Skeletons in the Closet: Securing Inherited Applications



Similar documents
Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Do You Have a Scanner or a Scanning Program?

Your world runs on applications. Secure them with Veracode.

Vulnerability Management in an Application Security World. AppSec DC November 12 th, The OWASP Foundation

Learning objectives for today s session

Cenzic Product Guide. Cloud, Mobile and Web Application Security

The Next Generation of Security Leaders

Vulnerability Management in an Application Security World. March 16 th, 2009

Vulnerability Management in an Application Security World. January 29 th, 2009


Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Application Security Program Management with Vulnerability Manager

Third Party Security: Are your vendors compromising the security of your Agency?

CloudCheck Compliance Certification Program

State of Software Security Report

How to ensure control and security when moving to SaaS/cloud applications

Application Security 101. A primer on Application Security best practices

Domain 1 The Process of Auditing Information Systems

IBM Rational AppScan: Application security and risk management

Achieving SOX Compliance with Masergy Security Professional Services

Is your business prepared for Cyber Risks in 2016

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

John B. Dickson, CISSP October 11, 2007

IoT & SCADA Cyber Security Services

Rolling out an Effective Application Security Assessment Program. Jason Taylor, CTO

KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT

UIIPA - Security Risk Management. June 2015

SecureGRC TM - Cloud based SaaS

Enterprise Technology Vendor Service

Vulnerability Management

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

5 Partner Benefits and Requirements Benefits Requirements... 8

How to Develop Cloud Applications Based on Web App Security Lessons

Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May Belfast

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

Security Threat Risk Assessment: the final key piece of the PIA puzzle

THE BLUENOSE SECURITY FRAMEWORK

PCI Solution for Retail: Addressing Compliance and Security Best Practices

OIG Security Audit: What You Need To Know

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

Information Security & Privacy

State of Oregon. State of Oregon 1

Five Tactics to Hybrid Cloud Success

Vulnerability management lifecycle: defining vulnerability management

Information security controls. Briefing for clients on Experian information security controls

Securely Outsourcing to the Cloud: Five Key Questions to Ask

Columbia University Web Security Standards and Practices. Objective and Scope

Information Security, Privacy and Compliance Convergence

Software Supply Chains: Another Bug Bites the Dust.

Review: McAfee Vulnerability Manager

5 Things to Look for in a Cloud Provider When it Comes to Security

Professional Services Overview

How to Build a Trusted Application. John Dickson, CISSP

CORL Dodging Breaches from Dodgy Vendors

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

rating of 5 out 5 stars

Best Practices - Remediation of Application Vulnerabilities

Above the Clouds: A Berkeley View of Cloud Computing & Outlook: Cloudy with a Chance of Security Challenges and. Presented by Nikhil Tripathi

Metrics that Matter Security Risk Analytics

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

Application Backdoor Assessment. Complete securing of your applications

Cisco Cloud Assessments. Justin Tang

Cyber Security for Competitve Advantage: How SaaS Providers are Transforming their Business

IT Insights. Managing Third Party Technology Risk

Cloud Security Fails & How the SDLC could (not?) have prevented them

MIS Systems & Infrastructure Lifecycle Management 1. Week 13 April 14, 2016

Top Web Application Security Issues. Daniel Ramsbrock, CISSP, GSSP

Integrated Threat & Security Management.

Making Leaders Successful Every Day

Cyber Security. John Leek Chief Strategist

Hardware and Asset Management Program

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

October 10, Report on Web Applications #13-205

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright Security Compass. 1

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

Cloud Computing - Benefits and Barriers for Retail Adoption

Digi Device Cloud: Security You Can Trust

Top 10 PCI Concerns. Jeff Tucker Sr. Security Consultant, Foundstone Professional Services

Cloud Infrastructure Security

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Information Security Program

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Italy. EY s Global Information Security Survey 2013

HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015

APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Adobe Systems Incorporated

Transcription:

Skeletons in the Closet: Securing Inherited Applications Baltimore ISSA April 27, 2011 John B. Dickson, CISSP #4649

Overview for Today s Session The Problem Information Gathering Application Scoring Risk Rank & Tradeoff Analysis Discussion Conclusion, Next Steps, and Q&A 1

Some Key Questions for Today s Session Where do you start? What applications represent the biggest risk? What attributes make applications more or less risky? What are the most cost-effective way to manage the risk of inherited applications? What approaches might work for your organization? 2

Key Goals for Today s Session Understand risk-based options for managing the security of inherited applications Develop a framework for ranking risks with specific applications Understand some of the decision-making factors that come into play when risk-ranking applications Apply one tactic from what you learn today next week at your organization 3

Personal Background 15-year information security consultant background Ex-Air Force SIGINT officer & security analyst at AFCERT Trident Data Systems, KPMG, SecureLogix, and Denim Group information security consultant Works with CIOs and CSOs to build successful software security initiatives Educates non-developer security professionals how to manage application risk 4

What you Don t know CAN Hurt You Passion: Get security professionals to ask a better set of questions Today s presentation focuses on helping you increase your IQ in the arena of software portfolio risk 5

Denim Group Background Professional services firm that builds & secures enterprise applications Secure development services: Secure.NET and Java application development Post-assessment remediation Application security services include: External application assessments Web, mobile, and cloud Software development lifecycle development (SDLC) consulting Classroom and e-learning instruction for developers CRADA with the 688 th Network Warfare Wing 6

