Top Banner
Nick Coblentz ([email protected]) http://nickcoblentz.blogspot.com OWASP CLASP Overview
24
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

Nick Coblentz ([email protected])http://nickcoblentz.blogspot.com

OWASP CLASP Overview

Page 2: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

2

OWASP CLASP Presentation Outline

What is CLASP?CLASP best practicesCLASP OrganizationBirds-Eye view of CLASP ProcessConcepts View

Security ServicesVulnerability-View

Role-Based ViewIntroduction to each role

Activity-Assessment ViewExamples

Activity-Implementation ViewExamples

CLASP Roadmap

Page 3: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

3

What Is CLASP?

Comprehensive, Lightweight, Application Security Process

OWASP project

“Activity driven, role-based set of process components whose core contains formalized best practices for building security into your existing or new-start software development life cycles in a structured, repeatable, and measurable way”

Page 4: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

4

What is CLASP?

Method for applying security to an organization's application development process

Adaptable to any organization or development process

OWASP CLASP is intended to be a complete solution that organizations can read and then implement iteratively

Focuses on leveraging a database of knowledge (CLASP vulnerability lexicon, security services, security principles, etc) and automated tools/processes

Page 5: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

5

CLASP Best Practices

Institute security awareness programsProvide security training to stakeholdersPresent organization's security policies, standards, and secure coding guidelines

Perform application assessmentsIs a central component in overall strategyFind issues missed by implemented “Security Activities”Leverage to build a business case for implementing CLASP

Capture security requirementsSpecify security requirements along side business/application requirements

Implement secure development processInclude “Security Activities”, guidelines, resources, and continuous reinforcement

Page 6: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

6

CLASP Best Practices

Build vulnerability remediation proceduresDefine steps to identify, assess, prioritize, and remediate vulnerabilities

Define and monitor metricsDetermine overall security postureAssess CLASP implementation progress

Publish operational security guidelinesMonitor and manage security of running systemsProvide advice and guidance regarding security requirements to end-users and operational staff

Page 7: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

7

CLASP Organization

Concepts ViewRole-Based ViewActivity-Assessment

Implementation costsActivity applicabilityRisk of inaction

Activity-implementation24 “Security Activities”

Vulnerability LexiconConsequences, problem types, exposure periods, avoidance & mitigation techniques

Additional Resources

Page 8: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

8

Birds-Eye View of CLASP Process

StakeholdersRead & understand “Concepts View”Read & understand “Role-Based View”

Project managerReads and understands “Activity-Assessment View”Determines applicable and feasible “Security Activities” to implementTies stakeholder roles to “Security Activities”Facilitates “Roles” to learn and execute “Security Activities”Measures progress and holds “Roles” accountable (Metrics)

Roles (PM, Architect, Designer, Implementer, ...)Execute “Security Activities” leveraging automated tools and CLASP & Organization knowledge base (Vulnerability Lexicon and other Resources)

Page 9: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

9

Concepts View – CLASP Security Services

Fundamental security goals that must be satisfied for each resource:

Authorization (access control)AuthenticationConfidentialityData IntegrityAvailabilityAccountabilityNon-Repudiation

Page 10: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

10

Concepts View – Overview of Vulnerability View

VulnerabilityProblem types:

104 typesExample: Buffer Overflow

Categories:Range and Type Errors Environmental Problems Synchronization & Timing Errors Protocol Errors General Logic Errors

Exposure periodsDevelopment artifact

ConsequencesViolated Security Service

Vulnerability (Continued)Platforms

Language, OS, DB, etc.

ResourcesRisk assessment

SeverityLikelihood

Avoidance and mitigation periodsAdditional Info

Overview, description, examples, related problems

Knowledge Base Provided!

