adopsi open samm untuk pengembangan tata kelola pengamanan perangkat lunak

15
Kementrian Komunikasi dan Informatika TATA KELOLA PENGAMANAN PERANGKAT LUNAK

Upload: directorate-of-information-security-ditjen-aptika

Post on 29-Nov-2014

507 views

Category:

Technology


5 download

DESCRIPTION

Pengenalan Open SAMM oleh Ivano Aviandi (CEO Cybertech Solusindo, Dosen, Praktisi Keamanan Informasi) disampaikan pada Diskusi Publik Tata Kelola Pengamanan Perangkat Lunak Hotel Sahid Jaya Jakarta, 7 November 2013

TRANSCRIPT

Page 1: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

Kementrian Komunikasi dan Informatika

TATA KELOLA PENGAMANANPERANGKAT LUNAK

Page 2: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

CONFIDENTIAL

Information Security

Page 3: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

CONFIDENTIAL

Introduction

Page 4: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

Introduction

CONFIDENTIAL

Page 5: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

Introduction

CONFIDENTIAL

Page 6: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

Introduction

CONFIDENTIAL

Security Guideline

Page 7: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

CONFIDENTIAL

Open SAMMSecure

Software Development

Governance DeploymentConstruction Verification

• Strategy & Metrics

• Policy and Compliance

• Education and

Guidance

• Threat Assessment

• Security Requirements

• Secure Architecture

• Design Review

• Code Review

• Security Testing

• Vulnerability

Management

• Environment

Hardening

• Operational

Enablement

Page 8: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

CONFIDENTIAL

Information Security Institute

Requirement

Design

Deployment

Coding

Testing

• Security Requirement• Setting up Phase

Gates• Risk Assessment

• Identify Design Sec. Req.

• Arch and Design Review

• Threat Modeling

• Coding Best Practice• Perform Static

Analysis

• Vulnerability Assessment

• Fuzzing

• Srv. Configuration Review

• Net. Configuration Review

Page 9: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

CONFIDENTIAL

FoundStone - McAfee

Requirement Design Implementation Verification Release Support and Services

Analysis and Design Develop Testing and

Implementation Deployment

SANS Institute

Page 10: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

CONFIDENTIAL

How About?Secure

Software Development

Governance DeploymentConstruction Verification

• Strategy & Metrics• Policy and Compliance • Education and

Guidance

• Threat Assessment • Security Requirements• Secure Architecture

• Design Review• Code Review• Security Testing

• Vulnerability Management

• Environment Hardening

• Operational Enablement

Implementation

Coding w/ Best Practice Guidance

Page 11: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

Implementation

Implementation

Account Security Mechanism

Session Management

Input & Output Based Handling

• Username & Password Quality

• Account and Password Ages Policy

• Lock Account Policy• Lockout Duration• Transmission Process

• Session Termination• Cookies Management• Dynamic Token• Multiple Session

• Input Validation• Display Error• File Validation• Meta Character

Filtering

CONFIDENTIAL

Page 12: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

CONFIDENTIAL

Sample Case

Page 13: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

Man in the Middle Attack

CONFIDENTIAL

Page 14: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

Man in the Middle Attack

Construction

CONFIDENTIAL

Threat Assessment

Security Requirement

Security Architecture

Implementation

Account Security

Mechanism

Session Management

Page 15: Adopsi Open SAMM untuk Pengembangan Tata Kelola Pengamanan Perangkat Lunak

Terima Kasih

CONFIDENTIAL

Q and A