Security within a development lifecycle. Enhancing product security through development process improvement



Similar documents
Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

COSC 472 Network Security

Juniper Networks Secure

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Application Security in the Software Development Lifecycle

Web Engineering Web Application Security Issues

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Security Testing. How security testing is different Types of security attacks Threat modelling

Mobile Application Threat Analysis

Passing PCI Compliance How to Address the Application Security Mandates

5.5. Penetration Tests. Report of the Auditor General of the Ville de Montréal to the City Council and to the Urban Agglomeration Council

Rational AppScan & Ounce Products

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

How To Secure Cloud Computing

UNCLASSIFIED Version 1.0 May 2012

Cloud Computing Governance & Security. Security Risks in the Cloud

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Columbia University Web Security Standards and Practices. Objective and Scope

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Information security controls. Briefing for clients on Experian information security controls

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Microsoft STRIDE (six) threat categories

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

How-To Guide: Cyber Security. Content Provided by

Data Protection: From PKI to Virtualization & Cloud

Introduction to Computer Security

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

DRUPAL WEBSITE PLATFORM BUYER S GUIDE

Introduction to Security

Evolution Of Cyber Threats & Defense Approaches

WEB APPLICATION SECURITY

External Penetration Assessment and Database Access Review

Application Intrusion Detection

Software that provides secure access to technology, everywhere.

Securing SharePoint 101. Rob Rachwald Imperva

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:

The Top Web Application Attacks: Are you vulnerable?

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

An Insight into Cookie Security

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Security Testing for Web Applications and Network Resources. (Banking).

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Management (CSM) Capability

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Critical Security Controls

PCI Compliance for Healthcare

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/

Overcoming PCI Compliance Challenges

Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.

Using Foundstone CookieDigger to Analyze Web Session Management

Network Security - ISA 656 Review

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Cryptography and Network Security

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

Security challenges for internet technologies on mobile devices

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT

Enterprise Cybersecurity: Building an Effective Defense

Risk Assessment Guide

Application Security: Threats and Architecture

ICOM 5018 Network Security and Cryptography

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

Agenda , Palo Alto Networks. Confidential and Proprietary.

Pass-the-Hash. Solution Brief

Functional vs. Load Testing

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report.

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

White paper. How to choose a Certificate Authority for safer web security

Information Security Services

Board Portal Security: How to keep one step ahead in an ever-evolving game

ICTN Enterprise Database Security Issues and Solutions

Weighted Total Mark. Weighted Exam Mark

Cybersecurity and internal audit. August 15, 2014

Enabling Security Operations with RSA envision. August, 2009

Cyber Security Management

Application Security Testing. Generic Test Strategy

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Cybersecurity: Protecting Your Business. March 11, 2015

Transcription:

Security within a development lifecycle Enhancing product security through development process improvement

Who I am Working within a QA environment, with a focus on security for 10 years Primarily web based and e-commerce based applications Worked for financial institutions, operating system manufacturers, security companies A hacker (what does this mean? Who should hire hackers?)

Who you are? How many people work within the development cycle in a corporation (internal or external applications) How many of you are customers for applications that store and/or serve sensitive data How many people work on projects or products that use databases to store potentially sensitive information?

To be covered Being a discerning customer, demanding quality software from vendors When to find security issues The Dev team and its roles How to find them Documenting/analysing them Policy questions Legal Issues Database Concerns

What I want you to get, what I want As a customer, a way of articulating your demands for secure software, feeling assured that your vendor is taking your security concerns seriously As a developer, a realization and help to incorporate security commitments and responsibilities into your development cycle, visibly increasing product security Personally, I want the world s software environment to be more secure, so I can live in a more secure world.

Why Security during development? Same reasons a company would care about security at all Reputation (worked for companies that lost sleep due to brand tarnishing nightmares) Loss of customers security issues cost more than traditional bugs Liability and other legal issues Not contributing to the problem

Buying secure software Are there outside audits? (are you willing to pay for them, or negotiate against product price?). When were the audits done? What are there internal security evaluations? Are they entirely positive and mention no potential vulnerabilities, or are they. Can you afford it? As a development house all your dependencies should go through a security evaluation phase

Politics, Money & Security Politics - Ownership of security responsibility should be outside of the development organization Money - If you can t make a business case for a security issue, then you can t make any case for it.

