This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Category:OWASP Security Spending Benchmarks"

From OWASP
Jump to: navigation, search
((Proposed) 25 Survey Questions)
Line 48: Line 48:
 
<ol>  
 
<ol>  
 
<li>What is your approximate annual revenue in USD?</li>
 
<li>What is your approximate annual revenue in USD?</li>
 +
# Under 1 million
 +
# 1 million – 5 million
 +
# 5 million- 25 million
 +
# 25 million- 100 million
 +
# Over 100 million
 
<li>What market do you serve?</li>
 
<li>What market do you serve?</li>
 +
# Finance
 +
# Medical
 +
# Energy
 +
# Government
 +
# Education
 +
# Professional Services
 +
# Non-profit
 +
# Retail
 +
# Manufacturing
 +
# Hospitality and Tourism
 +
# Other (please specify)
 
<li>Where is your organization based?</li>
 
<li>Where is your organization based?</li>
 +
a. USA or Canada <br>
 +
b. EU <br>
 +
c. Asia <br>
 +
d. Other (please specify) <br>
 
<li>What is your role within the organization?</li>
 
<li>What is your role within the organization?</li>
 +
a. Developer<br>
 +
b. Project manager<br>
 +
c. Security professional<br>
 +
d. Finance<br>
 +
e. Sales<br>
 +
f. Marketing<br>
 +
g. Other (please specify)<br>
 +
 
<li>Which of the following sensitive data types do your Web applications process? (check all that apply)</li>
 
<li>Which of the following sensitive data types do your Web applications process? (check all that apply)</li>
 +
a. Names, addresses, and other personal data<br>
 +
b. Credit card information<br>
 +
c. Health care related information<br>
 +
d. Financial account information<br>
 +
e. Other (please specify)<br>
 
<li>Which of the following security personnel does your organization have (check all that apply)</li>
 
<li>Which of the following security personnel does your organization have (check all that apply)</li>
 +
a. A Chief Information Security Officer or other dedicated security executive on the company’s executive board.<br>
 +
b. A senior manager or director dedicated to security<br>
 +
c. Network security engineers<br>
 +
d. Developers dedicated primarily to security<br>
 +
e. An Information Security Officer who also has other responsibilities.<br>
 +
f. None<br>
 +
g. Don’t know<br>
 +
 
<li>Approximately how many developers does your organization employ?</li>
 
<li>Approximately how many developers does your organization employ?</li>
 
<li>What is the approximate total number of employees in your organization?</li>
 
<li>What is the approximate total number of employees in your organization?</li>
 
<li>How much of your development is outsourced or subcontracted?</li>
 
<li>How much of your development is outsourced or subcontracted?</li>
 +
a. None<br>
 +
b. Only minor functions<br>
 +
c. Some<br>
 +
d. Major components are outsourced<br>
 +
e. Most<br>
 +
 
<li>How do you review the security of outsourced or subcontracted code?</li>
 
<li>How do you review the security of outsourced or subcontracted code?</li>
 +
a. We don’t review the security<br>
 +
b. We contractually require adherence to best practice<br>
 +
c. We specify particular security measures<br>
 +
d. We do a code review<br>
 +
e. We require an external review<br>
 +
 
<li>Do your developers undergo software security training? (please check appropriate box)</li>
 
<li>Do your developers undergo software security training? (please check appropriate box)</li>
 +
a. Yes, via an external training course<br>
 +
b. Yes, via internal resources<br>
 +
c. Yes, via certifications<br>
 +
d. No<br>
 +
e. Don’t know<br>
 +
 
<li>Do you perform background checks on developers?</li>
 
<li>Do you perform background checks on developers?</li>
 +
a. Yes<br>
 +
b. No<br>
 +
 
<li>Do you have internal security checkpoints during the software development life-cycle?</li>
 
<li>Do you have internal security checkpoints during the software development life-cycle?</li>
 +
a. Yes, at every stage of the development cycle<br>
 +
b. Yes, during the design phase<br>
 +
c. Yes, during the testing phase<br>
 +
d. No<br>
 +
 
<li> If you answered yes to the question on internal security review, where is the organizational responsibility for this review?</li>
 
<li> If you answered yes to the question on internal security review, where is the organizational responsibility for this review?</li>
 +
a. Within the development team<br>
 +
b. Within the QA team<br>
 +
c. Within a security team<br>
 +
d. Within the internal audit team<br>
 +
e. It varies<br>
 +
f. Don’t know<br>
 +
 
<li>Do you perform external security reviews before deploying a Web application?</li>
 
<li>Do you perform external security reviews before deploying a Web application?</li>
 +
a. Yes<br>
 +
b. No<br>
 +
 
<li>If you answered yes to the question on external security reviews, how often do you engage external security firms? (check all that apply)</li>
 
<li>If you answered yes to the question on external security reviews, how often do you engage external security firms? (check all that apply)</li>
 +
a. Once at the design phase<br>
 +
b. When making important security choices<br>
 +
c. Ad hoc, as needed<br>
 +
d. Prior to release<br>
 +
 
