Preventive Approach for Web Applications Security Testing OWASP 10/30/2009. The OWASP Foundation
|
|
|
- Letitia Knight
- 10 years ago
- Views:
Transcription
1 Preventive Approach for Web Applications Security Testing 10/30/2009 Luiz Otávio Duarte Ferrucio de Franco Rosa Walcir M. Cardoso Jr. Renato Archer Information Technology Center Brazilian Ministry of Science and Technology Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the License. The Foundation
2 Agenda Introduction Key Points Techniques for software testing Software Quality Web application security testing approach Practical demonstration Conclusions 2
3 Agenda Introduction Key Points Techniques for software testing Software Quality Web application security testing approach Practical demonstration Conclusions 3
4 Motivation The concern with security in developing projects for the Web is essential for the protection of information and business continuity. In recent years the Web has grown significantly and complexity of applications and services even more. New technologies, tools and architectures are adopted without properly concern for security. 4
5 Statistics Statistics SysAdmin, Audit, Network, Security Institute a weekly vulnerability consensus digest. NVD/NIST Statistics National Vulnerability Database - repository of vulnerability resources (USA). OSVDB Statistics Top 10 vulnerabilities by 5
6 Statistics Statistics NVD/NIST Statistics OSVDB Statistics Open Source Vulnerability Database, that aims to provide accurate, detailed, current, and unbiased technical information on security vulnerabilities. Top 10 vulnerabilities by Open Web Application Security Project, provides the top 10 most critical web application vulnerabilities. 6
7 Vulnerabilites Distribution 01/01/ /20/ Web Application Related Cross Plataform Windows Related Others OS Others 7
8 Statistics data OSVDB OSVDB Vulnerabilities Distribution 01/01/ /23/ All Categories All; 4497 Web Related; 2880 All Others; 1617 All Web Related All Others 8
9 NVD/NIST NVD/NIST 01/01/ /01/2009 SQL Injection: Cross Site Scripting: Others: 544; 14% 740; 18% 2775; 68% 9
10 - Web Application Related Vulnerabilities 01/01/ /20/ Web Application - Cross Site Scripting Web Application - SQL Injection Web Application - Others 10
11 - Top 10 Web app. vulns. for 2007 A1 - Cross Site Scripting (XSS) A2 - Injection Flaws A3 - Malicious File Execution A4 - Insecure Direct Object Reference A5 - Cross Site Request Forgery (CSRF) A6 - Information Leakage and Improper Error Handling A7 - Broken Authentication and Session Management A8 - Insecure Cryptographic Storage A9 - Insecure Communications A10 - Failure to Restrict URL Access 11
12 Aspects of the problem Developers/Architects are making the same kind of mistakes. Many of software development life cycles (SDLC) do not provide an effectively approach for security aspects. How to spot web vulnerabilities and the correct then are well known, but repairing could be expensive. Applications are not properly tested in terms of security. Lack of a de facto standard or approach to conduct a good software security testing for web applications. Know-how on penetration test is far from a good software security testing. 12
13 Goal Software Testing Software Quality Process Documentation Real Test Cases 13
14 Goal Software Testing Software Quality Process Documentation Real Test Cases 14
15 Initial Concepts Mistake Defect Error Fail Mistake A human action that can introduce some kind of defect in the software. Defect, Fault It is a deficiency (step, process or incorrect definition) resident in the software. The defect when executed can cause an error. 15
16 Initial Concepts Mistake Defect Error Fail Error It is caused by the execution of a defect and is characterized by an unexpected or inconsistent program state. It is the incorrect value in a given state of the program. Fail It is an observable event that the software infringed its specification. It is the noticed spread of an error. 16
17 Initial Concepts Vulnerability A weakness in a computing system which can be exploited and harmed by one or more threats. Making the system do what it was not designed to do. Web Application (In this presentation) Is an application coded in a browser-supported language that is acessed via a web browser over a network such as Internet. Some times we will use webapp as a synonymous of Web Application. 17
18 Agenda Introduction Key Points Techniques for software testing Software Quality Web application security testing approach Practical demonstration Conclusions 18
19 Web Application Vulnerabilities Life-Cicle Web Application Development Bad design/development Poor or not tested Software Deploy with Several Defects (In the Wild) Affects the quality Affects the security Defect detection (Reactive Fashion) By Software Security Testing Ocasional Not spoted Web Application Defect Correction 19
20 Web Application Vulnerabilities Life-Cicle Web Application Development Bad design/development Poor or not tested Software Deploy with Several Defects (In Wild) Affect the quality Preventive Approach, before software deploy Affect the security Defect detection (Reactive Fashion) By Software Security Testing Ocasional Not spoted Web Application Defect Correction 20
21 Preventive Approaches Line Fronts Secure Development Secure Design Secure Coding Education Software Security Testing Structural Functional 21
22 Preventive Approaches Line Fronts Secure Development Secure Design Secure Coding Education Software Security Testing Structural Functional 22
