<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jeremiahgrossman</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jeremiahgrossman"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jeremiahgrossman"/>
		<updated>2026-04-28T18:03:05Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jeremiahgrossman&amp;diff=215633</id>
		<title>User:Jeremiahgrossman</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jeremiahgrossman&amp;diff=215633"/>
				<updated>2016-04-19T07:23:14Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Jeremiah Grossman&lt;br /&gt;
&lt;br /&gt;
Founder of WhiteHat Security. World-Renowned Professional Hacker. Brazilian Jiu-Jitsu Black Belt. Published Author. Influential Blogger. Off-Road Race Car Driver.&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman's career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry's biggest names. And since Jeremiah earned a Brazilian Jiu-Jitsu black belt, the media has described him as &amp;quot;the embodiment of converged IT and physical security.” Preventing attacks from the scariest cyber-criminals is all in a day's work for Jeremiah, but staying a keystroke ahead of the bad guys isn't easy. In 2001, Jeremiah founded WhiteHat Security, which today has one of the largest professional hacking armies on the planet. Let it sink in. Professional. Hacker. Army.&lt;br /&gt;
&lt;br /&gt;
Jeremiah has received a number of industry awards, been publicly thanked by Microsoft, Mozilla, Google, Facebook, and many others for privately informing them of weaknesses in their systems -- a polite way of saying, ‘hacking them'. His research has included new ways to surreptitiously turn on anyone's computer video camera and microphone from anywhere across the Internet, sidestep corporate firewalls, abuse online advertising networks to take any website offline, hijack the email and bank accounts of millions, silently rip out saved passwords and surfing history from web browsers, and many other innovative cyber-attack techniques – some so insidious and fundamental that many still have not been fixed to this day.&lt;br /&gt;
&lt;br /&gt;
Collectively, it's no surprise Jeremiah has been featured in the Wall Street Journal, Forbes, NY Times and hundreds of other media outlets around the world who rely upon his expertise regularly. Just type “Jeremiah Grossman” into your favorite search engine, you'll see. He also serves on the advisory board of several hot start-ups including Kenna Security, SD Elements, and BugCrowd. Of course, all of this was after Mr. Grossman served as information security officer at Yahoo!&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Podcast_18&amp;diff=59109</id>
		<title>Podcast 18</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Podcast_18&amp;diff=59109"/>
				<updated>2009-04-16T17:20:29Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[[OWASP_Podcast|OWASP Podcast Series]] #18'''&lt;br /&gt;
&lt;br /&gt;
OWASP Interview with [http://jeremiahgrossman.blogspot.com/ Jeremiah Grossman] (Chief Technology Officer, [http://www.whitehatsec.com/ WhiteHat Security]) &amp;lt;br/&amp;gt;&lt;br /&gt;
Recorded March 30th, 2009&lt;br /&gt;
&lt;br /&gt;
 [http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=300769012 http://images.apple.com/itunes/overview/images/overview-icon-itunes20081106.jpg] [http://www.owasp.org/download/jmanico/podcast.xml https://www.owasp.org/images/d/d3/Feed-icon-32x32.png] &amp;lt;!-- [http://www.owasp.org/download/jmanico/owasp_podcast_18.mp3 mp3] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participants==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman is the founder and CTO of WhiteHat Security. He is considered a world-renowned expert in Web security, is a co-founder of the Web Application Security Consortium, and was named to InfoWorld's Top 25 CTOs for 2007.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=51315</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=51315"/>
				<updated>2009-01-15T22:27:46Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. Close survey (Jan 26, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. Analyze results and make raw data available &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cenzic.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Ifis_logo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:NCircle-logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:TTT_logo_2008.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:NCircle-logo.gif&amp;diff=51314</id>
		<title>File:NCircle-logo.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:NCircle-logo.gif&amp;diff=51314"/>
				<updated>2009-01-15T22:27:14Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50658</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50658"/>
				<updated>2009-01-10T00:14:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. Close survey (Jan 26, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. Analyze results and make raw data available &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Logo_securosis.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Logo_securosis.png&amp;diff=50657</id>
		<title>File:Logo securosis.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Logo_securosis.png&amp;diff=50657"/>
				<updated>2009-01-10T00:14:38Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50652</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50652"/>
				<updated>2009-01-09T22:40:09Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. Close survey (Jan 26, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. Analyze results and make raw data available &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Cigital_logo.gif&amp;diff=50651</id>
		<title>File:Cigital logo.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Cigital_logo.gif&amp;diff=50651"/>
				<updated>2009-01-09T22:39:45Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50625</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50625"/>
				<updated>2009-01-09T17:48:54Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. Close survey (Jan 26, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. Analyze results and make raw data available &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:echelonone.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:eema.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Fortify_logo.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GDS_LOGO_SMALL.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Fortify_logo.png&amp;diff=50624</id>
		<title>File:Fortify logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Fortify_logo.png&amp;diff=50624"/>
				<updated>2009-01-09T17:48:17Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50360</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50360"/>
				<updated>2009-01-07T21:20:00Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Status */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. Close survey (Jan 26, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. Analyze results and make raw data available &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50351</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50351"/>
				<updated>2009-01-07T17:32:19Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. Close survey (Jan 20, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. Analyze results and make raw data available &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Tssci.png]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Tssci.png&amp;diff=50350</id>
		<title>File:Tssci.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Tssci.png&amp;diff=50350"/>
				<updated>2009-01-07T17:32:00Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50345</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50345"/>
				<updated>2009-01-07T16:40:55Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. Close survey (Jan 20, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. Analyze results and make raw data available &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Denim_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Denim_logo.gif&amp;diff=50344</id>
		<title>File:Denim logo.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Denim_logo.gif&amp;diff=50344"/>
				<updated>2009-01-07T16:40:35Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50264</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50264"/>
				<updated>2009-01-06T19:34:23Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. Close survey (Jan 20, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. Analyze results and make raw data available &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Sectheory-logo-2.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Sectheory-logo-2.jpg&amp;diff=50263</id>
		<title>File:Sectheory-logo-2.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Sectheory-logo-2.jpg&amp;diff=50263"/>
				<updated>2009-01-06T19:34:01Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50262</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50262"/>
				<updated>2009-01-06T19:18:46Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Status */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  == &lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE) &amp;lt;br /&amp;gt;&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
3. Close survey (Jan 20, 2009) &amp;lt;br /&amp;gt;&lt;br /&gt;
4. Analyze results and make raw data available &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50261</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50261"/>
				<updated>2009-01-06T19:17:50Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
1. Completing the project description text and finalizing the proposed survey questions. (DONE)&lt;br /&gt;
2. Open up survey to respondents (Jan 12, 2009)&lt;br /&gt;
3. Close survey (Jan 20, 2009)&lt;br /&gt;
4. Analyze results and make raw data available&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50127</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50127"/>
				<updated>2009-01-05T22:06:39Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Leadership */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback. Jeremiah Grossman (Founder &amp;amp; CTO, WhiteHat Security) is also closely assisting in the effort.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50126</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50126"/>
				<updated>2009-01-05T21:57:21Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Imperva_Logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Imperva_Logo.gif&amp;diff=50125</id>
		<title>File:Imperva Logo.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Imperva_Logo.gif&amp;diff=50125"/>
				<updated>2009-01-05T21:56:30Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50124</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50124"/>
				<updated>2009-01-05T21:54:26Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSecLogo.jpg]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
Brian Bertacini, CISA, QSA&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
Jeremiah Grossman (Founder &amp;amp; CTO)&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecLogo.jpg&amp;diff=50123</id>
		<title>File:AppSecLogo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecLogo.jpg&amp;diff=50123"/>
				<updated>2009-01-05T21:53:24Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50120</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=50120"/>
				<updated>2009-01-05T18:41:20Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/images/7/79/Owasp_ssb_draft7.pdf PDF Download]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is [http://boazgelbord.blogspot.com/ Boaz Gelbord] (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
Jeremiah Grossman (Founder &amp;amp; CTO)&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_ssb_draft7.pdf&amp;diff=50119</id>
		<title>File:Owasp ssb draft7.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_ssb_draft7.pdf&amp;diff=50119"/>
				<updated>2009-01-05T18:37:02Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49853</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49853"/>
				<updated>2008-12-23T23:04:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollars and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no identifiable information will be published.  The survey only takes about 10-15 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. 5000-50,000&amp;lt;br&amp;gt;&lt;br /&gt;
g. Over 50,000 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Technology &amp;lt;br&amp;gt;&lt;br /&gt;
l.      Telecommunication &amp;lt;br&amp;gt;&lt;br /&gt;
m.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Has your organization suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Rank the impact of the following factors on driving your organization's security spending decisions (rank each from 1-5)&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Risk Mitigation &amp;lt;br&amp;gt;&lt;br /&gt;
b. Due Diligence &amp;lt;br&amp;gt;&lt;br /&gt;
c. Incident Response &amp;lt;br&amp;gt;&lt;br /&gt;
d. Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
e. Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization have a specific IT security budget?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately what percentage of your IT security budget is dedicated towards Web application security?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a. 1 - 5% &amp;lt;br&amp;gt;&lt;br /&gt;
		b. 5 - 10% &amp;lt;br&amp;gt;&lt;br /&gt;
		c. 10 - 20% &amp;lt;br&amp;gt;&lt;br /&gt;
		d. 20 - 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		e. Over 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		f. Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, How do you expect your organization’s Web application security spending will change in 2009 in relation to the previous year?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Over 20% spending increase &amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Spending increase up to 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	Spending decrease less than 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Over 20% spending decrease &amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI-DSS&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      GLBA &amp;lt;br&amp;gt;&lt;br /&gt;
f.      FISMA &amp;lt;br&amp;gt;&lt;br /&gt;
g.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
i.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many Web application developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring Web application developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your development budget or head count is dedicated to security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately how many of your developers participate?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	General fund&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What security checkpoint reviews are present during the Web application software development life-cycle?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	At every stage of the development process&amp;lt;br&amp;gt;&lt;br /&gt;
b.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Ad hoc &amp;lt;br&amp;gt;&lt;br /&gt;
