Introduction to Microsoft Security Development Lifecycle (SDL) Threat Modeling
|
|
|
- Dora Doyle
- 9 years ago
- Views:
Transcription
1 Introduction to Microsoft Security Development Lifecycle (SDL) Threat Modeling Secure software made easier Presenter Name Date
2 Course Overview Introduction and Goals How to Threat Model The STRIDE per Element Approach to Threat Modeling Diagram Validation Rules of Thumb Exercise Demo
3
4 Terminology and Context SDL Threat Modeling All engineers Core People involved Security Experts Internet Engineering Task Force (IETF) Threat Modeling Development stage Requirements Design Design analysis
5 Threat Modeling Basics Who? The bad guys will do a good job of it Maybe you will your choice What? A repeatable process to find and address all threats to your product When? The earlier you start, the more time to plan and fix Worst case is for when you re trying to ship: Find problems, make ugly scope and schedule choices, revisit those features soon Why? Find problems when there s time to fix them Security Development Lifecycle (SDL) requirement Deliver more secure products How?
6 Who Building a threat model (at Microsoft) Program Manager (PM) owns overall process Testers Identify threats in analyze phase Use threat models to drive test plans Developers create diagrams Customers for threat models Your team Other features, product teams Customers, via user education External quality assurance resources, such as pen testers You ll need to decide what fits to your organization
7 What Consider, document, and discuss security in a structured way Threat model and document The product as a whole The security-relevant features The attack surfaces Assurance that threat modeling has been done well
8 Why Produce software that s secure by design Improve designs the same way we ve improved code Because attackers think differently Creator blindness/new perspective Allow you to predictably and effectively find security problems early in the process
9
10 SSDP 8 SSDP 10 Get version info Cache Castle info Set version info Query other Castle info Read Castle info Local User 1 Manage Castle Feedback Publish this Castle info Explorer (or rundl132) 2 Manage Castle Feedback Join, leave, Set users props Castle Service 8 Query users props Set acct info Get acct info Get machine password Set psswd Shacct 4 Set acct info Get acct info Remote Castle Service 9
11 SSDP 8 SSDP 10 Get version info Cache Castle info Set version info Query other Castle info Read Castle info Local User 1 Publish this Castle info Explorer (or rundl132) 2 Manage Castle Feedback Join, leave, Set users props Castle Service 8 Query users props Set acct info Get acct info Get machine password Set psswd Shacct 4 Set acct info Get acct info Remote Castle Service 9
12 Any Questions? Everyone understands that? Spotted the several serious bugs? Let s step back and build up to that
13
14 The Process in a Nutshell Diagram Identify Threats Validate Mitigate
15 The Process: Diagramming Diagram Identify Threats Validate Mitigate
16 How to Create Diagrams Go to the whiteboard Start with an overview which has: A few external interactors One or two processes One or two data stores (maybe) Data flows to connect them Check your work Can you tell a story without edits? Does it match reality?
17 Diagramming Use DFDs (Data Flow Diagrams) Include processes, data stores, data flows Include trust boundaries Diagrams per scenario may be helpful Update diagrams as product changes Enumerate assumptions, dependencies Number everything (if manual)
18 Diagram Elements: Examples External Entity Process People Other systems Microsoft.com DLLs EXEs COM object Components Services Web Services Assemblies Trust Boundary Process boundary File system Data Flow Function call Network traffic Remote Procedure Call (RPC) Data Store Database File Registry Shared Memory Queue / Stack
19 Diagrams: Trust Boundaries Add trust boundaries that intersect data flows Processes talking across a network always have a trust boundary They make may create a secure channel, but they re still distinct entities Encrypting network traffic is an instinctive mitigation But doesn t address tampering or spoofing Points/surfaces where an attacker can interject Machine boundaries, privilege boundaries, integrity boundaries are examples of trust boundaries Threads in a native process are often inside a trust boundary, because they share the same privs, rights, identifiers and access 19
20 Diagram Iteration Iterate over processes, data stores, and see where they need to be broken down How to know it needs to be broken down? More detail is needed to explain security impact of the design Object crosses a trust boundary Words like sometimes and also indicate you have a combination of things that can be broken out Sometimes this datastore is used for X probably add a second datastore to the diagram
21 Context Diagram Resource integrity information integrity App Administrator Analysis Instructions
22 Level 1 Diagram
23 Diagram layers Context Diagram Very high-level; entire component / product / system Level 1 Diagram High level; single feature / scenario Level 2 Diagram Low level; detailed sub-components of features Level 3 Diagram More detailed Rare to need more layers, except in huge projects or when you re drawing more trust boundaries
24 Creating Diagrams: analysis or synthesis? Top down Gives you the context in context diagram Focuses on the system as a whole More work at the start Bottom up Feature crews know their features Approach not designed for synthesis More work overall
25
26 Diagram Validation Rules of Thumb Does data magically appear? Order Customer Web Server SQL Database Confirmation Data comes from external entities or data stores
27 Diagram Validation Rules of Thumb Are there data sinks? Transaction Web Server SQL Server Database Analytics You write to a store for a reason: Someone uses it.
