Glenn ten Cate Riccardo ten Cate
1
Project leaders & Authors of OWASP-SKF
Agenda
• Why?
• Software (AND Security) development life cycle
2
Evil and automated ownage
2
Agenda
• Why?
• Software (AND Security) development life cycle
3
Developer, you are the one
3
Agenda
• Why?
• Software (AND Security) development life cycle
4
Coding mistakes, déjà vu.
4
Agenda
• Why?
• Software (AND Security) development life cycle
5
Barely hanging on …
5
Agenda
• Why?
• Software (AND Security) development life cycle
6
But there is always an option!
6
Agenda
• Why?
• Software (AND Security) development life cycle
7
There are ways to learn!
7
• Worldwide not-for-profit charitable.
• Our mission is to make software security visible, so that
individuals and organizations worldwide can make
informed decisions about true software security risks.
8
Agenda
• Why?
• Software (AND Security) development life cycle
9
Be responsible for your code.
9
Verify your code
• ASVS lvl1 Opportunistic
It adequately defends against application security vulnerabilities
that are easy to discover.
• ASVS lvl2 Standard
It adequately defends against prevalent application security
vulnerabilities whose existence poses moderate-to-serious risk.
• ASVS lvl3 Advanced
It adequately defends against all advanced application security
vulnerabilities, and also demonstrates principles of good security
design.
10
Agenda
• Why?
• Software (AND Security) development life cycle
11
And now the blind can see.
11
What is S.K.F
• Guide to secure programming
By adapting your design to security, not securing your design
• Security awareness
It informs you about threats even before you wrote a single line of
code.
• Clear and transparent
Provides information applicable for your specific needs on the spot.
12
Demo
13
Agenda
• Why?
• Software (AND Security) development life cycle
14
You know this, you are ready.
14
SDLC MANUAL
• OWASP-SKF
• Software Development Life Cycle
• Code review
• SAST
• DAST
15
SDLC CI
• OWASP-SKF
• Software Development Life Cycle
• Travis CI
• Coveralls CI
• Scrutinizer CI
• And more...
16
Agenda
• Why?
• Software (AND Security) development life cycle
17
GitHub
• https://github.com/blabla1337/skf-flask
17
Agenda
• Why?
• Software (AND Security) development life cycle
18
GitHub
• https://github.com/blabla1337/skf-flask
18
Agenda
• Why?
• Software (AND Security) development life cycle
19
You have the skills …
19
Agenda
• Why?
• Software (AND Security) development life cycle
20
… you are the one.
20
Getting involved?
• OWASP
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework
• Website
www.secureby.design
Together we can make it big, strong and helpful!
21
Agenda
• Why?
• Software (AND Security) development life cycle
22
You are only as strong as the
weakest developer in your team.
22
23
Questions?
https://gitter.im/Security-Knowledge-Framework/Lobby

More Related Content

PPTX
[OWASP Poland Day] Saving private token
PDF
[OWASP Poland Day] OWASP for testing mobile applications
PDF
[OWASP Poland Day] A study of Electron security
PDF
[OWASP Poland Day] Security in developer's life
PPTX
[OWASP Poland Day] Application frameworks' vulnerabilities
PPTX
[Wroclaw #5] OWASP Projects: beyond Top 10
PPTX
[OWASP Poland Day] Application security - daily questions & answers
PPTX
Web & Cloud Security in the real world
[OWASP Poland Day] Saving private token
[OWASP Poland Day] OWASP for testing mobile applications
[OWASP Poland Day] A study of Electron security
[OWASP Poland Day] Security in developer's life
[OWASP Poland Day] Application frameworks' vulnerabilities
[Wroclaw #5] OWASP Projects: beyond Top 10
[OWASP Poland Day] Application security - daily questions & answers
Web & Cloud Security in the real world

What's hot (20)

PPTX
[Wroclaw #2] iOS Security - 101
PPTX
[Wroclaw #2] Web Application Security Headers
PDF
DevSecOps: What Why and How : Blackhat 2019
PDF
[OPD 2019] Governance as a missing part of IT security architecture
PPTX
AllDayDevOps 2019 AppSensor
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
PPTX
Fortify dev ops (002)
PDF
[OWASP Poland Day] Web App Security Architectures
PPTX
[Wroclaw #7] AWS (in)security - the devil is in the detail
PPTX
Continuous and Visible Security Testing with BDD-Security
PPTX
Practice of AppSec .NET
PDF
Secure Coding for Java - An Introduction
PDF
Mod Security
KEY
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
PPTX
Security testautomation
PPTX
Automating security tests for Continuous Integration
PPTX
Evaluating container security with ATT&CK Framework
PDF
Problems with parameters b sides-msp
PDF
Automated Security Testing
PDF
Compute Security - Host Security
[Wroclaw #2] iOS Security - 101
[Wroclaw #2] Web Application Security Headers
DevSecOps: What Why and How : Blackhat 2019
[OPD 2019] Governance as a missing part of IT security architecture
AllDayDevOps 2019 AppSensor
Elizabeth Lawler - Devops, security, and compliance working in unison
Fortify dev ops (002)
[OWASP Poland Day] Web App Security Architectures
[Wroclaw #7] AWS (in)security - the devil is in the detail
Continuous and Visible Security Testing with BDD-Security
Practice of AppSec .NET
Secure Coding for Java - An Introduction
Mod Security
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
Security testautomation
Automating security tests for Continuous Integration
Evaluating container security with ATT&CK Framework
Problems with parameters b sides-msp
Automated Security Testing
Compute Security - Host Security
Ad