e.      No security reviews &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, where is the organizational responsibility for these reviews? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your organizations Web application software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All or almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted Web application code? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How often are independent third-party security reviews performed before deploying a Web application? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Immediately before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.      When requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Never&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;		&lt;br /&gt;
		e.	Business Unit&amp;lt;br&amp;gt;&lt;br /&gt;
      &lt;br /&gt;
		f.	Varies&amp;lt;br&amp;gt;		&lt;br /&gt;
		g.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your IT security personnel undergo specialized training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How many of your organizations deployed Web applications have Web application firewalls monitoring of defending them?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
             &lt;br /&gt;
		e.	Business Unit&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Varies&amp;lt;br&amp;gt;		&lt;br /&gt;
		g.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Suggested By the Community ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
Assuming the use of AntiVirus and standard Firewalls, which of the following security technologies are currently used in your organization? (check all that apply) &amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Log management aggregation&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security Incident Management&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Application Layer Firewalls&amp;lt;br&amp;gt;&lt;br /&gt;
d.	IDS / IPS&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Automated Compliance Monitoring&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Data Loss Prevention &amp;lt;br&amp;gt;&lt;br /&gt;
g.	Web traffic monitoring and/or filtering&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Penetration testing tools&amp;lt;br&amp;gt;&lt;br /&gt;
i.	Vulnerability Scanners&amp;lt;br&amp;gt;&lt;br /&gt;
j.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How is your web application development environment protected during development?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	By an air gap, no connection to the corporate network or internet&amp;lt;br&amp;gt;&lt;br /&gt;
b.	By a Web application firewall enclave&amp;lt;br&amp;gt;&lt;br /&gt;
c.	With the standard firewalls, IDS/IPS, etc. that protects the whole organization&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers are allowed direct access to the internet to speed the development process and leverage outside code sources&amp;lt;br&amp;gt;&lt;br /&gt;
e.	I don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; There was some feedback on the preference of deleted question #4 over #11. Tying data types to regulation is easier to do.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
Jeremiah Grossman (Founder &amp;amp; CTO)&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49852</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49852"/>
				<updated>2008-12-23T22:10:51Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no identifiable information will be published.  The survey only takes about 10-15 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. 5000-50,000&amp;lt;br&amp;gt;&lt;br /&gt;
g. Over 50,000 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Technology &amp;lt;br&amp;gt;&lt;br /&gt;
l.      Telecommunication &amp;lt;br&amp;gt;&lt;br /&gt;
m.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Has your organization suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Rank the impact of the following factors on driving your organization's security spending decisions (rank each from 1-5)&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Risk Mitigation &amp;lt;br&amp;gt;&lt;br /&gt;
b. Due Diligence &amp;lt;br&amp;gt;&lt;br /&gt;
c. Incident Response &amp;lt;br&amp;gt;&lt;br /&gt;
d. Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
e. Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization have a specific IT security budget?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately what percentage of your IT security budget is dedicated towards Web application security?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a. 1 - 5% &amp;lt;br&amp;gt;&lt;br /&gt;
		b. 5 - 10% &amp;lt;br&amp;gt;&lt;br /&gt;
		c. 10 - 20% &amp;lt;br&amp;gt;&lt;br /&gt;
		d. 20 - 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		e. Over 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		f. Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, How do you expect your organization’s Web application security spending will change in 2009 in relation to the previous year?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Over 20% spending increase &amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Spending increase up to 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	Spending decrease less than 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Over 20% spending decrease &amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI-DSS&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      GLBA &amp;lt;br&amp;gt;&lt;br /&gt;
f.      FISMA &amp;lt;br&amp;gt;&lt;br /&gt;
g.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
i.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many Web application developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring Web application developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your development budget or head count is dedicated to security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately how many of your developers participate?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	General fund&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What security checkpoint reviews are present during the Web application software development life-cycle?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	At every stage of the development process&amp;lt;br&amp;gt;&lt;br /&gt;
b.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Ad hoc &amp;lt;br&amp;gt;&lt;br /&gt;
e.      No security reviews &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, where is the organizational responsibility for these reviews? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your organizations Web application software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All or almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted Web application code? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How often are independent third-party security reviews performed before deploying a Web application? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Immediately before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.      When requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Never&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;		&lt;br /&gt;
		e.	Business Unit&amp;lt;br&amp;gt;&lt;br /&gt;
      &lt;br /&gt;
		f.	Varies&amp;lt;br&amp;gt;		&lt;br /&gt;
		g.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your IT security personnel undergo specialized training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How many of your organizations deployed Web applications have Web application firewalls monitoring of defending them?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
             &lt;br /&gt;
		e.	Business Unit&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Varies&amp;lt;br&amp;gt;		&lt;br /&gt;
		g.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Suggested By the Community ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
Assuming the use of AntiVirus and standard Firewalls, which of the following security technologies are currently used in your organization? (check all that apply) &amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Log management aggregation&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security Incident Management&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Application Layer Firewalls&amp;lt;br&amp;gt;&lt;br /&gt;
d.	IDS / IPS&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Automated Compliance Monitoring&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Data Loss Prevention &amp;lt;br&amp;gt;&lt;br /&gt;
g.	Web traffic monitoring and/or filtering&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Penetration testing tools&amp;lt;br&amp;gt;&lt;br /&gt;
i.	Vulnerability Scanners&amp;lt;br&amp;gt;&lt;br /&gt;
j.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How is your web application development environment protected during development?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	By an air gap, no connection to the corporate network or internet&amp;lt;br&amp;gt;&lt;br /&gt;
b.	By a Web application firewall enclave&amp;lt;br&amp;gt;&lt;br /&gt;
c.	With the standard firewalls, IDS/IPS, etc. that protects the whole organization&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers are allowed direct access to the internet to speed the development process and leverage outside code sources&amp;lt;br&amp;gt;&lt;br /&gt;
e.	I don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; There was some feedback on the preference of deleted question #4 over #11. Tying data types to regulation is easier to do.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leadership  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Whitehat_security_logo.gif]]&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
Jeremiah Grossman (Founder &amp;amp; CTO)&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Whitehat_security_logo.gif&amp;diff=49851</id>
		<title>File:Whitehat security logo.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Whitehat_security_logo.gif&amp;diff=49851"/>
				<updated>2008-12-23T22:08:35Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: WhiteHat Security Logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;WhiteHat Security Logo&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49605</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49605"/>
				<updated>2008-12-19T18:13:24Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: /* Suggested By the Community */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no identifiable information will be published.  The survey only takes about 10-15 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. 5000-50,000&amp;lt;br&amp;gt;&lt;br /&gt;
g. Over 50,000 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Technology &amp;lt;br&amp;gt;&lt;br /&gt;
l.      Telecommunication &amp;lt;br&amp;gt;&lt;br /&gt;
m.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Has your organization suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Rank the impact of the following factors on driving your organization's security spending decisions (rank each from 1-5)&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Risk Mitigation &amp;lt;br&amp;gt;&lt;br /&gt;
b. Due Diligence &amp;lt;br&amp;gt;&lt;br /&gt;
c. Incident Response &amp;lt;br&amp;gt;&lt;br /&gt;
d. Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
e. Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization have a specific IT security budget?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately what percentage of your IT security budget is dedicated towards Web application security?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a. 1 - 5% &amp;lt;br&amp;gt;&lt;br /&gt;
		b. 5 - 10% &amp;lt;br&amp;gt;&lt;br /&gt;
		c. 10 - 20% &amp;lt;br&amp;gt;&lt;br /&gt;
		d. 20 - 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		e. Over 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		f. Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, How do you expect your organization’s Web application security spending will change in 2009 in relation to the previous year?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Over 20% spending increase &amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Spending increase up to 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	Spending decrease less than 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Over 20% spending decrease &amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI-DSS&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      GLBA &amp;lt;br&amp;gt;&lt;br /&gt;
f.      FISMA &amp;lt;br&amp;gt;&lt;br /&gt;
g.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
i.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many Web application developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring Web application developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your development budget or head count is dedicated to security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately how many of your developers participate?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	General fund&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What security checkpoint reviews are present during the Web application software development life-cycle?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	At every stage of the development process&amp;lt;br&amp;gt;&lt;br /&gt;
b.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Ad hoc &amp;lt;br&amp;gt;&lt;br /&gt;
e.      No security reviews &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, where is the organizational responsibility for these reviews? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your organizations Web application software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All or almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted Web application code? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How often are independent third-party security reviews performed before deploying a Web application? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Immediately before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.      When requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Never&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;		&lt;br /&gt;
		e.	Business Unit&amp;lt;br&amp;gt;&lt;br /&gt;
      &lt;br /&gt;
		f.	Varies&amp;lt;br&amp;gt;		&lt;br /&gt;
		g.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your IT security personnel undergo specialized training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How many of your organizations deployed Web applications have Web application firewalls monitoring of defending them?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
             &lt;br /&gt;
		e.	Business Unit&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Varies&amp;lt;br&amp;gt;		&lt;br /&gt;
		g.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Suggested By the Community ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
