Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group



Similar documents
Rational AppScan & Ounce Products

The Top Web Application Attacks: Are you vulnerable?

New IBM Security Scanning Software Protects Businesses From Hackers

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

WEB APPLICATION SECURITY

Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.

Web Applications The Hacker s New Target

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Where every interaction matters.

Web Application Penetration Testing

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Learning objectives for today s session

Reducing Application Vulnerabilities by Security Engineering

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Passing PCI Compliance How to Address the Application Security Mandates

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Integrating Security Testing into Quality Control

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

05.0 Application Development

Overview of the Penetration Test Implementation and Service. Peter Kanters

What is Web Security? Motivation

Table of Contents. Page 2/13

elearning for Secure Application Development

Web Application Report

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Barracuda Web Site Firewall Ensures PCI DSS Compliance

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Using Free Tools To Test Web Application Security

SQuAD: Application Security Testing

Adobe Systems Incorporated

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Magento Security and Vulnerabilities. Roman Stepanov

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

OWASP Top Ten Tools and Tactics

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

OWASP AND APPLICATION SECURITY

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Testing the OWASP Top 10 Security Issues

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Web Engineering Web Application Security Issues

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

HP Application Security Center

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Web application security

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Port 80 (and 443!) Is Wide Open Scanning for Application-Level Vulnerabilities

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

Secure Web Applications. The front line defense

Five Steps to Achieve Risk-Based Application Security Management Make application security a strategically managed discipline

Hack Proof Your Webapps

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Web application security: automated scanning versus manual penetration testing.

Strategic Information Security. Attacking and Defending Web Services

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Functional vs. Load Testing

How to Build a Trusted Application. John Dickson, CISSP

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

WebGoat for testing your Application Security tools

Ethical Hacking as a Professional Penetration Testing Technique

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

Don t Get Burned! Are you Leaving your Critical Applications Defenseless?

Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Chapter 1 Web Application (In)security 1

The Key to Secure Online Financial Transactions

SecurityMetrics Vision whitepaper

Essential IT Security Testing

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

Application Security Testing

Intrusion detection for web applications

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Application Security Best Practices. Wally LEE Principal Consultant

How To Ensure That Your Computer System Is Safe

SERENA SOFTWARE Serena Service Manager Security

Thick Client Application Security

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Data Breaches and Web Servers: The Giant Sucking Sound

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

HackMiami Web Application Scanner 2013 PwnOff

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Web Application security testing: who tests the test?

White Paper Secure Reverse Proxy Server and Web Application Firewall

Transcription:

Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Agenda Security Landscape Vulnerability Analysis Automated Vulnerability Analysis IBM Rational AppScan Overview

The Myth: Our Site Is Safe We Have Firewalls and IPS in Place Port 80 & 443 are open for the right reasons We Audit It Once a Quarter with Pen Testers Applications are constantly changing We Use Network Vulnerability Scanners Neglect the security of the software on the network/web server We Use SSL Encryption Only protects data between site and user not the web application itself

Reality: Security and Spending Are Unbalanced of All Attacks on Information Security are 75% Directed to the Web Application Layer 2/3 of All Web Applications are Vulnerable **Gartner

The Alarming Reality Hacking Stage 6 Wikipedia, Feb 9 2007

Why Application Security is a High Priority Web applications are the #1 focus of hackers: 75% of attacks at Application layer (Gartner) XSS and SQL Injection are #1 and #2 reported vulnerabilities (Mitre) Most sites are vulnerable: 90% of sites are vulnerable to application attacks (Watchfire) 78% percent of easily exploitable vulnerabilities affected Web applications (Symantec) 80% of organizations will experience an application security incident by 2010 (Gartner) Web applications are high value targets for hackers: Customer data, credit cards, ID theft, fraud, site defacement, etc Compliance requirements: Payment Card Industry (PCI) Standards, GLBA, HIPPA, FISMA,

The Security Landscape of the past Traditional Infrastructure was easier to protect... Concrete entities that were easy to understand Attack surface and vectors were very well-defined Application footprint very static Perimeter defense was king

Changing Security Landscape of Today Webification has changed everything... Infrastructure is more abstract and less defined Everything needs a web interface Agents and heavy clients are no longer acceptable Traditional defenses no longer apply

High Level Web Application Architecture Review Customer App is deployed here Sensitive data is stored here Internet Firewall Client Tier (Browser) Protects Transport SSL Protects Network (Presentation) Middle Tier App Server (Business Logic) Database Data Tier

Security Network Defenses for Web Applications Perimeter IDS IPS App Firewall Firewall Intrusion Detection System Intrusion Prevention System Application Firewall System Incident Event Management (SIEM)

What Can Happen?

