This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Application Security Guide For CISOs Project v2"

From OWASP
Jump to: navigation, search
(Created page with "<div style="width:100%;height:90px;border:0,margin:0;overflow: hidden;">link=OWASP_Project_Stages#tab.3DLab_Projects</div> <div style="border:0,margin:0;...")
 
 
(47 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 +
=Main=
 +
 +
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:CISO-Guide-header.jpg|link=]]</div>
 
<div style="width:100%;height:90px;border:0,margin:0;overflow: hidden;">[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]</div>
 
<div style="width:100%;height:90px;border:0,margin:0;overflow: hidden;">[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]</div>
<div style="border:0,margin:0;overflow: hidden;">
+
 
{{OWASP Defenders}} {{OWASP Book|5691953}}
 
<div style="margin: 5px; padding: 5px; float: left; width:70%">{{Social Media Links}} </div>
 
</div>
 
=Code Review Guide=
 
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |
+
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |
==The Release Candidate for the OWASP Code Review Guide is now available!==
+
 
Please forward to all the developers and development teams you know!! We would like to immediately start raising awareness about this OWASP resource.
+
==OWASP Application Security Guide For CISOs (Version 2 - 2018 Edition)==
We plan to release the final version in Aug. 2017 after a public comment period ending July 31, 2017.
 
  
Thank you,
+
Among application security stakeholders, Chief Information Security Officers (CISOs),are responsible for application security from governance, compliance and risk perspectives. The Application Security Guide For CISOs seeks to help CISOs manage application security programs according to their own roles, responsibilities, perspectives and needs. Application security best practices and OWASP resources are referenced throughout the guide.
Larry Conklin, Gary Robinson
 
OWASP Code Review Guides Co-Leaders
 
  
 
==Introduction==
 
==Introduction==
OWASP Code Review Guide is a technical book written for those responsible for code reviews (management, developers, security professionals). The primarily focus of this book has been divided into two main sections. Section one is why and how of code reviews and sections two is devoted to what vulnerabilities need to be to look for during a manual code review. While security scanners are improving every day the need for manual security code reviews still needs to have a prominent place in organizations SDLC (Secure development life cycle) that desires good secure code in production.
 
  
Second sections deals with vulnerabilities. It is based on the poplar OWASP 2013 top 10.  Here you will find most of the code examples for both on what not to do and on what to do. A word of caution on code examples; Perl is famous for its saying that there are 10,000 ways to do one thing. The same is true for C#, PHP and Java or any other computer language. Now add in "Object-Oriented Programming" and if we are using design patterns or even what designs patterns are being used and sample code becomes very “iff” in what to write. We tried to keep the sample code so code reviews can see red flags and not “do it my way or else”.
+
The purpose of this document is to guide CISOs and managers of security DevOps in managing application security from initial problem statement to delivery of the solution. We start this journey in part I by providing guidance on how to start an application security initiative such as with the creation of the business cases for investing in application security following with awareness of threats targeting applications. In part II we focus on how to create an application security program including the adoption of secure software development activities, application security tools and secure code training for developers. In part III we focus on managing application security from both program execution as well as from risk management strategy perspectives including the mitigation of the risk of vulnerabilities and the metrics and reporting them based upon risk and exposure. In part IV we focus on process improvements such as the use of software maturity models and the lesson learned from security incidents whose root causes might have been identified in exploit of application vulnerabilities.
  
The last section is the appendix. Here we have content like code reviewer check list, etc. of items that really don’t flow in book form but needed to be included to make the code review guide compete.
+
==Objectives==
  
