Reducing Application Vulnerabilities by Security Engineering



Similar documents
Rational AppScan & Ounce Products

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

The Top Web Application Attacks: Are you vulnerable?

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Table of Contents. Page 2/13

Adobe Systems Incorporated

THE HACKERS NEXT TARGET

WEB APPLICATION SECURITY

Passing PCI Compliance How to Address the Application Security Mandates

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

W16 INTEGRATING SECURITY INTO THE DEVELOPMENT LIFECYCLE. Ryan English SPI Dynamics Inc BIO PRESENTATION 6/28/2006 3:00 PM

Where every interaction matters.

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Learning objectives for today s session

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

PCI-DSS Penetration Testing

External Supplier Control Requirements

Making your web application. White paper - August secure

05.0 Application Development

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Your Web and Applications

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Society for Information Management

Application Security in the Software Development Lifecycle

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Strategic Information Security. Attacking and Defending Web Services

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Web App Security Audit Services

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

SQL Server Security "The Hackers Goldmine

Enterprise Computing Solutions

SOFTARE SECURTY OF WEB APPLICATION AND WEB ATTACKS

Overview of the Penetration Test Implementation and Service. Peter Kanters

Integrating Security Testing into Quality Control

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Pentests more than just using the proper tools

Information Security Services

ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

8070.S000 Application Security

How to complete the Secure Internet Site Declaration (SISD) form

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Web Application Security

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

Introduction: 1. Daily 360 Website Scanning for Malware

AN OVERVIEW OF VULNERABILITY SCANNERS

Chapter 4 Application, Data and Host Security

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Sitefinity Security and Best Practices

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Ethical Hacking as a Professional Penetration Testing Technique

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Magento Security and Vulnerabilities. Roman Stepanov

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Pentests more than just using the proper tools

Penta Security 3rd Generation Web Application Firewall No Signature Required.

Attack Vector Detail Report Atlassian

CRYPTUS DIPLOMA IN IT SECURITY

Security Testing and Vulnerability Management Process. e-governance

Enterprise Application Security Program

Web Application Report

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Cloud Security:Threats & Mitgations

Attacks from the Inside

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Secure Web Applications. The front line defense

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

How To Protect A Web Application From Attack From A Trusted Environment

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

OWASP Top Ten Tools and Tactics

Web Engineering Web Application Security Issues

Cyber Essentials. Test Specification

Network Security Audit. Vulnerability Assessment (VA)

How to Build a Trusted Application. John Dickson, CISSP

IBM. Vulnerability scanning and best practices

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

elearning for Secure Application Development

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Understanding Security Testing

Enterprise-Grade Security from the Cloud

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

PCI DSS 3.0 Compliance

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

How to Secure Your Environment

Transcription:

Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information contained herein is subject to change without notice. Testing Servic es

Agenda Background Application Security Myths and Reality Application Security Conventional Approach Vulnerabilities Security Engineering Trends Q & A 2

Background Hacking incidents» Greek Ministry website hit by Hackers intrusion Feb 2008» Indiatimes.com visitors risk high exposure to malware Feb 2008» Hacker steals Davidson Cos customer data Feb 2008 - Web Application Security Consortium Over 75% of internet attacks occur through ports 80 and 443 which must be left open to conduct business - Gartner Group Network Security Management is getting mature Web Applications are becoming #1 target for hackers 3

Background Reasons Very Less awareness in Application Security Testing Today Security Testing is being seen as optional Testing What is the Solution? Should we need to have dedicated Security Testing Team? Can Security Testing be outsourced? Can we incorporate Application Security in our development lifecycle? 4

Application Security Vulnerability A weakness in the application which can be a design flaw or an implementation bug, that allows hacker to cause harm to the stakeholders of an application What is Application Security? Use of software, hardware and procedural methods to protect applications, data and their control from external threats throughout its lifecycle Need for Application Security Patching or rebuilding application is expensive Interaction between 3 rd party code and custom business logic creates vulnerabilities More investments are focused on infrastructure 5

Common Myths Internet DMZ Trusted Inside Corporate Inside IIS Web Server Application Server Portal Server Email Server Admin Server DB HTTP(S) IMAP FTP SSH TELNET POP3 Firewall only allows PORT 80 (or 443 SSL) traffic from the Internet to the web server. Firewall only allows applications on the web server to talk to Firewall only allows application server to talk to database server. application server Firewall Protects the website Security Assessments are performed on the website every year Vulnerability Scanner reported no security issues Website uses SSL Web Application Security is a Developer problem There is no ROI in Security Testing 6

