Web Application Security Roadmap



Similar documents
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution

Learning objectives for today s session

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Realize That Big Security Data Is Not Big Security Nor Big Intelligence

OpenSAMM Software Assurance Maturity Model

Rational AppScan & Ounce Products

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

IBM Rational AppScan: Application security and risk management

F5 Silverline Web Application Firewall Onboarding: Technical Note

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Web Application Security

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Vulnerability Management

Application Security Testing as a Foundation for Secure DevOps

Reference Architecture: Enterprise Security For The Cloud

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva

Passing PCI Compliance How to Address the Application Security Mandates

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Cisco Security Optimization Service

End-to-End Application Security from the Cloud

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper

Application Security Manager ASM. David Perodin F5 Engineer

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

CORE Security and GLBA

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Cisco Advanced Services for Network Security

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

Building Security into the Software Life Cycle

Application Security in the Software Development Lifecycle

Application Code Development Standards

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Integrating Tools Into the SDLC

Web Application Firewalls: When Are They Useful? OWASP AppSec Europe May The OWASP Foundation

Streamlining Application Vulnerability Management: Communication Between Development and Security Teams

The New PCI Requirement: Application Firewall vs. Code Review

Application Security Center overview

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

2012 Data Breach Investigations Report

How to Instrument for Advanced Web Application Penetration Testing

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Software Application Control and SDLC

Cyber Essentials Scheme

A Network Administrator s Guide to Web App Security

IBM Security QRadar Vulnerability Manager

Protecting Your Organisation from Targeted Cyber Intrusion

ISSECO Syllabus Public Version v1.0

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

Effective Software Security Management

HP Application Security Center

HP Fortify application security

Smarter Balanced Assessment Consortium. Recommendation

From the Bottom to the Top: The Evolution of Application Monitoring

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Breaking down silos of protection: An integrated approach to managing application security

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

FIVE PRACTICAL STEPS

Integrating Web Application Security into the IT Curriculum

Continuous Network Monitoring

Global Web Application Firewall Market

10 Things Every Web Application Firewall Should Provide Share this ebook

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Network Security Administrator

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Attack Intelligence: Why It Matters

Five keys to a more secure data environment

Cisco Advanced Malware Protection for Endpoints

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

SAST, DAST and Vulnerability Assessments, = 4

elearning for Secure Application Development

The Web AppSec How-to: The Defenders Toolbox

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

How To Protect A Web Application From Attack From A Trusted Environment

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Obtaining Enterprise Cybersituational

NASCIO 2015 State IT Recognition Awards

State of Oregon. State of Oregon 1

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Transcription:

Web Application Security Roadmap Joe White joe@cyberlocksmith.com Cyberlocksmith April 2008 Version 0.9

Background Web application security is still very much in it s infancy. Traditional operations teams do not understand web application security risk and are ill-equipped to defend against web application threats. Many companies are wrestling with web application security and assigning ownership of the entire web application security effort to one person but these companies are still trying to figure out where this person fits into the organization. Security turf battles are inevitable in these situations. There is no clear separation between where web application security stops and traditional operations security begins.

Audience for this presentation Your company does not fully understand how to manage web application security risk. You have been assigned ownership of web application security and you are wrestling with prioritizing and scoping the challenges ahead of you. You are engaged in a security turf battle with your operations security team and your operations security team does not adequately understand web application security risks. You need help proactively managing expectations for securing your web applications.

Purpose of this presentation Let you know that you are not alone and that many other security professionals are wrestling with similar web application security concerns and issues. Offer a roadmap for your next steps that will build the confidence of your peers and management in your abilities to manage web application security risk. Help you to proactively manage the expectations of your senior management. Ensure that you understand the current industry best practices for securing web applications. Help you to succeed.

Disclaimer This presentation is intended to assist Security professionals by offering objective guidance for deploying effective Web Application Security solutions that are consistent with current industry Best Practices. This Web Application Security Roadmap will include approximate time and expense estimates pulled from a combination of personal experiences and informal colleague discussions. However, your mileage may vary. Vendor references are supplied as reference and are intended to be objective and informative. This presentation is independent of any official vendor affiliation. No vendor was harmed during the making of this presentation.

