D. Best Practices D.1. Assurance The 5 th A
|
|
|
- Irene Barker
- 9 years ago
- Views:
Transcription
1 Best Practices I&C School Prof. P. Janson September 2014 D. Best Practices D.1. Assurance The 5 th A 1 of 36
2 IT systems are insecure for two main reasons: People are fallible and systems are complex and brittle If architects built buildings the way programmers build IT systems the first woodpecker would cause civilization to collapse Software products hold promises but no liability like religious preaches 2 of 36
3 Technology cannot do much about human fallibility but it can do more and more about systems brittleness 3 of 36
4 How can we built more secure systems? SD 3 systems Emerging security engineering code books Recommended security engineering practices 4 of 36
5 SD 3 systems Most disciplines, also in engineering, are regulated and subject to heavy malpractice fines But anyone can claim to be a computer engineer without any license or liability This cannot and will not go on for ever Users increasingly demand secure systems Regulators increasingly mandate secure systems Just as the government eventually stepped in to mandate seat belts for cars and safety standards for aircraft, the time has come for software => (Self-)regulation and liability are coming IT engineering codes and practices Security as competitive differentiator NB: Hardware security engineering is not a focus of this course 5 of 36
6 SD 3 systems Systems increasingly need to be Secure by Design, by Deployment, and by Default Security by default is a direct application of the fail-safe & built-in principles Security by deployment is a matter of operations engineering (next chapter) Security by design is a matter of systems engineering (this chapter) 6 of 36
7 Emerging security design code books SANS Application Security Procurement Language Building-Security-In Maturity Model (BSIMM) OWASP guides and Comprehensive Lightweight Application Security Process (CLASP) Microsoft s Secure Development Lifecycle (SDL) IBM s SDLC NIST Guidelines Etc. 7 of 36
8 The SANS (SysAdmin, Audit, Network, Security) Institute Application Security Procurement Language Software vendors have little incentive to produce secure software but a big incentive to game assurance process Mitre & SANS agreed on standard contract language between software buyers & vendors = First step for vendors to assume liability for quality of software 8 of 36
9 Building-Security-In Maturity Model (BSIMM) Governance Intelligence SSDL Touchpoints* Deployment Strategy and Metrics Attack Models Architecture Analysis Penetration Testing Compliance and Policy Training ~ Construction ~ Verification Security Features and Design Standards and Requirements Code Review Security Testing * SSDL = Secure Software Development Lifecycle Software Environment Configuration Management and Vulnerability Management 9 of 36
10 Open Web Application Security Project (OWASP) Software Assurance Maturity Model (SAMM) 3 guides Development Code review Testing Application Security Verification Standard (ASVS) 10 of 36
11 Microsoft s Secure Development Lifecycle (SDL) Time-based explains what to do at what stage of development Analyzing and minimizing attack surface Analyzing cost of attacks and defenses Includes framework with 4 maturity levels in 5 capability areas Training, Policy & Organizational capabilities Requirements & Design Implementation Verification Release & Response 11 of 36
12 IBM SDLC overview Source: IBM Rational Application Security Security strategy & metrics Requirements Design Code Test Deploy Security requirements Secure design principles Secure coding Risk analysis Vulnerability management Secure deployment Abuse cases & anti requirements Architectural risk analysis Code review Security testing Operational enablement Security testing Security education & guidance Reprinted by courtesy of International Business Machines Corporation, ( ) International Business Machines Corporation 12 of 36
13 Recommended security design practices Cursory inspection of main secure coding guidebooks reveals many common recommendations 1. Strategy and education 2. Requirements and standards 3. Architecture / design & review 4. Implementation & review 5. Testing and vulnerability assessment 6. Deployment and response 13 of 36
14 1. Strategy and education a. Define secure development methodology b. Provide security awareness & education c. Ensure security certification & compliance 14 of 36
15 1.a. Secure development methodology Must define + publish / adopt secure development methodology Include and enforce gating security decision points in software development process Monitor behavior and enforce compliance with methodology Publish project security data internally Hold developers accountable for security of their deliverables 15 of 36