==Review of Code Review Guide 2.0==
+
The guide assists CISOs on how to manage application security through the phases of initiation, creation, management and process improvements.
Constructive comments on this OWASP Code Review Release Candidate should be forwarded via email to owasp-codereview-[email protected]. Private comments may be sent to [email protected] or [email protected] . All comments are welcome. All comments should indicate the specific relevant page and section.
+
Tactical guidance is provided in the following aspects:
 +
* Assure compliance of applications with security regulations for privacy, data protection and information security
 +
* Leverage OWASP resources such as project documentation and tools
 +
* Manage application security from perspective or people/training, processes and tools/technologies
 +
* Manage application vulnerability risks and remediation based upon risk exposure to the business
 +
* Create awareness on cyber-threats targeting applications to focus on countermeasures
 +
* Operationalise application security assessments and provide support to development teams for continuous software security development and testing
 +
* Integration of existing applications with emerging technologies such as API, micro-services, cloud, virtualisation, biometrics
 +
* Alignment of application security strategy with business and IT strategy
 +
* Focus on process automation and process improvements
 +
* Be an agent of change in challenging corporate environments and trigger appropriate responses
 +
* Asking the right questions to gain visibility across the organisation (who does what questions)
 +
* Proactive risk management strategies
 +
* Capture lesson learned from past security incidents/data breaches
 +
* Setting roadmaps for process improvements
  
All feedback is critical to the continued success of the OWASP Code Review Guide.
+
==Licensing==
  
==Licensing==
+
The OWASP Application Security Guide For CISOs is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
OWASP Code Review Guide is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
+
 
 +
&copy; OWASP Foundation
 +
 
 +
| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
 +
 
 +
== Core Content ==
 +
 
 +
The guide provide guidance to CISO to start, create, manage and improve Application Security Programs.
 +
The contents are articulated in (four) parts:
 +
* Part I: "How To" Start
 +
* Part II:  "How To" Create
 +
* Part III: "How To" Manage
 +
* Part IV: "How To" Improve
 +
 
 +
== Presentation ==
  
 +
[[File:CISO_AppSec_Guide_USA_2017_Small.jpg|link=https://www.owasp.org/images/b/bf/2017-CISO-Guide-Reboot-Morana_AppSec_USA_Short.pdf]]
  
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
+
Presentation given at OWASP AppSec USA 2017 Project Meeting
  
 
== Project Leader ==
 
== Project Leader ==
* Larry Conklin [mailto:[email protected]]
 
* Gary Robinson [mailto:[email protected]]
 
  
== Project Email ==
+
[https://www.owasp.org/index.php/Marco_Morana Marco Morana]
* Project Email [mailto:owasp-codereview-project@owasp.org]
+
 
 +
== Related Projects ==
  
==Classifications==
+
* [[OWASP_CISO_Survey|CISO Survey]]
[[File:Owasp-defenders-small.png|link=]]
+
* [[:Category:Software Assurance Maturity Model|Software Assurance Maturity Model]]
  
[[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]
+
| valign="top" style="padding-left:25px;width:200px;" |
  
[[File:Project_Type_Files_DOC.jpg|link=]]
+
== Quick Access ==
  
== Related Projects ==
+
* Application Security Guide For CISOs v2.0 EN (Work in Progress)
 +
** [[Application Security Guide For CISOsVs2|HTML]]
  
OWASP Testing Guide [https://www.owasp.org/index.php/OWASP_Testing_Project]
+
* Application Security Guide For CISOs v1.0 EN (Release Edition)
 +
** [[Application Security Guide For CISOs |HTML]]
 +
** [https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf PDF]
 +
** [http://www.lulu.com/shop/owasp-foundation/application-security-guide-for-cisos-v10-nov-2013/paperback/product-21288580.html Hardcopy]
  
 +
* Versión Uno en español
 +
** La [[Guía de Seguridad en Aplicaciones para CISOs]] (Español) fue editada y corregida por Mauro Gioino, Mauro Graziosi y [[User:Cristian_Borghello|Cristian Borghello]].
  
| valign="top"  style="padding-left:25px;width:200px;" |
+
== News and Events ==
 +
* [19-22 Sep 2017] The [https://2017.appsecusa.org/schedule/ CISO Guide Version 2 Reboot] was presented at [https://2017.appsecusa.org AppSec USA]
 +
* [12-16 June 2017] [https://github.com/OWASP/owasp-summits/blob/master/Outcomes/CISO/Application-Security-Guide-for-CISO.md Outcomes Of Discussions For CISO Guide Version 2] at [https://owaspsummit.org 2017 OWASP Summit in UK]
  
== Quick Download ==
+
==Classifications==
* [https://www.owasp.org/index.php/File:OWASP_Code_Review_Guide_v2.pdf Code Review Guide 2.0]
 