Web Application Security Roadmap Objectives Find Web Application vulnerabilities Address Web Application vulnerabilities Monitor/detect Web Application compromise attempts Decide upon threat classification framework and scoring model Develop Web Application Incident Response plan Scope/prioritize internal Web Application specific projects Proactively increase security awareness Threat Modeling (TM) and Data Flow Diagrams (DFDs) Manual Code Review (outside expert) Other possible Roadmap items to consider Internal projects

Find Web Application vulnerabilities Automated component Choose the automated web application security assessment tool that works best with your web application technology. Make sure you are addressing all internet facing web application exposure. Deploy Static Source code analysis tool to scan for security vulnerabilities within the source code. Manual component Manual web application security assessment is required to compliment the automated assessment above. Work to better educate manual assessment teams of the way your web application functions so they can better detect logic flaws and other pieces likely to be missed by automated scans. Integrate both peer code review and manual review of the static source code analysis results into your development life cycle.

Find Web Application vulnerabilities - 2 Web Application Security Assessment vendors AppScan - Watchfire (www.watchfire.com) Core Impact - Core Security (www.coresecurity.com) Hailstorm - Cenzic (www.cenzic.com) NTOSpider - NT OBJECTives (www.ntobjectives.com) WebInspect - SPI Dynamics (www.spydynamics.com) WhiteHat Sentinel - WhiteHat Security (www.whitehatsec.com) Static Source Code Analysis vendors Fortify - Fortify Software (www.fortifysoftware.com) Ounce - Ounce Labs (www.ouncelabs.com) Veracode (www.veracode.com)

Find Web Application vulnerabilities - 3 Web Application Security assessment CapEx and deployment times 30 days to evaluate each vendor if conducting a bake-off 0-4 weeks to deploy chosen tool after the evaluation phase CapEx for web application security assessment tools will vary between vendors. Budget for 25K - 50K. Static Source Code Analysis CapEx and implementation times 30 days to evaluate each vendor if conducting a bake-off 3-6 weeks to deploy chosen tool after the evaluation phase CapEx for static source analysis tools will vary between vendors and will likley depend on the chosen deployment scenario as well as how many developers will be using the tool. One FTE should be expected to manage the tool, depending on the scale of environment. Budget for 50K - 100K (1K - 3K per developer).

Address Web Application vulnerabilities Mitigate immediate internet facing risk Block your exposure from web application vulnerabilities as close as possible to when they are discovered. THIS IS CRITICAL! Buys you time to fix vulnerabilities in the underlying code. Web Application Firewall (WAF) will minimize threat window for each exposure by blocking access to vulnerability until the vulnerability can be fixed in the code. Address vulnerabilities in the code Web application security assessment tool should assist in locating specific code level changes that need to be made Static Source Code analysis will point directly to specific code level changes that need to be made If possible, map your web application vulnerabilities directly to your bug tracking system.

Address Web Application vulnerabilities - 2 Web Application firewall (WAF) vendors WebDefend - Breach (www.breach.com) ModSecurity - Open Source (www.modsecurity.org) support offered by Breach SecureSphere - Imperva (www.imperva.com) Application Security Manager - F5 (www.f5.com) Citrix Application Firewall - Citrix (www.citrix.com) Web Application Controller - Barracuda (www.barracudanetworks.com) Honorable mention Fortify Real-Time Analysis (RTA) (Formerly called Fortify Defender) (www.fortifysoftware.com)

Address Web Application vulnerabilities - 3 Web Application Firewall CapEx and deployment times 30 days to evaluate each vendor if conducting a bake-off 4-8 weeks to deploy chosen tool after the evaluation phase Ongoing management and fine-tuning can be expected after deployment CapEx for Web Application Firewalls will vary between vendors. Expect approx. 25K-40K per appliance and you will need at least two for redundancy. Budget for 75K-100K

Detect Web Application compromise attempts Deploy Web Application Firewall (WAF)

What is a Web Application Firewall? Looks at Web Application (Layer 7) data and acts upon it. Similar to a traditional network (Layer 4) firewall,. But not really a firewall after all More like a gateway than a firewall, But not really like a gateway either

Where Web Application Firewall fits into traditional deployment architecture.

Traditional network layer security is blind to application layer threats

Web Application Firewall Use Cases (Ivan Ristic s Blog, ModSecurity author) Web intrusion detection and prevention! Continuous security assessment! Virtual (or just-in-time) patching! HTTP traffic logging and monitoring! Network building blocks! Web application hardening http://www.modsecurity.org/blog/archives/2008/03/web_application_4.html

Detect Web Application compromise attempts Deploy Web Application Firewall (WAF) You cannot protect what you cannot see.