16 1.b. Security awareness and education of software developers (Repetition of observations listed on white-box scanning chart in lesson 20) Require that programmers display a sniper / spy mindset Being ego-conscious, determined, confident, motivated, having fun, breaking rules Require very sharp skills and broad expertise Programming languages, common frameworks and libraries Operating systems Middleware databases systems and network protocols System administration Vulnerabilities and attack techniques Knowing classification systems like CVSS, CVE, CWE, OWASP, CAPEC, etc. Tracking lists like bugtraq, webappsec Attending conferences like BlackHat and DefCon 16 of 36
17 1.b. Security awareness and education of software developers Educate new hires + Annual refresher courses Encourage professional certifications, e.g. SANS Global Information Assurance Certification (GIAC) for Secure Software Programmer (GSSP) International Information Systems Security Certification Consortium (ISC) 2 Certified Information Systems Security Professional (CISSP) Certified Secure Software Lifecycle Professional (CSSLP) Provide differentiated career recognition for security skills & practice 17 of 36
18 1.c. Certification of software security and compliance Understand applicable software certification requirements (see later) + align development process accordingly Ensure and monitor compliance of internal practices with adopted guidelines Document evidence of compliance Require executive sign-off on exceptions (known vulnerabilities, process non-compliance) Assess compliance of external components + document exceptions 18 of 36
19 2. Security requirements and standards Ensure that security is factored in from the start not added on as an afterthought Assess potential risks Threat and attack modeling Define security requirements to contain such risks Identify applicable standards (see next section) 19 of 36
20 Beware of poor excuses for dismissing certain attack paths That s not a user scenario Purpose is to look at intruder scenarios, not user scenarios It s hidden the user can t even see it Security by obscurity never worked They d have to know the file name/format/protocol/source code/directory structure (which is not public knowledge) Security by obscurity never worked That feature is changing (or has been removed) in the next version Some users will cling to old versions for ever The UI prevents them from doing that Intruders will always look at ways to circumvent the official UI We re using SSL, that protects us SSL can be attacked and has been Users cannot get to the back end Never forget Murphy s Law - test everything before claiming anything No one can ever be interested in hacking into this product Never say never This product may be integrated in a bigger application that someone will try to hack 20 of 36
21 3.a. Security architecture and design ~50% of security problems come from design flaws Design flaws cannot be found by staring at code => Need higher-level architectural perspective (forest vs. trees view) => Assign security professionals into architecture team => Identify and plan to use proven solutions + existing implementations 21 of 36
22 Towards a reusable, componentized security services architecture amenable to cloud computing & managed security services (Mgmt API e.g. KMIP) ( GSS API / CAPI ) Federated Security Mgmt Security Enforcement PI PI Community Identity, Role, Reputation governance Policy & trust languages & management Data discovery, classification, assurance, entitlement, bkup Crypto key management UTM Configuration, patching, intrusion / fraud, content filtering Risk management, monitoring, audit and compliance Authentication Access Control DLP, DRM Encryption Signature Content Filtering Logging & Reporting Data Appl. Appl. VM Container Box Box Facility Physical Network Management Enforcement policies mechanisms Central control Modular components Interoperable interfaces VS Library VA Domain VDC, VPN Cluster Organization 22 of 36
23 Towards a reusable, componentized security services architecture amenable to cloud computing & managed security services There are a number of readily available interfaces for many security services PKCS#11, JavaCard, etc. GSS-API Generalized Security Services API (can use PKCS#11) SASL Simple Authentication and Security Layer Java security ESAPI OWASP Enterprise Security API KMIP Key Management Interoperability Protocol 23 of 36
24 PKCS#11 Cryptographic Token Interface (Cryptoki) RSA Labs de facto standard Vendor neutral, cross-platform, industry-standard API to generic crypto tokens & HSMs Cryptographic services manipulating Security objects and attributes (keys, certs) Along life cycles as part of Extensible architecture that is Secure by design 24 of 36
25 PKCS#11 Cryptographic Token Interface (Cryptoki) Cryptographic services ENCRYPT, DECRYPT, SIGN, VERIFY, DERIVE (a key), ALLOWED_MECHANISMS, etc. Cryptographic objects Symmetric and asymmetric keys and certificates Functions to CRUD / import / export objects + manage lifecycles Used by Mozilla Firefox, DNSSEC, SSL/TLS, Truecrypt, etc. (among others) NB: Microsoft supports Windows-specific MS-CAPI instead 25 of 36
