Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org



Similar documents
Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Looking at the SANS 20 Critical Security Controls

DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, The OWASP Foundation

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

CTR System Report FISMA

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Get Confidence in Mission Security with IV&V Information Assurance

Security Controls Assessment for Federal Information Systems

Requirements For Computer Security

Security Compliance In a Post-ACA World

Security and Privacy Controls for Federal Information Systems and Organizations

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

IT Security Management Risk Analysis and Controls

COORDINATION DRAFT. FISCAM to NIST Special Publication Revision 4. Title / Description (Critical Element)

elearning for Secure Application Development

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Altius IT Policy Collection Compliance and Standards Matrix

System Security Certification and Accreditation (C&A) Framework

Adobe Systems Incorporated

Where every interaction matters.

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

05.0 Application Development

DIVISION OF INFORMATION SECURITY (DIS)

Security Self-Assessment Tool

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

Magento Security and Vulnerabilities. Roman Stepanov

Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Cloud Security for Federal Agencies

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

CONTINUOUS MONITORING

What is Web Security? Motivation

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

FISMA: Securing National Infrastructure

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

(WAPT) Web Application Penetration Testing

Compliance Overview: FISMA / NIST SP800 53

Passing PCI Compliance How to Address the Application Security Mandates

Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Columbia University Web Security Standards and Practices. Objective and Scope

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Secure Code Development

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) An Assessment of Cyber-Ark's Solutions

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Security Control Standard

VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2.

Web application security

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Enterprise Application Security Program

Preventive Approach for Web Applications Security Testing OWASP 10/30/2009. The OWASP Foundation

Sitefinity Security and Best Practices

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Points of View. CxO s point of view. Developer s point of view. Attacker s point of view

How To Ensure That Your Computer System Is Safe

HHS Information System Security Controls Catalog V 1.0

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

Spigit, Inc. Web Application Vulnerability Assessment/Penetration Test. Prepared By: Accuvant LABS

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE

FISMA / NIST REVISION 3 COMPLIANCE

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Strategic Information Security. Attacking and Defending Web Services

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Attack Vector Detail Report Atlassian

Lost in Translation: Understanding the Hacker Mindset

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

WHITEPAPER. Nessus Exploit Integration

INFORMATION TECHNOLOGY SECURITY POLICY Table of Contents

Security Guide for ActiveRoles Server 6.1

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

The Top Web Application Attacks: Are you vulnerable?

Reducing Application Vulnerabilities by Security Engineering

Oracle Database Security Myths

Thick Client Application Security

Security Control Standard

Security Control Standard

2012 FISMA Executive Summary Report

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Spillage and Cloud Computing

Transcription:

Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft sarbari@electrosoft-inc.com 703-437-9451 ext 12 The Foundation http://www.owasp.org

Agenda Federal IT Security Landscape FISMA and NIST Security Controls Mapping of AppSec Best Practices to Federal Specs Observations Wrap-Up 2

Are Federal Government Web Apps Secure? Well.. Not really! Why? Weaknesses in one/more of the following: Training Developers/Managers on secure development Documented secure coding standards Formalized SDLC processes that are actually followed Effective application threat modeling Security review of design/architecture Security focus during code review Comprehensive security testing Vulnerability and Penetration Analyses Active security monitoring

Information Security Federal Compliance Landscape Title III of E-Government Act of 2002 Federal Information Security Management Act (FISMA) Homeland Security Presidential Directives HSPD-7, HSPD-12, etc. OMB Memos FISMA Reporting Privacy Data Encryption FDCC, etc.)

FISMA - Security Assessment and Authorization NIST Standards and Guidelines FIPS 199 Security Categorization of Information Systems SP 800-37 Guidelines for Security Authorization of Information Systems SP 800-53 Rev 3 Recommended Security Controls for Federal Information Systems and Organizations

NIST Special Pub 800-53 Revision 3 (Aug 09) Title: Recommended Security Controls for Federal Information Systems and Organizations Approach: Risk Management Framework Categorize Information System Select Security Controls Implement Security Controls Assess Security Controls Authorize Information System Monitor Security Controls 18 families of Security Controls Families that impact Application Security: AC, AU, IA, SA, SC and SI CA, PL, RA ID FAMILY CLASS AC Access Control Technical AT Awareness and Training Operational AU Audit and Accountability Technical CA Security Assessment and Authorization Management CM Configuration Management Operational CP Contingency Planning Operational IA Identification and Authentication Technical IR Incident Response Operational MA Maintenance Operational MP Media Protection Operational PE Physical and Environmental Protection Operational PL Planning Management PS Personnel Security Operational RA Risk Assessment Management SA System and Services Acquisition Management SC System and Communications Protection Technical SI System and Information Integrity Operational PM Program Management Management

Application Security - Related Federal Efforts DISA Application Security and Development STIG July 2008 Application Security and Development Checklist Version 2 Release 1.5 - June 2009 NIST SP 800-64 Rev 2 Security Considerations in the System Development Life Cycle Oct 2008 SP 800-115 (draft) - Technical Guide to Information Security Testing Nov 2007 Security Content Automation Protocol (SCAP)

Top Ten Vulnerabilities (2007) Top Ten Vulnerabilities A1 - Cross Site Scripting (XSS) A2 - Injection Flaws A3 - Malicious File Execution A4 - Insecure Direct Object Reference A5 - Cross Site Request Forgery (CSRF) A6 - Information Leakage & Improper Error Handling A7 - Broken Authentication and Session Mgmt A8 - Insecure Cryptographic Storage A9 - Insecure Communications A10 - Failure to Restrict URL Access NIST 800-53 Rev3 Controls SI-10: Information Input Validation SI-10: Information Input Validation Not specified AC-3: Access Enforcement Not specified SI-11: Error Handling SC-23: Session Authenticity SC-13: Use of Cryptography SC-9: Transmission Confidentiality AC-3: Access Enforcement

