Re: [SC-L] How is secure coding sold within enterprises?

2007-03-20 Thread McGovern, James F (HTSC, IT)
Thanks for the response. I already own the book and understand how to engage 
vendors. Where I am seeking assistance is all the work that goes on within a 
large enterprise before these two things occur. The ideal situation for me 
would be to get my hands on the five to ten page Powerpoint slide deck that 
others who have blazed this path before me have used to sell the notion to 
their executives.

-Original Message-
From: Andrew van der Stock [mailto:[EMAIL PROTECTED]
Sent: Monday, March 19, 2007 5:06 PM
To: McGovern, James F (HTSC, IT)
Cc: SC-L
Subject: Re: [SC-L] How is secure coding sold within enterprises?


In terms of creating a SDLC, pop out to Borders and get Howard and Lipner's 
The Security Development Lifecycle ISBN 9780735622142

http://www.microsoft.com/mspress/books/8753.aspx

It is simply the best text I've read in a long time. 

You may be interested in the work Mark Curphey et al is doing at his new start 
up. They launched an ISM portal a couple of weeks back. 

http://www.ism-community.org/

If you're just after ideas on how to engage vendors, check out Curphey's blog 
for some nice insider posts:

http://securitybuddha.com/2007/03/07/top-10-tips-for-hiring-web-application-pen-testers/
http://securitybuddha.com/2007/03/07/top-ten-tips-for-hiring-security-code-reviewers/
http://securitybuddha.com/2007/03/08/top-ten-tips-for-managing-technical-security-folks/

He ran Foundstone's services for a while, and built up a pretty good 
consultancy. 

The sort of metrics you're after are notoriously hard to find out in the wild. 
There's some folks capturing screenshots of enterprise dashboards. This may or 
may not help at all. 

http://dashboardspy.com/

Thanks,
Andrew


On 3/19/07 4:12 PM, McGovern, James F (HTSC, IT) [EMAIL PROTECTED] wrote:



I agree with your assessment of how things are sold at a high-level but still 
struggling in that it takes more than just graphicalizing of your points to 
sell, hence I am still attempting to figure out a way to get my hands on some 
PPT that are used internal to enterprises prior to consulting engagements and I 
think a better answer will emerge. PPT may provide a sense of budget, 
timelines, roles and responsibilities, who needed to buy-in, industry metrics, 
quotes from noted industry analysts, etc that will help shortcut my own work so 
I can start moving towards the more important stuff.



-Original Message-
From: Andrew van der Stock  [ mailto:[EMAIL PROTECTED]
Sent: Monday, March 19, 2007 2:50  PM
To: McGovern, James F (HTSC, IT)
Cc:  SC-L
Subject: Re: [SC-L] How is secure coding sold within  enterprises?

There are two major methods:

 


1.  Opportunity cost / competitive advantage (the  Microsoft model)   

2.  Recovery cost reductions (the model used by most  financial 
institutions)



Generally,  opportunity cost is where an organization can further its goals by 
a secure  business foundation. This requires the CIO/CSO to be able to sell the 
business  on this model, which is hard when it is clear that many businesses 
have been  founded on insecure foundations and do quite well nonetheless. 
Companies that  choose to be secure have a competitive advantage, an advantage 
that will  increase over time and will win conquest customers. For example (and 
this is  my humble opinion), Oracle's security is a long standing unbreakable 
joke, and  in the meantime MS ploughed billions into fixing their tattered 
reputation by  making it a competitive advantage, and thus making their market 
dominance  nearly complete. Oracle is now paying for their CSO's mistake in not 
 understanding this model earlier. Forward looking financial institutions are  
now using this model, such as my old bank's (with its SMS transaction  
authentication feature) winning many new customers by not only promoting  
themselves as secure, but doing the right thing and investing in essentially  
eliminating Internet Banking fraud. It saves them money, and it works well for  
customers. This is the best model, but the hardest to sell.

The second  model is used by most financial institutions. They are mature risk 
managers  and understand that a certain level of risk must be taken in return 
for doing  business. By choosing to invest some of the potential or known 
losses in  reducing the potential for massive losses, they can reduce the 
overall risk  present in the corporate risk register, which plays well to 
shareholders. For  example, if you invest $1m in securing a cheque clearance 
process worth (say)  $10b annually to the business, and that reduces check 
fraud by $5m per year  and eliminates $2m of unnecessary overhead every year, 
security is an easy  sell with obvious targets to improve profitability. A well 
managed operational  risk group will easily identify the riskiest aspects of a 
mature company's  activities, and it's easy to justify improvements in those 
areas. 