Assuming the use of AntiVirus and standard Firewalls, which of the following security technologies are currently used in your organization? (check all that apply) &amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Log management aggregation&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security Incident Management&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Application Layer Firewalls&amp;lt;br&amp;gt;&lt;br /&gt;
d.	IDS / IPS&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Automated Compliance Monitoring&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Data Loss Prevention &amp;lt;br&amp;gt;&lt;br /&gt;
g.	Web traffic monitoring and/or filtering&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Penetration testing tools&amp;lt;br&amp;gt;&lt;br /&gt;
i.	Vulnerability Scanners&amp;lt;br&amp;gt;&lt;br /&gt;
j.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How is your web application development environment protected during development?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	By an air gap, no connection to the corporate network or internet&amp;lt;br&amp;gt;&lt;br /&gt;
b.	By a Web application firewall enclave&amp;lt;br&amp;gt;&lt;br /&gt;
c.	With the standard firewalls, IDS/IPS, etc. that protects the whole organization&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers are allowed direct access to the internet to speed the development process and leverage outside code sources&amp;lt;br&amp;gt;&lt;br /&gt;
e.	I don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; There was some feedback on the preference of deleted question #4 over #11. Tying data types to regulation is easier to do.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49585</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49585"/>
				<updated>2008-12-18T23:24:43Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 5000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Rank the impact of the following factors on your organization security spending decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Risk Mitigation &amp;lt;br&amp;gt;&lt;br /&gt;
b. Due Diligence &amp;lt;br&amp;gt;&lt;br /&gt;
c. Incident Response &amp;lt;br&amp;gt;&lt;br /&gt;
d. Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
e. Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization have a specific IT security budget?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, Approximately what percentage of your IT security is dedicated towards Web application security?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a. 1 - 5% &amp;lt;br&amp;gt;&lt;br /&gt;
		b. 5 - 10% &amp;lt;br&amp;gt;&lt;br /&gt;
		c. 10 - 20% &amp;lt;br&amp;gt;&lt;br /&gt;
		d. 20 - 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		e. Over 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		f. Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, How do you expect your organization’s Web application security spending will change in 2009 in relation to the previous year?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Over 20% spending increase &amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Spending increase up to 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	Spending decrease less than 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Over 20% spending decrease &amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI-DSS&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      GLBA &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
h.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many Web application developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring Web application developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your development budget or head count is dedicated to security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately how many of your developers participate?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	General fund&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What security checkpoint reviews are present during the Web application software development life-cycle?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	At every stage of the development process&amp;lt;br&amp;gt;&lt;br /&gt;
b.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Ad hoc &amp;lt;br&amp;gt;&lt;br /&gt;
e.      No security reviews &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, where is the organizational responsibility for these reviews? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your organizations Web application software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted Web application code? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How often are independent third-party security reviews performed before deploying a Web application? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Immediately before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.      When requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Never&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your IT security personnel undergo specialized training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How many of your organizations deployed Web applications have Web application firewalls monitoring of defending them?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Data Collection &amp;amp; Distribution ==&lt;br /&gt;
&lt;br /&gt;
For data collection our current plan is to utilize the SurveyMonkey system for hosting of the survey. We will not be collecting any publicly identifiable information including names, addresses, employer, email addresses, etc. from the respondents. While we expect a limited number of respondents trying to intentionally skew the results, we plan to take precautions to limit the potential while not creating unnecessary overhead. We may decide to control survey access via username/password, as well as through a trusted network of contacts. All information collected will be redistributed in report (PDF, HTML) as well as raw (CSV, XML, etc.) form.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49583</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49583"/>
				<updated>2008-12-18T21:41:45Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
The Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 5000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Rank the impact of the following factors on your organization security spending decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Risk Mitigation &amp;lt;br&amp;gt;&lt;br /&gt;
b. Due Diligence &amp;lt;br&amp;gt;&lt;br /&gt;
c. Incident Response &amp;lt;br&amp;gt;&lt;br /&gt;
d. Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
e. Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization have a specific IT security budget?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, Approximately what percentage of your IT security is dedicated towards Web application security?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a. 1 - 5% &amp;lt;br&amp;gt;&lt;br /&gt;
		b. 5 - 10% &amp;lt;br&amp;gt;&lt;br /&gt;
		c. 10 - 20% &amp;lt;br&amp;gt;&lt;br /&gt;
		d. 20 - 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		e. Over 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		f. Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, How do you expect your organization’s Web application security spending will change in 2009 in relation to the previous year?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Over 20% spending increase &amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Spending increase up to 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	Spending decrease less than 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Over 20% spending decrease &amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI-DSS&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      GLBA &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
h.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many Web application developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring Web application developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your development budget or head count is dedicated to security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately how many of your developers participate?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	General fund&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What security checkpoint reviews are present during the Web application software development life-cycle?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	At every stage of the development process&amp;lt;br&amp;gt;&lt;br /&gt;
b.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Ad hoc &amp;lt;br&amp;gt;&lt;br /&gt;
e.      No security reviews &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, where is the organizational responsibility for these reviews? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your organizations Web application software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted Web application code? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How often are independent third-party security reviews performed before deploying a Web application? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Immediately before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.      When requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Never&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your IT security personnel undergo specialized training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How many of your organizations deployed Web applications have Web application firewalls monitoring of defending them?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49582</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49582"/>
				<updated>2008-12-18T20:57:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
This Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 5000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Rank the impact of the following factors on your organization security spending decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Risk Mitigation &amp;lt;br&amp;gt;&lt;br /&gt;
b. Due Diligence &amp;lt;br&amp;gt;&lt;br /&gt;
c. Incident Response &amp;lt;br&amp;gt;&lt;br /&gt;
d. Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
e. Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization have a specific IT security budget?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, Approximately what percentage of your IT security is dedicated towards Web application security?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a. 1 - 5% &amp;lt;br&amp;gt;&lt;br /&gt;
		b. 5 - 10% &amp;lt;br&amp;gt;&lt;br /&gt;
		c. 10 - 20% &amp;lt;br&amp;gt;&lt;br /&gt;
		d. 20 - 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		e. Over 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		f. Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, How do you expect your organization’s Web application security spending will change in 2009 in relation to the previous year?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Over 20% spending increase &amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Spending increase up to 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	Spending decrease less than 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Over 20% spending decrease &amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI-DSS&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      GLBA &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
h.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many Web application developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring Web application developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your development budget or head count is dedicated to security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately how many of your developers participate?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	General fund&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What security checkpoint reviews are present during the Web application software development life-cycle?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	At every stage of the development process&amp;lt;br&amp;gt;&lt;br /&gt;
b.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Ad hoc &amp;lt;br&amp;gt;&lt;br /&gt;
e.      No security reviews &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, where is the organizational responsibility for these reviews? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your organizations Web application software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted Web application code? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How often are independent third-party security reviews performed before deploying a Web application? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Immediately before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.      When requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Never&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your IT security personnel undergo specialized training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How many of your organizations deployed Web applications have Web application firewalls monitoring of defending them?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49581</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49581"/>
				<updated>2008-12-18T20:56:46Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
This Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 5000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Rank the impact of the following factors on your organization security spending decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Risk Mitigation &amp;lt;br&amp;gt;&lt;br /&gt;
b. Due Diligence &amp;lt;br&amp;gt;&lt;br /&gt;
c. Incident Response &amp;lt;br&amp;gt;&lt;br /&gt;
d. Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
e. Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization have a specific IT security budget?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, Approximately what percentage of your IT security is dedicated towards Web application security?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a. 1 - 5% &amp;lt;br&amp;gt;&lt;br /&gt;
		b. 5 - 10% &amp;lt;br&amp;gt;&lt;br /&gt;
		c. 10 - 20% &amp;lt;br&amp;gt;&lt;br /&gt;
		d. 20 - 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		e. Over 50% &amp;lt;br&amp;gt;&lt;br /&gt;
		f. Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, How do you expect your organization’s Web application security spending will change in 2009 in relation to the previous year?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Over 20% spending increase &amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Spending increase up to 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	Spending decrease less than 20%&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Over 20% spending decrease &amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI-DSS&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      GLBA &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