  
== In Print ==
+
  {| width="200" cellpadding="2"
Code Review Guide 2.0 will be available in Lulu in the near future.
+
  |-
 +
  | rowspan="2" align="center" valign="top" width="50%" | [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]
 +
  | align="center" valign="top" width="50%" | [[File:Owasp-builders-small.png|link=Builders]] 
 +
  |-
 +
  | align="center" valign="top" width="50%" | [[File:Owasp-defenders-small.png|link=Defenders]]
 +
  |-
 +
  | colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]
 +
  |-
 +
  | colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]] 
 +
  |}
  
[http://www.lulu.com/content/5678680 Code Review Guide V1.1] on Lulu.
 
 
|}
 
|}
  
 
= Acknowledgements =
 
= Acknowledgements =
The OWASP Code Review project was conceived by Eoin Keary, the OWASP Dublin Founder and Chapter Lead.
+
==Volunteers==
 +
We are currently assembly a team of volunteers to author, edit and review the guide version 2.  List of names will be updated soon
 +
 
 +
= Road Map and Getting Involved =
 +
 
 +
* We rebooted the project (at AppSec USA 2017 Project Summit) create new version 2, wiki, GitHub repository
 +
* We reactivated OWASP CISO mailing list
 +
* We have created the stub for version 2 and structured the contents in four parts
 +
 
 +
Next steps are:
 +
* Develop the contents:  as was discussed at OWASP Summit in London in June 2017
 +
* Create a mini 2018 CISO Survey to socialize with CISOs at CISO summits using Survey Monkey lists
 +
 
 +
The main goal is to produce a draft by 30/3/2018 and a reviewed version by end of June 2018
 +
 
 +
Involvement in the development and promotion of the CISO Guide is actively encouraged.
 +
You do not have to be a security expert in order to contribute.
 +
Some of the ways you can help:
 +
* Develop the new contents
 +
* Update  the old contents
 +
* Review the text
 +
* Help with graphical design for the book and the diagrams
 +
* Help to create the mini CISO survey linked to the CISO web page
 +
 
 +
Please participate through the project's [https://lists.owasp.org/mailman/listinfo/owasp_application_security_guide_for_cisos mailing list].
 +
 
 +
= Stable Releases =
 +
 
 +
== Current version ==
 +
 
 +
v1.0 (Stable)
 +
* EN
 +
** [[Application Security Guide For CISOs |HTML]]
 +
** [https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf PDF]
 +
** [http://www.lulu.com/shop/owasp-foundation/application-security-guide-for-cisos-v10-nov-2013/paperback/product-21288580.html Hardcopy]
 +
 
 +
== Previous versions ==
 +
 
 +
Pre 1.0 versions (alpha and betas) are in the wiki page history at https://www.owasp.org/index.php/Application_Security_Guide_For_CISOs and sub-pages beginning in [https://www.owasp.org/index.php?title=Application_Security_Guide_For_CISOs&dir=prev&action=history August 2011].
  
Code Review Mailing list[mailto:[email protected]]
+
= Project About =
  
+
{{:Projects/OWASP_Application_Security_Guide_For_CISOs_Project | Project About }}
  
__NOTOC__ <headertabs />
+
__NOTOC__ <headertabs></headertabs>  
  
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]
+
[[Category:OWASP Project]]   
 +
[[Category:OWASP_Builders]]
 +
[[Category:OWASP_Defenders]]   
 +
[[Category:OWASP_Document]]

Latest revision as of 09:14, 4 November 2017

CISO-Guide-header.jpg
Lab big.jpg

OWASP Application Security Guide For CISOs (Version 2 - 2018 Edition)

Among application security stakeholders, Chief Information Security Officers (CISOs),are responsible for application security from governance, compliance and risk perspectives. The Application Security Guide For CISOs seeks to help CISOs manage application security programs according to their own roles, responsibilities, perspectives and needs. Application security best practices and OWASP resources are referenced throughout the guide.

Introduction

The purpose of this document is to guide CISOs and managers of security DevOps in managing application security from initial problem statement to delivery of the solution. We start this journey in part I by providing guidance on how to start an application security initiative such as with the creation of the business cases for investing in application security following with awareness of threats targeting applications. In part II we focus on how to create an application security program including the adoption of secure software development activities, application security tools and secure code training for developers. In part III we focus on managing application security from both program execution as well as from risk management strategy perspectives including the mitigation of the risk of vulnerabilities and the metrics and reporting them based upon risk and exposure. In part IV we focus on process improvements such as the use of software maturity models and the lesson learned from security incidents whose root causes might have been identified in exploit of application vulnerabilities.

