Improving your Secure SDLC ( SSDLC ) with Prevoty. How adding real-time application security dramatically decreases vulnerabilities
|
|
|
- Esmond Sparks
- 10 years ago
- Views:
Transcription
1 Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015
2 Improving your Secure SDLC ( SSDLC ) with Prevoty Table of Contents Abstract The application security problem Why hackers have moved to the application layer Top application security threats SSDLC overview Why implementing an SSDLC can be challenging Introducing prevoty High-level architecture Implementation High performance Application security monitoring Runtime protection Developer security toolkit How prevoty helps an SSDLC Summary
3 Improving your Secure SDLC ( SSDLC ) with Prevoty Abstract Gartner estimates that 70% of all hacks happened at the application layer in becoming the main attack surface for hackers. The dynamic and distributed nature of modern applications together with the increased sophistication of the attacks has rendered perimeter security ineffective and best practice for organizations is to find ways to build more security directly into the applications themselves. This has led many organizations to implement some form of a Secure Software Development Lifecycle (SSDLC). While there is no doubt that adoption of an SSDLC will improve application security to some extent, unfortunately real life implementations of a SSDLC can be extremely challenging and expensive and at least a distraction for application developers. This paper will outline Why the distributed and dynamic nature of today s applications makes hackers lives easier The biggest security threats for applications A brief overview of a Secure Software Development Lifecycle (SSDLC) Why implementing an SSDLC can be challenging for many organizations and, importantly, how using Prevoty can enable enterprises to realize: Rapid remediation of existing application vulnerability backlogs Quicker time to market for applications and features without the risk of introducing new vulnerabilities Protection from future XSS, SQL injection and CSRF zero-day attacks 3
4 Improving your Secure SDLC ( SSDLC ) with Prevoty The Application Security Problem The increase of public security breaches and data leakage has put enterprises in a challenging position with respect to dealing with application security. CIOs and CISOs now more than ever need to manage the trade-off between the value to their business stakeholders of releasing new applications rapidly versus releasing more secure applications in a less timely manner. Whilst the majority of enterprises understand the value in using a Secure SDLC (SSDLC) methodology to develop more secure applications, many struggle with the reality of fixing vulnerabilities identified during the testing process in addition to trying to anticipate the unknown threats coming from previously unknown hacks (known as zero-day attacks). So we end up in a difficult situation with unpleasant cost-benefit-risk decisions: do we allow existing applications to remain un-remediated? Should we still release new applications with known and potentially unknown vulnerabilities? There are four main parts to this application security problem: Existing backlog of vulnerabilities Most enterprises have a backlog of vulnerabilities for their existing published applications that is leaving their organizations exposed. There can be a number of reasons for this, including: The applications were released prior to a threat being identified and the organization simply does not have the time, capability or money to fix them The vulnerabilities identified include too many false positives whereby a fix would actually mess up the application usability The risk associated with leaving the vulnerabilities unremediated is perceived to be small Vulnerabilities introduced in new application development Agile development methodologies have become almost standard for enterprise application development and business requirements are driving more rapid application releases. This means that the time required to fix all identified vulnerabilities is often short and sometimes 4
5 Dealing with zero-day attacks Previously unknown threats, known as zero-day attacks, are unquestionably the most dangerous type of threats. Static (SAST), Dynamic (DAST) and Interactive (IAST) Application Security Testing tools rely on past definitions and patterns of previously known threats to operate successfully. So how do your application developers prevent attacks that have never been seen before? In addition, whenever the security community identifies a new zero-day, the whole process of application remediation needs to start all over again for every potentially affected application. Application developers are not security experts In order to attempt to stay ahead of hackers, security professionals need to spend a lot of their working lives monitoring the state of the art in terms of publicly available knowledge around vulnerabilities. It takes a thief to catch a thief. Developers were not hired to do this, they don t have the time to do this and their skillsets are not best placed to implement mitigations against complex attacks. Sifting through lists of vulnerabilities, many of which can be false positives and attempting to fix what they can without breaking the application functionality using the limited security knowledge that they have is about the best that can be expected. 5