h.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many Web application developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring Web application developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your development groups time or head count is dedicated to security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately how many of your developers participate?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	General fund&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What security checkpoint reviews are present during the Web application software development life-cycle?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	At every stage of the development process&amp;lt;br&amp;gt;&lt;br /&gt;
b.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Ad hoc &amp;lt;br&amp;gt;&lt;br /&gt;
e.      No security reviews &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, where is the organizational responsibility for these reviews? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your organizations Web application software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted Web application code? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How often are independent third-party security reviews performed before deploying a Web application? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Immediately before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.      When requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Never&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your IT security personnel undergo specialized training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How many of your organizations deployed Web applications have Web application firewalls monitoring of defending them?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49572</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49572"/>
				<updated>2008-12-18T17:45:25Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
This Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 5000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Rank the impact of the following factors on your organization security spending decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Risk Mitigation &amp;lt;br&amp;gt;&lt;br /&gt;
b. Due Diligence &amp;lt;br&amp;gt;&lt;br /&gt;
c. Incident Response &amp;lt;br&amp;gt;&lt;br /&gt;
d. Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
e. Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you expect your organization’s Web application security spending will change in 2009 in relation to the previous year?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Over 20% spending increase &amp;lt;br&amp;gt;&lt;br /&gt;
b.	Spending increase up to 20%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Spending decrease less than 20%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Over 20% spending decrease &amp;lt;br&amp;gt;&lt;br /&gt;
e.	We don’t know yet&amp;lt;br&amp;gt;&lt;br /&gt;
f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your organizations overall IT Security budget is dedicated towards Web application security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 5% &amp;lt;br&amp;gt;&lt;br /&gt;
a. 5 - 10% &amp;lt;br&amp;gt;&lt;br /&gt;
a. 10 - 20% &amp;lt;br&amp;gt;&lt;br /&gt;
a. 20 - 50% &amp;lt;br&amp;gt;&lt;br /&gt;
a. Over 50% &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI-DSS&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      GLBA &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
h.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many Web application developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring Web application developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your development groups time or head count is dedicated to security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately how many of your developers participate?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	General fund&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What security checkpoint reviews are present during the Web application software development life-cycle?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	At every stage of the development process&amp;lt;br&amp;gt;&lt;br /&gt;
b.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Ad hoc &amp;lt;br&amp;gt;&lt;br /&gt;
e.      No security reviews &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, where is the organizational responsibility for these reviews? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your organizations Web application software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted Web application code? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How often are independent third-party security reviews performed before deploying a Web application? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Immediately before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.      When requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Never&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your IT security personnel undergo specialized training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How many of your organizations deployed Web applications have Web application firewalls monitoring of defending them?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49571</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49571"/>
				<updated>2008-12-18T17:43:38Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
This Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 5000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Rank the impact of the following factors on your organization security spending decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Risk Mitigation &amp;lt;br&amp;gt;&lt;br /&gt;
b. Due Diligence &amp;lt;br&amp;gt;&lt;br /&gt;
c. Incident Response &amp;lt;br&amp;gt;&lt;br /&gt;
d. Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
e. Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you expect your organization’s Web application security spending will change in 2009 in relation to the previous year?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Over 20% spending increase &amp;lt;br&amp;gt;&lt;br /&gt;
b.	Spending increase up to 20%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Spending decrease less than 20%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Over 20% spending decrease &amp;lt;br&amp;gt;&lt;br /&gt;
e.	We don’t know yet&amp;lt;br&amp;gt;&lt;br /&gt;
f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your organizations overall IT Security budget is dedicated towards Web application security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 5% &amp;lt;br&amp;gt;&lt;br /&gt;
a. 5 - 10% &amp;lt;br&amp;gt;&lt;br /&gt;
a. 10 - 20% &amp;lt;br&amp;gt;&lt;br /&gt;
a. 20 - 50% &amp;lt;br&amp;gt;&lt;br /&gt;
a. Over 50% &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI-DSS&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      GLBA &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
h.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many Web application developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring Web application developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your development groups time or head count is dedicated to security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately how many of your developers participate?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	General fund&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What security checkpoint reviews are present during the Web application software development life-cycle?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	At every stage of the development process&amp;lt;br&amp;gt;&lt;br /&gt;
b.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Ad hoc &amp;lt;br&amp;gt;&lt;br /&gt;
e.      No security reviews &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, where is the organizational responsibility for these reviews? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your organizations Web application software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted Web application code? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How often are independent third-party security reviews performed before deploying a Web application? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Immediately before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.      When requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Never&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your IT security personnel undergo specialized training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How many of your organizations deployed Web applications have Web application firewalls monitoring of defending them?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49570</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49570"/>
				<updated>2008-12-18T17:41:41Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
This Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 5000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Rank the impact of the following factors on your organization security spending decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Risk Mitigation &amp;lt;br&amp;gt;&lt;br /&gt;
b. Due Diligence &amp;lt;br&amp;gt;&lt;br /&gt;
c. Incident Response &amp;lt;br&amp;gt;&lt;br /&gt;
d. Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
e. Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you expect your organization’s Web application security spending will change in 2009 in relation to the previous year?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Over 20% spending increase &amp;lt;br&amp;gt;&lt;br /&gt;
b.	Spending increase up to 20%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Spending decrease less than 20%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Over 20% spending decrease &amp;lt;br&amp;gt;&lt;br /&gt;
e.	We don’t know yet&amp;lt;br&amp;gt;&lt;br /&gt;
f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your organizations overall IT Security budget is dedicated towards Web application security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 5% &amp;lt;br&amp;gt;&lt;br /&gt;
a. 5 - 10% &amp;lt;br&amp;gt;&lt;br /&gt;
a. 10 - 20% &amp;lt;br&amp;gt;&lt;br /&gt;
a. 20 - 50% &amp;lt;br&amp;gt;&lt;br /&gt;
a. Over 50% &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI-DSS&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      GLBA &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
h.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many Web application developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring Web application developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately what percentage of your development groups time or head count is dedicated to security?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;ul&amp;gt;&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, approximately how many of your developers participate?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	General fund&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What security checkpoint reviews are present during the Web application software development life-cycle?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	At every stage of the development process&amp;lt;br&amp;gt;&lt;br /&gt;
b.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Ad hoc &amp;lt;br&amp;gt;&lt;br /&gt;
e.      No security reviews &amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, where is the organizational responsibility for these reviews? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your organizations Web application software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted Web application code? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How often are independent third-party security reviews performed before deploying a Web application? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Immediately before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
a.	During the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.      When requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Never&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your IT security personnel undergo specialized training? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How many of your organizations deployed Web applications have Web application firewalls monitoring of defending them?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If yes, out of what budget are the costs allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	Development&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Q&amp;amp;A&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Internal audit&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	Varies&amp;lt;br&amp;gt;&lt;br /&gt;
		f.	Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;li&amp;gt;If budget specified, approximate what percentage of that budget is allocated?&amp;lt;/li&amp;gt;&lt;br /&gt;
		a.	All of almost all&amp;lt;br&amp;gt;&lt;br /&gt;
		b.	Most&amp;lt;br&amp;gt;&lt;br /&gt;
		c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
		d.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
		e.	None or very little&amp;lt;br&amp;gt;&lt;br /&gt;
		f.      Don't know&lt;br /&gt;
	&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49566</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49566"/>
				<updated>2008-12-18T17:04:16Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
This Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 5000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Rank the impact of the following factors on your organization security spending decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Risk Mitigation &amp;lt;br&amp;gt;&lt;br /&gt;
b. Due Diligence &amp;lt;br&amp;gt;&lt;br /&gt;
c. Incident Response &amp;lt;br&amp;gt;&lt;br /&gt;
d. Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
e. Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	None&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Significant portion&amp;lt;br&amp;gt;&lt;br /&gt;
e.	All or almost all&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted code? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Very important&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Nice to have but not a priority&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Not a factor in hiring&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you have internal security checkpoints during the software development life-cycle? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, at every stage of the development cycle&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, during the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, during the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; If you answered yes to the question on internal security review, where is the organizational responsibility for this review? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Within the development team&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Within the QA team&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Within a security team&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Within the internal audit team&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you perform independent third-party security reviews before deploying a Web application?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Every web application undergoes an external review before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Only security critical applications undergo an external review&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Only when requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We never perform external security reviews&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, how often do you engage external security firms? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Once at the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