Denim Group Background CSRF Explained http://threadstrong.com/courses-csrf-explained.html 7

Background the Current State of Affairs Creating meaningful enterprise-wide software security initiatives is hard The vast majority of info regarding software security focuses on writing more secure code or SDLC process improvement Most organizations have hundreds or thousands of legacy applications that work! They represent money already spent ROI? They are viewed part of the plumbing by management The code base can be millions of lines of code Focus on web applications Other software risks must be taken into consideration Web services, Saas, certain desktop applications 8

Key Facts 66% have adopted a risk-based approach to remediation of application vulnerabilities 71% have an executive or team with primary ownership and accountability for application security 66% have defined communications channels between security, operations, and development teams Source: Securing Your Applications: Three Ways to Play, Aberdeen Group, August 2010 9

Step 1 Information Gathering Build a Portfolio of Applications Collect Background Information Development Details Vendor (if any) Audience Hosting Details Assess the Data Type (CCs, PII, ephi, etc) Compliance Requirements 10

Step 1 Information Gathering Build a Portfolio of Applications Collect Background Information Development Details Vendor (if any) Audience Hosting Details Assess the Data Type (CCs, PII, ephi, etc) Compliance Requirements 11

Step 1 Information Gathering (Continued) Determine the Scale Lines of Code Dynamic Pages Concurrent Users User Roles Assess the Underlying Technology Infrastructure (OS, hardware, etc) Platform (.NET, Java, PHP, etc) Versions Assess the Security State Assessment Activity (type, date, etc) Vulnerabilities (high, medium, low) Protection (IDS/IPS, WAF) 12

Step 2 Application Scoring Business Importance Risk Business Function (customer interface, internal but public-facing, departmental use only) Access Scope (external, internal) Data Sensitivity (customer data, company confidential, public) Availability Impact (serious, minor, minimal, or no reputation damage) 13

Step 2 Application Scoring (Continued) Technology Risk Authentication (methods, enforcement) Data Classification (formal approach or not) Input / Output Validation (structured or not) Authorization Controls (resource checks in place or not) Security Requirements (explicitly documented or not) Sensitive Data Handling (controls in place like encryption or not) User Identity Management (procedures in place for account creation, access provisioning, and change control or not) Infrastructure Architecture (network segmentation, patching) 14

Step 2 Application Scoring (Continued) Assessment Risk Technical Assessment (assessment activity, vulnerabilities still present) Regulatory Exposure (unknown, subject to regulation) Third-Party Risks (outsourced development, SaaS hosting, etc) 15

Example Application Analysis Patient portal for hospital system Connects to back-end Electronic Medical Record system Microsoft.NET 3.5 framework Currently functionality being enhanced by internal development team Contains Electronic Patient (EPI) Data Audited once for PCI compliance in 2007 Scanned by outside 3 rd party for application security vulnerabilities in 2009 16

Application Comparisons Application #1 Publicly accessible staff scheduling application 1 million lines of code Written in classic ASP by an outsourced company this is no longer under contract <$1m year sales goes through the application in a $5b company No mitigating security technologies in place Still processes orders efficiently; supported by application maintenance group 17

Application Comparisons Application #2 External company website with limited functionality Site build it in Microsoft SharePoint 2007 technologies Custom web parts provide some interactive Site actively managed by corporate marketing team Not in scope for past outside security audit given marketing responsibility 18

Application Comparisons Application #3 J2EE-based corporate E-commerce site 500K lines of code Lots of revenue ($$$) for the company Regular security audits and scans by 3 rd parties Web services to various internal applications 19

Application Comparisons Application #4 3 rd -party software-as-a-service (SaaS) CRM platform Sensitive client data included in database Functionality allows sales people to export data Managed by VP of Sales Software application in the cloud 20

Results Comparison Let s analyze our results Apply quantitative decision-making analysis concepts Want to understand what level of effort addresses the highest amount of risk Tradeoff analysis 21

So where do you go from here? 22

Potential Follow-up Options End of Life Remediate Potential Testing Approaches Tailoring to Documented Risk Work identified list from top to bottom Application Security Verification Standard Levels of application-level security verification that increase in breadth and depth as one moves up the levels Verification requirements that prescribe a unique white-list approach for security controls Reporting requirements that ensure reports are sufficiently detailed to make verification repeatable, and to determine if the verification was accurate and complete. 23

What you can do now! Collect or scrub your initial application inventory Develop relationships w/ 3 rd parties who can help you through the identification process Find a peer that is conducting the same risk ranking Exhaust Open Web Application Security Project (OWASP) resources! Familiarize yourself with OWASP OpenSAMM 24

Conclusion Managing the security of inherited applications can present the most severe headaches for someone building a software security program A risk-based approach is really the only economically feasible approach given the size/complexity of the problem Understanding certain attributes of inherited applications is critical to applying a risk-based management approach 25

Resources Web Application Security Portfolios, ISSA Journal, May 2009, Coblentz, Nick. Open Web Application Security Project Open Software Assurance Maturity Model, www.owasp.org Open Web Application Security Project Application Security Verification Standard, www.owasp.org How-to-Guide for Software Security Vulnerability Remediation, Dan Cornell, Denim Group, October 2010 Cloud Security Alliance Securing your Applications, Aberdeen Group, Brink, Derek, August 2010 26

Contact John B. Dickson, CISSP john@denimgroup.com (210) 572-4400 www.denimgroup.com blog.denimgroup.com Twitter: @johnbdickson 27