This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "CPWE"

From OWASP
Jump to: navigation, search
m (Introduction)
m
 
(25 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
= Introduction =
 
= Introduction =
This OWASP cheat sheet for [http://en.wikipedia.org/wiki/Chief_information_security_officer Chief Information Security Officers (CISO)] is intended for an executive audience and for application security program assessors. It contains a list of application security program weaknesses that is intended to be built out over time, similar to MITRE's Common Weakness Enumeration (CWE) for software weaknesses. This list of program weaknesses is called the Common Program Weakness Enumeration (CPWE). The CPWE spans topics having to do with both institutionalization of an application security program, and also systems development touch points. An example of a CPWE use case is an organization having a SAMM or BSIMM assessment done, and the findings are mapped to CPWE-ID. Mappings are done in a similar fashion as one can for example generally configure software vulnerability assessment tools to map software weakness findings to CWE (or e.g. OWASP Top Ten), so that one can compare apples to apples regardless of program assessment methodology. I.e., regardless if for example SAMM or  BSIMM was used. Long-term goals for leveraging the CPWE potentially include creating an OWASP CISO Top Ten project using the CPWE as inputs (i.e. that draws from the list), as a sort of brass ring for an OWASP CISO "guide".
+
This OWASP initiative is intended for an executive audience and for application security program assessors. It contains a list of application security program weaknesses called the Common Program Weakness Enumeration (CPWE) that is intended to be built out over time, similar to MITRE's Common Weakness Enumeration (CWE) for software weaknesses. The CPWE spans topics having to do with both institutionalization of an application security program, and also systems development touch points. A CPWE use case is an organization having a SAMM (or a BSIMM, or a less formal assessment) done, and the findings are mapped to CPWE-ID. Mappings in this example would be done in a similar fashion as one can for example generally configure software vulnerability assessment tools to map software weakness findings to CWE (or e.g. OWASP Top Ten), so that one can compare apples to apples regardless of program assessment methodology.  
  
= Common Program Weakness Enumeration =
+
'''Example: '''Below is a notional example of reporting findings from some SwA program assessment using CPWE:
The comprehensive CPWE dictionary view is below.
 
  
[[CPWE-ID: 12|Insufficient Program Resources - (12)]]<br>
+
  '''Severe (3 Findings)'''
xxxxxxxxxxx - (xx)<br>
+
      CPWE-3: Failure to Address Verification Findings For Application X  ''<-- This is an instance of a finding of type CPWE-3''
xxxxxxxxxxx - (xx)<br>
+
      CPWE-3: Failure to Address Verification Findings For Application Y  ''<-- This is another instance of a finding of type CPWE-3''
xxxxxxxxxxx - (xx)<br>
+
      CPWE-12: Insufficient Program Resources For Project Z  ''<-- This is an instance of a finding of type CPWE-12''
xxxxxxxxxxx - (xx)<br>
+
  '''High (xx Findings)'''
 +
      ...
 +
  '''Moderate (xx Findings)'''
 +
  '''Low (xx Findings)'''
  
 +
Long-term goals for leveraging the CPWE potentially include creating an OWASP CISO Top Ten project using the CPWE as inputs (i.e. that draws from the list), similar to how the CWE/SANS Top 25 list is constructed using the CWE.
  
"Insufficient Program Resources - (##)"..... if you only put someone on this half time you'll continue limping along trying to start a secure software development program........
+
= Contributor Instructions =
 +
First, thank you for considering contributing. Generally, I think for CPWE outlines we need at least the five sections as in the example ([[CPWE-ID: 12|Insufficient Program Resources - (12)]]). I think we should make sure to cover not just BSIMM and SAMM, but NIST SP 800-64 (and actually make sure the SP is well-represented). I think CWPE text needs to be CWE-like (i.e. brief but consistent in presentation and level of detail), but also slightly bent towards an executive audience. I think CWPE consequences need to grouped into those two top-level buckets for sure, for clear alignment in that regard to CF Disclosure Guidance: Topic No. 2.  
  
"Lack of Verification Capability  - (##)"........ if you have for instance only a couple people to get some elements of the program going but not enough to have an enforcement/verification capability..........
+
Next steps if you are interested would be to send a note to boberski_michael [at] bah.com for an assignment for further discussion on an item.
  
