Re: [SC-L] [article] When risk management goes bad

2015-02-24 Thread Christian Heinrich
Gary,

On Sat, Feb 21, 2015 at 6:13 AM, Gary McGraw  wrote:
> I wrote my latest SearchSecurity article based on conversations I have been 
> having with a number of CSOs and
> security execs.  It’s about what happens when risk management goes bad.  The 
> biggest failure condition seems
> to be “ignoring the lows” entirely.

"High" technology risks, such as chained exploits, are "low" business
risks in the context of ISO 31000 et al.


-- 
Regards,
Christian Heinrich

http://cmlh.id.au/contact

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] BSIMM-V Article in Application Development Times

2014-01-08 Thread Christian Heinrich
Stephen,

On Sat, Jan 4, 2014 at 8:12 PM, Stephen de Vries
 wrote:
> Leaving the definition of agile aside for the moment, doesn’t the fact that 
> the BSIMM measures
> organisation wide activities but not individual dev teams mean that we could 
> be drawing inaccurate
> conclusions from the data?  E.g.  if an organisation says it is doing Arch 
> reviews, code reviews and
> sec testing, it doesn’t necessarily mean that every team is doing all of 
> those activities, so it may give
> the BSIMM reader a false impression of the use of those activities in the 
> real world.
>
> In addition to knowing which activities are practiced organisation wide, it 
> would also be valuable to
> know which activities work well on a per-team or per-project basis.

My reading of the "Roles" section of BSIMM-V.pdf is that the people
interviewed for the BSIMM sample are:
1. Executive Leadership (or CISO, VP of Risk, CSO, etc)
2. Everyone else within the Software Security Group (SSG)

What you are asking to be included is what is referred to as the
"Satellite" within BSIMM-V.pdf and I believe this may also require the
inclusion of http://cmmiinstitute.com/cmmi-solutions/cmmi-for-development/
too (why not :) ).

The issue with this is that it would invalidate the statistics from
the prior five BSIMM releases due to the inclusion of new questions
and in additional these new statistics were not gathered over time
either hence the improvements measured over time within BSIMM would be
invalid too due tot he new dataset.

Furthermore, Gary, Sammy and Brian have limited time to interview all
67 BSIMM participating firms.

However, I would be interested to know the "BSIMM Advisory Board" i.e.
http://bsimm.com/community/ view on this is and if it would be
possible to undertake this additional sampling within their own BSIMM
participating firm to determine if there is additional value would be
gained for BSIMM?  However, I suspect that an objective measurement
would be too hard to quantify due to internal politics of each BSIMM
participating firm but I could be wrong.


-- 
Regards,
Christian Heinrich

http://cmlh.id.au/contact

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


[SC-L] OWASP Top Ten - Comparison of 2013, 2010, 2007, 2004 and 2003 Releases

2013-08-12 Thread Christian Heinrich
The comparison of the 2013, 2010, 2007, 2004 and 2003 releases of the
OWASP Top Ten can be downloaded from
https://github.com/cmlh/OWASP-Top-Ten-2013/releases


-- 
Regards,
Christian Heinrich

http://cmlh.id.au/contact
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] Security in open source components

2012-10-28 Thread Christian Heinrich
... and I found https://github.com/jeremylong/DependencyCheck#readme today
(i.e. Sunday 28 October 2012) via GitHub.

On Fri, Oct 26, 2012 at 10:34 AM, Christian Heinrich <
christian.heinr...@cmlh.id.au> wrote:

> Grant,
>
> ... and
> http://www.scmagazine.com.au/News/320617,redhat-project-fights-java-vulnerabilities.aspx
> was published yesterday (25 Oct).
>
> On Mon, Oct 1, 2012 at 3:19 PM, Christian Heinrich
>  wrote:
> > Grant,
> >
> > Below are the discussions related to Maven and the paper referenced:
> > 1. http://krvw.com/pipermail/sc-l/2012/002786.html
> > 2. http://krvw.com/pipermail/sc-l/2012/002788.html
> >
> > On Fri, Sep 28, 2012 at 9:10 AM, Grant Murphy 
> wrote:
> >> I don't have the original mail but some time ago a thread on this list
> >> mentioned this article:
> >>
> >>
> http://www.sonatype.com/Products/Why-Sonatype/Reduce-Security-Risk/Security-Brief
>
>
> --
> Regards,
> Christian Heinrich
>
> http://cmlh.id.au/contact
>



-- 
Regards,
Christian Heinrich

http://cmlh.id.au/contact
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] Security in open source components

2012-10-26 Thread Christian Heinrich
Grant,

... and 
http://www.scmagazine.com.au/News/320617,redhat-project-fights-java-vulnerabilities.aspx
was published yesterday (25 Oct).

On Mon, Oct 1, 2012 at 3:19 PM, Christian Heinrich
 wrote:
> Grant,
>
> Below are the discussions related to Maven and the paper referenced:
> 1. http://krvw.com/pipermail/sc-l/2012/002786.html
> 2. http://krvw.com/pipermail/sc-l/2012/002788.html
>
> On Fri, Sep 28, 2012 at 9:10 AM, Grant Murphy  wrote:
>> I don't have the original mail but some time ago a thread on this list
>> mentioned this article:
>>
>> http://www.sonatype.com/Products/Why-Sonatype/Reduce-Security-Risk/Security-Brief


-- 
Regards,
Christian Heinrich

http://cmlh.id.au/contact
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] Security in open source components

2012-10-02 Thread Christian Heinrich
Grant,

Below are the discussions related to Maven and the paper referenced:
1. http://krvw.com/pipermail/sc-l/2012/002786.html
2. http://krvw.com/pipermail/sc-l/2012/002788.html

On Fri, Sep 28, 2012 at 9:10 AM, Grant Murphy  wrote:
> I don't have the original mail but some time ago a thread on this list
> mentioned this article:
>
> http://www.sonatype.com/Products/Why-Sonatype/Reduce-Security-Risk/Security-Brief


-- 
Regards,
Christian Heinrich

http://cmlh.id.au/contact
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] security in open source components

2012-05-04 Thread Christian Heinrich
Johan,

Since each git commit is SHA-1 and is popular with open source
projects then it would be possible incorporate them as a "submodule"
as part of your larger superproject within git but it does have some
limitations outlined within
http://stackoverflow.com/questions/996164/is-anyone-really-using-git-super-subprojects

Let me know if this addresses your concern or if I am way off?

On Wed, Apr 25, 2012 at 6:22 AM, Johan Peeters  wrote:
> These points are important. However, I am also concerned about
> component distribution.
> How can I be sure that the binary component my build script retrieves
> from, say, Maven Central is the one released by the relevant open
> source project? I know there are checksums and such, but I remain to
> be convinced that this typically affords adequate protection or that
> it even could do so. If my fears are well-founded, current
> distribution mechanisms of open source components provide the ideal
> opportunity for installing back-doors on the server side.
> I hope I am just being paranoid and the authors neglected to talk
> about distribution because it is obviously secure. I certainly would
> have been happier if distribution had been analysed and found secure,
> or, even, not terribly insecure.
> Does anyone else share these concerns? Or can anyone allay my fears?


-- 
Regards,
Christian Heinrich

http://cmlh.id.au/contact
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___