28 Diagram Validation Rules of Thumb Data doesn t flow magically Order Database Returns Database
29 Diagram Validation Rules of Thumb It goes through a process Order Database RMA Returns Database
30 Diagrams Should Not Resemble Flow charts Class diagrams Call graphs
31 Real Context Diagram ( Castle ) Castle Config Castle Config Castle Service Local User Feedback Feedback Join/Leave Castle Remote Castle
32 Castle Level 1 Diagram SSDP 10 SSDP 8 Get version info Cache Castle info Set version info Query other Castle info Read Castle info Local User 1 Manage Castle Feedback Publish this Castle info Explorer (orrundl132) 2 Manage Castle Join, leave, Set users props Castle Service 8 Feedback Query users props Set acct info Get machine password Get acct info Set psswd Shacct 4 Set acct Info Get acct info Remote Castle Service 9
33 The Process: Identifying Threats Diagram Identify Threats Validate Mitigate
34 Identify Threats Experts can brainstorm How to do this without being an expert? Use STRIDE to step through the diagram elements Get specific about threat manifestation Threat Property we want Spoofing Authentication Tampering Integrity Repudiation Nonrepudiation Information Disclosure Confidentiality Denial of Service Availability Elevation of Privilege Authorization
35 Threat: Spoofing Threat Spoofing Property Authentication Definition Impersonating something or someone else Example Pretending to be any of billg, microsoft.com, or ntdll.dll
36 Threat: Tampering Threat Tampering Property Integrity Definition Modifying data or code Example Modifying a DLL on disk or DVD, or a packet as it traverses the LAN
37 Threat: Repudiation Threat Repudiation Property Non-Repudiation Definition Claiming to have not performed an action Example I didn t send that , I didn t modify that file, I certainly didn t visit that Web site, dear!
38 Threat: Information Disclosure Threat Information Disclosure Property Confidentiality Definition Exposing information to someone not authorized to see it Example Allowing someone to read the Windows source code; publishing a list of customers to a Web site
39 Threat: Denial of Service Threat Denial of Service Property Availability Definition Deny or degrade service to users Example Crashing Windows or a Web site, sending a packet and absorbing seconds of CPU time, or routing packets into a black hole
40 Threat: Elevation of Privilege Threat Elevation of Privilege (EoP) Property Authorization Definition Gain capabilities without proper authorization Example Allowing a remote Internet user to run commands is the classic example, but going from a Limited User to Admin is also EoP
41 Different Threats Affect Each Element Type ELEMENT S T R External Entity Process Data Store Data Flow? I D E
42 Apply STRIDE Threats to Each Element For each item on the diagram: Apply relevant parts of STRIDE Process: STRIDE Data store, data flow: TID Data stores that are logs: TID+R External entity: SR Data flow inside a process: Don t worry about T, I, or D This is why you number things
43 Use the Trust boundaries Trusted/ high code reading from untrusted/low Validate everything for specific and defined uses High code writing to low Make sure your errors don t give away too much
44 Threats and Distractions Don t worry about these threats The computer is infected with malware Someone removed the hard drive and tampers Admin is attacking user A user is attacking himself You can t address any of these (unless you re the OS)
45 The Process: Mitigation Diagram Identify Threats Validate Mitigate
46 Mitigation Is the Point of Threat Modeling Mitigation To address or alleviate a problem Protect customers Design secure software Why bother if you: Create a great model Identify lots of threats Stop So, find problems and fix them
47 Mitigate Address each threat Four ways to address threats Redesign to eliminate Apply standard mitigations What have similar software packages done and how has that worked out for them? Invent new mitigations (riskier) Accept vulnerability in design SDL rules about what you can accept Address each threat
48 Standard Mitigations Spoofing Authentication To authenticate principals: Cookie authentication Kerberos authentication PKI systems such as SSL/TLS and certificates To authenticate code or data: Digital signatures Tampering Integrity Windows Vista Mandatory Integrity Controls ACLs Digital signatures Repudiation Non Repudiation Secure logging and auditing Digital Signatures Information Disclosure Confidentiality Encryption ACLS Denial of Service Availability ACLs Filtering Quotas Elevation of Privilege Authorization ACLs Group or role membership Privilege ownership Input validation