Etc,
+
= Common Program Weakness Enumeration =
.. initial, then e.g. (make a pass through sp)
+
The comprehensive CPWE dictionary view is below.
.....some top-level generic using sp, 5 generic, e.g. missing or inadequate implementation phase activities
+
 
... risky or dangerous vendor service
+
[[CPWE-ID: 12|Insufficient Program Resources - (12)]]<br>
.. risky or dangerous application or service integration ((split all these 'ors' into separate ones))
+
Organizational Culture Problems - (xx)<br>
.. missing policy
+
Missing Policy - (xx)<br>
.. missing standards
+
Missing Standards - (xx)<br>
.. missing systems development activity
+
Missing Solution Stack Guidance - (xx)<br>
.. missing systems development gate
+
Missing Secure Coding Standards - (xx)<br>
.. failure to track compliance activities
+
Missing Common Security Control Libraries - (xx)<br>
.. failure to track security bugs
+
Inadequate Developer Training - (xx)<br>
.. failure to protect source code from theft
+
Use of Insufficient Verification Technique - (xx)<br>
... missing or inadequate developer training
+
Failure to Address Verification Findings - (3)<br>
.. no reusable common security control libraries
+
Failure to Protect Source Code from Theft - (xx)<br>
.. no secure coding standards
+
Failure to Protect Sensitive Application Data from Theft - (xx)<br>
.. no minimum lifecycle activities
+
Failure to Track Security Bugs - (xx)<br>
.. failure to address implicit contractual or regulatory requirements
+
Failure to Address Implicit Contractual Requirements - (xx)<br>
.. failure to address explicit contractual or regulatory requirements
+
Failure to Address Explicit Contractual Requirements - (xx)<br>
.. inappropriate or inadequate secure development lifecycle activity
+
Risky Internal Integration - (xx)<br>
.. portfolio posture blindness
+
Risky Vendor Integration - (xx)<br>
.. application posture blindness
+
Broken or Risky Platform - (xx)<br>
.. potentially material event (add ref to draft guidance)
+
Broken or Risky Service - (xx)<br>
 +
Weaknesses that Affect SDLC Initiation Phase - (xx)<br>
 +
Weaknesses that Affect SDLC Development/Acquisition Phase - (xx)<br>
 +
Weaknesses that Affect SDLC Implementation/Assessment Phase - (xx)<br>
 +
Weaknesses that Affect SDLC Maintenance Phase - (xx)<br>
 +
Weaknesses that Affect SDLC Disposal Phase - (xx)<br>
 +
Supply Chain Issues - (xx)<br>
 +
Service-Oriented Architecture Issues - (xx)<br>
 +
Reusable Security Module Issues - (xx)<br>
 +
Cross-Organizational Solution Issues - (xx)<br>
 +
Migration Issues - (xx)<br>
 +
Data Center or Development Facility Issues - (xx)<br>
 +
Virtualization Issues - (xx)<br>
 +
Regulatory Cybersecurity Risk Disclosure Obligation Issues - (xx)<br>
 +
Regulatory Cyber Incident Disclosure Obligation Issues - (xx)<br>
 +
Weaknesses in In-House Applications - (xx)<br>
 +
Weaknesses in In-House Mobile Applications - (xx)<br>
 +
Weaknesses in In-House App Store - (xx)<br>
 +
Weaknesses in Vendor Applications - (xx)<br>
 +
Weaknesses in Vendor Mobile Applications - (xx)<br>
 +
Weaknesses in Vendor App Store - (xx)<br>
 +
Weaknesses in In-House Verification Services - (xx)<br>
 +
Weaknesses in Vendor Verification Services - (xx)<br>
 +
... - (xx)<br>
  
 
= Authors and Primary Editors  =
 
= Authors and Primary Editors  =
  
 
Mike Boberski - boberski_michael [at] bah.com
 
Mike Boberski - boberski_michael [at] bah.com
 
= Other Cheatsheets =
 
{{Cheatsheet_Navigation}}
 
 
[[Category:Cheatsheets]]
 

Latest revision as of 19:22, 26 September 2012

Introduction

This OWASP initiative is intended for an executive audience and for application security program assessors. It contains a list of application security program weaknesses called the Common Program Weakness Enumeration (CPWE) that is intended to be built out over time, similar to MITRE's Common Weakness Enumeration (CWE) for software weaknesses. The CPWE spans topics having to do with both institutionalization of an application security program, and also systems development touch points. A CPWE use case is an organization having a SAMM (or a BSIMM, or a less formal assessment) done, and the findings are mapped to CPWE-ID. Mappings in this example would be done in a similar fashion as one can for example generally configure software vulnerability assessment tools to map software weakness findings to CWE (or e.g. OWASP Top Ten), so that one can compare apples to apples regardless of program assessment methodology.