6 Why hackers have moved to the application layer We used to think of an application as a binary or single host deployment. This simplistic model has grown into something much larger and more complex. An application today is the collection of services and processes that allow an end user or another application to perform a series of logically grouped actions. An application isn t just a single host anymore. Cloud, Web Services, Partner Apps, SAML Mobile & Multi-device External Data Services Users Firewall incl. WAFs VPN Database Dynamic User Generated Content External Employees Internal Employees Built in-house & externally Distributed Today, an application is at the hub of information sharing. It facilitates requests and collects data from internet, intranet and extranet users and sources. To put this in perspective, we re talking about applications making use of cloud computing and storage, partner applications, RSS feeds, API calls to external services, accessed by both untrusted and mobile devices, and the applications themselves being built including a lot of open source and even pre-compiled software with who-knows-what inside. 6
7 Top application security threats The top attacks that external facing and B-2-B applications face today are cross-site scripting (XSS), SQL injection and cross-site request forgery (CSRF). Cross Site Scripting XSS is the ability to execute JavaScript in a client s browser (including mobile web and hybrid apps). This can be a reflected or persisted attack. A reflected attack is experienced by individual users whereas a persisted attack affects all users. In either case, an attacker can grab credentials, drop malware/ shells and steal information. And don t forget brand defacement we ve seen cases of persisted XSS that has political messages from third world countries and activist groups. SQL injection SQL injection is the ability to execute unauthorized queries against a database. This allows an attacker to not just tamper but also exfiltrate sensitive information like Personal Identifiable Information (PII). Cross-Site Request Forgery CSRF is the ability to perform an attack on a user without them even knowing to hijack a session and/or steal a user s identity. It basically takes advantage of applications that don t securely manage a user s state changing activity when using a particular feature. As hackers become more sophisticated, we re now seeing how these attacks can be chained to cause a lot of damage. For instance, XSS can be used to steal an administrator s credentials, leading to the opportunity for SQL injection to execute malicious queries to steal things like user names and passwords or credit card information. 7
8 SSDLC Overview When we talk about SSDLC In the security and application development community most trace its origins to Microsoft s Security Development Lifecycle. This was put into overdrive at the behest of Bill Gates in one his more controversial company s. Microsoft realized that they had to bake security into their development lifecycle. The entire Windows division shut down and everyone focused on security. As organizations outside of Microsoft embraced the concepts around building security, the term SSDLC started to emerge. There is no standard that defines exactly what is included in an SSDLC, but based on experience of working with many enterprise customers, the following is a realistic high-level view of what is typical: Coding Write & Remediate App Best Practices Testing Static Code Analysis (SCA) Dynamic App Security Testing (DAST) Design Architecture & Design Reviews Threat Modeling Deployment Server Config Review Network Config Review Vulnerabilities List Delivered to Developers Security efforts are applied into all phases of the typical SDLC: In the Requirements phase, security teams get involved in early product conversations to build an initial risk assessment. Design involves threat modeling and identifying risks in the architecture and what resources could be compromised In the Coding process developers use secure coding libraries and follow best practices to ensure that they are doing things like input, query and token validation and may use SAST tools to identify possible vulnerabilities. In the Testing phase, developers, QA and security teams may use SAST, DAST and IAST tools, fuzzers and also penetration test the application. When potential vulnerabilities and/or bugs are found, then the results are delivered back to the development team. Finally the product is eventually released to pre-production where it undergoes configuration and networking review prior to the move to production. 8
9 Why implementing an SSDLC can be challenging There are many reasons why organizations struggle to implement an effective SSDLC. These include: Time Applications are at the heart of an enterprise s business. It is normal for there to be significant pressure on the app dev team from the business to release new applications and new features. Importantly, all of the results of the testing phase using software tools and security team don t actually fix anything all they do is deliver a list of possible vulnerabilities back to the developers who have to attempt to fix prior to release or remediate after release, again dragging them away from new development activities. Therefore, it s no surprise that adding more security can be seen as slowing down the release process and have a direct negative impact on business results. Expertise Implementing the basics in terms of input validation to avoid XSS is pretty much standard practice for enterprise application developers. However, the expertise to write code that can defend against more sophisticated attacks requires a deep knowledge of the arcane world of security and hackers and the vast, vast majority of developers were not hired with this expertise. Resources Building security into all phases of the SDLC requires resources both in terms of people and technology that many organizations struggle to afford. Even those organizations in the fortunate position to have large security budgets still tend to see a disproportionate amount of spending on network and perimeter based security based on the traditional (and now outdated) enterprise security model. 9