SANS Top 25 (1 of 3) - Insecure Interaction Between Components Top 25 Coding Vulnerabilities CWE-20: Improper Input Validation CWE-116: Improper Encoding or Escaping of Output CWE-89: SQL Injection CWE-79: Cross-site Scripting CWE-78: OS Command Injection CWE-319: Clear-text Transmission of Sensitive Information CWE-352: Cross-Site Request Forgery (CSRF) CWE-362: Race Condition CWE-209: Error Message Information Leak NIST 800-53 Rev3 Controls SI-10: Information Input Validation Not specified SI-10: Information Input Validation SI-10: Information Input Validation SI-10: Information Input Validation SC-9: Transmission Confidentiality Not specified Not specified SI-11: Error Handling

SANS Top 25 (2 of 3) Porous Defenses Top 25 Coding Vulnerabilities CWE-285: Improper Access Control (Authorization) CWE-327: Use of a Broken or Risky Cryptographic Algorithm CWE-259: Hard-Coded Password CWE-732: Insecure Permission Assignment for Critical Resource CWE-330: Use of Insufficiently Random Values Not specified CWE-250: Execution with Unnecessary Privileges CWE-602: Client-Side Enforcement of Server- Side Security NIST 800-53 Rev3 Controls AC-3: Access Enforcement SC-13: Use of Cryptography IA-5: Authenticator Management AC-3: Access Enforcement AC-6: Least Privilege Not specified

SANS Top 25 (3 of 3) - Risky Resource Management Top 25 Coding Vulnerabilities NIST 800-53 Rev3 Controls CWE-119: Memory Buffer Overrun SA-8: Security Engineering Principles 1 CWE-642: External Control of Critical State Data SA-8: Security Engineering Principles 1 CWE-73: External Control of File Name or Path SA-8: Security Engineering Principles 1 CWE-426: Un-trusted Search Path SA-8: Security Engineering Principles 1 CWE-94: Code Injection SA-8: Security Engineering Principles 1 CWE-494: Download of Code Without Integrity Check SI-7: Software and Information Integrity CWE-404: Improper Resource Shutdown or Release SA-8: Security Engineering Principles 1 CWE-665: Improper Initialization SA-8: Security Engineering Principles 1 CWE-682: Incorrect Calculation SA-8: Security Engineering Principles 1 1 Weak Mapping

Application Security Verification Std 2009 ASVS Security Requirement Areas NIST 800-53 Rev 3 Controls Cover age V1 - Security Architecture Documentation RA-3 1 of 6 V2 - Authentication Verification AC-2, AC-3, AC-5, AC-7, AC-11, AC-14, AU-2, IA-5, IA-6, IA-8, SC-24, SI-3 12 of 15 V3 - Session Management Verification AC-11, SC-10, SC-23, SI-3 9 of 13 V4 - Access Control Verification AC-2, AC-3, AC-6, SI-3, AU-2 10 of 15 V5 - Input Validation Verification SA-8, SI-3, SI-10, AU-2 7 of 9 V6 - Output Encoding/Escaping Verification SI-3, SI-10 5 of 10 V7 - Cryptography Verification IA-5, SC-12, SC-13, SI-3, AU-2 6 of 10 V8 - Error Handling and Logging Verification SI-3, SI-11, AU-3, AU-9 7 of 12 V9 - Data Protection Verification 0 of 6 V10 - Communication Security Verification AC-4, AC-6, IA-3, IA-5, SC-8, SC-9, SC-24, AU-2 7 of 9 V11 - HTTP Security Verification SC-23 1 of 7 V12 - Security Configuration Verification CM-5, SI-6, SI-7, AU-2 3 of 4 V13 - Malicious Code Search Verification SI-3, SI-7 2 of 2 V14 - Internal Security Verification SC-4, SC-28 2 of 3

Fed AppSec - Weaknesses in SDLC Phases (SP 800-64) Phase: Initiation Planning System Categorization/Privacy Impact Assessment Establish Secure Development Processes (Coding Stds/Config Mgmt) WEAK! Security Training of Developer/Managers WEAK! Phase: Development Risk Assessment/Threat Modeling WEAK! Security Architecture and Documentation WEAK! Security Testing (Design Review/Code Review/Functional & Security Testing) WEAK! Phase: Implementation/Assessment Establish Secure Configuration/Environment Assess System Security Posture WEAK! Authorize System for Operation Phase: Operations and Maintenance Perform Configuration Management of System Continuous Monitoring Phase: Disposal Planning Sanitize Media/Dispose of HW & SW/Preserve Information Close System

Fed AppSec Areas to be Strengthened Security Training of Application Developers and Managers Development of Secure Coding Practices Threat Modeling based on Application Vulnerabilities and Threats Security Architecture Documentation Roles/Resources/Functions/Security Controls/Components/Interactions Sensitive Resource Identification and Protection Data, URLs, Configuration Files, etc. Conditioning of Output Content/Data Server-Side Implementation of Security Services Common Implementation Non-circumventable Secure Degradation/Failure of Functions Security Testing of Software Applications Static and Dynamic Testing of code Penetration Testing of Deployed Application

Final Thoughts Compliance drives federal government security Current FISMA security controls and practices have greatly strengthened platform and network security It s time to focus on Application/Software Security Recommendations to promote AppSec in Federal Space: Set of Security Controls for AppSec Guidelines for Secure Coding Practices Guidelines for Software Security Testing OMB mandate to focus on AppSec