Copyright © 2004 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.

Slides:



Advertisements
Similar presentations
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Advertisements

Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Auditing A Risk-Based Approach To Conducting A Quality Audit
First Practice - Information Security Management System Implementation and ISO Certification.
COMP8130 and 4130Adrian Marshall 8130 and 4130 Test Management Adrian Marshall.
System Implementations American corporations spend about $300 Billion a year on software implementation/upgrade projects.
Purpose of the Standards
Building a Compliance Risk Monitoring Program HCCA Compliance Institute New OrleansApril 19, 2005 Lois Dehls Cornell, Esq. Assistant Vice President, Deputy.
Information Systems Controls for System Reliability -Information Security-
This is a work of the U.S. Government and is not subject to copyright protection in the United States. The OWASP Foundation OWASP AppSec DC October 2005.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Internal Auditing and Outsourcing
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
The Evergreen, Background, Methodology and IT Service Management Model
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Test Organization and Management
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
4 March 2014 ©2014 Newdea, Inc. 2 A Global, On-Line, Customizable Project Management Tool for PPD Coordination Units Outcomes >Transparency >Learning.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
CDS Operational Risk Management - October 28, 2005 Existing Methodologies for Operational Risk Mitigation - CDS’s ERM Program ACSDA Seminar - October 26.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Implementing and Auditing Ethics Programs
Managing Risk Through Performance Measurement FIRMA Risk Management Training Conference Lori Loken-King - SVP Union Bank, N.A., Operational Risk Management.
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Using a Comprehensive Occupational Exposure Database to Integrate Members of the Occupational Health Team and Improve Your Occupational Health Program.
IT Requirements Management Balancing Needs and Expectations.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Case for Quality Initiative Industry Perspective Monica J. Wilkins April 30, 2013.
NAME Evaluation Report Name of author(s) Name of institution Year.
Paul Hardiman and Rob Brown SMMT IF Planning and organising an audit.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 Pesticide Program Dialogue Committee Meeting State Lead Agency Presentation Chuck Andrews, Chair AAPCO Worker Protection Committee California Department.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
SOFTWARE PROJECT MANAGEMENT
Strategies for Knowledge Management Success SCP Best Practices Showcase March 18, 2004.
OHT 12.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 Introduction Types of external participants Risks and benefits of introducing.
Kathy Corbiere Service Delivery and Performance Commission
Continual Service Improvement Methods & Techniques.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
National Center for Coastal Ocean Science Environmental Management System Implementation August 2005.
Unifying Talent Management. Harnessing the Power of Workforce Intelligence in Talent Planning to Drive Business Performance.
Safety Management Systems Session Four Safety Promotion APTA Webinar June 9, 2016.
New Ecological Science Advice for Ecosystem Protection The EPA Science Advisory Board (SAB) Staff Office supports three external scientific advisory committees.
Kick starting your due diligence programme
Physical Security Governance Model
Software Quality Control and Quality Assurance: Introduction
Lessons Learned: Implementing a Vulnerability Management Program
Self Identified Issues
Description of Revision
Making Information Security Manageable with GRC
Making Information Security Actionable with GRC
Governance Lisa Lugo Senior Vice President Strategic Operations
Pierce County Performance Audit Committee
Week Ten – IT Audit Reporting
Re-Purposing and Reusing Training Materials Online
Internal controls Project support overview.
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation OWASP AppSec June 2004 NYC The Need for Metrics and Measurement in Application Security Jack Danahy OWASP Metrics and Measurement Standards Committee Project Lead

OWASP AppSec The Need for Metrics Identify critical areas of focus Set security investment priorities Track effectiveness of remediation and training Target critical remediation needs Evaluate ROI in security training investment Set and monitor security acceptance criteria Monitor compliance with established thresholds Publish trend analyses to document security efforts/progress Evaluate outsourcers’ compliance with contractual requirements Identify critical vulnerabilities early Learn how to fix the vulnerability Confirm vulnerability elimination Monitor performance of development teams and outsourcers Set critical priorities and security exit criteria Publish results Prexis Vulnerability Analysis Data Compliance/ Audit Managers Developers Program Managers Development Managers CSO/CISO

OWASP AppSec OWASP Metrics and Measurement Project Goals  Member survey and outreach to characterize significant and required metrics  Metrics gathering best practices framework  Recommendations for metrics gathering, tool analysis, metrics aggregation and weighting

OWASP AppSec The Case for Measurement The Need for Metrics:  Certification  Prioritization  Remediation  Tracking

OWASP AppSec Metrics for Certification  Governance  Credible, reliable metrics support compliance efforts by demonstrating pervasive security  Stability  Proof of security and lack of excessive patching increase customer confidence and reduce operational risk  Functionality  Validation of appropriate implementation of defined security components ensures that product meets baseline security requirements

OWASP AppSec Metrics for Prioritization  Determine application or project vulnerability  Determine severity of vulnerabilities  Prioritize remediation efforts low exposure Audience and Exposure high exposure Low Value High

OWASP AppSec Metrics for Remediation  Informed business-level decision support  Legacy applications: Wrap it, rewrite it, or replace it  Outsourced projects: Baselines and thresholds drive acceptance criteria and accountability  Resource allocation: focus investments and attention  Efficient workflow for developers  Specific identification of vulnerability  Explanation of vulnerability including potential impact  Conclusive remediation recommendations

OWASP AppSec Metrics for Tracking  Establish baseline and acceptable thresholds  Set accountability expectations with external vendors  Measure team performance  Provide reliable information to all areas of organization  Monitor progress over time requires:  Granularity of information  Periodicity of data (regulatory and public company requirements)

OWASP AppSec Sample Outsourcer Report Card

OWASP AppSec The Case for Measurement  Certification: Provide quantifiable measurement of security  Prioritization: Make informed resource allocation decisions  Remediation: Identify and eliminate risks caused by vulnerabilities  Tracking: Prove progress against reliable baselines and thresholds

OWASP AppSec Call for Participation  Active recruitment efforts underway   Questions? Comments?  Contact me at:

OWASP AppSec Thank you