Owasp Sdl-It PDF
Owasp Sdl-It PDF
Owasp Sdl-It PDF
Lifecycle for IT
Rob Labbé
Application Consulting and Engineering Services
roblab@microsoft.com
The Reasons for Secure Software
threats to
employees
• IT Systems can be used by attackers
Threat
Application Model / Post-
Internal Pre-Production Production
SDL-IT Entry / Risk Design
Review Assessment
Assessment Review Assessment
Application Entry / Risk Assessment
Post-Production
App Entry Internal Review
Assessment
• Objective:
• Low Risk Applications
• Host Level Scan
• Windows
• IIS
• SQL
• High/Medium Risk Applications
• Host Level Scan
• White Box Code Review
White Box Code Review
• Process
• Application team provides source code
• Analysts review application code
uncovering security vulnerabilities
• Vulnerabilities logged in bug database
• Application team required to address all
sev 1 bugs prior to going into
production
Some common attack patterns
white box review may reveal
• Cross-Site Script Vulnerabilities
• SQL Injection
• Buffer Overflow
• Poor Authorization Controls
• Secrets Stored In Clear Text
Post-Production Assessment
Post-Production
App Entry Internal Review Assessment
• Design Reviews
• A holistic view
• People
• Process Process: Security
• Tools
cannot be an Tools: Providing the
afterthought most innovative tools