When/Where to find security issues? As early as possible! Business Model Requirements phase Architectural Documents Product Specifications Implementation bugs in product Other products

Understanding bug severity Level of knowledge needed (deep product knowledge, will the manual give needed knowledge, looking at config files?) Level of access needed (user level account on machine, any external web user, physical access to machine, physical access of network) What is compromised (DoS, financial data) Scenario of intruder

Development team and security Everyone has a role to play Doc doc best practices, known issues (see disclosure discussion), db access rights, OS access requirements PM security specification review (or assignment of such), security requirements, security release requirements Operations (if applicable) give input and feedback during dev, determine security concerns and/or develop workarounds. May assist in detecting known vulnerabilities as well (custom IDS signatures, for example) Dev write secure code, fix bad code, improve & follow best coding practices QA Develop & Execute sec test cases, work on generalizing bugs into best practices document Having security advocates and experts in any of these roles will be beneficial to the security of your product

Hiring hackers Conventional wisdom is that financial/security/military does not hire hackers Only a fool would hire someone because they call themselves a hacker What is the impact of NOT having some people that continually think of the system as something to break?

Database Security Issues Connection (what is auth type, how is auth info stored?) Documentation are database minimal permission levels documented cryptographic protection of records. Not simplistic, potentially very effective (go ahead, steal my database, little good will it do you). Potential limiter of liability and disclosure laws (CA, USA in particular) Database Auditing Think of the database as your heart of gold at the end of your security rainbow. Important part of your security onion (layered security model). Application level auditing (do you want it, do you want to implement tamper evident logging?) May be useful for threat modeling to scenario plan database attacks, poisonings, and malicious modifications

Security & User Interface Often overlooked Default values Understandability of settings

Typical Bugs and reactions Application authentication credentials sitting plaintext on machine but he can t get into the box, but if he owns the box, it s all over anyways! Authentication credentials cached plaintext on client machine, it s his responsibility to secure the machine Sensitive data plaintext in database, if they hack the machine, it s all over anyways

Internal exploit code Automated tools may end up exploit code Should be unnecessary to write

Internal data handling Until fixed, security bugs are very sensitive information If your bug tracking software is not secure it may be wise to track security issues outside of your normal communication channels Need to know good, too small need to know very bad

Legal Implications Failure to disclose Government disclosure regulations 3 rd party auditor deception issues False representation/false advertising issues Fitness of product laws

Policy questions Whose call is it to fix security issues What is the disclosure policy (to customers, to internal parties)

Who to tell: the disclosure question Vendor disclosure doesn t seem common today Either ship software without known security issues (possible, costly, harder to do this with a hard ship date ) or give your customer software with known issues If you decide to disclose to a customer, limit the internal distribution of that data. If you honestly/competently self-audit, there will be a disclosure question

Implement best coding practices Great developers are not automatically great security developers Many times security functionality is being implemented without thought or knowledge All issues found should be Do not implement homegrown crypto Do not trust user input Leave no plaintext confidential data anywhere Be careful when components interact transferred into this document, Disallow privilege escalation preventing future mistakes Audit appropriately, safely Educate your developers regarding security

References & Additional Reading Cost of software Bugs - NIST Study http://www.nist.gov/director/prog-ofc/report02-3.pdf. Cost of when bugs are found - http://www.cutter.com/research/2000/crb000111.html Usability in Privacy applications -http:// www.blackhat.com/presentations/bh-europe-03/bh-europe-03- sassaman.pdf Liability Issue: Search for Stephen Wu at http://cyberlaw.stanford.edu/blogs/ Web Application security best practices guidehttp://www.owasp.org/documentation/guide Database security - Honeytoken paper - http://www.securityfocus.com/infocus/1713