Managing Web & Application Security with OWASP bringing it all together. Tobias Gondrom (OWASP Project Leader)



Similar documents
Tobias Gondrom (OWASP Global Board Member)

OpenSAMM Software Assurance Maturity Model

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May Belfast

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

OWASP Top Ten Tools and Tactics

Adobe Systems Incorporated

Using Free Tools To Test Web Application Security

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright Security Compass. 1

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

(WAPT) Web Application Penetration Testing

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Magento Security and Vulnerabilities. Roman Stepanov

Sichere Software- Entwicklung für Java Entwickler

Web attacks and security: SQL injection and cross-site scripting (XSS)

Essential IT Security Testing

05.0 Application Development

From the Bottom to the Top: The Evolution of Application Monitoring

Leveraging OWASP to Reduce Web App Data Breach Risk

Secure Development LifeCycles (SDLC)

We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013

Implementation of Web Application Security Solution using Open Source Gaurav Gupta 1, B. K. Murthy 2, P. N. Barwal 3

Web Application Security

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

TEAM Academy Catalog. 187 Ballardvale Street, Wilmington, MA

Enterprise Application Security Workshop Series

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

How to complete the Secure Internet Site Declaration (SISD) form

Secure Web Development Teaching Modules 1. Threat Assessment

Enterprise Application Security Program

Pentests more than just using the proper tools

SQuAD: Application Security Testing

Where every interaction matters.

Testing the OWASP Top 10 Security Issues

elearning for Secure Application Development

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Attack and Penetration Testing 101

State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters rd@rd1.net

Intrusion detection for web applications

Attack Vector Detail Report Atlassian

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

SERENA SOFTWARE Serena Service Manager Security

Development Processes (Lecture outline)

The New OWASP Testing Guide v4

Software Security: Services and Products

Web Application Penetration Testing

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

ensuring security the way how we do it

Integrating Web Application Security into the IT Curriculum

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance

How to Build a Trusted Application. John Dickson, CISSP

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

How To Write A Web Application Vulnerability Scanner And Security Auditor

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Web application testing

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Application Security Guide For CISOs

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Latin ISRM EFFECTIVE APPLICATION SECURITY STRATEGY FOR MANAGING ONGOING PCI-DSS 2.0 COMPLIANCE

PCI Compliance Updates

The Top Web Application Attacks: Are you vulnerable?

OWASP WebScarab NG FOSDEM The OWASP Foundation

Security Testing for Developers using OWASP ZAP

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Software Development: The Next Security Frontier

Vulnerability Management in an Application Security World. AppSec DC November 12 th, The OWASP Foundation

Columbia University Web Security Standards and Practices. Objective and Scope

Pentests more than just using the proper tools

Web Application Security

white SECURITY TESTING WHITE PAPER

Report Book: Retina Network Security Scanner Unlimited

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Web Application Attacks And WAF Evasion

Strategic Information Security. Attacking and Defending Web Services

IBM Rational AppScan: Application security and risk management

How To Ensure That Your Computer System Is Safe

Application Security Testing How to find software vulnerabilities before you ship or procure code

Amadeus Shaping the future of travel

Learning objectives for today s session

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Transcription:

Managing Web & Application Security with OWASP bringing it all together Tobias Gondrom (OWASP Project Leader)

OWASP World OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security visible so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work.

Tobias Gondrom 15 years information security experience (Global Head of Security, CISO, CTO) CISSP, CSSLP, CCISO 12 years management of application development experience Sloan Fellow M.Sc. In Leadership and Strategy, London Business School Thames Stanley: Managing Director, CISO Advisory, Information Security & Risk Management, Research and Advisory Author of Internet Standards on Secure Archiving, CISO training and co-author of the OWASP CISO guide Chair of IETF Web Security Working Group http://datatracker.ietf.org/wg/websec/charter/ Member of the IETF Security Directorate Cloud Security Alliance, Hong Kong chapter board member OWASP Project Leader for the CISO Survey member of OWASP London, previous chapter lead of OWASP Germany, previous chair of the OWASP Global Industry Committee, www.owasp.org

What was in it for me. What s in it for you. How you can bring it all together.

How OWASP can help you Material & Tools People Ideas

OWASP World But which of the currently 148 active projects is good and can help me solve my problems?