10 False Positives! One of the most painful aspects of a developer s life when dealing with a list of potential vulnerabilities is wasting time dealing with false positives parts of the application that match a pattern that may allow an exploit. but in fact is a necessary part of the code required to make the application function as required. Process On the positive side, having everybody think about security is always a good thing. Having more proactive security thinkers is great for a company. However, on the negative side, in the majority of organizations nobody really knows where to start or if they are doing enough or even too much. It s hard to find the delicate balance between application / feature development and doing things securely. If developers are under too much time pressure or don t have the expertise to build secure applications, then the value of threat modeling and risk assessment is nil. SSDLC is about embracing a methodology that drives the technology and ultimately the business. It s something that has to be practiced and tuned along the way. The goal is to reduce the friction and time for developers to build applications security. But in reality, most organizations don t practice vanilla SSDLC as they don t have the resources or don t have the methodology. They end up forking it into their own model for their own business, which is fine if there are controls to verify that it s working. 10
11 Introducing Prevoty At Prevoty we fundamentally believe that application security should be done from within the application and NOT at the perimeter. But we also know that having developers build security into applications is extremely hard, time-consuming and ultimately a huge resource drain. So we created a RASP (Runtime Application Self-Protection) technology that allows security to be built into applications automatically. Cloud, Web Services, Partner Apps, SAML Mobile & Multi-device External Data Services Users Firewall incl. WAFs VPN Database Dynamic User Generated Content External Employees Internal Employees Built in-house & externally Distributed Applications call the Prevoty security engine either from inside the application itself via an SDK or via the application s technology framework (e.g. Java,.NET). By being within the flow of application execution, the Prevoty engine not only understands syntax but also context. 11
12 High-level Architecture All real-time analysis and prevention is performed by the Prevoty Security Engine. Our approach is not predicated on past definitions and signatures, regular expressions, taint analysis or learning. Instead, we are focused on understanding and preventing malicious intent. The security engine understands syntax as well as context - e.g. cross-site scripting (XSS) executes in a browser, SQL injection happens in the database engine, etc. For effective security, a combination of language analysis and context is paramount. By strictly enforcing content and language we are not subject to zero-day attacks in the same way that either a traditional regex/signature based or a learning-based behavioral analysis are. When something malicious is identified, the security engine alerts via the Prevoty console and/or via a SIEM or logging tool. In protection mode, the Prevoty security engine always returns secured (cleaned, nonmalicious) payloads to the application, so the application will always run successfully -- even when under attack. 12
13 Implementation Applications call the Prevoty security engine via the Prevoty API. This function is instrumented inside the application itself in one of two ways: Prevoty Plug-ins Installed via a single command script, Prevoty Plug-ins provide a mechanism for existing applications to call the security engine without requiring any changes to the applications themselves. Prevoty SDKs Prevoty SDKs are available for all common languages, including Java, C#, PHP. Ruby, Python, and Node.js. The SDKs allow developers to quickly add Prevoty security to their applications, with a single API call made whenever analysis is required (e.g. GET and POST requests). High Performance The Prevoty security engine has been developed with performance in mind. It is not a proxy; it does not intercept every request or every GET or POST request parameter calls to the engine are only made when analysis is required. Requests process in less than one tenth of a millisecond. The only performance impact is the cost of an API call whenever a payload is being processed. With Prevoty s secure cloud-based service, roundtrips typically take around 50-60ms. When deployed on-premise, the engine can be positioned either at the app server tier or the web server tier whichever makes sense for the enterprise s topology. This configuration typically results in round-trips of only 2-3ms. 13
14 Application Security Monitoring The Prevoty security engine alerts security teams in real-time. Prevoty comes with its own Console but can also deliver real-time updates to SIEMs and log management tools such as IBM QRadar, HP ArcSight and Splunk. Additionally, Prevoty can integrate with syslog or other logging tools. The payloads contain all the relevant KPIs and analytics on a transactional level. In this way, Prevoty can also help companies that do root cause analysis (RCA). Runtime Protection Real-time protection capabilities include data exfiltration prevention, content sanitization, token & session id management, and Man-in-the-Middle (MitM) protection. Security policy management is centrally managed across all applications, regardless of application type. Developer Security Toolkit In addition to monitoring and protection functions, Prevoty SDK s include additional security services for developers, including: Cryptography Typed data validation Spam and profanity filters 14
