ANATOMY OF AN
APPSEC PROGRAM
OR HOW TO STOP DEPLOYING SHITTY SHODDY CODE TO PRODUCTION
SEPTEMBER 28-29, 2018
2
• Introductions
• The Problem (as I see it)
• The Solution (again, as I see it)
• Finding vulnerabilities
• Fixing things
• Preventing vulnerabilities
• Metrics
• Wrap-up / Q&A
BECAUSE QA SAID I NEEDED ONE
AGENDA
3
THIS IS KINDA IMPORTANT
WARNING
44
THE GLUE THAT STICKS SECURITY BALLS TOGETHER
APPSEC
55
14 YEARS OF THE SAME OL' SHIT CRAP
OWASP TOP 10
66
BECAUSE DRAMA CREATES TENSION
RIPPED FROM THE HEADLINES
7
IT'S SECURITY FOR APPLICATIONS
APPLICATION SECURITY
WHAT IS THIS APPSEC
YOU SPEAK OF?
88
WIKIPEDIA
Application security encompasses measures
taken to improve the security of an
application often by finding, fixing, and
preventing security vulnerabilities.
- Wikipedia
BECAUSE DEFINITIONS ARE AWESOME
99
WIKIPEDIA
Application security encompasses measures
taken to improve the security of an
application often by finding, fixing, and
preventing security vulnerabilities.
- Wikipedia
And then measure your results.
- Joe
BECAUSE DEFINITIONS ARE AWESOME
FINDING VULNS
LOOKING FOR A NEEDLE IN A STACK OF NEEDLES
11
DON'T FOCUS ON TOOLS
FINDING
VULNS
12
YEAH, IT'S KINDA LIKE THAT
FINDING VULNS
13
WRITE THIS DOWN
KEY POINTS
• Don't try to do everything at once.
• Start small and expand.
• Focus on your high-risk apps first.
• Chain together assessment
methodologies.
TODO: FIX THIS STUFF
CUZ THAT'S BASICALLY THE POINT
15
WITH A MEME
FIXING VULNS
16
WITH ANOTHER OVERUSED MEME
FIXING VULNS
17
BUT IT'S BEHIND THE FIREWALL”
FALSE POSITIVES
<?php
...
[omitted for brevity]
...
$con = mysql_connect("localhost",$user,$pass);
mysql_select_db("database", $con);
$id = $_GET['id'];
$result = mysql_query("SELECT name FROM user WHERE id=$id", $con);
mysql_close($con);
...
[omitted for brevity]
...
?>
18
BUT IT'S BEHIND THE FIREWALL”
FALSE POSITIVES
<?php
...
[omitted for brevity]
...
$con = mysql_connect("localhost",$user,$pass);
mysql_select_db("database", $con);
$id = validate($_GET['id’]; )
$result = mysql_query("SELECT name FROM user WHERE id=$id", $con);
mysql_close($con);
...
[omitted for brevity]
...
?>
19
WRITE THIS DOWN
KEY POINTS
• Make it easy for your developers to engage
in AppSec.
• Set realistic goals and expand.
• Create a security backlog and use “security
sprints” each release to work it.
• As teams mature, introduce security gates.
• Have a process to handle false positives.
PREVENTION
ACTUALLY GETTING BETTER
21
MAKING DEVELOPERS BETTER
PREVENTION
22
IN THE WAYS OF SECURITY
EDUCATING DEVELOPERS
23
WRITE THIS DOWN
KEY POINTS
• Developers aren't security people.
• Have hands-on workshops to cover
security issues.
• Walk your developers through
hacking things.
• Top-down support is really critical.
METRICS
HOW TO KNOW IF IT'S WORKING
25
WHAT'S THE DIFFERENCE?
METRICS VS. STATS
STATISTIC: A fact or piece of data from a study
of a large quantity of numerical data
METRICS: Standards of measurement by which
performance, progress, or quality of a plan,
process, or product can be assessed
26
AN EXAMPLE
APPSEC METRICS
GOAL QUESTION MEASURE METRIC
Less than
1% security
defect rate
How many vulns are there?
How many lines of code?
Number of vulns
Number of LoC
Security Defect Density – number of
vulns/1000 lines of code, plotted over
time with the target waterline
27
AN EXAMPLE
APPSEC METRICS
28
WRITE THIS DOWN
KEY POINTS
• Use the G-Q-M method for metrics.
• Choose meaningful metrics.
• Evaluate against a defined framework.
• This is how you demonstrate value.
2929
THE GLUE THAT STICKS SECURITY BALLS TOGETHER
APPSEC
WE’RE HIRING
www.BishopFox.com
Careers@BishopFox.com
VISIT US ONLINE TO FIND OUT MORE
THANK YOU