26 GSS-API IETF RFC 2743 (supersedes RFC 2078) Authentication and crypto API no authorization function Mechanism-, protocol-, and connection-independence through manipulation of opaque tokens exchanged as TCP data Standard bindings for C and Java GSS- API GSS- API GSS App App GSS Sockets API TCP/IP Opaque GSS tokens TCP/IP Sockets API 26 of 36
27 GSS-API verbs Credential initialization & termination GSS_Acquire_cred Name, ltime, mechs => cred_handle GSS_Inquire_cred Cred_handle => Name, ltime, mechs GSS_Add_cred Cred_handle, Name, ltime, mechs GSS_Release_cred Cred_handle => Secure context initialization and termination GSS_Init_sec_context GSS_Process_context_token GSS_Accept_sec_context GSS_Inquire_sec_context GSS_Delete_sec_context GSS_Export_sec_context (to other process) GSS_Import_sec_context (from other process) Message integrity and signature GSS_GetMIC or GSS_Sign GSS_VerifyMIC or GSS_Verify with symmetric or asymmetric crypto Message encryption and decryption GSS_Wrap or GSS_Seal GSS_Unwrap or GSS_Unseal with symmetric or asymmetric crypto Total ca. 45 calls incl. calls for name, mechanism, OID mgt 27 of 36
28 SASL Simple Authentication and Security Layer over BEEP Block Extensible Exchange Protocol BEEP multiplexes TCP / TLS or any other transport connection into up to 257 MIME channels Channel profiles are negotiated at set-up and may be linked to any channel TLS profile for transport ( SASL profile for security SASL can flow over any transport connection but typically uses a BEEP channel to negotiate SASL-approved network confidentiality, integrity, and authentication functions SASL API SASL BEEP App BEEP Options: ANONYMOUS PLAIN (userid-password) CRAM-MD5 (password digest challenge-response) OTP (one-time nonce derived from password DIGEST-MD5 (password digest + optional C&I) KERBEROS SECURID TLS+PLAIN (TLS + PLAIN SASL) TLS+EXTERNAL (TLS + client-side certificate) App BEEP SASL BEEP SASL API TCP/IP Tokens in SASL/BEEP headers TCP/IP 28 of 36
29 Java security Extensible, standards-based, interoperable security architecture including Platform Security = Built-in language security enforced by Java compiler and JVM Strong data typing Automatic memory management Bytecode verification Secure class loading Cryptography API (JCA / now incl. JCE) = algorithm- & implementation-independent Confidentiality Integrity Digital signature Key management 29 of 36
30 Java security Authentication & Authorization(JAAS) Authentication API Single sign-on to multiple pluggable mechanisms Authorization API Fine-grained role-based access control policy management Secure communication (confidentiality & integrity) JSSE over HTTPS / SSL / TLS JGSS over GSS-API with Kerberos SASL 30 of 36
31 OWASP ESAPI Free, open source, web application security control APIs & libraries Reference implementations in multiple languages Solid foundation for new development Allows retrofitting security into existing software 31 of 36
32 OWASP ESAPI Authenticator User AccessController AccessReferenceMap Validator Encoder HTTPUtilities Encryptor EncryptedProperties Randomizer Exception Handling Logger IntrusionDetector SecurityConfiguration Authentication Access control / authorization Input validation Output encoding HTTP security Cryptography Error handling Logging Intrusion detection Security configuration 32 of 36
33 OWASP ESAPI coverage of OWASP Top Ten vulnerabilities OWASP Top Ten OWASP ESAPI A1. Cross Site Scripting (XSS) A2. Injection Flaws A3. Malicious File Execution A4. Insecure Direct Object Reference A5. Cross Site Request Forgery (CSRF) A6. Leakage and Improper Error Handling A7. Broken Authentication and Sessions A8. Insecure Cryptographic Storage A9. Insecure Communications A10. Failure to Restrict URL Access Validator, Encoder Encoder HTTPUtilities (Safe Upload) AccessReferenceMap, AccessController User (CSRF Token) EnterpriseSecurityException, HTTPUtils Authenticator, User, HTTPUtils Encryptor HTTPUtilities (Secure Cookie, Channel) AccessController Copyright The OWASP Foundation Permission 2014 P. is Janson granted to copy, distribute and/or modify this document under the terms of the OWASP License. 33 of 36
34 Key Management Interoperability Protocol (KMIP) Manages crypto objects (keys, certificates) and their attributes across their lifecycle 34 of 36
35 KMIP objects Objects Certificates & keys (private, public, symmetric + split keys) Secret data, opaque objects Verbs On keys Create, Destroy Activate, Revoke Re-key Archive, Recover Get, Put On certificates Certify Re-certify Validate Managing attributes Add / Delete / Get / Modify Attribute Managing events Notify (e.g. key expiration and replacement need) 35 of 36
36 3.b. Reviews Perform security analysis and review at every software development step Architecture Design Implementation Test The earlier the better ( Errors \ Found Design Coding Integration Beta GA Design 1x 5x 10x 15x 30x Coding 1x 10x 20x 30x Integration 1x 10x 20x And NIST is conservative others claim it could cost 100X 36 of 36