OWASP Flagship Projects Code Review Guide AntiSamy Project ZAP - Zed Attack Proxy WebGoat Project ASVS - Application Security Verification Standard opensamm - Software Assurance Maturity Model Development Guide Project OWASP Top Ten ModSecurity Core Rule Set Project ESAPI - Enterprise Security API CSRFGuard Project Web Testing Environment Project Secure Coding Practices - Quick Reference Guide Testing Guide Codes of Conduct

OWASP Labs Projects and more Hatkit Broken Web Datafiddler Hackademic O2 Platform Applications opensamm - Challenges Scrubbr AntiSamy Fuzzing Project Software ModSecurity Web CSRFGuard Project Core Rule Mutillidae Set Java XML Code Assurance Project Maturity ModelHTTP POST Project Project Vicnum Browser Application Templates DatabasePodcast Project Testing Security WebGoat Project Tool Web Testing Code System Review Guide For CSRFTester Wapiti Project Environment Guide Project WebScarab CISOs OWASP Project Project Secure Coding JavaScript Top Ten LAPSE Practices Legal Project - AppSec Sandboxes ZAP - Zed Project Quick Fiddler Tutorial Attack Proxy Reference Cornucopia Cloud 10 Addons for Series Webslayer ASVS - Project Guide Joomla Mantra Security CTF Project Orizon Application Testing Guide Security Vulnerability Security Testing ESAPI - ProjectAssurance Security Scanner Framework Enterprise Codes of Testing of Broken Web Virtual Verification WSFuzzer Development Security API Yasca Project ConductVirtual Applications Standard AppSensor Patching EnDe Cheat Sheets Guide Project Forward Worlds Project Project Best Project Project Exploit Tool Practices Project

OWASP - Projects Project Status Stable Beta Tools Categories Documentation Alpha Inactive Protect Detect Life Cycle e.g. OWASP Top-10: Stable, Documentation, Protect 9

10 Multitude of Standards and Documents - OWASP - ISO 2700x, ISO 31000 - Cobit, Risk IT (ISACA) - ITIL, NIST, PCI-DSS, ISF Standard of Good Practice for Information Security - CSA (Cloud Security Alliance) -.

Web & Application Security People Training Organisation Process Risk Mgmt. SDLC Guidelines Verification Technology Tools Development Frameworks 11

OWASP Projects for an industry or development company OWASP Top Ten Code Review Guide ASVS - Application Security Verification Standard ESAPI - Enterprise Security API opensamm - Software Assurance Maturity Model Development Guide Project AntiSamy Project WebGoat Project Secure Coding Practices - Quick Reference Guide AppSensor Project Application Security Guide For CISOs Testing Guide Cheat Sheets Project O2 Platform

One Roadmap Example Basic Benchmarking / Maturity Model OWASP Top-10 - Awareness Intermediate Sophisticate Risk management Organisational Design SDLC Training Training: Development Guide Verification: ASVS Application Security Verification Standard Project, Code Review Guide, Testing Guide Development: ESAPI Operation: AppSensor 13

Maturity Models & Benchmarking Or: Where are we? And where are we going?

Maturity Models & Benchmarking Review of existing security efforts Benchmarking, Measuring Progress and Maturity Models - Software Assurance Maturity Model (SAMM, http://www.opensamm.org) - ISO 27000s - Capability Maturity Model (CMM) - 15

SAMM Security Practices From each of the Business Functions, 3 Security Practices are defined The Security Practices cover all areas relevant to software security assurance Each one can be targeted individually for improvement

OWASP Top 10 Awareness & Training

OWASP Top-10 Top 10 Most Critical Web Application Security Risks there exist more risks beyond top-10! Referenced by many external standards and best practices, e.g. PCI DSS etc. Great tool for awareness programs and training Available in many languages: e.g. Chinese, German, Currently in revision for new version in 2013 (review stage of RC1) 18

OWASP Top-10 - how Easy to use to start a first discussion and awareness Initial developer training (1.5 hours) Management awareness Available in many languages (Spanish, Chinese, Japanese, Korean, Vietnamese, Indonesian, ) Also other Top-10 for cloud, But: there exist more risks beyond top-10! Referenced by many external standards, regulation and best practices, e.g. PCI DSS etc. 19