b.	When making important security choices&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Ad hoc, as needed&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Prior to release&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does the costs of these security reviews come from: (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	The development budget&amp;lt;br&amp;gt;&lt;br /&gt;
b.	The Q&amp;amp;A budget&amp;lt;br&amp;gt;&lt;br /&gt;
c.	A security budget&amp;lt;br&amp;gt;&lt;br /&gt;
d.	A general budget&amp;lt;br&amp;gt;&lt;br /&gt;
e.	It varies&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of your total developer’s time is directly devoted to security activities? (code reviews, meetings, etc)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	I don’t know - we don’t measure time in that way&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
g.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you think your organization’s security spending in 2009 will change in relation to 2008?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We will spend over 20% more in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We will spend between up to 20% more in 2009 and 2008&amp;lt;br&amp;gt;&lt;br /&gt;
c.	We will spend up to 20% less in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We will spend over 20% less in 2009 than 2008 &amp;lt;br&amp;gt;&lt;br /&gt;
e.	We don’t know yet how much we will spend in 2009&amp;lt;br&amp;gt;&lt;br /&gt;
f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Please rank how much the following drive your organization budgeting decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
- Risk Mitigation&amp;lt;br&amp;gt;&lt;br /&gt;
- Due Diligence&amp;lt;br&amp;gt;&lt;br /&gt;
- Incident Response&amp;lt;br&amp;gt;&lt;br /&gt;
- Regulatory Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
- Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49565</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49565"/>
				<updated>2008-12-18T17:02:47Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
This Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000 - 5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 5000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant and publicized security incident within the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	None&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Significant portion&amp;lt;br&amp;gt;&lt;br /&gt;
e.	All or almost all&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted code? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Very important&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Nice to have but not a priority&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Not a factor in hiring&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you have internal security checkpoints during the software development life-cycle? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, at every stage of the development cycle&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, during the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, during the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; If you answered yes to the question on internal security review, where is the organizational responsibility for this review? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Within the development team&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Within the QA team&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Within a security team&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Within the internal audit team&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you perform independent third-party security reviews before deploying a Web application?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Every web application undergoes an external review before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Only security critical applications undergo an external review&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Only when requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We never perform external security reviews&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, how often do you engage external security firms? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Once at the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
b.	When making important security choices&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Ad hoc, as needed&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Prior to release&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does the costs of these security reviews come from: (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	The development budget&amp;lt;br&amp;gt;&lt;br /&gt;
b.	The Q&amp;amp;A budget&amp;lt;br&amp;gt;&lt;br /&gt;
c.	A security budget&amp;lt;br&amp;gt;&lt;br /&gt;
d.	A general budget&amp;lt;br&amp;gt;&lt;br /&gt;
e.	It varies&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of your total developer’s time is directly devoted to security activities? (code reviews, meetings, etc)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	I don’t know - we don’t measure time in that way&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
g.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you think your organization’s security spending in 2009 will change in relation to 2008?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We will spend over 20% more in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We will spend between up to 20% more in 2009 and 2008&amp;lt;br&amp;gt;&lt;br /&gt;
c.	We will spend up to 20% less in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We will spend over 20% less in 2009 than 2008 &amp;lt;br&amp;gt;&lt;br /&gt;
e.	We don’t know yet how much we will spend in 2009&amp;lt;br&amp;gt;&lt;br /&gt;
f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Please rank how much the following drive your organization budgeting decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
- Risk Mitigation&amp;lt;br&amp;gt;&lt;br /&gt;
- Due Diligence&amp;lt;br&amp;gt;&lt;br /&gt;
- Incident Response&amp;lt;br&amp;gt;&lt;br /&gt;
- Regulatory Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
- Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49564</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49564"/>
				<updated>2008-12-18T16:55:13Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
This Security Spending Benchmarks Project seeks to produce guidance and an industry accepted benchmark for justifying overall Web application security spending. We want to quantify how many dollar and human resources should be allocated towards the software development life-cycle, security training, security software/tools, independent third-party reviews, Web application firewalls, etc. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security in or out of the software development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and/or hosting secure Web application, but there is no industry consensus or data repositories on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not be able to charge a premium for this investment because there is no reference point for the investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions. Your feedback is much appreciated. We want to use the survey answers to address the following questions and many others: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a Web application development groups headcount is dedicated towards security?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application security as a percentage of software development and overall operational IT security costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where do Web application security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organizations who develop, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. 1000-5000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 5000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	None&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Significant portion&amp;lt;br&amp;gt;&lt;br /&gt;
e.	All or almost all&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted code? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Very important&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Nice to have but not a priority&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Not a factor in hiring&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you have internal security checkpoints during the software development life-cycle? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, at every stage of the development cycle&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, during the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, during the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; If you answered yes to the question on internal security review, where is the organizational responsibility for this review? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Within the development team&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Within the QA team&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Within a security team&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Within the internal audit team&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you perform independent third-party security reviews before deploying a Web application?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Every web application undergoes an external review before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Only security critical applications undergo an external review&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Only when requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We never perform external security reviews&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, how often do you engage external security firms? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Once at the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
b.	When making important security choices&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Ad hoc, as needed&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Prior to release&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $25,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $25,000- $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
c. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
e. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
f. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does the costs of these security reviews come from: (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	The development budget&amp;lt;br&amp;gt;&lt;br /&gt;
b.	The Q&amp;amp;A budget&amp;lt;br&amp;gt;&lt;br /&gt;
c.	A security budget&amp;lt;br&amp;gt;&lt;br /&gt;
d.	A general budget&amp;lt;br&amp;gt;&lt;br /&gt;
e.	It varies&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of your total developer’s time is directly devoted to security activities? (code reviews, meetings, etc)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	I don’t know - we don’t measure time in that way&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is software security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Extremely important&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know - I don't deal with customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following regulations apply to your software (check all that apply)?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      PCI&amp;lt;br&amp;gt;&lt;br /&gt;
b.      HIPAA&amp;lt;br&amp;gt;&lt;br /&gt;
c.      SOX &amp;lt;br&amp;gt;&lt;br /&gt;
d.      FERPA &amp;lt;br&amp;gt;&lt;br /&gt;
e.      Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Other regulations (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
g.      None of the above&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Absolutely critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant public security incident in the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you think your organization’s security spending in 2009 will change in relation to 2008?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We will spend over 20% more in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We will spend between up to 20% more in 2009 and 2008&amp;lt;br&amp;gt;&lt;br /&gt;
c.	We will spend up to 20% less in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We will spend over 20% less in 2009 than 2008 &amp;lt;br&amp;gt;&lt;br /&gt;
e.	We don’t know yet how much we will spend in 2009&amp;lt;br&amp;gt;&lt;br /&gt;
f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Please rank how much the following drive your organization budgeting decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
- Risk Mitigation&amp;lt;br&amp;gt;&lt;br /&gt;
- Due Diligence&amp;lt;br&amp;gt;&lt;br /&gt;
- Incident Response&amp;lt;br&amp;gt;&lt;br /&gt;
- Regulatory Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
- Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Deleted Questions ==&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49491</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49491"/>
				<updated>2008-12-18T00:02:19Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
This OWASP project seeks to produce an industry accepted benchmark for justifying spending in Web application security. We want to quantify how many dollar and human resources should be allocated towards Web application security, including that of within the software development life-cycle. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security and the application development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and hosting secure Web application, but there is no industry consensus or data on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software.  Organization that have invested development resources into software security may not get to charge a premium for this investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions.  Your feedback is much appreciated. We want to use the answers to address the following questions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a development groups headcount is dedicated towards security?&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards software security as a percentage of development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the software security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards developer security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards independent third-party security reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the independent third-party security review budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application firewalls?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does Web application firewall budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organization who development, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 1000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	None&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Significant portion&amp;lt;br&amp;gt;&lt;br /&gt;