23 Agenda Introduction Key Points Techniques for software testing Software Quality Web application security testing approach Practical demonstration Conclusions 23
24 Software Testing Software testing is the process of running the software in a controlled way to evaluate whether it behaves as specified. The main goal of software testing is to detect software failures so defects may be uncovered and corrected. 24
25 Software Testing - Aspects A fundamental software testing problem is that testing all possible test cases is not feasible. (combinatorial explosion) The solution is the definition of a good test criterion, that selects a reduced set of test cases that have high probability to find defects. There are several criteria types and objectives: Test criteria; Test case selection criteria; Adequacy criteria; 25
26 Software Testing We test the software only partially? Yes. We can not conclude that the software is free from defects, even after running several test cases. The cost of testing to ensure that software has no defects can overcome the project budget. We should plan what to test: The targets must be critical points, those most vulnerable, more susceptible to defects, which offer greater risk to the business. 26
27 Technical aspects of software testing What to test Types of testing Functionality Testing Interface Testing Stress Testing Usability Testing Security Testing... How to test Test Criteria When to test - SDLC 27
28 Technical aspects of software testing What to test Types of testing How to test Test Criteria Functional Testing Equivalence Partition Boundary Value Analysis... Structural Testing Branch Testing Condition Testing Function Testing... When to test - SDLC 28
29 Technical aspects of software testing What to test Types of testing How to test Test Criteria When to test - SDLC Unit Testing Integration/Module Testing System Testing / Validation Testing Acceptance Testing Regression Testing 29
30 Software Test Documentation IEEE STD Defines several documents to make the testing more reliable. Test Plan; Test Design Specification; Test Case Specification; Test Procedure Specification; Test Item Transmittal Report; Test Log; Test Incident Report; Test Summary Report. 30
31 Software Test Documentation IEEE STD Defines several documents to make the testing more reliable. Test Plan; Test Design Specification; Test Case Specification; overhead to testing. Test Procedure Specification; Test Item We Transmittal can use a different Report; and more effective Test Log; approach to deal with documentation. Test Incident Report; Test Summary Report. Those documents can introduce unnecessary 31
32 Agenda Introduction Key Points Techniques for software testing Software Quality Web application security testing approach Practical demonstration Conclusions 32
33 Software Quality Is the degree in which the software product meets stated and implied needs when used under specified conditions. ISO/IEC Draft Software product Quality Requirements and Evaluation (SQuaRE) Quality models for software product quality and system quality in use. ISO/IEC Information technology - Software product evaluation - Part 1: General overview. Software product evaluation - Part 5: Process for evaluators. 33
34 ISO/IEC Draft Software product quality model Portability Maintainability Compatibility Operability Performance Efficiency Reliability Functional Suitability Security 34
35 Security Authenticity Accountability Non-repudiation Integrity Confidentiality 35
36 ISO/IEC (ISO/IEC ) Provides basis for a systematic evaluation process and general software quality. Establishes evaluation process, such as: Repeatability / Reproducibility / Impartiality / Objectivity (RRIO). Estabilish evaluation requirements Specify the evaluation Design the evaluation Execute the evaluation Conclusion of the evaluation 36
37 Agenda Introduction Key Points Techniques for software testing Software Quality Web application security testing approach Practical demonstration Conclusions 37
38 Proposed Approach Software Testing Software Quality Process Documentation Real Test Cases 38
39 Proposed Approach Software Testing - Security Will define the web application security testing criteria; Will define the test case selection criteria; Will define the adequacy criteria. Software Quality Security The evaluation phases are extends to software security testing, defining The process: Establish security testing requirements; Especify the security testing; Design the security testing; Execute the security testing; Conclusion of the security testing. Based on ISO/IEC : 39
40 Proposed Approach Process Documentation Security When not based on IEEE , is based on the documentation of each ISO/IEC evaluation phase. Real Test Cases Security The easiest part for security guys. We have several test cases to identify different types of vulnerabilities. 40
41 Web Application Security Testing Approach Aims to be SDLC and STM independent. SDLC 2 STM 1 SDLC 1 STM N SDLC 3 SDLC N STM 2 41
42 Web Application Security Testing Approach Adequacy Criteria Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Process 42
43 A web application security testing criterion The webapp security testing criterion will define what is the prioritization of security control or threat that must be exercised in the testing, based on security requirements. Furthermore will establish security metrics for testing. What security testing criterion can we use? Web Application Risk Analisys? Web Application Threat Modeling? Web Application Security Use Cases?... Adequacy Criteria Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Process 43