49 Inventing Mitigations Is Hard: Don t do it Mitigations are an area of expertise, such as networking, databases, or cryptography Amateurs make mistakes, but so do pros Mitigation failures will appear to work Until an expert looks at them We hope that expert will work for us When you need to invent mitigations, get expert help
50 Sample Mitigation Mitigation #54, Rasterization Service performs the following mitigation strategies: OM is validated and checked by (component) before being handed over to Rasterization Service The resources are decoded and validated by interacting subsystems, such as [foo], [bar], and [boop] Rasterization ensures that if there are any resource problems while loading and converting OM to raster data, it returns a proper error code Rasterization Service will be thoroughly fuzz tested (Comment: Fuzzing isn t a mitigation, but it s a great thing to plan as part 4)
51 Improving Sample Mitigation: Validated-For OM is validated and checked by [component] before being handed over to Rasterization Service Validated for what? Be specific! validates that each element is unique. validates that the URL is RFC-1738 compliant, but note URL may be to (Also a great external security note)
52 The Process: Validation Diagram Identify Threats Validate Mitigate
53 Validating Threat Models Validate the whole threat model Does diagram match final code? Are threats enumerated? Minimum: STRIDE per element that touches a trust boundary Has Test / QA reviewed the model? Tester approach often finds issues with threat model or details Is each threat mitigated? Are mitigations done right? Did you check these before Final Security Review? Shipping will be more predictable
54 Validate Quality of Threats and Mitigations Threats: Do they: Describe the attack Describe the context Describe the impact Mitigations Associate with a threat Describe the mitigations File a bug Fuzzing is a test tactic, not a mitigation
55 Validate Information Captured Dependencies What other code are you using? What security functions are in that other code? Are you sure? Assumptions Things you note as you build the threat model HTTP.sys will protect us against SQL Injection LPC will protect us from malformed messages GenRandom will give us crypto-strong randomness
56 More Sample Mitigations Mitigation #3: The Publish License is created by RMS, and we've been advised that it's only OK to include an unencrypted address if it's required for the service to work. Even if it is required, it seems like a bad idea due to easy harvesting. Primary Mitigation: Bug # has been filed against the RMS team to investigate removing the address from this element. If that's possible, this would be the best solution to our threat. Backup Mitigation: It's acceptable to mitigate this by warning the document author that their address may be included in the document. If we have to ship it, the user interface will be updated to give clear disclosure to the author when they are protecting a document.
57 Effective Threat Modeling Meetings Develop draft threat model before the meeting Use the meeting to discuss Start with a DFD walkthrough Identify most interesting elements Assets (if you identify any) Entry points/trust boundaries Walk through STRIDE against those elements Threats that cross elements/recur Consider library, redesigns
58
59
60 Exercise Handout Work in teams to: Identify all diagram elements Identify threat types to each element Identify at least three threats Identify first order mitigations Extra credit: Improve the diagram
61 Identify All Elements (16 Elements) 7 8 and two trust boundaries, which don t have threats against them
62 Identify Threat Types to Each Element Identify STRIDE threats by element type Threats ELEMENT Elements S T R I D E Administrator (1) External Entity Admin console (2), Host SW (3) Process Config data (4), Integrity data (5), Filesystem data (6), registry (7) Data Store Data Flow 8. raw reg data 9. raw filesystem data 10. commands... 16
63 Identify Threats! Be specific Understand threat and impact Identify first order mitigations
64
65 Call to Action Threat model your work! Start early Track changes Work with a Security Advisor! Talk to your dependencies about security assumptions Learn more
66 Threat Modeling Learning Resources MSDN Magazine SDL Blog Reinvigorate your Threat Modeling Process All threat modeling posts Threat Modeling: Uncover Security Design Flaws Using The STRIDE Approach 1/ThreatModeling/default.aspx Article Experiences Threat Modeling at Microsoft D F F1A8EA2720EE92A/Shostack-ModSec08Experiences-Threat-Modeling-AtMicrosoft.pdf 0modeling/default.aspx Books The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software (Howard, Lipner, 2006) Threat Modeling chapter s/auth8753.aspx
