90 likes | 105 Views
Software Security Maturity. The Economic Advantages of a Resilient Supply Chain- Software Security. The End in Mind…. 13% of every dollar spent on software development is returned for a productivity gain and reinvested in high value activities.
E N D
Software Security Maturity The Economic Advantages of a Resilient Supply Chain- Software Security
The End in Mind… • 13% of every dollar spent on software development is returned for a productivity gain and reinvested in high value activities
Software Security Program - Value Delivery and Productivity Save 2008 Productivity Save $19 M Productivity Gain Increases from Y 2007 to Y 200811.13% * Estimate * Projected DTCC Confidential 3
SDLC Security Requirements “White Box” Testing “Black Box” Testing Pen Tests End-to-end Education, Training, “Security Mavens” Consulting Expertise Workflow, Process Management- CMMI Software Security Controls • 10-15% Productivity Impact • 3 year program • Business case based on reduced risk, higher productivity Static Code Analysis Dynamic Analysis Security Architecture Manual Design Development Q/A- Testing Production
Economic Impact of Controls Controls Preventative Detective Lifecycle 36 1
The Challenge in 2005 The Depository Trust & Clearing Corp (DTCC) had 450 application developers on shore and over 100 offshore creating product for their brokers, bank, mutual fund and insurance carrier customers. DTCC needed to implement improved security practices as part of the application development process. The goal was to create more secure applications to handle clearance and settlement of more than $1.8 Quadrillion worth of securities transactions each year • Background: • Context: • CMMI Level 3 Certified development organization • Dilemma: • What is the best approach to improving the resiliency of software developed, outsourced or bought? 6
Communication KPIs, Portfolio Level Reporting, Vulnerability Framework DTCC’s Software Security Program 10 Core Control Points System Implementation Lifecycle (SILC – CLASP Integration) Security Education Code Management Open Source Palamida/Black Duck Requirements Phase Business Requirements, PSA Process Enhance Whiteboard Tracking BITS Shared Assessment- Services Design Phase Current ASAR New ASAR Implementation Build Phase Fortify – In-house Development Veracode – COTS Testing Phase WHITEHAT – Dynamic Analysis Security Testing (TSG) Operational Phase Application Logging Control Standard enVision Integration Application Assessment Net2S, Primeon (on demand) Database Security AppDetective – Compliance enVision – Security Monitoring
Accountability Model – Comprehensive reports Domain Level, VP Level and Project Level Reports 9