44 A web application security testing criterion Almost all security test case will cause an abnormal behavior in the structure under testing. The oracle must be able to determine if this abnormal behavior is related or not with some kind of security flaw. If the system's behavior is "normal then, either the flaw was not spotted or does not exists. Adequacy Criteria Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Process 44
45 A web application security testing criterion Is any of those webapp security testing criteria a valid criterion? All of those criteria, in addition to an adequate test case set, have the ability to identify security flaws presence. But we have not yet been able to prove that all flaws (defined by the criterion) can be exercised. Once established the webapp security testing criterion, we must determine the set of case tests. This is the test case select criterion. 45
46 A security test case selection criterion We already know what kind of security control or threat to prioritize, now we need to determine a criterion to select good test cases. How to define the test data selection criterion? How to select properly real test cases and automated test case generation tools, so those threats and security controls can be well exercised? Adequacy Criteria Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Process 46
47 A security test case selection criterion Adequacy Criteria We can: Derive vulnerabilities from threat; Derive attack trees from security use cases or risk analysis, defining vulnerabilities; The aim is to reduce the testing efforts to the identified vulnerabilities that could be exploited by threats or could be present on security controls. Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Process 47
48 The Adequacy Criterion The adequacy criterion is used to determine whether a program has been tested enough. It is based on the evaluation of the security test case set: the set is adequate if and only if it satisfies each sequence defined by the webapp security testing criterion. In other words: is the confrontation of test case set and webapp security test criterion requirements. Adequacy Criteria Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Process 48
49 The Adequacy Criterion It is a hard work to state the adequacy of a selected set of security test case. But we can estimate the coverage test: Were all attack surface tested? Were all defined threat tested? Were all defined security controls tested? Were all defined vulnerabilities spottable? Were all attach tree tested? Adequacy Criteria Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Process 49
50 Web Application Security Test Case / Tools We select the security test case and tools based on the security test case criterion, because on the security field we have many ways/techniques and tools that helps the process to spot a vulnerability. What we need to do is to generate test cases from those huge quantity of ways/techniques and tools. Remember the testing must be RRIO. We can use pentest techniques, but in a structured way. Adequacy Criteria Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Process 50
51 Web Application Security Test Case / Tools So now it is time to use the security skills to generate test cases. Who can save us? OSSTMM; ; Pentesting techniques; Exploitation techniques; Security testing tools. Adequacy Criteria Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Process 51
52 Web Application Security Test Case / Tools As the used approach is broad, there might have methodologies that allow the use of the suggested approach. As our goal is a preventive approach, the methodology must be defined during the development of the software product. That is, during the SDLC. Let's take the Vee model as an example. Adequacy Criteria Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Process 52
53 Software Testing Vee model (Generic) 53
54 Software Testing Vee model (Generic) Requeriment Analysis System Design Architecture Specification Module Specification Coding 54
55 Software Testing Vee model (Generic) Requeriment Analysis System Design Architecture Specification Acceptance Test Design System Test Design Integration Test Design Unit Test Design Module Specification Coding 55
56 Software Testing Vee model (Generic) Requeriment Analysis System Design Architecture Specification Acceptance Test Design System Test Design Integration Test Design Unit Test Design Module Specification Coding 56
57 Software Testing Vee model (Generic) Requeriment Analysis System Design Architecture Specification Acceptance Test Design System Test Design Integration Test Design Unit Test Design Integration Testing Acceptance Testing System Testing Module Specification Unit Testing Coding 57
58 Software Testing Vee model (Generic) Requeriment Analysis System Design Architecture Specification Acceptance Test Design System Test Design Integration Test Design Unit Test Design Integration Testing Acceptance Testing System Testing Module Specification Unit Testing Coding 58
59 Software Testing Vee model (Generic) Requeriment Analysis System Design Architecture Specification Acceptance Test Design System Test Design Integration Test Design Unit Test Design Integration Testing Acceptance Testing System Testing Module Specification Unit Testing Coding 59