Points of View. CxO s point of view. Developer s point of view. Attacker s point of view
Web App Security 2 CxO s point of view Points of View Measurable security SCAP (Security Content Automation Protocol) Developer s point of view Secure coding/software security CWE (Common Weakness Enumeration)
D. Best Practices D.1. Assurance The 5 th A
Best Practices I&C School Prof. P. Janson September 2014 D. Best Practices D.1. Assurance The 5 th A 1 of 20 IT systems are insecure for two main reasons: People are fallible and systems are complex and
Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,
Secure and Resilient Software Development Mark S. Merkow Lakshmikanth Raghavan CRC Press Taylor& Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Group, an Informs
Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May 2012 - Belfast
Building & Measuring Security in Web Applications Fabio Cerullo Cycubix Limited 30 May 2012 - Belfast Brief Bio - CEO & Founder Cycubix Limited - 10+ years security experience in Technology, Manufacturing,
Enterprise Security API (ESAPI) Java Java User Group San Antonio. Jarret Raim June 3 rd, 2010
Enterprise Security API (ESAPI) Java Java User Group San Antonio Jarret Raim June 3 rd, 2010 What is it? ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Web Application Security
Web Application Security A Beginner's Guide Bryan Sullivan Vincent Liu Mc r New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, 2009. The OWASP Foundation http://www.owasp.
DISA's Application Security and Development STIG: How Can Help You AppSec DC November 12, 2009 Jason Li Senior Application Security Engineer [email protected] The Foundation http://www.owasp.org
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. http://www.owasp.
Architectural Design Patterns for SSO (Single Sign On) Design and Use Cases for Financial i Web Applications Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. OWASP Copyright The OWASP Foundation Permission
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Key Management Interoperability Protocol (KMIP)
www.oasis-open.org Management Interoperability Protocol (KMIP) Storage Developer s Introduction SNIA Fall 2009 Gordon Arnold, [email protected] Chair, Storage Security Industry Forum 1 2009 Insert Copyright
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Designing and Coding Secure Systems
Designing and Coding Secure Systems Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class covers secure coding and some design issues from a language neutral approach you can
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Web Engineering Web Application Security Issues
Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Secure Development LifeCycles (SDLC)
www.pwc.com Feb 2014 Secure Development LifeCycles (SDLC) Bart De Win Bart De Win? 15+ years of Information Security Experience Ph.D. in Computer Science - Application Security Author of >60 scientific
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Software Application Control and SDLC
Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Credit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
How To Ensure That Your Computer System Is Safe
Establishing a Continuous Process for PCI DSS Compliance Visa, MasterCard, American Express, and other payment card companies currently require all U.S. merchants accepting credit card payments to comply
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
How To Use The Gss-Api And Sspi For A Security Reason On A Microsoft Microsoft Server (Or A Microsplatte)
Best Practices for Integrating Kerberos into Your Application This paper describes best practices for application developers who wish to add support for the Kerberos Network Authentication System to their
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
OpenSAMM Software Assurance Maturity Model
Libre Software Meeting Brussels 10-July-2013 The OWASP Foundation http://www.owasp.org Open Software Assurance Maturity Model Seba Deleersnyder [email protected] OWASP Foundation Board Member OWASP Belgium
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
Secure development and the SDLC. Presented By Jerry Hoff @jerryhoff
Secure development and the SDLC Presented By Jerry Hoff @jerryhoff Agenda Part 1: The Big Picture Part 2: Web Attacks Part 3: Secure Development Part 4: Organizational Defense Part 1: The Big Picture Non
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
IBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
IceWarp Server - SSO (Single Sign-On)
IceWarp Server - SSO (Single Sign-On) Probably the most difficult task for me is to explain the new SSO feature of IceWarp Server. The reason for this is that I have only little knowledge about it and
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers
White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