The Reality Security Spending % of Attacks % of Dollars Web Applications 10% 75% 90% 25% Network Server 75% 2/3 of All Attacks on Information Security Are Directed to the Web Application Layer of All Web Applications Are Vulnerable 7

Application Security Conventional Approach Untested Application Application Study Security Scanning Re-scan Analysis Remediation & Reporting 8

What it Leads to? Failure to capture vulnerabilities in all layer of the application High cost for Fixing issues identified at later stage Loss of Revenue Loss to Client 9

Vulnerabilities 2008, Cognizant Technology Solutions. All Rights Reserved. The information contained herein is subject to change without notice. Testing Servic es

Top 10 Vulnerabilities - 2007 Top 10 are key vulnerabilities that should be eliminated from any application as defined by OWASP (Open Web Application Security Project) Vulnerability Vulnerability Type Cross Site Scripting (XSS) Injection Flaws Malicious File Execution Insecure Direct Object Reference Cross Site Request Forgery (CSRF) Information Leakage and Improper Error Handling Broken Authentication and Session Management Insecure Cryptographic Storage Insecure Communications Failure to Restrict URL Access Application Application Application Application / Platform Application Application Application / Administrative Application Application / Administrative Application 11

Vulnerabilities Few Causes Less Server side validation Port 80, 443 are always open for e-business Improper User Authentication Assuming Guest level user might not have technical competencies to exploit applications Rely on https implementation Stores clear text DSN connection strings in the configuration files Assuming cross site scripting is not a big issue Development Team typically under deadlines Not following Secure coding guidelines Networks handling traffic on internet are programmed to trust each other for the best routes for data 12

Possible Attack Areas 13

Security Engineering 2008, Cognizant Technology Solutions. All Rights Reserved. The information contained herein is subject to change without notice. Testing Servic es

Overview Conventional View Software Engineering is about Ensuring that certain things happen whereas Security Engineering is about ensuring that they don t. Reality Security Systems differ greatly from one system to other. One typically needs some combination of user authentication, transaction integrity and accountability, fault tolerance and message secrecy. Many systems fails because their designers protect the wrong things or protect the right things in the wrong way 15

Process Security Testing Activities SDLC Phases Understand Client s security Posture/ Policy Security Requirement Gathering Requirement Identification Document Security Requirements Planning and Analysis List Security objectives Security Planning Analyze the Compliance specific requirements Design Threat Modeling Security Architecture & Design Review Develop & Design guidelines as per Policy Development Testing Deployment Security Code Reviews Use Manual and tool based Penetration Testing Security Administration Process Checklists and Design Guidelines Compliance Specific Testing Deployment Review Use Source Code Analysis Tools Analysis and Reporting Post Deployment Periodic Penetration Testing Fix issues discovered during maintenance 16

Patterns 17

Advantages Provides confidence in Project Teams that the project is On Track Earlier detection of Security related issues Faster resolution of identified issues Reduces cost associated in finding fixes in OAT Phase Iterative tests allows proper tuning of the application Development team gets more time for Security bug fixing related activities 18

Risks Major change in the application needs rework Non Availability of interfaces Non availability of Inter dependent modules Need to get Developers involved May require change in existing process 19

Tasks Manual Tools Security Design Review Source code Analysis Threat Modeling Secure coding Checklists Secure code Reviews Security Engineering Tasks Vulnerability Scanning Debugging Penetration Testing Security Assessments Compliance Testing 20

Tool Selection Criteria 21

Best Practices Engage Security Testing Team in early stages of Application Development Ensure Security is part of the iterative Development Process Follow the security coding principle Application Development Team should accept that application security is their responsibility Knowledge Transfer to clients on Development techniques for secure applications 22

Data Security Data Sanitization Process of disguising sensitive information in test and development databases by overwriting it with realistic looking but false data of a similar type Data Sanitization Techniques Encryption/Decryption Substitution Masking Data Shuffling records Number variance Null ing out 23

Future Security Trends Cell phone worms will infect more phones, jumping from phone to phone over wireless data network Voice over IP (VoIP) systems will be the target of cyber attacks Spyware will continue to be a huge and growing issue Security Testing will grow from conventional testing methodology to deeper analysis phase on identifying the traces of malicious code Laptop encryption will be made mandatory By 2009, 60 percent of IT organizations will make security vulnerability detection an integral part of their SDLC processes - Gartner 24

Questions? 25

Testing Servic es Thank you Subash Newton Subash.Newton@Cognizant.com 26