<li>If you answered yes to the question on external security reviews, what is the approximate annual expenditure on these reviews?</li>
 
<li>If you answered yes to the question on external security reviews, what is the approximate annual expenditure on these reviews?</li>
 +
 
<li>Does the costs of these security reviews come from: (check all that apply)</li>
 
<li>Does the costs of these security reviews come from: (check all that apply)</li>
 +
a. The development budget<br>
 +
b. The Q&A budget<br>
 +
c. A security budget<br>
 +
d. A general budget<br>
 +
e. It varies<br>
 +
f. Don’t know<br>
 +
 
<li>What percentage of your total developer’s time is directly devoted to security activities? (code reviews, meetings, etc)</li>
 
<li>What percentage of your total developer’s time is directly devoted to security activities? (code reviews, meetings, etc)</li>
 +
a. Under 2%<br>
 +
b. 2%-5%<br>
 +
c. 5%-10%<br>
 +
d. 10%-15%<br>
 +
e. Over 15%<br>
 +
f. I don’t know - we don’t measure time in that way<br>
 +
 
<li>How important is software security generally to your customers?</li>
 
<li>How important is software security generally to your customers?</li>
 +
a. Extremely important<br>
 +
b. Very important<br>
 +
c. Important<br>
 +
d. Not very important<br>
 +
 
<li>Does your organization produce software or systems that deal primarily with:</li>
 
<li>Does your organization produce software or systems that deal primarily with:</li>
 +
a. Highly sensitive data<br>
 +
b. Somewhat sensitive data<br>
 +
c. Not very sensitive data <br>
 +
d. Depends on who is deploying it<br>
 +
 
<li>How important is Web application security to your executive management?</li>
 
<li>How important is Web application security to your executive management?</li>
 +
a. Absolutely critical<br>
 +
b. Very important, but must be balanced against tight release deadlines.<br>
 +
c. Somewhat important<br>
 +
d. Nice to have<br>
 +
e. Not very important<br>
 +
 
<li>Is security a part of your marketing or branding strategy for your product?</li>
 
<li>Is security a part of your marketing or branding strategy for your product?</li>
 +
a. Yes<br>
 +
b. No<br>
 +
 
<li>Have you suffered a significant public security incident in the last two years?</li>
 
<li>Have you suffered a significant public security incident in the last two years?</li>
 +
a. Yes<br>
 +
b. No<br>
 +
 
<li> If you answered Yes to the last question, what damage resulted from this breach? (please check all that apply)</li>
 
<li> If you answered Yes to the last question, what damage resulted from this breach? (please check all that apply)</li>
 
<li>How do you think your organization’s security spending in 2009 will change in relation to 2008?
 
<li>How do you think your organization’s security spending in 2009 will change in relation to 2008?
 
</li>
 
</li>
 +
 +
a. We will spend more in 2009 than 2008<br>
 +
b. We will spend about the same in 2009 and 2008<br>
 +
c. We will spend less in 2009 than 2008<br>
 +
d. We don’t know yet how much we will spend in 2009<br>
 +
e. We don’t measure security spending<br>
 
</ol>
 
</ol>
 
  
 
== Project Status  ==
 
== Project Status  ==

Revision as of 18:06, 17 December 2008

Category:OWASP Project

About the Security Spending Benchmarks Project

Establishing a Benchmark for Security Spending in Web Application Development The OWASP project “Security Spending in Web Application Development” aims to answer the question – How many resources should be devoted to security spending in the software development life-cycle?


Overview

This project seeks to produce an industry accepted benchmark to help address the issues below. We want to quantify how many dollar and human resources should be allocated towards security in the software development life-cycle. This project is motivated by the fact that:

  • There are few, if any, industry standard benchmarks for executive management to consider when deciding what is a reasonable amount of resources to spend on security in the Web application development process.
  • Spending on security helps mitigate risks whose potential costs are difficult to quantify. This makes justifying and obtaining security budgets difficult.
  • Many business initiatives require organizations to take “reasonable measures” and “adhere to best practices” for developing secure Web application, but there is no industry consensus or data on how this translates into monetary terms.
  • Smaller organizations outside of highly regulated industries purchase and deploy Web applications with no realistic ability to evaluate their security.
  • Producing a less secure Web application may be less expensive than producing a more secure version of the same software. Organization that have invested development resources into software security may not get to charge a premium for this investment.


Prior to releasing the survey we are asking colleagues to help formulate the right questions. Your feedback would be much appreciated. We want to use the answers to address the following questions:

  • Do organizations measure software security spending separately from the rest of their development costs?
  • How much developer time is spent on software security related activities? How much budget is allocated towards software security as a percentage of development costs?
  • Where does the software security budget come from?


How do the above answers correlate with:

  • Company size
  • Industry vertical
  • Sensitivity of the underlying data
  • Existence of executive level security oversight
  • Role of security in the company’s software development cycle


(Proposed) 25 Survey Questions

This survey is meant to be completed out by organization who development, sell, or host Web applications. It is not intended for general software consumers. Respondents do not not need to provide any individually identifiable information and no individual answers will be published. Only aggregate reports will be published. The survey only takes about 10 minutes. Thank you very much for taking the time to complete this survey and help us better understand security spending in software development.


