I think we need a multifaceted approach that includes supply side, demand side, insurance companies, consumer protection organisations, etc. etc.
We need regulation with legal penalties - as exist for airlines, for example - for software firms that fail to meet minimal standards for quality - which must be defined to include security (using demonstrated linkages to existing legislation as a catalyst - i.e., non-secure software makes it impossible to be HIPPA, FISMA, SOX, PCI, etc. compliant). We need a system of evaluation (like Good Housekeeping seal of approval, but NOT like Common Criteria) for consumers to be able to easily determine which software meets the minimum standards for "goodness". We need the insurance firms that are now offering security and CIP related products to add software security criteria to their definitions, so that their customers who buy demonstrably secure software get breaks on their premiums, and those that willfully engage in risky behaviours - i.e., persisting in use of bad software - are penalised by higher premiums or, ultimately, having their coverage dropped. We need to educate end users as we did with seatbelts and cigarettes - a series of really good public service advertisements that clearly and engagingly depict what happens as a result of AVOIDABLE (by developers) security-related failings in software. With outlets like YouTube, the budget to broadcast such advertisements would be significantly smaller than it would have been when only the media outlets were big commercial networks. Just some ideas - no doubt some better than others. The real message is "Yes, we need to change consumer behaviour" - but that alone won't get us where we need to go. Karen Mercedes Goertzel, CISSP Associate 703.698.7454 goertzel_ka...@bah.com ________________________________________ From: sc-l-boun...@securecoding.org [sc-l-boun...@securecoding.org] On Behalf Of Brad Andrews [andr...@rbacomm.com] Sent: Friday, August 21, 2009 12:08 PM To: sc-l@securecoding.org Subject: [SC-L] Customer Demand While no customer is likely to say they don't care about software working now that we are past Y2K, they don't think about it at all and are unlikely to allow any schedule slippage to allow for making sure that is true. Customers only really care about the things they will pay for. Many companies claim they "can't stand" poor software or services, but they still pay for them, so they will keep getting them. Until we convince them that good security really is important and that they must demand and pay for it, we won't make the progress we want to make. How many companies wouldn't even be doing the PCI level of effort if they weren't forced to do so? How many strictly limit it to their "PCI environment" rather than looking at the risk to the whole enterprise? Even major breaches don't help since the "it can't happen here" attitude is common all over, in spite of the fact it is a risky stance. While part of this is just a cynical rant, I think the base point is that we have a whole lot more selling to do on the need for software security before we can properly place it throughout the curriculum. That sales job is hard. The fact a few people have "gotten it" doesn't mean most have or that we are completely ready for the next step. I realize many here may not be saying that, but that is the message I get stepping back. And I am a dreamer/visionary. I like to think well ahead of things, but focusing too much there makes us likely to continue to be a niche area, leaving lots of vulnerabilities. Wouldn't a better focus be on the customer demand end? Stirring that up will do more to advance secure development than any number of maturity models. Unfortunately, it is a much more difficult task. I would bet it is also not as conceptually interesting to many. -- Brad Andrews RBA Communications CISM, CSSLP, SANS/GIAC GSEC, GCFW, GCIH, GPCI Quoting Martin Gilje Jaatun <secse-ch...@sislab.no>: > His stance on this > is that "if security were important to the customer, the customer would > provide and prioritize security requirements". To me, this is a bit like > saying "If the customer doesn't explicitly state that the software > should be Y2k-proof, he/she is not really bothered about it". _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. _______________________________________________ _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. _______________________________________________