67 Resources SDL Portal SDL Blog SDL Process on MSDN (Web) SDL Process on MSDN (MS Word)
68 Questions?
69 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
70
71 Standard Mitigations STRIDE Threat Property we want Spoofing Authentication Tampering Integrity Repudiation Nonrepudiation Information Disclosure Confidentiality Denial of Service Availability Elevation of Privilege Authorization
72 Standard Mitigations STRIDE Threat Property Spoofing Authentication To authenticate principals: Basic authentication Digest authentication Cookie authentication Windows authentication (NTLM) Kerberos authentication PKI systems, such as SSL or TLS and certificates IPSec Digitally signed packets To authenticate code or data: Digital signatures Message authentication codes Hashes
73 Standard Mitigations STRIDE Threat Property Tampering Integrity Windows Vista mandatory integrity controls ACLs Digital signatures Message authentication codes
74 Standard Mitigations STRIDE Threat Property Repudiation Nonrepudiation Strong authentication Secure logging and auditing Digital signatures Secure time stamps Trusted third parties
75 Standard Mitigations STRIDE Threat Property Information Disclosure Confidentiality Encryption ACLs
76 Standard Mitigations STRIDE Threat Property Denial of Service Availability ACLs Filtering Quotas Authorization High-availability designs
77 Standard Mitigations STRIDE Threat Property Elevation of Privilege Authorization ACLs Group or role membership Privilege ownership Permissions Input validation
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder [email protected] Winter School in Information Security, Finse May
Threat modeling. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2011
Threat modeling Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Threats Threat = something bad that can happen Given an system or product what are the threats against
Microsoft STRIDE (six) threat categories
Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007
Security Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
Secure Programming Lecture 9: Secure Development
Secure Programming Lecture 9: Secure Development David Aspinall, Informatics @ Edinburgh 24th February 2014 Outline Overview Lifecycle security touchpoints 1. Code review and repair 2. Architectural risk
In Building Security In, Gary McGraw proposes three pillars to use throughout the lifecycle: I: Applied Risk Management
Secure Programming Lecture 9: Secure Development David Aspinall, Informatics @ Edinburgh 24th February 2014 Outline Overview Lifecycle security touchpoints 1. Code review and repair 2. Architectural risk
Windows Server 2008/2012 Server Hardening
Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
The Security Development Lifecycle. Steven B. Lipner, CISSP [email protected] Senior Director Security Engineering Strategy Microsoft Corp.
The Security Development Lifecycle Steven B. Lipner, CISSP [email protected] Senior Director Security Engineering Strategy Microsoft Corp. 2 Overview Introduction A look back Trustworthy Computing
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Security within a development lifecycle. Enhancing product security through development process improvement
Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation [email protected]
Security and Compliance Robert Nottoli Principal Technology Specialist Microsoft Corporation [email protected] DISCLAIMER FOR DOCUMENTATION REGARDING PRE-RELEASED SOFTWARE This document supports a
Managing Local Administrator Passwords with LAPS 10/14/2015 PENN STATE SECURITY CONFERENCE
Managing Local Administrator Passwords with LAPS 2015 PENN STATE SECURITY CONFERENCE DAN BARR [email protected] SYSTEMS ADMINISTRATOR, APPLIED RESEARCH LABORATORY The Shared Password Threat Shared passwords
Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services [email protected]
Microsoft Security Development Lifecycle for IT Rob Labbé Application Consulting and Engineering Services [email protected] The Reasons for Secure Software There are many threats to data and systems
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
An Approach to Threat Modeling in Web Application Security Analysis
Volume-5, Issue EICA2012-5, February 10, 2012 An Approach to Threat Modeling in Web Application Security Analysis Sreenivasa Rao B Dept. of Computer Science & Engineering CMJ University, Shillong, India
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES
BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES Disclaimer!! Best Practices are Not rules or rigid standards General solutions to common problems Guidelines and common reference that can
Security and Privacy in Cloud Computing
Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Threats, vulnerabilities, and enemies Goal Learn the cloud computing threat model
Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007
Agile and Secure Can We Be Both? Chicago OWASP June 20 th, 2007 The Agile Practitioner s Dilemma Agile Forces: Be more responsive to business concerns Increase the frequency of stable releases Decrease
KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) [email protected] www.technologytransfer.it
OWASP Cornucopia. Ecommerce Website Edition. The OWASP Foundation. OWASP London https://www.owasp.org. 3rd June 2013
