OWASP Periodic Table of Elements

Thursday, November 21 • 12:00 pm - 12:50 pm

After 25 years of software engineering since the first Internet worm was written to exploit a buffer overflow vulnerability, web developers are still building insecure software. It is time for a new approach. The vast majority of software bug classes can be eliminated by building protections into perimeter technologies, platform infrastructures, and application frameworks before a developer even writes a single line of custom code. By allowing developers to focus on just a small subset of bug classes, training and standards programs can be more targeted and effective so developers can write secure code much more efficiently.

Vulnerabilities and weaknesses from industry-recognized indexes including OWASP Top 10, WASC TCv2, and CWE-25 are analyzed to determine which of the protection options are ideal for solving the software security problem. Where changes to internet standards and protocols are required, alternatives in perimeter, framework, or custom code solutions are also provided until the internet-scale solutions are in place. If a solution can be completely implemented in perimeter or infrastructure technologies, only that solution is provided. Similarly, if any part of the solution can be provided in standard or custom frameworks, that solution is not recommended to be implemented in custom code. The guiding principle is essentially: "implement security controls as far from custom code as possible." Only if there is no other way to solve a particular security problem is a custom code solution recommended.

Speaker:
James Landis

N/A

James Landis has seen the various successes and failures of a diverse set of Application Security programs from both the outside (as a penetration tester and SDLC consultant) and the inside (as the owner of Application Security programs for Autodesk and eBay, including Bill Me Later, PayPal, x.commerce, and Magento). James has been committed to the OWASP goals and mission since 2003 - through the reach and influence of OWASP he believes that most classes of web app security flaws can be solved for good!