15 How Prevoty helps an SSDLC The SSDLC with Prevoty is not slowed down by the endless recurring loop of finding and fixing vulnerabilities: Design Arch & Design Reviews Threat Modeling Coding Write application Include Prevoty API calls Testing SCA DAST Deployment Server Config Review Network Config Review Building Prevoty into the lifecycle helps alleviate all the main SSDLC implementation pain points: Time Including the Prevoty SDK in an application is simple and calling the engine is literally one line of code wherever analysis is required in the business logic. Using a Prevoty framework integration for.net or java is even quicker. And once this small effort has been done once, there is no need to come back and remediate the application again. Expertise Secure coding is tough. The vast majority of application developers are not security experts. Building in Prevoty means that they don t have to be. Prevoty has been designed to make the experience easier and more effective for developers to build applications securely. The SDKs are simple, intuitive and predictable wrappers around a REST API. Resources Developers can focus on new application and feature development. Security teams can focus on other the many other security challenges facing the enterprise. 15
16 False Positives! Administration of the Prevoty engine primarily constitutes setting up appropriate configurations to ensure that the appropriate analysis takes place based on the application context. When this matches the business logic, false positives are eliminated. Process Using Prevoty makes the process of releasing secure code much more lightweight and much less open to individual interpretations of security best practices by developers, increasing the efficacy of the SSDLC. How Prevoty solves the application security problem Using Prevoty technology solves the issues related to the top application security threats: Existing backlog of vulnerabilities Prevoty frameworks for Java and.net can be applied instantly and deliver an immediate dramatic reduction in vulnerabilities without the requirement of having to change or recompile any of the applications. For more granularity and for applications written in other languages, Prevoty SDKs allow existing applications to be quickly and easily instrumented without having to have deep knowledge of the business logic. Vulnerabilities introduced in new application development Including Prevoty as a standard part of the application development process means that developers will automatically release highly secure code without the risk of releasing applications with new vulnerabilities. 16
17 Dealing with zero-day attacks Because the Prevoty engine is based on contextual analysis and not past definitions or learning, it doesn t matter whether an attack has been seen before or not. Any applications using Prevoty are already protected against zero-day XSS, SQL injection and CSRF protection. Application developers are not security experts All a developer needs to know how to do is to call a REST API and the Prevoty engine will automatically deliver all the expertise required to protect the application. Summary Prevoty provides a radical new real-time application security capability, enabling applications to protect themselves. Prevoty works inside the application itself and the analysis engine is smart enough to actively prevent anything malicious from executing inside the application. In addition to providing active defense and real-time application threat intelligence, Prevoty s technology can dramatically reduce the time and costs associated with releasing secured code as part of a Secure SDLC (SSDLC): Rapid remediation of existing application vulnerability backlogs Quicker time to market for applications without the risk of introducing new vulnerabilities Protection from future XSS, SQL injection and CSRF zero-day attacks Prevoty. Application Security That Works. To request a live demo, start a free trial or simply get more information, please visit info.prevoty.com 17
THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY
THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY Why enterprises need runtime application self-protection 2 ABSTRACT Enterprise information security encompasses
The Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection
The Evolution of Enterprise Application Security Why enterprises need runtime application self-protection 2 Abstract Enterprise information security encompasses a broad set of disciplines and technologies,
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE How application threat intelligence can make existing enterprise security infrastructures smarter THE BLIND SPOT IN THREAT INTELLIGENCE
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing
Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing The cyber security landscape has become increasingly complex in recent years. Threats include
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
2015 Vulnerability Statistics Report
2015 Vulnerability Statistics Report Introduction or bugs in software may enable cyber criminals to exploit both Internet facing and internal systems. Fraud, theft (financial, identity or data) and denial-of-service
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Is your software secure?