e.	All or almost all&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted code? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Very important&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Nice to have but not a priority&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Not a factor in hiring&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you have internal security checkpoints during the software development life-cycle? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, at every stage of the development cycle&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, during the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, during the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; If you answered yes to the question on internal security review, where is the organizational responsibility for this review? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Within the development team&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Within the QA team&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Within a security team&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Within the internal audit team&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you perform independent third-party security reviews before deploying a Web application?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Every web application undergoes an external review before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Only security critical applications undergo an external review&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Only when requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We never perform external security reviews&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, how often do you engage external security firms? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Once at the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
b.	When making important security choices&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Ad hoc, as needed&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Prior to release&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
c. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does the costs of these security reviews come from: (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	The development budget&amp;lt;br&amp;gt;&lt;br /&gt;
b.	The Q&amp;amp;A budget&amp;lt;br&amp;gt;&lt;br /&gt;
c.	A security budget&amp;lt;br&amp;gt;&lt;br /&gt;
d.	A general budget&amp;lt;br&amp;gt;&lt;br /&gt;
e.	It varies&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of your total developer’s time is directly devoted to security activities? (code reviews, meetings, etc)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	I don’t know - we don’t measure time in that way&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is software security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Extremely important&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know - I don't deal with customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Absolutely critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant public security incident in the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you think your organization’s security spending in 2009 will change in relation to 2008?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We will spend over 20% more in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We will spend between up to 20% more in 2009 and 2008&amp;lt;br&amp;gt;&lt;br /&gt;
c.	We will spend up to 20% less in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We will spend over 20% less in 2009 than 2008 &amp;lt;br&amp;gt;&lt;br /&gt;
e.	We don’t know yet how much we will spend in 2009&amp;lt;br&amp;gt;&lt;br /&gt;
f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Additional Survey Questions to Consider  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Please rank how much the following drive your organization budgeting decisions&amp;lt;/li&amp;gt;&lt;br /&gt;
- Risk Mitigation&amp;lt;br&amp;gt;&lt;br /&gt;
- Due Diligence&amp;lt;br&amp;gt;&lt;br /&gt;
- Incident Response&amp;lt;br&amp;gt;&lt;br /&gt;
- Regulatory Compliance&amp;lt;br&amp;gt;&lt;br /&gt;
- Competitive Advantage&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49490</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49490"/>
				<updated>2008-12-17T23:58:16Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
This OWASP project seeks to produce an industry accepted benchmark for justifying spending in Web application security. We want to quantify how many dollar and human resources should be allocated towards Web application security, including that of within the software development life-cycle. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on Web application security and the application development processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are often difficult to quantify, thereby making justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing, delivering, and hosting secure Web application, but there is no industry consensus or data on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software.  Organization that have invested development resources into software security may not get to charge a premium for this investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help us formulate the most appropriate questions.  Your feedback is much appreciated. We want to use the answers to address the following questions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of a development groups headcount is dedicated towards security?&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards software security as a percentage of development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the software security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards developer security education?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards independent third-party security reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the independent third-party security review budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much budget is allocated towards Web application firewalls?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does Web application firewall budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organization who development, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 1000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	None&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Significant portion&amp;lt;br&amp;gt;&lt;br /&gt;
e.	All or almost all&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted code? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Very important&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Nice to have but not a priority&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Not a factor in hiring&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you have internal security checkpoints during the software development life-cycle? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, at every stage of the development cycle&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, during the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, during the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; If you answered yes to the question on internal security review, where is the organizational responsibility for this review? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Within the development team&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Within the QA team&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Within a security team&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Within the internal audit team&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you perform independent third-party security reviews before deploying a Web application?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Every web application undergoes an external review before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Only security critical applications undergo an external review&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Only when requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We never perform external security reviews&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, how often do you engage external security firms? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Once at the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
b.	When making important security choices&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Ad hoc, as needed&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Prior to release&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
c. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does the costs of these security reviews come from: (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	The development budget&amp;lt;br&amp;gt;&lt;br /&gt;
b.	The Q&amp;amp;A budget&amp;lt;br&amp;gt;&lt;br /&gt;
c.	A security budget&amp;lt;br&amp;gt;&lt;br /&gt;
d.	A general budget&amp;lt;br&amp;gt;&lt;br /&gt;
e.	It varies&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of your total developer’s time is directly devoted to security activities? (code reviews, meetings, etc)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	I don’t know - we don’t measure time in that way&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is software security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Extremely important&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know - I don't deal with customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Absolutely critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant public security incident in the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you think your organization’s security spending in 2009 will change in relation to 2008?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We will spend over 20% more in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We will spend between up to 20% more in 2009 and 2008&amp;lt;br&amp;gt;&lt;br /&gt;
c.	We will spend up to 20% less in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We will spend over 20% less in 2009 than 2008 &amp;lt;br&amp;gt;&lt;br /&gt;
e.	We don’t know yet how much we will spend in 2009&amp;lt;br&amp;gt;&lt;br /&gt;
f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49488</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49488"/>
				<updated>2008-12-17T23:29:01Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
Establishing a Benchmark for Security Spending in Web Application Development&lt;br /&gt;
The OWASP project “Security Spending in Web Application Development” aims to answer the question – How many resources should be devoted to security spending in the software development life-cycle?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
This project seeks to produce an industry accepted benchmark to help address the issues below.  We want to quantify how many dollar and human resources should be allocated towards security in the software development life-cycle. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on security in the Web application development process.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are difficult to quantify.  This makes justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing secure Web application, but there is no industry consensus or data on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software.  Organization that have invested development resources into software security may not get to charge a premium for this investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help formulate the right questions.  Your feedback would be much appreciated. We want to use the answers to address the following questions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do organizations measure software security spending separately from the rest of their development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much developer time is spent on software security related activities?&lt;br /&gt;
How much budget is allocated towards software security as a percentage of development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the software security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organization who development, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 1000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	None&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Significant portion&amp;lt;br&amp;gt;&lt;br /&gt;
e.	All or almost all&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted code? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Very important&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Nice to have but not a priority&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Not a factor in hiring&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you have internal security checkpoints during the software development life-cycle? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, at every stage of the development cycle&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, during the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, during the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; If you answered yes to the question on internal security review, where is the organizational responsibility for this review? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Within the development team&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Within the QA team&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Within a security team&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Within the internal audit team&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you perform independent third-party security reviews before deploying a Web application?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Every web application undergoes an external review before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Only security critical applications undergo an external review&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Only when requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We never perform external security reviews&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, how often do you engage external security firms? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Once at the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
b.	When making important security choices&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Ad hoc, as needed&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Prior to release&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
c. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does the costs of these security reviews come from: (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	The development budget&amp;lt;br&amp;gt;&lt;br /&gt;
b.	The Q&amp;amp;A budget&amp;lt;br&amp;gt;&lt;br /&gt;
c.	A security budget&amp;lt;br&amp;gt;&lt;br /&gt;
d.	A general budget&amp;lt;br&amp;gt;&lt;br /&gt;
e.	It varies&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of your total developer’s time is directly devoted to security activities? (code reviews, meetings, etc)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	I don’t know - we don’t measure time in that way&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is software security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Extremely important&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know - I don't deal with customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Absolutely critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant public security incident in the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you think your organization’s security spending in 2009 will change in relation to 2008?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We will spend over 20% more in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We will spend between up to 20% more in 2009 and 2008&amp;lt;br&amp;gt;&lt;br /&gt;
c.	We will spend up to 20% less in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We will spend over 20% less in 2009 than 2008 &amp;lt;br&amp;gt;&lt;br /&gt;
e.	We don’t know yet how much we will spend in 2009&amp;lt;br&amp;gt;&lt;br /&gt;
f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49487</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49487"/>
				<updated>2008-12-17T23:28:20Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
Establishing a Benchmark for Security Spending in Web Application Development&lt;br /&gt;
The OWASP project “Security Spending in Web Application Development” aims to answer the question – How many resources should be devoted to security spending in the software development life-cycle?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
This project seeks to produce an industry accepted benchmark to help address the issues below.  We want to quantify how many dollar and human resources should be allocated towards security in the software development life-cycle. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on security in the Web application development process.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are difficult to quantify.  This makes justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing secure Web application, but there is no industry consensus or data on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software.  Organization that have invested development resources into software security may not get to charge a premium for this investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help formulate the right questions.  Your feedback would be much appreciated. We want to use the answers to address the following questions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do organizations measure software security spending separately from the rest of their development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much developer time is spent on software security related activities?&lt;br /&gt;
How much budget is allocated towards software security as a percentage of development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the software security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organization who development, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;What is the total approximate annual revenue of your organization in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. Under 1 million &amp;lt;br&amp;gt;&lt;br /&gt;
b. 1 million – 5 million &amp;lt;br&amp;gt;&lt;br /&gt;
c. 5 million- 25 million&amp;lt;br&amp;gt;&lt;br /&gt;
d. 25 million- 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 100 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Finance&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Medical&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Energy&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Government&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Education&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Professional Services&amp;lt;br&amp;gt;&lt;br /&gt;
g.      Non-profit&amp;lt;br&amp;gt;&lt;br /&gt;
h.      Retail&amp;lt;br&amp;gt;&lt;br /&gt;
i.      Manufacturing&amp;lt;br&amp;gt;&lt;br /&gt;
j.      Hospitality and Tourism&amp;lt;br&amp;gt;&lt;br /&gt;
k.      Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Executive&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Security professional&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Project manager&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developer&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Finance&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Sales&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Marketing&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Names, addresses, and other personally identifiable information&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Credit card information&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Health care related information&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Financial account information&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Intellectual property&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Confidential information&amp;lt;br&amp;gt;&lt;br /&gt;
g.	Other (please specify)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	A Chief Information Security Officer or other dedicated security executive on the company’s executive board.&amp;lt;br&amp;gt;&lt;br /&gt;
b.	A senior manager or director dedicated to security&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Network security engineers&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Developers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Quality assurance testers dedicated primarily to security&amp;lt;br&amp;gt;&lt;br /&gt;
f.	An Information Security Officer who also has other responsibilities.&amp;lt;br&amp;gt;&lt;br /&gt;
g.	None&amp;lt;br&amp;gt;&lt;br /&gt;
h.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 50 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 50 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 100 - 500&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 500&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
a. 1 - 10 &amp;lt;br&amp;gt;&lt;br /&gt;
b. 10 - 100 &amp;lt;br&amp;gt;&lt;br /&gt;
c. 100 - 500 &amp;lt;br&amp;gt;&lt;br /&gt;
d. 500 - 1000&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 1000&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your software development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	None&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Some&amp;lt;br&amp;gt;&lt;br /&gt;
c.	About half&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Significant portion&amp;lt;br&amp;gt;&lt;br /&gt;
e.	All or almost all&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted code? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We don’t review the security&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We contractually require adherence to best-practices and/or particular security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
d.	We conduct a security review internally&amp;lt;br&amp;gt;&lt;br /&gt;
e.	We have an independent third-party firm conduct a security review&amp;lt;br&amp;gt;&lt;br /&gt;
f.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, via an external training course&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, via internal resources&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, via certifications&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following background checks are conducted when hiring developers? (please check all that apply)&amp;lt;/li&amp;gt; &lt;br /&gt;
a.	Basic criminal background check&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Extensive overall background check via third party&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Contacting references&amp;lt;br&amp;gt;&lt;br /&gt;
d.      None&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is previous security experience when hiring developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.      Very important&amp;lt;br&amp;gt;&lt;br /&gt;
b.      Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Nice to have but not a priority&amp;lt;br&amp;gt;&lt;br /&gt;
d.      Not a factor in hiring&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you have internal security checkpoints during the software development life-cycle? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes, at every stage of the development cycle&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Yes, during the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Yes, during the testing phase&amp;lt;br&amp;gt;&lt;br /&gt;
d.	No&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; If you answered yes to the question on internal security review, where is the organizational responsibility for this review? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Within the development team&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Within the QA team&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Within a security team&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Within the internal audit team&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Do you perform independent third-party security reviews before deploying a Web application?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Every web application undergoes an external review before deployment&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Only security critical applications undergo an external review&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Only when requested by customers&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We never perform external security reviews&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, how often do you engage external security firms? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Once at the design phase&amp;lt;br&amp;gt;&lt;br /&gt;
b.	When making important security choices&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Ad hoc, as needed&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Prior to release&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure (USD) on these reviews?&amp;lt;/li&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
a. Under $50,000&amp;lt;br&amp;gt;&lt;br /&gt;
b. $50,000 - $100,000 &amp;lt;br&amp;gt;&lt;br /&gt;
c. $100,000 - $250,000 &amp;lt;br&amp;gt;&lt;br /&gt;
d. $250,000 - $1,000,000&amp;lt;br&amp;gt;&lt;br /&gt;
e. Over 1 million&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does the costs of these security reviews come from: (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	The development budget&amp;lt;br&amp;gt;&lt;br /&gt;
b.	The Q&amp;amp;A budget&amp;lt;br&amp;gt;&lt;br /&gt;
c.	A security budget&amp;lt;br&amp;gt;&lt;br /&gt;
d.	A general budget&amp;lt;br&amp;gt;&lt;br /&gt;
e.	It varies&amp;lt;br&amp;gt;&lt;br /&gt;
f.	Don’t know&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of your total developer’s time is directly devoted to security activities? (code reviews, meetings, etc)&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Under 2%&amp;lt;br&amp;gt;&lt;br /&gt;
b.	2%-5%&amp;lt;br&amp;gt;&lt;br /&gt;
c.	5%-10%&amp;lt;br&amp;gt;&lt;br /&gt;
d.	10%-15%&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Over 15%&amp;lt;br&amp;gt;&lt;br /&gt;
f.	I don’t know - we don’t measure time in that way&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is software security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Extremely important&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
e.      Don't know - I don't deal with customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Highly sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Somewhat sensitive data&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Not very sensitive data &amp;lt;br&amp;gt;&lt;br /&gt;
d.	Depends on who is deploying it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Absolutely critical&amp;lt;br&amp;gt;&lt;br /&gt;
b.	Very important&amp;lt;br&amp;gt;&lt;br /&gt;
c.	Somewhat important&amp;lt;br&amp;gt;&lt;br /&gt;
d.	Nice to have&amp;lt;br&amp;gt;&lt;br /&gt;
e.	Not very important&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant public security incident in the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	Yes&amp;lt;br&amp;gt;&lt;br /&gt;
b.	No&amp;lt;br&amp;gt;&lt;br /&gt;
c.      Don't know &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;How do you think your organization’s security spending in 2009 will change in relation to 2008?&amp;lt;/li&amp;gt;&lt;br /&gt;
a.	We will spend over 20% more in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
b.	We will spend between up to 20% more in 2009 and 2008&amp;lt;br&amp;gt;&lt;br /&gt;
c.	We will spend up to 20% less in 2009 than 2008&amp;lt;br&amp;gt;&lt;br /&gt;
d.      We will spend over 20% less in 2009 than 2008 &amp;lt;br&amp;gt;&lt;br /&gt;
e.	We don’t know yet how much we will spend in 2009&amp;lt;br&amp;gt;&lt;br /&gt;
f.	We don’t measure security spending&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49163</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49163"/>
				<updated>2008-12-15T22:13:03Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
Establishing a Benchmark for Security Spending in Web Application Development&lt;br /&gt;
The OWASP project “Security Spending in Web Application Development” aims to answer the question – How many resources should be devoted to security spending in the software development life-cycle?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
This project seeks to produce an industry accepted benchmark to help address the issues below.  We want to quantify how many dollar and human resources should be allocated towards security in the software development life-cycle. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on security in the Web application development process.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are difficult to quantify.  This makes justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing secure Web application, but there is no industry consensus or data on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software.  Organization that have invested development resources into software security may not get to charge a premium for this investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help formulate the right questions.  Your feedback would be much appreciated. We want to use the answers to address the following questions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do organizations measure software security spending separately from the rest of their development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much developer time is spent on software security related activities?&lt;br /&gt;