Example: Below is a notional example of reporting findings from some SwA program assessment using CPWE:

 Severe (3 Findings)
     CPWE-3: Failure to Address Verification Findings For Application X  <-- This is an instance of a finding of type CPWE-3
     CPWE-3: Failure to Address Verification Findings For Application Y  <-- This is another instance of a finding of type CPWE-3
     CPWE-12: Insufficient Program Resources For Project Z  <-- This is an instance of a finding of type CPWE-12
 High (xx Findings)
     ...
 Moderate (xx Findings)
 Low (xx Findings)

Long-term goals for leveraging the CPWE potentially include creating an OWASP CISO Top Ten project using the CPWE as inputs (i.e. that draws from the list), similar to how the CWE/SANS Top 25 list is constructed using the CWE.

Contributor Instructions

First, thank you for considering contributing. Generally, I think for CPWE outlines we need at least the five sections as in the example (Insufficient Program Resources - (12)). I think we should make sure to cover not just BSIMM and SAMM, but NIST SP 800-64 (and actually make sure the SP is well-represented). I think CWPE text needs to be CWE-like (i.e. brief but consistent in presentation and level of detail), but also slightly bent towards an executive audience. I think CWPE consequences need to grouped into those two top-level buckets for sure, for clear alignment in that regard to CF Disclosure Guidance: Topic No. 2.

Next steps if you are interested would be to send a note to boberski_michael [at] bah.com for an assignment for further discussion on an item.

Common Program Weakness Enumeration

The comprehensive CPWE dictionary view is below.

Insufficient Program Resources - (12)
Organizational Culture Problems - (xx)
Missing Policy - (xx)
Missing Standards - (xx)
Missing Solution Stack Guidance - (xx)
Missing Secure Coding Standards - (xx)
Missing Common Security Control Libraries - (xx)
Inadequate Developer Training - (xx)
Use of Insufficient Verification Technique - (xx)
Failure to Address Verification Findings - (3)
Failure to Protect Source Code from Theft - (xx)
Failure to Protect Sensitive Application Data from Theft - (xx)
Failure to Track Security Bugs - (xx)
Failure to Address Implicit Contractual Requirements - (xx)
Failure to Address Explicit Contractual Requirements - (xx)
Risky Internal Integration - (xx)
Risky Vendor Integration - (xx)
Broken or Risky Platform - (xx)
Broken or Risky Service - (xx)
Weaknesses that Affect SDLC Initiation Phase - (xx)
Weaknesses that Affect SDLC Development/Acquisition Phase - (xx)
Weaknesses that Affect SDLC Implementation/Assessment Phase - (xx)
Weaknesses that Affect SDLC Maintenance Phase - (xx)
Weaknesses that Affect SDLC Disposal Phase - (xx)
Supply Chain Issues - (xx)
Service-Oriented Architecture Issues - (xx)
Reusable Security Module Issues - (xx)
Cross-Organizational Solution Issues - (xx)
Migration Issues - (xx)
Data Center or Development Facility Issues - (xx)
Virtualization Issues - (xx)
Regulatory Cybersecurity Risk Disclosure Obligation Issues - (xx)
Regulatory Cyber Incident Disclosure Obligation Issues - (xx)
Weaknesses in In-House Applications - (xx)
Weaknesses in In-House Mobile Applications - (xx)
Weaknesses in In-House App Store - (xx)
Weaknesses in Vendor Applications - (xx)
Weaknesses in Vendor Mobile Applications - (xx)
Weaknesses in Vendor App Store - (xx)
Weaknesses in In-House Verification Services - (xx)
Weaknesses in Vendor Verification Services - (xx)
... - (xx)

Authors and Primary Editors

Mike Boberski - boberski_michael [at] bah.com