BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES



Similar documents
Microsoft STRIDE (six) threat categories

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

Security Testing. How security testing is different Types of security attacks Threat modelling

Threat modeling. Tuomas Aura T Information security technology. Aalto University, autumn 2011

Seven Practical Steps to Delivering More Secure Software. January 2011

Understanding and evaluating risk to information assets in your software projects

Development Processes (Lecture outline)

ISSECO Syllabus Public Version v1.0

Threat Modeling. 1. Some Common Definition (RFC 2828)

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Vulnerability Management in an Application Security World. January 29 th, 2009

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

Secure Product Development

Introduction to Information Security

Secure Programming Lecture 9: Secure Development

In Building Security In, Gary McGraw proposes three pillars to use throughout the lifecycle: I: Applied Risk Management

Challenges of Software Security in Agile Software Development

Building Security into the Software Life Cycle

Rapid Threat Modeling Techniques

Security and Privacy in Cloud Computing

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

Vulnerability Management in an Application Security World. AppSec DC November 12 th, The OWASP Foundation

Secure By Design: Security in the Software Development Lifecycle

Web Application Remediation. OWASP San Antonio. March 28 th, 2007

Recall the Security Life Cycle

Developing Secure Software, assignment 1

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Software Development: The Next Security Frontier

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Agile and Secure: OWASP AppSec Seattle Oct The OWASP Foundation

Mobile Application Threat Analysis

Mobile application security How security and privacy issues can derail mobile applications. Whitepaper

Application Security in the Software Development Lifecycle

Web Application Security

Improving RoI by Using an SDL

GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Wireless Emergency Alerts (WEA) Cybersecurity Risk Management Strategy for Alert Originators

Vulnerability Management in an Application Security World. March 16 th, 2009

UEFI Firmware Security Best Practices

Integrating Security Testing into Quality Control

IT Compliance Volume II

Web Application Security Roadmap

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Software Security Touchpoint: Architectural Risk Analysis

FERPA: Data & Transport Security Best Practices

Effective Software Security Management

Threat Modelling (Web)Apps Myths and Best Practices OWASP The OWASP Foundation Matthias Rohr

Security within a development lifecycle. Enhancing product security through development process improvement

Software Application Control and SDLC

Assessing the Effectiveness of a Cybersecurity Program

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

The monsters under the bed are real World Tour

Application Intrusion Detection

CORE Security and GLBA

Introduction to Microsoft Security Development Lifecycle (SDL) Threat Modeling

PRIORITIZING CYBERSECURITY

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

Threat Modeling Using Fuzzy Logic Paradigm

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

3 rd Party Application Analysis: Best Practices and Lessons Learned. Chris Wysopal Founder and CTO Veracode

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Building a Corporate Application Security Assessment Program

FIVE PRACTICAL STEPS

Threat Modeling: Lessons from Star Wars. Adam

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

State of South Carolina Policy Guidance and Training

Protecting against cyber threats and security breaches

Information Systems Security

Cisco Advanced Services for Network Security

An Approach to Threat Modeling in Web Application Security Analysis

Cyber Security Metrics Dashboards & Analytics

Introduction to Security

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Vulnerability Management Nirvana: A Study in Predicting Exploitability

Cutting Edge Practices for Secure Software Engineering

A Methodology for Capturing Software Systems Security Requirements

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

How To Test For Security

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Secure Software Begins in the Development Process

tj.jmffliim.upij II, 14 1" H'H'.i.U.' Threat Modeling Designing for Security Adam Shostack WILEY

elearning for Secure Application Development

! Resident of Kauai, Hawaii

D. Best Practices D.1. Assurance The 5 th A

N Stage Authentication with Biometric Devices. Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute

Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

I D C A N A L Y S T C O N N E C T I O N

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

The Seven Deadly Myths of Software Security Busting the Myths

IT Security & Compliance. On Time. On Budget. On Demand.

ABB s approach concerning IS Security for Automation Systems

Security Threats in Demo Steinkjer

How To Test For Security On A Network Without Being Hacked

Application Software Assurance Center of Excellence Relies on Professionalized Teams to Train Air Force Programmers in Securing the SDLC

Practical Steps To Securing Process Control Networks

Transcription:

BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES

Disclaimer!! Best Practices are Not rules or rigid standards General solutions to common problems Guidelines and common reference that can be shared, further developed, and can give rise to new Best practices 2

Agenda Security Testing Myths Vs Realities The 10 Recommended Security Practices Summary 3

Security Testing Security Testing is the process to determine that an information system protects data and maintains functionality as intended. A few lines of code can wreak more havoc than a bomb - Tom Ridge (Former) Secretary of the U.S. Department of Homeland Security Need of Security Testing: Technical and Business Perspectives Validates system s conformance to security requirements Identify potential security vulnerabilities Improve project costs Reduce Litigation Conform to regulatory requirements Protect reputation or brand 4 Source: Avert Labs