Objectives

The guide assists CISOs on how to manage application security through the phases of initiation, creation, management and process improvements. Tactical guidance is provided in the following aspects:

  • Assure compliance of applications with security regulations for privacy, data protection and information security
  • Leverage OWASP resources such as project documentation and tools
  • Manage application security from perspective or people/training, processes and tools/technologies
  • Manage application vulnerability risks and remediation based upon risk exposure to the business
  • Create awareness on cyber-threats targeting applications to focus on countermeasures
  • Operationalise application security assessments and provide support to development teams for continuous software security development and testing
  • Integration of existing applications with emerging technologies such as API, micro-services, cloud, virtualisation, biometrics
  • Alignment of application security strategy with business and IT strategy
  • Focus on process automation and process improvements
  • Be an agent of change in challenging corporate environments and trigger appropriate responses
  • Asking the right questions to gain visibility across the organisation (who does what questions)
  • Proactive risk management strategies
  • Capture lesson learned from past security incidents/data breaches
  • Setting roadmaps for process improvements

Licensing

The OWASP Application Security Guide For CISOs is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

© OWASP Foundation

Core Content

The guide provide guidance to CISO to start, create, manage and improve Application Security Programs. The contents are articulated in (four) parts:

  • Part I: "How To" Start
  • Part II: "How To" Create
  • Part III: "How To" Manage
  • Part IV: "How To" Improve

Presentation

CISO AppSec Guide USA 2017 Small.jpg

Presentation given at OWASP AppSec USA 2017 Project Meeting

Project Leader

Marco Morana

Related Projects

Quick Access

  • Application Security Guide For CISOs v2.0 EN (Work in Progress)
  • Application Security Guide For CISOs v1.0 EN (Release Edition)

News and Events

Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg

Volunteers

We are currently assembly a team of volunteers to author, edit and review the guide version 2. List of names will be updated soon

  • We rebooted the project (at AppSec USA 2017 Project Summit) create new version 2, wiki, GitHub repository
  • We reactivated OWASP CISO mailing list
  • We have created the stub for version 2 and structured the contents in four parts

Next steps are:

  • Develop the contents: as was discussed at OWASP Summit in London in June 2017
  • Create a mini 2018 CISO Survey to socialize with CISOs at CISO summits using Survey Monkey lists

The main goal is to produce a draft by 30/3/2018 and a reviewed version by end of June 2018

Involvement in the development and promotion of the CISO Guide is actively encouraged. You do not have to be a security expert in order to contribute. Some of the ways you can help:

  • Develop the new contents
  • Update the old contents
  • Review the text
  • Help with graphical design for the book and the diagrams
  • Help to create the mini CISO survey linked to the CISO web page

Please participate through the project's mailing list.

Current version

v1.0 (Stable)

Previous versions

Pre 1.0 versions (alpha and betas) are in the wiki page history at https://www.owasp.org/index.php/Application_Security_Guide_For_CISOs and sub-pages beginning in August 2011.

what is this project?
Name: OWASP Application Security Guide For CISOs Project (home page)
Purpose:
  • The purpose of this document is to guide the CISO in managing application security from initial problem statement to delivery of the solution. We start this journey with the creation of the business cases for investing in application security following with the awareness of threats targeting applications, the identification of the economical impacts, the determination of a risk mitigation strategy, the prioritization of the mitigation of the risk of vulnerabilities, the selection of security control measures to mitigate risks,the adoption of secure software development processes and maturity models and we conclude this journey with the selection of metrics for reporting and managing application security risk.

Draft Version: More info about this project can be found in the introductory page of the guide Application Security Guide For CISOs

License: Creative Commons Attribution Share Alike 3.0
who is working on this project?
Project Leader(s):
  • Marco Morana @
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation: View
Mailing list: Mailing List Archives
Project Roadmap: View
Main links:
Key Contacts
  • Contact Marco Morana @ to contribute to this project
  • Contact Marco Morana @ to review or sponsor this project