More Related Content

PDF
Why does security matter for devops by Caroline Wong
PPTX
451 and Cylance - The Roadmap To Better Endpoint Security
PDF
DevSecCon Singapore 2018 - Measuring and maximizing vuln discovery efforts by...
PDF
Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
PDF
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
PDF
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
PPTX
Security Champions - Introduce them in your Organisation
PPTX
Security as Code
Why does security matter for devops by Caroline Wong
451 and Cylance - The Roadmap To Better Endpoint Security
DevSecCon Singapore 2018 - Measuring and maximizing vuln discovery efforts by...
Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Security Champions - Introduce them in your Organisation
Security as Code

What's hot (12)

PDF
Security champions v1.0
PDF
Cyber security report 2017 cisco 2017 acr_pdf
PDF
Mastering next gen-siem-usecases-part1
PDF
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
PPTX
Future of password less Authentication
PPTX
CLUSIR INFONORD OWASP iot 2014
PDF
The Challenges of Scaling DevSecOps
PDF
Maintaining and updating your risk assessment using vsRisk
PPTX
Introducing vsRisk 2.6
PDF
Application Security in an Agile World - Agile Singapore 2016
PPTX
DevSecOps
PPTX
Turning security into code by Jeff Williams
Security champions v1.0
Cyber security report 2017 cisco 2017 acr_pdf
Mastering next gen-siem-usecases-part1
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Future of password less Authentication
CLUSIR INFONORD OWASP iot 2014
The Challenges of Scaling DevSecOps
Maintaining and updating your risk assessment using vsRisk
Introducing vsRisk 2.6
Application Security in an Agile World - Agile Singapore 2016
DevSecOps
Turning security into code by Jeff Williams
Ad

Similar to CactusCon 2018 - Anatomy of an AppSec Program (20)

PPTX
Mike Spaulding - Building an Application Security Program
PPTX
Building an AppSec Team Extended Cut
PDF
Application Security Testing for Software Engineers: An approach to build sof...
PPTX
How to build app sec team &amp; culture in your organization the hack summi...
PPTX
Application Security 101 (OWASP DC)
PPTX
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
PDF
SC conference - Building AppSec Teams
PPTX
00. introduction to app sec v3
PPTX
Why 'positive security' is a software security game changer
PPTX
For Business's Sake, Let's focus on AppSec
PDF
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
PDF
Streamlining AppSec Policy Definition.pptx
PPTX
Application Security: What do we need to know?
PPTX
Software Security Metrics
PDF
application-security-fallacies-and-realities-veracode
PPTX
Simplify Dev with Complicated Security Tools
PPT
Intro to-ssdl--lone-star-php-2013
PPTX
Best Practices for a Mature Application Security Program Webinar - February 2016
PDF
Building a business case for expanding your AppSec Program
PPTX
The Four(ish) Appsec Metrics You Can’t Ignore
Mike Spaulding - Building an Application Security Program
Building an AppSec Team Extended Cut
Application Security Testing for Software Engineers: An approach to build sof...
How to build app sec team &amp; culture in your organization the hack summi...
Application Security 101 (OWASP DC)
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
SC conference - Building AppSec Teams
00. introduction to app sec v3
Why 'positive security' is a software security game changer
For Business's Sake, Let's focus on AppSec
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Streamlining AppSec Policy Definition.pptx
Application Security: What do we need to know?
Software Security Metrics
application-security-fallacies-and-realities-veracode
Simplify Dev with Complicated Security Tools
Intro to-ssdl--lone-star-php-2013
Best Practices for a Mature Application Security Program Webinar - February 2016
Building a business case for expanding your AppSec Program
The Four(ish) Appsec Metrics You Can’t Ignore
Ad

