- Reasonable Application Security
- Posts
- Reasonable šAppSec #32 - Five Security Articles, The OpenSSF Secure Software Dev Guiding Principles ā Do they require you to do anything of value?, and Podcast Corner
Reasonable šAppSec #32 - Five Security Articles, The OpenSSF Secure Software Dev Guiding Principles ā Do they require you to do anything of value?, and Podcast Corner
A review of application security happenings and industry news from Chris Romeo.
Hey there,
In this weekās issue of Reasonable Application Security:
Five security articles š° that are worth YOUR time
Featured focus: The OpenSSF Secure Software Dev Guiding Principles ā Do they require you to do anything of value?
Application Security Podcast šļøCorner
Where to find Chris? š
Note, this is the second to last Reasonable AppSec for 2023. After next week, weāll take a two-week break for the holidays.
Five Security Articles š° that Are Worth YOUR Time
āSecure by Design Alert: How Software Manufacturers Can Shield Web Management Interfaces From Malicious Cyber Activityā ā This CISA guidance urges software manufacturers to proactively prevent the exploitation of vulnerabilities in web management interfaces by designing and developing their products using Secure by Design principles, which include taking ownership of customer security outcomes and embracing radical transparency and accountabilityā.
āRethinking the Scan and Fix Hamster Wheel: A New Paradigm for Application Securityā ā There are challenges to the current application security approach, which focuses on scanning and fixing vulnerabilities using tools like SAST and DAST. It criticizes this approach as reactive and inefficient, leading to a hamster wheel effect. The author advocates for a new paradigm that balances security and efficiency, integrating security tools seamlessly into developer workflows without compromising productivity.
āConsumer Software Security Assessment: Should We Follow NHTSA's Lead?ā ā Should we establish a consumer software security organization, similar to the NHTSA for vehicles, to ensure software meets basic security standards and is user-friendly? It highlights the complexity of modern software and the importance of default security settings. It suggests a safety rating system for software, akin to vehicle safety ratings, to help consumers make informed decisions about their digital security and privacy.
āAlmost all developers are using AI despite security concerns, survey suggestsā ā 96% of developers use AI tools, often bypassing security policies, despite awareness that these tools frequently generate insecure code; it emphasizes the need for increased security measures and awareness to mitigate the risks associated with relying on AI for coding.
āU.S, U.K. And 16 Other Nations Agree On AI Security Guidelinesā ā An agreement was signed by 18 countries, led by the UK and the US, on AI safety, focusing on secure by design principles for AI system development, aiming to integrate cybersecurity into the entire development process of AI systems.
Featured focus: The OpenSSF Secure Software Dev Guiding Principles ā Do they require you to do anything of value?
As 2023 comes to a close, Iāve been thinking that perhaps Iāve been too pessimistic in questioning many things I see coming across my desk or LinkedIn. Then I read the OpenSSF Secure Software Development Guiding Principles. I found myself struggling to understand what compliance with these principles unlocks. Letās walk through them and discuss them.
To employ development practices that are in conformance with modern, industry-accepted secure development methods.
Great start, but what are industry-accepted secure dev methods? Could we please call these things out and perhaps adjust the minimum bar a year from now? Do you mean SAST? SCA? Gasp, DAST? Or SDL. Or secure by design/default. What do you mean? Keeping things so high level removes any real meaning from the statement.
To learn and apply secure software design principles (such as least privilege).
Once again, least privilege is a great design principle. Could we call out the other ones you have in mind versus leaving us to discuss and debate what the list of principles entails?
To learn the most common kinds of vulnerabilities and to take steps to make them unlikely or limit their impact.
Ahh, yes. I see now. We should figure out what our top vulns are and then make them go away. It all sounds so simpleā¦.
At this point, I canāt continue through the list and tear them apart. I decided to update their list and add my own words to them. Here we go!
Employ a set of secure development lifecycle practices, including modern, industry-accepted, secure development methods like threat modeling, source code review for security and privacy, code scanning (SAST, SCA), and runtime protection (RASP).
To learn and apply secure software design principles, including:
Minimise attack surface area
Establish secure defaults
The principle of Least privilege
The principle of Defence in depth
Fail securely
Donāt trust services
Separation of duties
Avoid security by obscurity
Keep security simple
Fix security issues correctly
To learn the most common vulnerabilities plaguing the things we build and take steps to reduce our vulnerability load over time. [Reducing vuln load is the only thing we can do successfully; we can state that weāll remove vulnerabilities, but it wonāt happen.]
To check for and address known and potential critical vulnerabilities before releasing software, then monitor for vulnerabilities throughout the product's supported life. [This one was good ā it didnāt need much.]
To harden and secure our software development infrastructure against compromise or infiltration against the same principles, practices, and expectations set for the software developed and built from them. [This one as well ā only slight wording tweaks.]
[This needed a rewrite because itās not practical. Open source is open source, and I usually need what the package provides, and there are no alternatives.] To utilize a collection of criteria to choose software from suppliers and developers that publicly report security health metrics and adopt controls to prevent tampering of software packages and that actively address known/discovered malicious software. Choosing the best available package is the goal, but it is not always the answer.
To provide software supply chain understandability to consumers of our software consistent with evolving industry standards, practices, and tooling. To consume the artifacts of the software supply chain artifacts and take action upon the information I am provided. [SBOM must be active to have any value.]
To manage responsible vulnerability disclosure programs that include upstream dependencies and have publicly documented vulnerability reporting and remediation policies. [This one is fine.]
To publish security advisories consistent with evolving industry best practices. [This one is fine.]
To actively collaborate with and participate in industry and regulatory initiatives related to securing the software supply chain and to evangelize the adoption of the Secure Software Development Guiding Principles among our industry peers. I struck this one ultimately. You donāt have to do this to develop secure software.
Once again, letās think about the things we prescribe for our industry, and donāt be afraid to push back when something doesn't make sense!
Podcast šļø Corner
I love making podcasts. In Podcast Corner, you get a single place to see what Iāve put out this week. Sometimes, they are my podcasts. Other times, they are podcasts that have caught my attention.
Arshan Dabirsiaghi -- Security Startups, AI Influencing AppSec, and Pixee/Codemodder.io (Audio only; YouTube)
Arshan Dabirsiaghi discusses the challenges in app security, the dynamic nature of startups, and the future role of AI in application security while also exploring his team's work on Codemodder.io, an open-source tool aimed at improving security practices in development.
Security Table (we took a break this past week, but here is an oldie but goodie)
AppSec vs. ProdSec (Audio only; YouTube)
We engage in a lively debate attempting to demystify and differentiate Application Security and Product Security. We discuss the role of hardware, supply chain challenges, and the overlap between the two concepts.
A new episode, "Privacy and Threat Modeling in Practice,ā is coming soon. I promise it is. Iām planning to get back to the Threat Modeling Podcast in December.
Where to find Chris? š
The rest of 2023 ā relaxing in Raleigh, NC, building new features supporting the Devici beta, and preparing for a busy 2024.
North Carolina Cybersecurity Symposium, February 22-23, 2024
BSides SF, May 4-5, 2024
RSA, San Francisco, May 6 - 9, 2024
š¤ Have questions, comments, or feedback? I'd love to hear from you!
š„ Reasonable AppSec is brought to you by Kerr Ventures.
š¤ Want to partner with Reasonable AppSec? Reach out, and letās chat.