Similar to [OWASP Poland Day] Security knowledge framework (20)

PDF
OWASP-SKF Making the web secure by design - Glenn ten Cate - Codemotion Amste...
PDF
[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...
KEY
Application Security Done Right
PPT
六合彩香港-六合彩
PDF
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
PDF
Matteo Meucci - Security Summit 12th March 2019
PDF
ACS-security-2821-001 Lecture Note 13.pdf
PPTX
Security of internet
PDF
Owasp o
PDF
Running an app sec program with OWASP projects_ Defcon AppSec Village
PPT
Owasp Serbia overview
PPT
OWASP - Building Secure Web Applications
PPT
SoftwareSecurity.ppt
PPT
Integration into the Secure SDLC Process.ppt
PPTX
Application Security and Secure Software Development Lifecycle
PPTX
Chirita ionel owasp europe tour
PPT
Software Security Testing
PDF
Matteo meucci Software Security - Napoli 10112016
PDF
Arved sandstrom - the rotwithin - atlseccon2011
PDF
Application Security Testing for Software Engineers: An approach to build sof...
OWASP-SKF Making the web secure by design - Glenn ten Cate - Codemotion Amste...
[CONFidence 2016] Glenn ten Cate - OWASP-SKF Making the web secure by design,...
Application Security Done Right
六合彩香港-六合彩
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci - Security Summit 12th March 2019
ACS-security-2821-001 Lecture Note 13.pdf
Security of internet
Owasp o
Running an app sec program with OWASP projects_ Defcon AppSec Village
Owasp Serbia overview
OWASP - Building Secure Web Applications
SoftwareSecurity.ppt
Integration into the Secure SDLC Process.ppt
Application Security and Secure Software Development Lifecycle
Chirita ionel owasp europe tour
Software Security Testing
Matteo meucci Software Security - Napoli 10112016
Arved sandstrom - the rotwithin - atlseccon2011
Application Security Testing for Software Engineers: An approach to build sof...
Ad

More from OWASP (20)

PDF
[OPD 2019] Web Apps vs Blockchain dApps
PDF
[OPD 2019] Threat modeling at scale
PDF
[OPD 2019] Life after pentest
PDF
[OPD 2019] .NET Core Security
PDF
[OPD 2019] Top 10 Security Facts of 2020
PDF
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
PPTX
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
PPTX
[OPD 2019] AST Platform and the importance of multi-layered application secu...
PPTX
[OPD 2019] Inter-application vulnerabilities
PDF
[OPD 2019] Automated Defense with Serverless computing
PDF
[OPD 2019] Advanced Data Analysis in RegSOC
PDF
[OPD 2019] Attacking JWT tokens
PDF
[OPD 2019] Rumpkernels meet fuzzing
PDF
[OPD 2019] Trusted types and the end of DOM XSS
PDF
[Wroclaw #9] The purge - dealing with secrets in Opera Software
PDF
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
PDF
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
PDF
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
PDF
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
PDF
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Threat modeling at scale
[OPD 2019] Life after pentest
[OPD 2019] .NET Core Security
[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Advanced Data Analysis in RegSOC
[OPD 2019] Attacking JWT tokens
[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Trusted types and the end of DOM XSS
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies

Recently uploaded (20)

PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PDF
Containerization lab dddddddddddddddmanual.pdf
PDF
Alethe Consulting Corporate Profile and Solution Aproach
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PDF
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
PPTX
Concepts of Object Oriented Programming.
PPTX
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
PPTX
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
PPTX
MY PRESENTATION66666666666666666666.pptx
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPSX
AI AppSec Threats and Defenses 20250822.ppsx
PPTX
Reading as a good Form of Recreation
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PDF
Course Overview and Agenda cloud security
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPTX
Artificial_Intelligence_Basics use in our daily life
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
Containerization lab dddddddddddddddmanual.pdf
Alethe Consulting Corporate Profile and Solution Aproach
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
Alethe Consulting Corporate Profile and Solution Aproach
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
Concepts of Object Oriented Programming.
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
MY PRESENTATION66666666666666666666.pptx
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
AI AppSec Threats and Defenses 20250822.ppsx
Reading as a good Form of Recreation
Layers_of_the_Earth_Grade7.pptx class by
Viva Digitally Software-Defined Wide Area Network.pptx
Course Overview and Agenda cloud security
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Artificial_Intelligence_Basics use in our daily life
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB

[OWASP Poland Day] Security knowledge framework