The  FUD model (used by many vendors - do this or the SOX 

Re: [SC-L] Economics of Software Vulnerabilities

2007-03-20 Thread ljknews
At 8:55 AM -0400 3/20/07, Michael S Hines wrote:
 I'm not sure what your sources are but from what I'm hearing and reading the
 problem is that there are many missing drivers for what have become standard
 peripherals that people are used to - and some of the vendors are reluctant
 to develop new drivers (the driver technology changed in Vista - so all
 drivers have to be reworked).
 
 MP3 players, ePhones, PDA's, etc. have become standard components in many
 places...  and they don't work with Vista - yet (if ever).

That is because the features provided by many add-on products depended on
the longstanding loose state of security on Microsoft Windows.

 It's the feature thing not that users are shunning security.
 
 And, at least to me, it is an indication that M$ did not understand the
 marketplace or rushed the (incomplete) product to market.  There's more than
 one way to foul up a new product launch.

The previous Microsoft mode had been to favor anything that would ease
feature implementation over anything that would provide security.
-- 
Larry Kilgallen
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] How is secure coding sold within enterprises?

2007-03-20 Thread Gunnar Peterson
JD Meier had a good post recently on influencing without authority, which is the
position security finds itself in:

1. assume all potential allies
2. clarify goals and priorities
3. diagnose the allies world
4. identify relevant currencies
5. deal with relationships
6. influence through give and take

http://blogs.msdn.com/jmeier/archive/2007/03/09/influencing-without-authority.aspx

how does this translate to app security? well i think it means find
stakeholders/allies wherever you can. any group that is interested try to 1)
educate them about software risks and software security and 2) give them
tools/process they can bring to bear on the problem. specifically, legal teams
are generally very interested in risks, so i have seen several legal teams at
very large companies deploy parts of the OWASP legal project to good effect.
business analysts can be trained on how specify some security concerns in use
cases/user stories. qa teams can be educated on security specific testing tools
and techniques, architects can learn how to design reusable security services,
and so on. so whatever group that seems eager to get involved it makes sense to
engage, once security concerns are embedded in test plans and use cases, aligned
with business goals, the software security effort is not a one off from a
developer point of view.

find all allies, turn none away, arm them with knowledge, turn em loose.

the other issue is that there are many security services that you cannot expect
an app project to deliver on its own. skyscrapers should not have to have their
own fighter jets to protect against people flying planes into them, that is why
you have an air force. making the case for platform security can be hard, but
that is where the architects have to help (i seem to recall that security is a
nonfunctional requirement and that architects are supposed to own non
functional requirements). one of the reasons i like browser-based federated
identity is because you can externalize some authN code from the app, you get
stronger identity tokens across the wire, you don't have developers creating
their own authN code, and of course the users get SSO and SLO. this is like app
armor, in my view, a reference model for security services - improved security
mechanism, great usability, business value, and a simplified programming model.

-gp

Quoting McGovern, James F (HTSC, IT) [EMAIL PROTECTED]:

 Thanks for the response. I already own the book and understand how to engage
 vendors. Where I am seeking assistance is all the work that goes on within a
 large enterprise before these two things occur. The ideal situation for me
 would be to get my hands on the five to ten page Powerpoint slide deck that
 others who have blazed this path before me have used to sell the notion to
 their executives.

 -Original Message-
 From: Andrew van der Stock [mailto:[EMAIL PROTECTED]
 Sent: Monday, March 19, 2007 5:06 PM
 To: McGovern, James F (HTSC, IT)
 Cc: SC-L
 Subject: Re: [SC-L] How is secure coding sold within enterprises?


 In terms of creating a SDLC, pop out to Borders and get Howard and Lipner's
 The Security Development Lifecycle ISBN 9780735622142

 http://www.microsoft.com/mspress/books/8753.aspx

 It is simply the best text I've read in a long time.

 You may be interested in the work Mark Curphey et al is doing at his new
 start up. They launched an ISM portal a couple of weeks back.

 http://www.ism-community.org/

 If you're just after ideas on how to engage vendors, check out Curphey's blog
 for some nice insider posts:


http://securitybuddha.com/2007/03/07/top-10-tips-for-hiring-web-application-pen-testers/

http://securitybuddha.com/2007/03/07/top-ten-tips-for-hiring-security-code-reviewers/

http://securitybuddha.com/2007/03/08/top-ten-tips-for-managing-technical-security-folks/

 He ran Foundstone's services for a while, and built up a pretty good
 consultancy.

