Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

As a security professional you will constantly be assessing the the security posture of your organization. For this assignment, we will be taking an industry

As a security professional you will constantly be assessing the the security posture of your organization. For this assignment, we will be taking an industry standard assessment framework, BSIMM, and apply it to our fictitious incident that we developed during week 1. Using the incident detail provided below, complete an assessment of Full Sail's application security practices and provide a list of recommendations on how it can be improved. 

Incident Scenario:
 

Following the incident that you wrote about in week 1, Full Sail's information security leadership has decided to perform an audit of Full Sail's software development practices to gain an understanding on where Full Sail's processes can be improved. To accomplish this, the information security team has outlined a list of desired requirements from the Building Security In Maturity Model (BSIMM) framework (refer to Part 6: The BSIMM Activities in the BSIMM Foundations PDF). For this assignment, you will read the background information for each section, familiarize yourself with the requirements defined in BSIMM, and write up what Full Sail's development team needs to do to comply with the defined requirements.


 

GOVERNANCE
 

STRATEGY & METRICS
 

Full Sail has been developing software from a feature perspective. As in, the developers are focused on deploying the features desired from the development leadership. There is a loose process between the developers to ensure that the changes being made don't break the application when deployed, but the process doesn't go beyond this. Of the developers, there is one that has an interest in trying to develop secure code, but he doesn't have the tools or buy-in from leadership to really act on it. 
 

BSIMM Requirements

SM1.1
 

SM2.7
 


 

COMPLIANCE & POLICY

Full Sail has a compliance specialist that works to ensure that the university is in alignment with regulatory compliance, namely GLBA and FERPA. However, there is not a written policy that defines the processes and procedures that need to be adhered to in order to ensure that compliance is carried out amongst all faculty. There also isn't a lot of understanding around how Personally Identifiable Information (PII) is handled within the applications that manage it. Finally, due to compliance being a large part of university accreditation, the compliance specialist does a thorough job of training executives on the regulatory compliance that needs to be adhered to, but there isn't a lot of training on the consequences of non-compliance. 
 

BSIMM Requirements

CP1.1

CP1.2

CP1.3

CP2.5

 

TRAINING

Full Sail provides company-specific information security awareness training to all of it's faculty, but nothing specific to software development. 
 

BSIMM Requirements

T1.1

T1.7

T2.8

T2.9


 

INTELLIGENCE

ATTACK MODELS
 

Full Sail subscribes to a commercial threat intelligence service to keep them up-to-date on the threats that Full Sail may experience. The Full Sail information security team also maintains a list of the top five threats to Full Sail University and works to tailor their defenses to best combat those threats at a high level. However, Full Sail hasn't gotten to a level where they are tailoring their defenses to technology-specific threats.
 

BSIMM Requirements

AM1.5
 

AM2.2

AM2.5
 


 

SECURITY FEATURES & DESIGN

Full Sail has a variety of security tools utilized by the information security team, and practices around hardening the operating systems and infrastructure used at the university. However, this information is only partially communicated to the development teams, and it is often not timely. There is no regular cadence between the security team and the development team to exchange information on best practices.  
 

BSIMM Requirements

SFD1.1

SFD1.2

 

STANDARDS & REQUIREMENTS

Just as there are few comprehensive policies in place at Full Sail, there are also very few documented standards. There is, however, requirements adhered to around matters that deal with compliance like GLBA and FERPA. 
 

Full Sail also, has a process where annually they review these compliance requirements to ensure that they are still maintaining alignment with the most up-to-date standards. 
 

Finally, there is a boilerplate Service Level Agreement (SLA) in place for dealing with vendors, but that SLA does not contain any requirements around software security.
 

BSIMM Requirements

SR1.1

SR1.3

SR2.2

SR2.5


 

SSDL TOUCHPOINTS
 

ARCHITECTURE ANALYSIS
 

As discussed previously, there is not any form of security reviews being performed during the development process. However, there are members of the team that are interested in how they can develop software more securely.
 

BSIMM Requirements

AA1.1

AA1.2
 

AA2.2
 

AA2.4


 

CODE REVIEW

Full Sail's development team does not utilize a standard set of static code analysis tools, but some of the developers have taken the liberty to utilize the free tier SonarQube to scan some of their code before they check it in. 
 

BSIMM Requirements

CR1.2

CR1.4
 

CR2.8


 

SECURITY TESTING

As discussed, there are loose Quality Assurance activities performed to ensure that the code being checked in by the various developers don't break the FSO application, but they are focused on feature functionality and performance alone. 
 

BSIMM Requirements

ST1.1

ST1.3


 

DEPLOYMENT

PENETRATION TESTING
 

As part of Full Sail's compliance requirements, Full Sail hires a 3rd party penetration tester to test its security annually. However, Full Sail has no internal penetration testing capabilities that it leverages.
 

BSIMM Requirements

PT1.1

PT1.3

 

SOFTWARE ENVIRONMENT

As discussed, Full Sail's information security team has defined hardening requirements for their operating systems and infrastructure, but there is a gap when it comes to the tools and infrastructure used by the development team. 
 

BSIMM Requirements

SE1.2
 

 

CONFIGURATION MANAGEMENT & VULNERABILITY MANAGEMENT

Full Sail's information security team has worked with the university to develop a comprehensive Incident Response Plan (IRP), and it interfaces with the software development team insofar that there is a procedure to ensure that applications can be restored from backups in the case of an incident. However, there is not a procedure in place for the development to make emergency changes to the code base that has been tested. 
 

BSIMM Requirements

CMVM1.1

CMVM2.1

CMVM3.4

 

Objectives and Outcomes:

Upon completion of this activity, you should be able to:

  • Demonstrate how the BSIMM framework can be applied to an organization's processes.
  • Understand at a high level how to perform an audit for an application security program.
  • Develop the skills associated with thinking about an organization's security program in the terms of an industry standard framework.

Deliverables:

Deliver a Word Document or PDF file:

  • You will upload the document with the file named LastnameFirsname_week1.docor LastnameFirsname_week1.PDF

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Income Tax Fundamentals 2013

Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill

31st Edition

1111972516, 978-1285586618, 1285586611, 978-1285613109, 978-1111972516

More Books

Students also viewed these Algorithms questions

Question

special order? profit will by

Answered: 1 week ago