More from Bishop Fox (20)

PDF
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
PDF
InfoSec World 2016 – RFIDiggity – Pentester Guide to Hacking HF/NFC and UHF...
PDF
InfoSec World 2013 – W4 – Using Google to Find Vulnerabilities in Your IT Env...
PDF
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
PDF
SpellCheckV2 Rules
PDF
Smarter Home Invasion With ZigDiggity
PDF
Hacking Exposed EBS Volumes
PDF
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
PDF
Ferris Bueller’s Guide to Abuse Domain Permutations
PDF
Check Your Privilege (Escalation)
PDF
Introduction to Linux Privilege Escalation Methods
PDF
Penetration Testing Resource Guide
PDF
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
PDF
How Perceptual Analysis Helps Bug Hunters
PDF
Getting Buzzed on Buzzwords: Using Cloud & Big Data to Pentest at Scale
PPTX
Evolving Cyber Adversary Simulation: How Red Teaming Benefits Organizations
PDF
ASU Cybersecurity Symposium - Breaking Into a Career of Breaking In
PDF
Preparing a Next Generation IT Strategy
PDF
Lord of the Bing: Taking Back Search Engine Hacking From Google and Bing
PDF
Pulp Google Hacking
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
InfoSec World 2016 – RFIDiggity – Pentester Guide to Hacking HF/NFC and UHF...
InfoSec World 2013 – W4 – Using Google to Find Vulnerabilities in Your IT Env...
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
SpellCheckV2 Rules
Smarter Home Invasion With ZigDiggity
Hacking Exposed EBS Volumes
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
Ferris Bueller’s Guide to Abuse Domain Permutations
Check Your Privilege (Escalation)
Introduction to Linux Privilege Escalation Methods
Penetration Testing Resource Guide
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
How Perceptual Analysis Helps Bug Hunters
Getting Buzzed on Buzzwords: Using Cloud & Big Data to Pentest at Scale
Evolving Cyber Adversary Simulation: How Red Teaming Benefits Organizations
ASU Cybersecurity Symposium - Breaking Into a Career of Breaking In
Preparing a Next Generation IT Strategy
Lord of the Bing: Taking Back Search Engine Hacking From Google and Bing
Pulp Google Hacking

Recently uploaded (20)

PPTX
Lecture 5 Software Requirement Engineering
PDF
novaPDF Pro 11.9.482 Crack + License Key [Latest 2025]
PDF
Introduction to Ragic - #1 No Code Tool For Digitalizing Your Business Proces...
PDF
iTop VPN Crack Latest Version Full Key 2025
PPTX
Cybersecurity: Protecting the Digital World
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PPTX
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx
PDF
BoxLang Dynamic AWS Lambda - Japan Edition
PPTX
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
PPTX
most interesting chapter in the world ppt
PDF
MCP Security Tutorial - Beginner to Advanced
PPTX
Airline CRS | Airline CRS Systems | CRS System
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
PDF
Guide to Food Delivery App Development.pdf
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PPTX
Tech Workshop Escape Room Tech Workshop
DOCX
How to Use SharePoint as an ISO-Compliant Document Management System
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PPTX
Download Adobe Photoshop Crack 2025 Free
Lecture 5 Software Requirement Engineering
novaPDF Pro 11.9.482 Crack + License Key [Latest 2025]
Introduction to Ragic - #1 No Code Tool For Digitalizing Your Business Proces...
iTop VPN Crack Latest Version Full Key 2025
Cybersecurity: Protecting the Digital World
Topaz Photo AI Crack New Download (Latest 2025)
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx
BoxLang Dynamic AWS Lambda - Japan Edition
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
most interesting chapter in the world ppt
MCP Security Tutorial - Beginner to Advanced
Airline CRS | Airline CRS Systems | CRS System
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
Guide to Food Delivery App Development.pdf
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Tech Workshop Escape Room Tech Workshop
How to Use SharePoint as an ISO-Compliant Document Management System
CCleaner 6.39.11548 Crack 2025 License Key
Download Adobe Photoshop Crack 2025 Free

CactusCon 2018 - Anatomy of an AppSec Program