This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "CISO AppSec Guide v2: Introduction"

From OWASP
Jump to: navigation, search
 
(12 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
[[Application Security Guide For CISOsVs2|< Back to the Application Security Guide For CISOs V2]]
 
[[Application Security Guide For CISOsVs2|< Back to the Application Security Guide For CISOs V2]]
  
__NOTOC__
+
= Introduction =
  
= Introduction =
+
The intent of this guide is to help Chief Information Security Officers (CISOs) and SecDevOps managers in the initiation, creation and management of new application security programs and initiatives within their organisation as well as for improvements of existing application security processes, standards, training and tools.
 +
 
 +
OWASP resources such as projects are referenced throughout this guide. These resources can be used by CISOs and SecDevOps managers for creating standards, conduct application security assessments, develop training modules for software developers.  OWASP free tools for security testing of web application vulnerabilities are also referenced in this guide.
  
Among application security stakeholders, Chief Information Security Officers (CISOs) are responsible for application security from governance, compliance and risk perspectives. This guide seeks to help CISOs manage application security programs according to CISO roles, responsibilities, perspectives and needs. Application security best practices and OWASP resources are referenced throughout this guide. OWASP is a non profit organization whose mission is "making application security visible and empowering application security stakeholders with the right information for managing application security risks".
+
== Scope ==
  
This CISO guide is written to help CISOs that are responsible for managing application security programs from the information security and risk management perspectives. From the information security perspective, there is a need to protect the organization assets such as the citizen, client and customer sensitive data, the databases where this data is stored, the network infrastructure where the database servers reside and last but not least, the applications and software used to access and process this data. Besides business and user data,  applications and software are among the assets that CISOs seek to protect. Some of these applications and software provide business critical functions to customers that generate revenues for the organization. Examples include applications and software that provide customers with business services as well as applications and software that are sold as products to the clients. In the case where software applications are considered business critical information assets, these should receive a specific focus in human resources, training, processes, standards and tools. The scope of this guide is the security of web applications and the security of the components of the architecture such as the security of web servers, application servers and databases. This does not include other aspects of security that are not related to the specific application. Such as the security of the network infrastructure that supports the applications and constitutes a valued asset whose security properties such as confidentiality, integrity and availability need to be protected as well.  
+
The scope of this guide is application security and the security of the components of the application architecture such as clients, servers, databases, services, software components and libraries. This scope of this guide does not cover other aspects that are essential to the security of the application such as network and infrastructure security.
  
 
==Objectives==
 
==Objectives==
  
The guide assists CISOs on how to manage application security through the phases of initiation, creation, management and process improvements.
+
This guide is written in alignment of OWASP mission main goal that is "making application security visible and empowering application security stakeholders with the right information for managing application security risks". Specifically we seek to provide guidance on the following aspects of the application security program:
Tactical guidance is provided in the following aspects:  
+
* Assuring compliance of applications with security regulations for privacy, data protection and information security  
* Assure compliance of applications with security regulations for privacy, data protection and information security  
+
* Leveraging OWASP resources such as project documentation and tools
* Leverage OWASP resources such as project documentation and tools
+
* Managing application security from perspective or people/training, processes and tools/technologies
* Manage application security from perspective or people/training, processes and tools/technologies
+
* Managing application vulnerability risks and remediation based upon risk exposure to the business  
* Manage application vulnerability risks and remediation based upon risk exposure to the business  
+
* Creating awareness on cyber-threats targeting applications to focus on countermeasures
* Create awareness on cyber-threats targeting applications to focus on countermeasures
+
* Operationalisation  of application security assessments
* Operationalise application security assessments and provide support to development teams for continuous software security development and testing
+
* Supporting development teams for continuous software security development and testing
 
* Integration of existing applications with emerging technologies such as API, micro-services, cloud, virtualisation, biometrics
 
* Integration of existing applications with emerging technologies such as API, micro-services, cloud, virtualisation, biometrics
* Alignment of application security strategy with business and IT strategy
+
* Creation of an application security strategy in alignment with business and IT strategy
* Focus on process automation and process improvements
+
* Focusing on process automation and process improvements
* Be an agent of change in challenging corporate environments and trigger appropriate responses
+
* Helping CISOs and SecDevOps managers to be an agent of change in challenging corporate environments and trigger appropriate responses
* Asking the right questions to gain visibility across the organisation (who does what questions)
+
* Help CISOs and SecDevOps to ask the right questions to gain visibility across the organisation (who does what questions)
* Proactive risk management strategies
+
* Capturing the lesson learned from past security incidents/data breaches
* Capture lesson learned from past security incidents/data breaches
 
 
* Setting roadmaps for process improvements
 
* Setting roadmaps for process improvements
  
 
== Target Audience ==
 
== Target Audience ==
 
* Chief Information Security Officers (CISOs)
 
* Chief Information Security Officers (CISOs)
* Senior security management
+
* Security Development Operation (SecDevOps) Managers
* Senior technology management
 
  
 
[[Category:OWASP Application Security Guide For CISO Project]]
 
[[Category:OWASP Application Security Guide For CISO Project]]

Latest revision as of 01:35, 7 November 2017

< Back to the Application Security Guide For CISOs V2

Introduction

The intent of this guide is to help Chief Information Security Officers (CISOs) and SecDevOps managers in the initiation, creation and management of new application security programs and initiatives within their organisation as well as for improvements of existing application security processes, standards, training and tools.

OWASP resources such as projects are referenced throughout this guide. These resources can be used by CISOs and SecDevOps managers for creating standards, conduct application security assessments, develop training modules for software developers. OWASP free tools for security testing of web application vulnerabilities are also referenced in this guide.

Scope

The scope of this guide is application security and the security of the components of the application architecture such as clients, servers, databases, services, software components and libraries. This scope of this guide does not cover other aspects that are essential to the security of the application such as network and infrastructure security.

Objectives

This guide is written in alignment of OWASP mission main goal that is "making application security visible and empowering application security stakeholders with the right information for managing application security risks". Specifically we seek to provide guidance on the following aspects of the application security program:

  • Assuring compliance of applications with security regulations for privacy, data protection and information security
  • Leveraging OWASP resources such as project documentation and tools
  • Managing application security from perspective or people/training, processes and tools/technologies
  • Managing application vulnerability risks and remediation based upon risk exposure to the business
  • Creating awareness on cyber-threats targeting applications to focus on countermeasures
  • Operationalisation of application security assessments
  • Supporting development teams for continuous software security development and testing
  • Integration of existing applications with emerging technologies such as API, micro-services, cloud, virtualisation, biometrics
  • Creation of an application security strategy in alignment with business and IT strategy
  • Focusing on process automation and process improvements
  • Helping CISOs and SecDevOps managers to be an agent of change in challenging corporate environments and trigger appropriate responses
  • Help CISOs and SecDevOps to ask the right questions to gain visibility across the organisation (who does what questions)
  • Capturing the lesson learned from past security incidents/data breaches
  • Setting roadmaps for process improvements

Target Audience

  • Chief Information Security Officers (CISOs)
  • Security Development Operation (SecDevOps) Managers