special handling mechanism Uses both perceived and real impact metrics Ensures that all reports are tracked and responded to Does NOT address timeframes

ISO In Depth Communication with support providers Communication with Product Management Communications with developers and QA Timing of public disclosure notices Timing of fixed releases

Recognizes that third-party (open-source) code could be involved Provides for Coordinators between finders and vendors to minimize the possibility of blackmail or extortion Ensures a consistent mechanism

Disclosure Notice Content Whether it’s real or perceived How to recognize the vulnerability How to evaluate impact on your systems How to mitigate before a fix is available Which release(s) fix the issue(s) How to repair any damage

How Can We Use These Standards Need to know all Vendors’ CSIRT mail aliases Know where to find previously addressed issues on vendor support site Make your own template for submission – Contact info – Minimum needed to describe problem, product Release version numbers are critical – Do not include reproduction info initially

Minimum Submission Info Product Name and version Release Version installed Operating System Client or Server issue Brief symptoms CVSS from your point of view Remediation(s) attempted with results Is there corrupted or lost data?

Benefits to Practitioners Clean method to report vulnerabilities Clean method to research known issues Common expectations as to responses

Benefits to Vendors Repeatable and well-oiled response process Guidance as to expectations by customers Common severity calculations – CVSS Common Vulnerability Scoring System

How to Help Vendors Look up known and addressed issues Update all software/applications promptly Submit a report to the vendor Wait for further instructions to submit exact reproduction information in a secure manner Don’t report multiple issues in the same mail unless they have a common root-cause

Further Reading CVSS Standards guide – CVSS Calculator – ion=2 ion=2

Further Reading ISO Information technology — Security techniques — Evaluation criteria for IT security ISO 27034, Information technology – Security techniques - Application security ISO 28001, Security management systems for the supply chain — Best practices for implementing supply chain security, assessments and plans

Caveat The US price for the two standards is over $400. The more useful one is ISO 29147

Contact Info Dick Hacking