60 Software Testing Vee model (Generic) Requeriment Analysis System Design Architecture Specification Acceptance Test Design System Test Design Integration Test Design Unit Test Design Integration Testing Acceptance Testing System Testing Module Specification Unit Testing Coding 60
61 Documentation Process The documentation process is the base of RRIO. It is important to use a well-established process of testing so the documentation process is naturally achieved. Remember ISO/IEC ? We extended it to security testing. So the process of testing follows this ISO and so does documentation. Adequacy Criteria Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Process 61
62 Testing phases, based on ISO/IEC Estabilish testing requirements Establish the purpose of the test - SECURITY Identify types of product(s) to be evaluated - WEBAPPS Specify quality model WebApp secure testing criterion Specify the testing Select Metrics Establish rating levels for metrics Establish criteria for assessment Design the testing Produce evaluation plan Execute the testing Conclusion of the evaluation Take measures Compare with criteria did the adequacy criterion Worked? Assess results Generate a reviewed security testing report 62
63 Testing phases, based on ISO/IEC Depending on what is being tested (acceptance, system, integration, unit) we must use the test phases in different ways. For example, the test criteria may be different for each phase; The test case selection criterion for unit testing uses knowledge of the webapps source-code, code review and inspection tools might be used as well as patterns of input validation. The criterion for selection of test cases for integration testing can involve manipulation of input and communication between modules. That is, for each type of test this set of phases should be re-drawn, re-structured, re-thought. 63
64 Testing phases, based on ISO/IEC The steps should be repeated until the program reaches the desired level of security. (Maturity models?) Remember: New risk analysis should be made; New types of threats; New security use cases; New attacks trees; New tests case. Adequacy Criteria Web Application Security Testing Methodologies Web Application Security Test Cases / Tools Security Test Case Selection Criteria Web Application Security Test Criteria Documentation Documentation rocess Process 64
65 Agenda Introduction Key Points Techniques for software testing Software Quality Web application security testing approach Practical demonstration Conclusions 65
66 Agenda Introduction Key Points Techniques for software testing Software Quality Web application security testing approach Practical demonstration Conclusions 66
67 Conclusions It is a preventive approach (and practice), using risk analysis (threat modeling) and other technologies, in order to establish guidelines for test criteria for sensitive applications. The key point is how to use technology properly in a determinated flow of phases in order to achieve a given result. It is fully applicable to any type (adherent) of software testing model and any SDLC. 67
68 Thanks 68
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Overview of the Penetration Test Implementation and Service. Peter Kanters
Penetration Test Service @ ABN AMRO Overview of the Penetration Test Implementation and Service. Peter Kanters ABN AMRO / ISO April 2010 Contents 1. Introduction. 2. The history of Penetration Testing
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Secure Code Development
ISACA South Florida 7th Annual WOW! Event Copyright Elevate Consult LLC. All Rights Reserved 1 Agenda i. Background ii. iii. iv. Building a Business Case for Secure Coding Top-Down Approach to Develop
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Levels of Software Testing. Functional Testing
Levels of Software Testing There are different levels during the process of Testing. In this chapter a brief description is provided about these levels. Levels of testing include the different methodologies
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
Software Testing. Knowledge Base. Rajat Kumar Bal. Introduction
Software Testing Rajat Kumar Bal Introduction In India itself, Software industry growth has been phenomenal. IT field has enormously grown in the past 50 years. IT industry in India is expected to touch
Better Software Though Expertise, Collaboration & Automation. BDD, DevOps and Testing
Better Software Though Expertise, Collaboration & Automation BDD, DevOps and Testing CONTENTS 1 MAGENTYS... 3 2 TESTING SERVICES... 4 2.1 Test Automation... 5 2.1.1 Test Automation Framework and Automated
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
An approach to Web Application Penetration Testing. By: Whiskah
An approach to Web Application Penetration Testing By: Whiskah #whiskah Security enthusiast NOT a CI$$P, CIS*, GIAC, MCS*, CCN* NOT Lulzsec or Anonymous :) Don t be confused Vulnerability assessment identify,
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview
Description C Service Overview G- Cloud Specialist Cloud Services Security and Penetration Testing This document provides a description of TVS s Security and Penetration Testing Service offered under the
Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis
Integrating Security into the Application Development Process Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Agenda Seek First to Understand Source Code Security AppSec and SQA Analyzing
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Web Application security testing: who tests the test?