  1. What is your approximate annual revenue in USD?
    1. Under 1 million
    2. 1 million – 5 million
    3. 5 million- 25 million
    4. 25 million- 100 million
    5. Over 100 million
  2. What market do you serve?
    1. Finance
    2. Medical
    3. Energy
    4. Government
    5. Education
    6. Professional Services
    7. Non-profit
    8. Retail
    9. Manufacturing
    10. Hospitality and Tourism
    11. Other (please specify)
  3. Where is your organization based?
  4. a. USA or Canada
    b. EU
    c. Asia
    d. Other (please specify)

  5. What is your role within the organization?
  6. a. Developer
    b. Project manager
    c. Security professional
    d. Finance
    e. Sales
    f. Marketing
    g. Other (please specify)

  7. Which of the following sensitive data types do your Web applications process? (check all that apply)
  8. a. Names, addresses, and other personal data
    b. Credit card information
    c. Health care related information
    d. Financial account information
    e. Other (please specify)

  9. Which of the following security personnel does your organization have (check all that apply)
  10. a. A Chief Information Security Officer or other dedicated security executive on the company’s executive board.
    b. A senior manager or director dedicated to security
    c. Network security engineers
    d. Developers dedicated primarily to security
    e. An Information Security Officer who also has other responsibilities.
    f. None
    g. Don’t know

  11. Approximately how many developers does your organization employ?
  12. What is the approximate total number of employees in your organization?
  13. How much of your development is outsourced or subcontracted?
  14. a. None
    b. Only minor functions
    c. Some
    d. Major components are outsourced
    e. Most

  15. How do you review the security of outsourced or subcontracted code?
  16. a. We don’t review the security
    b. We contractually require adherence to best practice
    c. We specify particular security measures
    d. We do a code review
    e. We require an external review

  17. Do your developers undergo software security training? (please check appropriate box)
  18. a. Yes, via an external training course
    b. Yes, via internal resources
    c. Yes, via certifications
    d. No
    e. Don’t know

  19. Do you perform background checks on developers?
  20. a. Yes
    b. No

  21. Do you have internal security checkpoints during the software development life-cycle?
  22. a. Yes, at every stage of the development cycle
    b. Yes, during the design phase
    c. Yes, during the testing phase
    d. No

  23. If you answered yes to the question on internal security review, where is the organizational responsibility for this review?
  24. a. Within the development team
    b. Within the QA team
    c. Within a security team
    d. Within the internal audit team
    e. It varies
    f. Don’t know

  25. Do you perform external security reviews before deploying a Web application?
  26. a. Yes
    b. No

  27. If you answered yes to the question on external security reviews, how often do you engage external security firms? (check all that apply)
  28. a. Once at the design phase
    b. When making important security choices
    c. Ad hoc, as needed
    d. Prior to release

  29. If you answered yes to the question on external security reviews, what is the approximate annual expenditure on these reviews?
  30. Does the costs of these security reviews come from: (check all that apply)
  31. a. The development budget
    b. The Q&A budget
    c. A security budget
    d. A general budget
    e. It varies
    f. Don’t know

  32. What percentage of your total developer’s time is directly devoted to security activities? (code reviews, meetings, etc)
  33. a. Under 2%
    b. 2%-5%
    c. 5%-10%
    d. 10%-15%
    e. Over 15%
    f. I don’t know - we don’t measure time in that way

  34. How important is software security generally to your customers?
  35. a. Extremely important
    b. Very important
    c. Important
    d. Not very important

  36. Does your organization produce software or systems that deal primarily with:
  37. a. Highly sensitive data
    b. Somewhat sensitive data
    c. Not very sensitive data
    d. Depends on who is deploying it

  38. How important is Web application security to your executive management?
  39. a. Absolutely critical
    b. Very important, but must be balanced against tight release deadlines.
    c. Somewhat important
    d. Nice to have
    e. Not very important

  40. Is security a part of your marketing or branding strategy for your product?
  41. a. Yes
    b. No

  42. Have you suffered a significant public security incident in the last two years?
  43. a. Yes
    b. No

  44. If you answered Yes to the last question, what damage resulted from this breach? (please check all that apply)
  45. How do you think your organization’s security spending in 2009 will change in relation to 2008?
  46. a. We will spend more in 2009 than 2008
    b. We will spend about the same in 2009 and 2008
    c. We will spend less in 2009 than 2008
    d. We don’t know yet how much we will spend in 2009
    e. We don’t measure security spending

Project Status

Completing the project description text and finalizing the proposed 25 survey questions.


Project Contributors

The Security Spending Benchmarks Project Leader is Boaz Gelbord (Executive Director of Information Security, Wireless Generation). Boaz can be contacted reached directly at bgelbord AT wgen.net with any questions or feedback.

  • Jeremiah Grossman (CTO, WhiteHat Security)

This category currently contains no pages or media.