Myths Vs Realities Some Myths of Software Security My applications do not have any security problem Network defense mechanism will protect an organization from any application based security breach Magic bullet theory Security implementation in an organization is costly Security testing is time consuming 5

Changing the Old Paradigm Creating a better, more secure application development process Software security testing is different from software functionality testing Integrate security best practices into the software development lifecycle (SDLC), instead of hastily adding it at the end. This increases efficiency, reduces overall costs and improves customer satisfaction 6

Integration of Security Testing throughout SDLC Maintain ( 500 X ) Test & Deploy ( 50 X 200 X) Implementation ( 20 X) Design ( 5 X ) Requirements Definition ( 3 X ) Project Initiation & Planning ( X ) 7 Parallel Security Activities

Information Gathering Software Components and Their Environment Collecting as much information as possible about the target application Understanding the software and it s environment is important to evaluate the attack surface 8

Information Gathering Evaluation of the Software Attack Surface 9

Threat Evaluation Data Flow Diagram (DFD) helps understand how the system works and the threats it faces A good way to get started in this space is the Microsoft s STRIDE model 10

STRIDE Spoofing Can an attacker gain access using a false identity? Tampering Can an attacker modify data as it flows through the application? Repudiation If an attacker denies doing something, can we prove he did it? Information disclosure Can an attacker gain access to private or potentially injurious data? Denial of service Can an attacker crash or reduce the availability of the system? Elevation of privilege Can an attacker assume the identity of a privileged user? 11

Every Asset is Subject to Attack Asset Request Data Files Requested File(s) External Entity User Response Service Process Data Store Dataflow 12 12 Authn Info Get Credentials Authn Engine Credentials Authn Request

Threat Types by Asset Type Asset S Spoofing T Tamperin g R Repudiation I Information Disclosure D Denial of Service E Elevation of Privilege External Entity Process Data Store Dataflow 13

Prioritizing Security Testing Focus testing on areas where difficulty of attack is least and the impact is highest - Chris Wysopal Why analyze and prioritize? What is Threat Modeling? 14

Why Analyze and Prioritize Security Testing? Put appropriate defenses in products Because attackers 15 Want to attack Your application

Threat Modeling and Its Benefits Threat modeling is.. A security-based analysis that helps understand where the product is most vulnerable Find assets, evaluates threats and uncovers vulnerabilities Helps reduce overall security risks Prioritizes security tests Forms the basis of security design specifications Determines the threat mitigation techniques to employ Benefits Helps understand an application better Helps find bugs and flaws in complex designs Drives well-designed security test plans 16

Threat Modeling Process Threat Modeling Process 1 2 Identify Assets Create an Architecture Overview 5 Document the Threats 17

Identifying Vulnerabilities In Source Code Well-tested code that includes security tests results in an end product that is more robust, easier to maintain and more secure Can be detected through Security code reviews Source code analysis Automating the code review process is a good approach 18

Testing with Known Intrusions No security testing regime is complete until the product is tested with known intrusions It verifies that the application cannot be breached by known means. If it can, then fix and verify before the application goes into production 19

Source: CERT 99% of network intrusions occurred based on known vulnerabilities that could have been prevented with proactive vulnerability management. Automate attack simulation whereby software pretends to attack the application with known paths of intrusion. Tools like Metasploit can help. 20

Creating a Security Test Plan The Security Test Plan should incorporate a highlevel outline of the artifacts to be tested and the methodologies to be used 21

Security Test Plan 22

Choosing the Right Tools for Security Testing Know your attacker and know yourself Test an application under the following conditions to determine the vulnerabilities a non-authenticated user an authenticated user an administrative user 23

Metrics & Reporting Both the quantity and quality of testing needs to be measured to assess the efficiency of the testing performed on the software Defect metrics are vital All time-oriented metrics should be measured regular Maintain a common problem database 24

25

Recap Security is a Process and not a Product Break the traditional approach. Integrate security testing throughout SDLC Evaluate the attack surface and threats Develop security testing strategy Analyze and prioritize test strategies Think Evil. Be Evil. Test Evil Perform code reviews Know your enemy and know yourself Attack!!! 26

References Risk-Based and Functional Security Testing: C. C. Michael and Will Radosevich Building Secure Web Applications: Peter Varhol, Technology Strategy Research, LLC Threat Modeling-Improving the Application Life cycle: Dan Sellers Myths of Software Security by People Security Secure Coding: Principles and Practices. Graff, Mark G. & Van Wyk, Kenneth R. Sebastopol, CA: O Reilly, 2003 (ISBN: 0596002424). Security Considerations in the Information System Development Life Cycle: Grance, T.; Myers, M.; & Stevens, M (NIST Special Publication 800-64), 2004 Risk Based Security Testing: TechRepublic Publication http://www.cert.org/stats/ http://web.nvd.nist.gov/view 27

THANK YOU!! Aarti_Agarwal@mcafee.com Aarti.Agarwal@gmail.com +91 9980851530 28