3. Risk Management What & How much is enough? 20

Risk Management Risk: The probable frequency and probable magnitude of future loss Why or where do you put your resources? Methods: OWASP, ISO-27005, ITIL, NIST SP 800-30, OCTAVE Asset Classification, Threat Analysis & Vulnerability Assessment What do you do with Risks? Quality vs. quantity, Human behavior & risk 21

Risk management Why / Benefits: Allocation of resources Asset Classification and values? Threats Analysis & Scenarios? Establish ownership of assets, risk and controls Methods: OWASP FAIR (Factor Analysis of Information Risk) ISO 27005, ISO 31000 Risk IT (ISACA) 22

OWASP Top 10 Risk Rating Methodology Threat Agent? 1 2 3 Attack Vector Weakness Prevalence Weakness Detectability Technical Impact Easy Widespread Easy Severe Average Common Average Moderate Difficult Uncommon Difficult Minor 1 2 2 1 Business Impact? Injection Example 1.66 * 1 1.66 weighted risk rating

Other methods: e.g. ISO 27005, Risk Probability Loss Vulnerability Threat Frequency Business Impact Asset values Controls 24

Likelihood Risk Heat Map Threat Level Medium Medium High High High Medium Medium Medium High High Low Medium Medium Medium High Low Low Medium Medium Medium Low Low Low Medium Medium Impact 25

SDLC(s) Microsoft SDL Adobe Secure Product Lifecycle OWASP s CLASP 26

e.g. Microsoft SDL Secure Software Development Lifecycle - SDLC

Training OWASP Top-10 Secure Coding Practices Cheatsheets Webgoat 28

OWASP Top-10 Usually a good first awareness training for developers (~1-2 hours) Recommend to tailor it to your application landscape: make it meaningful for them as some of the security risks may not be as urgent in your organisation as others Enrich with examples / use cases from your applications 29

Secure Coding Practices Quick Reference Guide Good next step of To do after initial OWASP Top-10 Technology agnostic coding practices What to do, not how to do it Compact (17 pages), comprehensive checklist format Focuses on secure coding requirements, rather then on vulnerabilities and exploits Includes cross referenced glossary to get developers and security folks talking the same language Tailor to your application landscape (not all parts may be equally important for your organisation). Goal: Build a secure coding kick-start tool, to help development teams quickly understand secure coding Originally developed for use inside The Boeing Company, July 2010, Boeing assigned copyright to OWASP 30

Secure Coding Practices Quick Reference Guide Summary Help development teams to quickly understand secure coding practices Assist defining requirements and adding them to policies and contracts Context and vocabulary for interactions with security staff Easy desk reference 31

OWASP Cheat Sheet Series 32 Transport Layer Protection Cheat Sheet Authentic ation Cheat Sheet Cross-Site Request Forgery (CSRF) Preventio n Cheat Sheet DOM based XSS Preventio n Cheat Sheet Cryptogra phic Storage Cheat Sheet Session Managem ent Cheat Sheet Input Validation Cheat Sheet XSS (Cross Site Scripting) Preventio n Cheat Sheet HTML5 Security Cheat Sheet SQL Injection Preventio n Cheat Sheet Forgot Password Cheat Sheet Web Service Security Cheat Sheet

Webgoat Exercise with Example Web Application to illustrate typical Security Flaws within Web-Applications Practice Lessons for Common Vulnerabilities Teach a Structured Approach to Testing and Exploiting Give Practical Training and Examples 33

One Roadmap Example Basic Benchmarking / Maturity Model OWASP Top-10 - Awareness Intermediate Sophisticate Risk management Organisational Design SDLC Training Training: Development Guide Verification: ASVS Application Security Verification Standard Project, Code Review Guide, Testing Guide Development: ESAPI Operation: AppSensor 34

Further Resources: OWASP CISO Guide: https://www.owasp.org/index.php/appli cation_security_guide_for_cisos OWASP CISO Survey Email me: tobias.gondrom@owasp.org 35

Questions? What OWASP tools do you think will be useful for you right away? What would you like to have in the future? 36

Thank you CISO Survey https://www.surveymonkey.com /s/ciso2013survey