 The sort of metrics you're after are notoriously hard to find out in the
 wild. There's some folks capturing screenshots of enterprise dashboards. This
 may or may not help at all.

 http://dashboardspy.com/

 Thanks,
 Andrew


 On 3/19/07 4:12 PM, McGovern, James F (HTSC, IT)
 [EMAIL PROTECTED] wrote:



 I agree with your assessment of how things are sold at a high-level but still
 struggling in that it takes more than just graphicalizing of your points to
 sell, hence I am still attempting to figure out a way to get my hands on some
 PPT that are used internal to enterprises prior to consulting engagements and
 I think a better answer will emerge. PPT may provide a sense of budget,
 timelines, roles and responsibilities, who needed to buy-in, industry
 metrics, quotes from noted industry analysts, etc that will help shortcut my
 own work so I can start moving towards the more important stuff.



 -Original Message-
 From: Andrew van der Stock  [ mailto:[EMAIL PROTECTED]
 Sent: Monday, March 19, 2007 2:50  PM
 To: McGovern, James F (HTSC, IT)
 Cc:  

[SC-L] Question on User Groups

2007-03-20 Thread McGovern, James F (HTSC, IT)
Quick question for folks here. I participate in multiple user-groups and the 
topic of secure coding practices has never appeared. What would it take for a 
software vendor on this list to present to the CT OO Users Group ( 
www.cooug.org). These events are well attended.
 
Likewise, I am also a member of the advisory board for the Technology Managers 
Forum in NYC ( www.techforum.com) where we are working on an upcoming agenda. I 
would like to see secure coding practices become a panel topic here as well. 
Likewise, for folks who want to establish booths, sponsorship opportunities are 
also available.
 
Between these two events, you could have the opportunity to work with lots of 
Fortune enterprises in the Northeast. Besides, we are more interesting than the 
usual government stuff :-)


*
This communication, including attachments, is
for the exclusive use of addressee and may contain proprietary,
confidential and/or privileged information.  If you are not the intended
recipient, any use, copying, disclosure, dissemination or distribution is
strictly prohibited.  If you are not the intended recipient, please notify
the sender immediately by return e-mail, delete this communication and
destroy all copies.
*

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Economics of Software Vulnerabilities

2007-03-20 Thread Wall, Kevin
James McGovern apparently wrote...

 The uprising from customers may already be starting. It is 
 called open source. The real question is what is the duty of 
 others on this forum to make sure that newly created software 
 doesn't suffer from the same problems as the commercial 
 closed source stuff...

While I agree that the FOSS movement is an uprising, it:
1) it's being pushed by customers so much as IT developers
2) the uprising isn't so much as being an outcry against
   security as it is against not being able to have the
   desired features implemented in a manner desired.

At least that's how I see it.

With rare exceptions, in general, I do not find that the
open source community is that much more security consciousness
than those producing closed source. Certainly this seems true
if measured in terms of vulnerabilities and we measure across
the board (e.g., take a random sampling from SourceForge) and
not just our favorite security-related applications.

Where I _do_ see a remarkable difference is that the open source
community seems to be in general much faster in getting security
patches out once they are informed of a vulnerability. I suspect
that this has to do as much with the lack of bureaucracy in open
source projects as it does the fear of loss of reputation to their
open source colleagues.

However, this is just my gut feeling, so your gut feeling my differ.
(But my 'gut' is probably bigger than yours, so feeling prevails. ;-)
Does anyone have any hard evidence to back up this intuition. I
thought that Ross Anderson had done some research along those lines.

-kevin
---
Kevin W. Wall   Qwest Information Technology, Inc.
[EMAIL PROTECTED]   Phone: 614.215.4788
It is practically impossible to teach good programming to students
 that have had a prior exposure to BASIC: as potential programmers
 they are mentally mutilated beyond hope of regeneration
- Edsger Dijkstra, How do we tell truths that matter?
  http://www.cs.utexas.edu/~EWD/transcriptions/EWD04xx/EWD498.html 


This communication is the property of Qwest and may contain confidential or
privileged information. Unauthorized use of this communication is strictly 
prohibited and may be unlawful.  If you have received this communication 
in error, please immediately notify the sender by reply e-mail and destroy 
all copies of the communication and any attachments.

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___