Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group



Similar documents
How to Build a Trusted Application. John Dickson, CISSP

Application Security and the SDLC. Dan Cornell Denim Group, Ltd.

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Application Security and the SDLC. Dan Cornell Denim Group, Ltd.

An Introduction to Application Security In ASP.NET Environments. Houston.NET User Group. February 23 rd, 2006

An Introduction to Application Security in J2EE Environments

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

What is Web Security? Motivation

Passing PCI Compliance How to Address the Application Security Mandates

THE HACKERS NEXT TARGET

Web Engineering Web Application Security Issues

The monsters under the bed are real World Tour

Web Application Report

The Top Web Application Attacks: Are you vulnerable?

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

WEB APPLICATION SECURITY

Don t Get Burned! Are you Leaving your Critical Applications Defenseless?

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Last update: February 23, 2004

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Web App Security Audit Services

Learning objectives for today s session

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Magento Security and Vulnerabilities. Roman Stepanov

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Rational AppScan & Ounce Products

Adobe Systems Incorporated

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

External Supplier Control Requirements

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Web Application Security

Strategic Information Security. Attacking and Defending Web Services

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Application Security Testing. Generic Test Strategy

Secure Web Applications. The front line defense

The New PCI Requirement: Application Firewall vs. Code Review

Web application security: automated scanning versus manual penetration testing.

Columbia University Web Security Standards and Practices. Objective and Scope

Your Web and Applications

Web Application Penetration Testing

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Testing the OWASP Top 10 Security Issues

Web Application Security

Where every interaction matters.

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia

MANAGED SECURITY TESTING

New IBM Security Scanning Software Protects Businesses From Hackers

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Secure Code Development

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

The security of Web applications

Application Security Best Practices. Wally LEE Principal Consultant

Java Web Application Security

(WAPT) Web Application Penetration Testing

DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, The OWASP Foundation

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Web Application Vulnerability Testing with Nessus

elearning for Secure Application Development

Chapter 1 Web Application (In)security 1

Web Applications The Hacker s New Target

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

05.0 Application Development

HP Application Security Center

Application Code Development Standards

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Enterprise Computing Solutions

SAST, DAST and Vulnerability Assessments, = 4

OWASP Top Ten Tools and Tactics

Top Ten Web Attacks. Saumil Shah Net-Square. BlackHat Asia 2002, Singapore

Web Application Security

Web Application Security

Payment Card Industry Data Security Standard PCI-DSS #SA7D, Platform Database, Tuning & Security

Attack Vector Detail Report Atlassian

Penetration Testing Service. By Comsec Information Security Consulting

Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Web Application Vulnerabilities and Avoiding Application Exposure

Check list for web developers

Thick Client Application Security

Integrating Web Application Security into the IT Curriculum

90% of data breaches are caused by software vulnerabilities.

Challenges of Automated Web Application Scanning

Cyber Exploits: Improving Defenses Against Penetration Attempts

Reducing Application Vulnerabilities by Security Engineering

More Than A Microsoft World. Marc Maiffret Co-Founder Chief Hacking Officer

Information Technology Policy

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Data Breaches and Web Servers: The Giant Sucking Sound

Columbia University Web Application Security Standards and Practices. Objective and Scope

Transcription:

Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group

Overview What is Application Security? Examples of Potential Vulnerabilities Potential Strategies to Build Secure Apps Questions and Answers

Denim Group Background Enterprise application development company with security expertise Custom software development Application-level integration Application security assessments and secure application development

What is Application Security Security associated with custom application code Focus is on web application security Versus non-internet facing applications Complements existing infrastructure security assets such as firewalls, IDS, and secured operating systems

Nature of HTTP and the Web Connectionless protocol no state Anonymity of attacks Assumption: web servers expect request to come from browser, therefore implicitly trust input

Why Application Security 70% of applications reviewed by security firm had significant security design flaws @Stake Security Briefing Interaction between server, 3 rd party code, and custom business logic creates vulnerabilities Patching or rebuilding app expensive Perception exists that locking down OS and web server = web security

Why Application Security Web-facing, business critical applications HTTP & SLL open to the world Much investment focused on infrastructure Well understood threats, mature products Firewalls, authentication, intrusion detection Security many times an overlooked facet of web development projects

Examples of Potential Vulnerabilities

Parameter Tampering Price information is stored in hidden HTML field with assigned $ value Assumption: hidden field won t be edited Attacker edits $ value of product in HTML Attacker submits altered web page with new price Still widespread in many web stores

Price Changes via Hidden HTML tags

Price Changes via Hidden HTML tags

Cookie Poisoning Attacker impersonates another user Identifies cookie values that ID s the customer to the site Attacker notices patterns in cookie values Edits pattern to mimic another user

Cookie Poisoning

Cookie Poisoning

Cookie Poisoning

Cookie Poisoning

Unvalidated Input Attack Exploitation of implied trust relations Instead of: john@doe.com Attacker inputs: ////////////////////////////////////////////////// Exploits lack of boundary checkers on back-end application

Unvalidated Input Attack

Unvalidated Input Attack

Unvalidated Input Attack

Unvalidated Input Attack

Open Web Application Security Project Top Ten Most Critical Web Application Security Vulnerabilities 1. Unvalidated Input 2. Broken Access Control 3. Broken Authentication and Access Control 4. Cross-Site Scripting Flaws 5. Buffer Overflows 6. Injection Flaws 7. Improper Error Handling 8. Insecure Storage 9. Denial of Service 10. Insecure Configuration Management Source: www.owasp.org

Client side authentication Web apps many times use client-side code to present and manage data Storage of usernames or ID numbers in cookie make them ripe for forgery Sites rely on cookie expiration to terminate sessions You can modify cookies to extend time Bottom line: Never trust anything from an http request

Potential Strategies to Build Secure Apps

Key Issue: Build vs. Measure Cultures Application Development groups are building technical capabilities based upon evolving business requirements Corporate IS Security dept. in charge of ongoing security operations

Additional Challenges Most organizations do not have sufficiently skilled resources to cope with application security assessments Development teams typically under deadlines I love deadlines. I especially love the whooshing sound they make as they fly by. --Douglas Adams, Author, Hitchhiker's Guide to the Galaxy.

Emerging Best Practices Security must become a key aspect of the development process Security requirements reflected in design plan Ensure the security is part of the iterative development process Changes to web sites are ongoing and are not static QA Group should not be last line of defense

Code Evaluation Paths Code review auditing source code Expensive, time consuming, and takes expertise Application assessments reviews functionality and interactions of compiled applications in real-life environments Potentially superficial and only capture a % of actual vulnerabilities in custom code

Application Security Reviews Internal or 3 rd party process to assess internally developed applications Assessment reviews major web app vulnerabilities Use best-of-breed tools and custom scripts Integrated with client development schedule Reviews designed to coincide with key development milestones of client project

Application Security Reviews Commercial security scanners are becoming more widespread Automated tools are great first-round way to assess potential vulnerabilities However, in-depth assessments use custom scripts and code reviews (sometimes) Analogy of network scanners Consider Augmenting security team with internal or external.net and Java security experts

Assessment Benefits 3 rd -party assessment of applications by noted experts; Increase confidence & reliability in application Compliance with government regulations Sarbanes Oxley, GLB, HIPAA Satisfies potential SEC audit objectives Knowledge transfer to clients on development techniques for secure applications

Wrap up Application Security is emerging as a critical aspect of enterprise security Emerging best practices include iterative assessments and defense in depth Cultural, organizational, and technical challenges all may hinder an effective strategy

Wrap Up Questions and Answers