How much budget is allocated towards software security as a percentage of development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the software security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organization who development, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;What is your approximate annual revenue in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where is your organization based?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is your role within the organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following sensitive data types do your Web applications process? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Which of the following security personnel does your organization have (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Approximately how many developers does your organization employ?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What is the approximate total number of employees in your organization?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much of your development is outsourced or subcontracted?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How do you review the security of outsourced or subcontracted code?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do your developers undergo software security training? (please check appropriate box)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do you perform background checks on developers?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do you have internal security checkpoints during the software development life-cycle?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; If you answered yes to the question on internal security review, where is the organizational responsibility for this review?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do you perform external security reviews before deploying a Web application?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, how often do you engage external security firms? (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;If you answered yes to the question on external security reviews, what is the approximate annual expenditure on these reviews?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Does the costs of these security reviews come from: (check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What percentage of your total developer’s time is directly devoted to security activities? (code reviews, meetings, etc)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How important is software security generally to your customers?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Does your organization produce software or systems that deal primarily with:&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How important is Web application security to your executive management?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Is security a part of your marketing or branding strategy for your product?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Have you suffered a significant public security incident in the last two years?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; If you answered Yes to the last question, what damage resulted from this breach? (please check all that apply)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How do you think your organization’s security spending in 2009 will change in relation to 2008?&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49159</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49159"/>
				<updated>2008-12-15T22:08:32Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
Establishing a Benchmark for Security Spending in Web Application Development&lt;br /&gt;
The OWASP project “Security Spending in Web Application Development” aims to answer the question – How many resources should be devoted to security spending in the software development life-cycle?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
This project seeks to produce an industry accepted benchmark to help address the issues below.  We want to quantify how many dollar and human resources should be allocated towards security in the software development life-cycle. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on security in the Web application development process.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are difficult to quantify.  This makes justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing secure Web application, but there is no industry consensus or data on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software.  Organization that have invested development resources into software security may not get to charge a premium for this investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help formulate the right questions.  Your feedback would be much appreciated. We want to use the answers to address the following questions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do organizations measure software security spending separately from the rest of their development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much developer time is spent on software security related activities?&lt;br /&gt;
How much budget is allocated towards software security as a percentage of development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the software security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== (Proposed) 25 Survey Questions  ==&lt;br /&gt;
&lt;br /&gt;
This survey is meant to be completed out by organization who development, sell, or host Web applications.  It is not intended for general software consumers. Respondents do not  not need to provide any individually identifiable information and no individual answers will be published.  Only aggregate reports will be published. The survey only takes about 10 minutes.  Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;What is your approximate annual revenue in USD?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What market do you serve&amp;lt;li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49135</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49135"/>
				<updated>2008-12-15T21:54:42Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
Establishing a Benchmark for Security Spending in Web Application Development&lt;br /&gt;
The OWASP project “Security Spending in Web Application Development” aims to answer the question – How many resources should be devoted to security spending in the software development life-cycle?&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
This project seeks to produce an industry accepted benchmark to help address the issues below.  We want to quantify how many dollar and human resources should be allocated towards security in the software development life-cycle. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on security in the Web application development process.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are difficult to quantify.  This makes justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing secure Web application, but there is no industry consensus or data on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software.  Organization that have invested development resources into software security may not get to charge a premium for this investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help formulate the right questions.  Your feedback would be much appreciated. We want to use the answers to address the following questions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do organizations measure software security spending separately from the rest of their development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much developer time is spent on software security related activities?&lt;br /&gt;
How much budget is allocated towards software security as a percentage of development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the software security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49133</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49133"/>
				<updated>2008-12-15T21:54:07Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
Establishing a Benchmark for Security Spending in Web Application Development&lt;br /&gt;
The OWASP project “Security Spending in Web Application Development” aims to answer the question – How many resources should be devoted to security spending in the software development life-cycle?&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
This project seeks to produce an industry accepted benchmark to help address the above issues.  We want to quantify how many dollar and human resources should be allocated towards security in the software development life-cycle. This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on security in the Web application development process.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are difficult to quantify.  This makes justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing secure Web application, but there is no industry consensus or data on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software.  Organization that have invested development resources into software security may not get to charge a premium for this investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help formulate the right questions.  Your feedback would be much appreciated. We want to use the answers to address the following questions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do organizations measure software security spending separately from the rest of their development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much developer time is spent on software security related activities?&lt;br /&gt;
How much budget is allocated towards software security as a percentage of development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the software security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49130</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49130"/>
				<updated>2008-12-15T21:53:20Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
Establishing a Benchmark for Security Spending in Web Application Development&lt;br /&gt;
The OWASP project “Security Spending in Web Application Development” aims to answer the question – How many resources should be devoted to security spending in the software development life-cycle?&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on security in the Web application development process.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are difficult to quantify.  This makes justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing secure Web application, but there is no industry consensus or data on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software.  Organization that have invested development resources into software security may not get to charge a premium for this investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project seeks to produce an industry accepted benchmark to help address the above issues.  We want to quantify how many dollar and human resources should be allocated towards security in the software development life-cycle.&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help formulate the right questions.  Your feedback would be much appreciated. We want to use the answers to address the following questions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do organizations measure software security spending separately from the rest of their development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much developer time is spent on software security related activities?&lt;br /&gt;
How much budget is allocated towards software security as a percentage of development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the software security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Status  ==&lt;br /&gt;
Completing the project description text and finalizing the proposed 25 survey questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49126</id>
		<title>Category:OWASP Security Spending Benchmarks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Security_Spending_Benchmarks&amp;diff=49126"/>
				<updated>2008-12-15T21:51:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jeremiahgrossman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About the Security Spending Benchmarks Project ==&lt;br /&gt;
&lt;br /&gt;
Establishing a Benchmark for Security Spending in Web Application Development&lt;br /&gt;
The OWASP project “Security Spending in Web Application Development” aims to answer the question – How many resources should be devoted to security spending in the software development life-cycle?&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
This project is motivated by the fact that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on security in the Web application development process.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Spending on security helps mitigate risks whose potential costs are difficult to quantify.  This makes justifying and obtaining security budgets difficult.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing secure Web application, but there is no industry consensus or data on how this translates into monetary terms.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Producing a less secure Web application may be less expensive than producing a more secure version of the same software.  Organization that have invested development resources into software security may not get to charge a premium for this investment.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project seeks to produce an industry accepted benchmark to help address the above issues.  We want to quantify how many dollar and human resources should be allocated towards security in the software development life-cycle.&lt;br /&gt;
&lt;br /&gt;
Prior to releasing the survey we are asking colleagues to help formulate the right questions.  Your feedback would be much appreciated. We want to use the answers to address the following questions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Do organizations measure software security spending separately from the rest of their development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;How much developer time is spent on software security related activities?&lt;br /&gt;
How much budget is allocated towards software security as a percentage of development costs?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where does the software security budget come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
How do the above answers correlate with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Company size&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Industry vertical&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitivity of the underlying data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Existence of executive level security oversight&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Role of security in the company’s software development cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at '''bgelbord AT wgen.net''' with any questions or feedback.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jeremiah Grossman (CTO, WhiteHat Security)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jeremiahgrossman</name></author>	</entry>

	</feed>