Web Application security testing: who tests the test? Ainārs Galvāns Application Penetration Tester www.exigenservices.lv About myself Functional testing Leading test group Reporting to client Performance
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,
Secure and Resilient Software Development Mark S. Merkow Lakshmikanth Raghavan CRC Press Taylor& Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Group, an Informs
A Brief Overview of Software Testing Techniques and Metrics
A Brief Overview of Software Techniques and Metrics Anitha.A Programmer, School of Computer Studies (PG), RVS college of Arts & science, Coimbatore, India. Abstract: Software is the process of executing
Security Testing & Load Testing for Online Document Management system
1 Security Testing & Load Testing for Online Document Management system Abstract The client is a leading provider of online technical documentation solutions in UK, they wanted to protect their documents
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
white SECURITY TESTING WHITE PAPER
white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
Integrating Security Testing into Quality Control
Integrating Security Testing into Quality Control Executive Summary At a time when 82% of all application vulnerabilities are found in web applications 1, CIOs are looking for traditional and non-traditional
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Web Engineering Web Application Security Issues
Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Protecting Applications on Microsoft Azure against an Evolving Threat Landscape
Protecting Applications on Microsoft Azure against an Evolving Threat Landscape So, your organization has chosen to move to Office 365. Good choice. But how do you implement it? Find out in this white
Getting software security Right
Getting software security Right Haiyun Xu, Theodoor Scholte April 24 2015 Table of contents 2 I 23 1. Who is SIG? 2. SIG software maintainability model 3. Getting software security Right: security by design
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014
Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014 Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
How To Perform An External Security Vulnerability Assessment Of An External Computer System
External Vulnerability Assessment -Executive Summary- Prepared for: ABC ORGANIZATION On March 9, 2008 Prepared by: AOS Security Solutions 1 of 5 Table of Contents Executive Summary... 3 Immediate Focus
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, 2009. The OWASP Foundation http://www.owasp.
DISA's Application Security and Development STIG: How Can Help You AppSec DC November 12, 2009 Jason Li Senior Application Security Engineer [email protected] The Foundation http://www.owasp.org
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Points of View. CxO s point of view. Developer s point of view. Attacker s point of view
Web App Security 2 CxO s point of view Points of View Measurable security SCAP (Security Content Automation Protocol) Developer s point of view Secure coding/software security CWE (Common Weakness Enumeration)
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Quality Assurance version 1
Quality Assurance version 1 Introduction Quality assurance (QA) is a standardised method that ensures that everything works as it was intended to work and looks as it was intended to look. It should force
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
CHAPTER 20 TESING WEB APPLICATIONS. Overview
CHAPTER 20 TESING WEB APPLICATIONS Overview The chapter describes the Web testing. Web testing is a collection of activities whose purpose is to uncover errors in WebApp content, function, usability, navigability,
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006
Turning the Battleship: How to Build Secure Software in Large Organizations Dan Cornell May 11 th, 2006 Overview Background and key questions Quick review of web application security The web application
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Mobile Application Threat Analysis
The OWASP Foundation http://www.owasp.org Mobile Application Threat Analysis Ari Kesäniemi Nixu Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited
Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
DEVELOPING SECURE SOFTWARE
DEVELOPING SECURE SOFTWARE A FOUNDATION FOR CLOUD AND IOT SECURITY Eric Baize @ericbaize Senior Director, Product Security Office EMC Corporation Chairman of SAFECode CSA EMEA Congress November 2015 1
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
SQuAD: Application Security Testing
SQuAD: Application Security Testing Terry Morreale Ben Whaley June 8, 2010 Why talk about security? There has been exponential growth of networked digital systems in the past 15 years The great things
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Enterprise Application Security Program
Enterprise Application Security Program GE s approach to solving the root cause and establishing a Center of Excellence Darren Challey GE Application Security Leader Agenda Why is AppSec important? Why
How To Understand And Understand The Security Of A Web Browser (For Web Users)
Security vulnerabilities: should they be early detected? - [email protected] Alessandro Garcia [email protected] OPUS Research Group Agenda 1. Background; 2.Motivation; 3.Research Questions;
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
Basic Testing Concepts and Terminology
T-76.5613 Software Testing and Quality Assurance Lecture 2, 13.9.2006 Basic Testing Concepts and Terminology Juha Itkonen SoberIT Contents Realities and principles of Testing terminology and basic concepts
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.
Managing business infrastructure White paper Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities. September 2008 2 Contents 2 Overview 5 Understanding