Why Do Hackers Today Target Applications? Because they know you have firewalls So its not very convenient to attack the network anymore But they still want to attack cos they still want to steal data Because firewalls do not protect against app attacks! So the hackers are having a field day! Very few people are actively aware of application security issues Because web sites have a large footprint No need to worry anymore about cumbersome IP addresses Because they can! It is difficult or impossible to write a comprehensively robust application Developers are yet to have secure coding as second nature Developers think differently from hackers Cheap, Fast, Good choose two, you can t have it all It is also a nightmare to manually QA the application White-box static code analyzers don t test for inter-app relationships Many companies today still do not have a software security QA policy or resource

Vulnerability Analysis

The OWASP Top 10 list Application Threat Negative Impact Example Impact Cross-Site scripting Injection Flaws Malicious File Execution Insecure Direct Object Reference Cross-Site Request Forgery Information Leakage and Improper Error Handling Broken Authentication & Session Management Insecure Cryptographic Storage Insecure Communications Failure to Restrict URL Access Identity Theft, Sensitive Information Leakage, Attacker can manipulate queries to the DB / LDAP / Other system Execute shell commands on server, up to full control Attacker can access sensitive files and resources Attacker can invoke blind actions on web applications, impersonating as a trusted user Attackers can gain detailed system information Session tokens not guarded or invalidated properly Weak encryption techniques may lead to broken encryption Sensitive info sent unencrypted over insecure channel Hacker can access unauthorized resources Hackers can impersonate legitimate users, and control their accounts. Hackers can access backend database information, alter it or steal it. Site modified to transfer all interactions to the hacker. Web application returns contents of sensitive file (instead of harmless one) Blind requests to bank account transfer money to hacker Malicious system reconnaissance may assist in developing further attacks Hacker can force session token on victim; session tokens can be stolen after logout Confidential information (SSN, Credit Cards) can be decrypted by malicious users Unencrypted credentials sniffed and used by hacker to impersonate user Hacker can forcefully browse and access a page past the login page

Automated Vulnerability Analysis IBM Rational AppScan

SECURITY TESTING IS PART OF SDLC QUALITY TESTING Collaborative Application Lifecycle Management SDLC Quality Assurance Quality Dashboard Requirements Management Test Management and Execution Defect Management Create Plan Build Tests Manage Test Lab Report Results Open Platform Best Practice Processes Functional Testing SAP Java Performance Testing TEAM SERVER Open Lifecycle Service Integrations Web Service Quality Code Quality System z, i.net Security and Compliance homegrown

DEVELOPMENT OPERATOINS AppScan in the Rational Portfolio BUSINESS SOFTWARE QUALITY SOLUTIONS Test and Change Management Requirements Test Change Rational RequisitePro Rational ClearQuest Rational ClearQuest Defects Rational ClearQuest Test Automation Developer Test Rational PurifyPlus Rational Test RealTime Functional Test Rational Functional Tester Plus Automated Manual Rational Rational Functional Tester Manual Tester Security and Compliance Test AppScan PolicyTester Performance Test Rational Performance Tester Rational Robot Quality Metrics Project Dashboards Detailed Test Results Quality Reports

Rational AppScan What is it? AppScan is an automated tool used to perform vulnerability assessments on Web Applications Why do I need it? To simplify finding and fixing web application security problems What does it do? Scans web applications, finds security issues and reports on them in an actionable fashion Who uses it? Security Auditors main users today QA engineers when the auditors become the bottle neck Developers to find issues as early as possible (most efficient)

How does AppScan work? Approaches an application as a black-box Traverses a web application and builds the site model Determines the attack vectors based on the selected Test policy Tests by sending modified HTTP requests to the application and examining the HTTP response according to validate rules HTTP Request Web Application Application HTTP Response Web Servers Databases

AppScan Goes Beyond Pointing out Problems

Scanning in Progress

Identify Vulnerabilities

Actionable Fix Recommendations

Reports