Detect Web Application compromise attempts Deploy Web Application Firewall (WAF) You cannot protect what you cannot see. http://imgs.xkcd.com/comics/exploits_of_a_mom.png

Detect Web Application compromise attempts Deploy Web Application Firewall (WAF) You cannot protect what you cannot see. You will need greater visibility into application layer traffic. This is usually the piece that traditional operations security folks do not understand. WAF should monitor and detect application anomalies and compromise attempts from users. WAF offers greater visibility into application security events. As WAF market matures, you can expect the WAF to be fed real-time vulnerabilities by your web application security assessment tool in order to proactively block newly discovered attacks. The tricky part here is that you will likely need the help of the traditional operations security guys in order to successfully deploy your WAF into production environment.

Decide upon threat classification framework Lots of framework options available to choose from. Check out WASC and OWASP for more guidance here. Should be consistent with the web application security assessment tool you have chosen Whitehat Sentinel uses Web Application Security Consortium Threat Classification scheme (http://www.webappsec.org/projects/threat/) Authentication Authorization Client-side Attacks Command Execution Information Disclosure Logical Attacks

Develop Web Application Incident Response plan This is the piece overlooked by most organizations. You do NOT want to be blind-sided by a web application security event while you are earning the trust of both your management and peers. The operations security guys may actually want you to fail. Expect a lot of policy writing and approx. 4-8 weeks until total sign-off A web Application focused Incident Response plan will: 1. offer a predetermined course of action in the event of an Application Security incident. 2. allow for an expedited reaction to an application incident or occurrence. 3. leverage all tools/personnel available in a timely, effective and predetermined way. 4. Build confidence within your organization of your abilities.

Scope/prioritize internal Web Application specific projects Ideally, you should try to build the general foundation for web application security as referenced in the prior slides before addressing the sample internal projects listed below. If necessary you can do them concurrently but understand that you will need to build a strong web application security foundation as soon as possible in order to be successful. Integrate security into SDLC Secured development lifecycle Secure design review Web Services / API architecture Document coding standards Integrate security into QA process Remote access to source code from offshore developers Integrate security into your application design process Tighten up the platform framework Internal projects

Increase security awareness Executive web application security risk awareness Developer Training Java black belt (http://www.javablackbelt.com/) Online development courses Recurring Presentations/events Security hack contests (hack-a-thon) Secure development training Strive to get everyone to start thinking like an attacker Internal projects

Threat Modeling and Data Flow Diagrams Threat Modeling Understand all entry and exit points into the web application Understand threat scenarios Understand trust boundaries in the application Understand most likely data to be targeted by attackers Know your crown jewels Data Flow Diagrams Understand anticipated user activity within the application flow Understand expected data flow from one application component to the next Internal projects

Manual code review (outside expert) Manual line-by-line code review for all application code by a Subject Matter Expert (SME) in your application technology. Include all tiers in the application architecture: client side within presentation tier the application tier the backend database tier If budget restrictions require you to prioritize between tiers, address internet facing code first and then move on to application tier and then backend database tier. Note: if presentation tier in your architecture can make database calls directly then you will need to review all code at the same time. CapEx should be budgeted at between 50-100K. A phased approach may spread the cost across multiple quarters/years. Internal projects

Other possible Roadmap items to consider Distributed Denial of Service Attacks (DDoS) WAF should offer defense against Web Application Denial of Service (DoS) attacks up to a point but it is not clear how much defense WAF will offer against a focused and coordinated DDoS attack. May require additional services from co-lo and/or upstream ISP. Anti-Phishing Companies/Services offer focused defense against targeted phishing and other attacks at your organization s brand name. These brand protection services are great to have in advance but can usually be ramped up quickly after targeted attacks are discovered. Security Center Reporting features of WAF should be available for users to increase security awareness and proactively address security weaknesses. Web Application Security metrics Internal projects

Just remember this, Information security risks and threats change over time. You must adapt to these changes. Web application security is the current threat that you need to understand and be adapting to. If you are new to web application security, it is OK because there is still time to change and adapt. Don t be an information security dinosaur!

Questions????? Latest version of this presentation: http://www.webappsecroadmap.com