The OWASP Foundation OWASP London https://www.owasp.org 3rd June 2013 OWASP Cornucopia Ecommerce Website Edition OWASP Cornucopia - Ecommerce Website Edition helps developers identify security requirements
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
Operating System Security
Operating System Security Klaus Schütz Windows OS Security Microsoft Redmond Before I start My VP love(d) me A frustrated friend 1 Agenda Evolution of Threats Client vs. Server Security Operating System
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
Windows 7. Qing Liu [email protected] Michael Stevens [email protected]
Windows 7 Qing Liu [email protected] Michael Stevens [email protected] 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Software Security Touchpoint: Architectural Risk Analysis
Software Security Touchpoint: Architectural Risk Analysis Gary McGraw, Ph.D. Chief Technology Officer, Cigital Founded in 1992 to provide software security and software quality professional services Recognized
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team
What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information
Rapid Threat Modeling Techniques
SESSION ID: ASD-R01 Rapid Threat Modeling Techniques Chad Childers IT Security Ford Motor Company Agenda Threat Modeling background Lessons Learned to make threat modeling faster Techniques specifically
BMC Performance Manager Windows Security White Paper DCOM / WMI
BMC Performance Manager Windows Security White Paper DCOM / WMI Problem The IT department delivers user IT services to their internal and external customers. The IT department wants to maintain control
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
EC-Council E C S P.NET. EC-Council. EC-Council Certified Secure Programmer (.NET)
E C S P.NET (.NET) ECSP.NET Course Software defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has
Mobile Application Threat Analysis
The OWASP Foundation http://www.owasp.org Mobile Application Threat Analysis Ari Kesäniemi Nixu Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
Windows Azure Security
Windows Azure Security A Peek Under the Hood Charlie Kaufman 06/03/2010 Agenda Introduction Azure Compute Security Azure Storage Security SQL Azure Security Questions Azure Combines Three Components Compute
Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation
Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Agile and Secure: OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/
Agile and Secure: Can We Be Both? OWASP AppSec Seattle Oct 2006 Dan Cornell, OWASP San Antonio Leader Principal, Denim Group Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation
The Risks that Pen Tests don t Find. OWASP 13 April 2012. The OWASP Foundation http://www.owasp.org
The Risks that Pen Tests don t Find 13 April 2012 Gary Gaskell Infosec Services [email protected] 0438 603 307 Copyright The Foundation Permission is granted to copy, distribute and/or modify
THREAT MODELLING FOR WEB SERVICES BASED WEB APPLICATIONS
THREAT MODELLING FOR WEB SERVICES BASED WEB APPLICATIONS Lieven Desmet, Bart Jacobs, Frank Piessens, and Wouter Joosen DistriNet Research Group, Katholieke Universiteit Leuven, Celestijnenlaan 200A, 3001
tj.jmffliim.upij II, 14 1" H'H'.i.U.' Threat Modeling Designing for Security Adam Shostack WILEY
tj.jmffliim.upij II, 14 1" H'H'.i.U.' w Threat Modeling Designing for Security Adam Shostack WILEY Contents Introduction xxi Part I Getting Started 1 Chapter 1 Dive In and Threat Model! 3 Learning to Threat
FileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 4: Active Directory Security... 32 Ac tive Directory Security Architecture... 32
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org
SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Experiences Threat Modeling at Microsoft
Experiences Threat Modeling at Microsoft Adam Shostack [email protected] Microsoft Abstract. Describes a decade of experience threat modeling products and services at Microsoft. Describes the
Threat Modeling. 1. Some Common Definition (RFC 2828)
Threat Modeling Threat modeling and analysis provides a complete view about the security of a system. It is performed by a systematic and strategic way for identifying and enumerating threats to a system.
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v2-1-0-2
NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v2-1-0-2: NNTDC01 On NNTDC01 - By admin for time period 5/23/2014 8:49:51 AM to 5/23/2014 8:49:51 AM NNT CIS Microsoft Windows Server
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Application Compatibility Best Practices for Remote Desktop Services
Application Compatibility Best Practices for Remote Desktop Services Introduction Remote Desktop Services in Windows Server 2008 R2 allows Windows Server to be accessed by multiple users concurrently to
Microsoft Dynamics GP 2010. SQL Server Reporting Services Guide
Microsoft Dynamics GP 2010 SQL Server Reporting Services Guide April 4, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
Threat Modelling (Web)Apps Myths and Best Practices OWASP 7.11.2012. The OWASP Foundation http://www.owasp.org. Matthias Rohr
Threat Modelling (Web)Apps Myths and Best Practices Matthias Rohr 7.11.2012 www.matthiasrohr.de [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