Page 11: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

11

Role-Based View - Introduction

CLASP ties “Security Activities” to roles rather than development process stepsRoles:

Project Manager Drives the CLASP initiative

Requirements SpecifierArchitectDesignerImplementerTest AnalystSecurity Auditor

Page 12: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

12

Role-Based View – Project Manager

Drives CLASP initiativeManagement buy-in mandatorySecurity rarely shows up as a featureResponsibilities:

Promote security awareness within teamPromote security awareness outside teamManage metrics

Hold team accountableAssess overall security posture (application and organization)

Possibly map this to a Security Manager and Project Manager because:

PM may not have expertiseSM may want to apply over the entire organizationPM would still be responsible for day-to-day tasks

Page 13: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

13

Role-Based View – Requirements Specifier

Generally maps customer features to business requirementsCustomers often don't specify security as a requirementResponsibilities:

Detail security relevant business requirementsDetermine protection requirements for resources (following an architecture design)Attempt to reuse security requirements across organizationSpecify misuse cases demonstrating major security concerns

Page 14: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

14

Role-Based View – Architect

Creates a network and application architectureSpecify network security requirements such as firewall, VPNs, etc.Responsibilities:

Understand security implications of implemented technologiesEnumerate all resources in use by the systemIdentify roles in the system that will use each resourceIdentify basic operations on each resourceHelp others understand how resources will interact with each otherExplicitly document trust assumptions and boundariesProvide these items in a written format and include diagrams (for example network component model, applic

Page 15: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

15

Role-Based View – Designer

Keep security risks out of the applicationHave the most security-relevant workResponsibilities:

Choose and research the technologies that will satisfy security requirementsAssess the consequences and determine how to address identified vulnerabilitiesSupport measuring the quality of application security effortsDocument the “attack surface” of an application

Designers should:Push back on requirements with unrecognized security risksGive implementers a roadmap to minimize the risk of errors requiring an expensive fixUnderstand security risks of integrating 3rd party softwareRespond to security risks

Page 16: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

16

Role-Based View – Implementer

Application developersTraditionally carries the bulk of security expertise

Instead this requirement is pushed upward to other roles

Responsibilities:Follow established secure coding requirements, policies, standardsIdentify and notify designer if new risks are identifiedAttend security awareness trainingDocument security concerns related to deployment, implementation, and end-user responsibilities

Bulk of security expertise is shifted to designer, architect, and project manager

Pros and Cons?

Page 17: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

17

Role-Based View – Test Analyst

Quality assuranceTests can be created for security requirements in addition to business requirements/features

Security testing may be limited due to limited knowledge

May be able to run automated assessment toolsMay only have a general understanding of security issues

Page 18: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

18

Role-Based View – Security Auditor

Examines and assures current state of a projectResponsibilities:

Determine whether security requirements are adequate and completeAnalyze design for any assumptions or symptoms of risk that could lead to vulnerabilitiesFind vulnerabilities within an implementation based on deviations from a specification or requirement

Page 19: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

19

Activity-Assessment View Overview

There are 24 CLASP “Security Activities”Added iteratively

Activity-Assessment View allows a project manager to determine appropriateness of CLASP activitiesGuide provides:

Activity applicabilityRisks due to omission of activityEstimation of implementation costRoles that will execute activity

Page 20: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

20

Activity-Assessment and Roles

Page 21: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

21

Activity-Assessment Example Item

Page 22: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

22

Activity-Implementation View Introduction

Defines the purpose or goals for the “Security Activity”Provides details regarding:

Sub goals such as:“Provide security training to all team members”“Appoint a project security officer”

Describes in detail how to carry out tasks or accomplish goalsDetails which CLASP resources support these tasks

ex: vulnerability lexicon to examine secure coding practices

ex: Security Services to examine threats to a resource (threat modeling)

**Show Example Here**, “Perform security analysis of system requirements and design (threat modeling)”

Page 23: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

23

CLASP Roadmaps

Legacy application roadmap:Minimal impact on ongoing development projectsIntroduce only highest relative impact on securityKey steps (12 total):

1 – Security awareness program6 – Security assessment8 – Source-level security review

Green-field roadmap:holistic approachIdeal for new software development

Especially Spiral and Iterative models

Key steps (20 total):1 – Security awareness program

2 – Metrics

3 – 8 Security related planning and design

9 – Security principles

12 – Threat modeling

16 – Source-level review

17 – Security assessment

Page 24: Nick Coblentz (Nick.Coblentz@gmail.com)  OWASP CLASP Overview.

24

Questions?

More information:http://www.owasp.org/index.php/Category:OWASP_CLASP_Project

Downloadable “Book”http://www.list.org/~chandra/clasp/OWASP-CLASP.zip