How to Build a Trusted Application. John Dickson, CISSP



Similar documents
Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

What is Web Security? Motivation

Learning objectives for today s session

Don t Get Burned! Are you Leaving your Critical Applications Defenseless?

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

The Top Web Application Attacks: Are you vulnerable?

WEB APPLICATION SECURITY

An Introduction to Application Security in J2EE Environments

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Web Engineering Web Application Security Issues

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Rational AppScan & Ounce Products

Strategic Information Security. Attacking and Defending Web Services

Passing PCI Compliance How to Address the Application Security Mandates

Web application security: automated scanning versus manual penetration testing.

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Secure Code Development

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Web Application Penetration Testing

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Integrating Security Testing into Quality Control

Adobe Systems Incorporated

Reducing Application Vulnerabilities by Security Engineering

Application Code Development Standards

New IBM Security Scanning Software Protects Businesses From Hackers

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Development Processes (Lecture outline)

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Magento Security and Vulnerabilities. Roman Stepanov

Web App Security Audit Services

Web Application Vulnerabilities and Avoiding Application Exposure

Software Security Touchpoint: Architectural Risk Analysis

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Testing the OWASP Top 10 Security Issues

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

External Supplier Control Requirements

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Security

90% of data breaches are caused by software vulnerabilities.

Last update: February 23, 2004

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Where every interaction matters.

SAST, DAST and Vulnerability Assessments, = 4

Enterprise Application Security Program

OWASP Top Ten Tools and Tactics

Chapter 1 Web Application (In)security 1

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Secure Web Applications. The front line defense

Using Free Tools To Test Web Application Security

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

The Security Organization p. 1 Anecdote p. 2. Introduction

Check list for web developers

elearning for Secure Application Development

Web Application Security

Columbia University Web Security Standards and Practices. Objective and Scope

Network Security Audit. Vulnerability Assessment (VA)

State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters rd@rd1.net

Web Application Report

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

(WAPT) Web Application Penetration Testing

Information Technology Policy

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

Penetration Testing Service. By Comsec Information Security Consulting

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Integrigy Corporate Overview

Application Security Best Practices. Wally LEE Principal Consultant

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Java Web Application Security

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

Application Security Testing. Generic Test Strategy

WebGoat for testing your Application Security tools

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

How To Protect A Web Application From Attack From A Trusted Environment

Transcription:

How to Build a Trusted Application John Dickson, CISSP

Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers

Denim Group, Ltd. Background Enterprise application development company with security expertise Large-scale web application development projects Application-level integration Application security assessments and secure application development

What is Application Security? Security associated with custom application code Focus is on web application security Versus non-internet facing applications Protection of online customer data given recent privacy lapses

Software Implementation Perfect World Actual Functionality Intended Functionality

Software Implementation Real World Actual Functionality Intended Functionality Built Features Bugs Unintended And Undocumented Functionality

Nature of HTTP and the Web Hyper-Text Transport Protocol (HTTP) is a light-weight application-level protocol with the speed that is necessary for distributed, collaborative information systems. HTTP is a state-less, connection-less transmission protocol Ports 80 & 443 (HTTP & HTTPS) Assumption: web servers expect request to come from browser - implicitly trust input

Why Application Security? More business-critical apps and customer data online Attacker community focusing on port 80/443 Complexities involved with interaction between server, 3 rd party code, and custom business logic 10% of FBI/CSI Study respondents reported misuse of public web applications Compliance pressures (SOX, GLB, HIPAA)

Why Application Security? Rapid dev cycle creates control weaknesses Much investment focused on infrastructure Well understood threats, mature products Firewalls, authentication, intrusion detection Security many times an overlooked facet of web development projects

Additional Challenges Most organizations do not have sufficiently skilled resources to cope with application security assessments Development teams typically under deadlines I love deadlines. I especially love the whooshing sound they make as they fly by. --Douglas Adams, Author, Hitchhiker's Guide to the Galaxy.

Examples of Potential Vulnerabilities

Parameter Tampering Price information is stored in hidden HTML field with assigned $ value Assumption: hidden field won t be edited Attacker edits $ value of product in HTML Attacker submits altered web page with new price Still widespread in many web stores

Price Changes via Hidden HTML tags

Price Changes via Hidden HTML tags

Cookie Poisoning Attacker impersonates another user Identifies cookie values that ID s the customer to the site Attacker notices patterns in cookie values Edits pattern to mimic another user

Cookie Poisoning

Cookie Poisoning

Cookie Poisoning

Cookie Poisoning

Unvalidated Input Attack Exploitation of implied trust relations Instead of: john@doe.com Attacker inputs: ////////////////////////////////////////////////// Exploits lack of boundary checkers on back-end application

Unvalidated Input Attack

Unvalidated Input Attack

Unvalidated Input Attack

Unvalidated Input Attack

Potential Strategies to Build Secure Apps

Potential Strategies to Build Secure Apps OWASP resources Attack modeling Bridge Cultural gap Assess SDLC Application Security Assessments

Open Web Application Security Project Top Ten List 1. Unvalidated Input 2. Broken Access Control 3. Broken Authentication and Session Management 4. Cross-Site Scripting Flaws 5. Buffer Overflows 6. Injection Flaws 7. Improper Error Handling 8. Insecure Storage 9. Denial of Service 10. Insecure Configuration Management *Source www.owasp.org

OWASP Testing Background of OWASP testing No existing standards prior to OWASP Threat groups not specific threats High level concepts Industry group designed to develop common app pen test language

Bridge Cultural Gap Between Security and Developers Key Challenge: Build vs. Measure Cultures Application Development groups are building technical capabilities based upon evolving business requirements Corporate IS Security dept. in charge of ongoing security operations

Include Security in SDLC Security must become a key aspect of the development process Security requirements reflected in design plan Ensure the security is part of the iterative development process Changes to web sites are ongoing and are not static QA Group should not be last line of defense

Attack Modeling Provides deeper understanding of risk areas Distributed software can be attacked at many points Helps developers think differently Want to create software that is secure enough

Attack Modeling ID assets Create an architecture overview Understand application w/ use cases and other modeling tools ID potential threats Enumerate each threat Rank order threats for trade-off analysis

Code Evaluation Paths Code review auditing source code Expensive, time consuming, and takes expertise Application assessments reviews functionality and interactions of compiled applications in real-life environments Potentially superficial and only capture a % of actual vulnerabilities in custom code

Application Security Reviews Internal or 3 rd party process to assess internally developed applications Assessment reviews major web app vulnerabilities Use best-of-breed tools and custom scripts Integrated with client development schedule Reviews designed to coincide with key development milestones of client project

Application Security Reviews Commercial security scanners are becoming more widespread Automated tools are great first-round way to assess potential vulnerabilities However, in-depth assessments use custom scripts and code reviews (sometimes) Analogy of network scanners Consider Augmenting security team with internal or external.net and Java security experts

Assessment Benefits 3 rd -party assessment of applications by noted experts; Increase confidence & reliability in application Compliance with government regulations Sarbanes Oxley, GLB, HIPAA Satisfies potential SEC audit objectives Knowledge transfer to clients on development techniques for secure applications

Wrap up Application Security is emerging as a critical aspect of enterprise security Emerging best practices include iterative assessments and defense in depth Cultural, organizational, and technical challenges all may hinder an effective strategy

Questions and Answers? John Dickson, CISSP john@denimgroup.com (210) 572-4400