Is your software secure? HP Fortify Application Security VII konferencja Secure 2013 Warsaw - October 9, 2013 Gunner Winkenwerder Sales Manager Fortify CEE, Russia & CIS HP Enterprise Security +49 (172)
Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva [email protected]
Production Security and the SDLC Mark Kraynak Sr. Dir. Strategic Marketing Imperva [email protected] Building Security Into the Development Process Production Test existing deployed apps Eliminate security
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
Work smarter, not harder, to secure your applications Featuring Analyst Research
1 Issue 2 1 2 3 9 Seismic shift needed toward application security Critical differentiator for RASP Access to the code From the Gartner Files: Maverick* Research: Stop Protecting Your Apps; It s Time for
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
How Web Application Security Can Prevent Malicious Attacks
Securing Enterprise Web Applications for Critical Data Protection and PCI-DSS Compliance Selecting the Right Technology is Essential in Guarding Against Malicious Attacks White_Paper As today s organizations
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
How to Instrument for Advanced Web Application Penetration Testing
How to Instrument for Advanced Web Application Penetration Testing Table of Contents 1 Foreword... 3 2 Problem... 4 3 Background... 4 3.1 Dynamic Application Security Testing (DAST)... 4 3.2 Static Application
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company
Product Roadmap Sushant Rao Principal Product Manager Fortify Software, a HP company Agenda Next Generation of Security Analysis Future Directions 2 Currently under investigation and not guaranteed to
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers
How to Protect Your from Hackers Web attacks are the greatest threat facing organizations today. In the last year, Web attacks have brought down businesses of all sizes and resulted in massive-scale data
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
End-to-End Application Security from the Cloud
Datasheet Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed
F5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
A Strategic Approach to Web Application Security
WhiteHat Security White Paper A Strategic Approach to Web Application Security Extending security across the entire software development lifecycle Jerry Hoff Vice President, Static Code Analysis Division
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Be Fast, but be Secure a New Approach to Application Security July 23, 2015
Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Brought to you by Copyright 2015 Vivit Worldwide Hosted by Paul
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper
Integrating Application Security into the Mobile Software Development Lifecycle WhiteHat Security Paper Keeping pace with the growth of mobile According to the November 2015 edition of the Ericsson Mobility
Penta Security 3rd Generation Web Application Firewall No Signature Required. www.gasystems.com.au
Penta Security 3rd Generation Web Application Firewall No Signature Required www.gasystems.com.au 1 1 The Web Presence Demand The Web Still Grows INTERNET USERS 2006 1.2B Internet Users - 18% of 6.5B people
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
From Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. [email protected] +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI
Information Security Threats and Strategies Ted Ericson Product Marketing - ASI Agenda Security breaches today Attack vector mitigation Secure web implementation Penetration testing ASI Corporate Security
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
How To Ensure That Your Computer System Is Safe
Establishing a Continuous Process for PCI DSS Compliance Visa, MasterCard, American Express, and other payment card companies currently require all U.S. merchants accepting credit card payments to comply
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
A white paper analysis from Orasi Software. Enterprise Security. Attacking the problems of application and mobile security
A white paper analysis from Orasi Software Enterprise Security Attacking the problems of application and mobile security Introduction: Securing the Mobile Enterprise The mobile enterprise has created vast
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Application Security Center overview
Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
