Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?



Similar documents
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams

Vulnerability Management in an Application Security World. AppSec DC November 12 th, The OWASP Foundation

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together. Dan Cornell. CTO, Denim

Using Sprajax to Test AJAX. OWASP AppSec Seattle Oct The OWASP Foundation

Adobe Systems Incorporated

Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan

Learning objectives for today s session

How to Build a Trusted Application. John Dickson, CISSP

Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Application security testing: Protecting your application and data

Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group

SAST, DAST and Vulnerability Assessments, = 4

How-to-Guide for Software Security Vulnerability Remediation. by Dan Cornell

Comparing Application Security Tools

Security Testing & Load Testing for Online Document Management system

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

DEVELOPING SECURE SOFTWARE

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

Enterprise level security, the Huddle way.

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Passing PCI Compliance How to Address the Application Security Mandates

WHITEPAPER. Nessus Exploit Integration

ensuring security the way how we do it

The Top Web Application Attacks: Are you vulnerable?

ALM/Quality Center. Software

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

05.0 Application Development

SAFECode Security Development Lifecycle (SDL)

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Secure Development Lifecycle. Eoin Keary & Jim Manico

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

next generation privilege identity management

Integrigy Corporate Overview

An Introduction to Application Security in J2EE Environments

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

Enterprise Application Security Program

How To Understand And Understand The Security Of A Web Browser (For Web Users)

Put a Firewall in Your JVM Securing Java Applications!

TOOL EVALUATION REPORT: FORTIFY

Security in the Sauce Labs Cloud

Agile and Secure: OWASP AppSec Seattle Oct The OWASP Foundation

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL

SharePoint 2010

Nikolay Zaynelov Annual LUG-БГ Meeting nikolay.zaynelov.com

IT Security & Compliance. On Time. On Budget. On Demand.

Main Question 1: How and where do you or your family use the Internet - whether on a computer or a cell phone? Follow up questions for INTERNET USERS

NE T GENERATION CLOUD SECURITY PLATFORM

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Using Nessus In Web Application Vulnerability Assessments

Online Vulnerability Scanner Quick Start Guide

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

WebGoat for testing your Application Security tools

The AppSec How-To: Achieving Security in DevOps

GUI Test Automation How-To Tips

Performing a Web Application Security Assessment

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

BSA Best Practices Webinars Role Based Access Control Sean Berry Customer Engineering

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

NSFOCUS Web Vulnerability Scanning System

Web attacks and security: SQL injection and cross-site scripting (XSS)

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

How to set up SQL Source Control. The short guide for evaluators

Coverity Scan. Big Data Spotlight

THE WEB HACKING INCIDENTS DATABASE 2009

Web Security CS th November , Jonathan Francis Roscoe, Department of Computer Science, Aberystwyth University

Rational AppScan & Ounce Products

Agile QA Process. Anand Bagmar Version 1.

Web Application Security Roadmap

Transcription:

Remediation Statistics: What Does Fixing Application Vulnerabilities Cost? Dan Cornell Denim Group, Ltd. Session ID: ASEC-302 Session Classification: Intermediate

Agenda An Innocent Question Finding a Structure for Remediation Projects Methodology Remediation Data Analysis and Recommendations Questions 2

Fixing a Cross-Site Scripting (XSS) Vulnerability How long does it take? A) 9.6 minutes B) 16.2 minutes C) 84 minutes D) It doesn t matter E) All of the above 3

Fixing a Cross-Site Scripting (XSS) Vulnerability How long does it take? A) 9.6 minutes Average fix time for stored XSS (no load) B) 16.2 minutes Average fix time for reflected XSS (no load) C) 84 minutes Average fix time for stored and reflected (loaded) D) It doesn t matter E) All of the above 4

Fixing a Cross-Site Scripting (XSS) Vulnerability How long does it take? A) 9.6 minutes Average fix time for stored XSS (no load) B) 16.2 minutes Average fix time for reflected XSS (no load) C) 84 minutes Average fix time for stored and reflected (loaded) D) It doesn t matter E) All of the above 5

Remediation Worst Practices When the security team: Demands a development team devote time and budget to remediation Provides them with no direction or support Has the development team attempt to make fixes on their own Complains when things don t work out 6

Remediation Worst Practices Result: No new features and half- or non-fixed vulnerabilities Good luck getting your next remediation project approved 7

Finding a Structure for Remediation Projects Desired outcome: predictable and effective remediation projects Predictable: know how long they will take and how much they will cost Effective: targeted vulnerabilities actually get fixed A community of stakeholders Security Development IT Audit / Compliance 8

Remediation Projects Inception Planning Calculate Risk Agree on Fix and Confirmation Methods Determine Level of Effort Schedule Execution Set up Development Environment Fix Vulnerabilities Confirm Fixes and Perform Functional Testing Deploy 9

Remediation: How To Guide Describes methodology for software security remediation projects Includes tips and best practices Free online denimgroup.com/howtoguide_download_register.html 10

That s Great But How long will it actually take me to fix my vulnerabilities? Software security remediation projects are software development projects So estimate them as such Best practices: Bottom-up estimation Cluster vulnerabilities where possible It would be nice to have some data to use as a starting point 11

Data! Took data from 15 remediated applications Two types of analysis: Vulnerability-level (4 applications) Project-level (13 applications) Data from Inception and Planning phases was too messy Data from Execution phase was useable 12

The Good (Why This Data Might Be Useful) Some data is better than no data As long as you understand potential areas of bias Read How to Measure Anything by Douglas W. Hubbard Had relatively large sample size for some vulnerability types 13

The Bad (Some Potential Sources of Bias) Relatively small sample size Based on a single project type Outsourced software security remediation projects Data required cleanup and normalization Vulnerability data centered around technical vulnerabilities Most identified by automated static analysis 14

Vulnerability-Specific Data (20+ Sample Count) Vulnerability Type Sample Count Average Fix (minutes) Dead Code (unused methods) 465 2.6 Poor logging: system output stream 83 2.9 Poor Error Handling: Empty catch block 180 6.8 Lack of Authorization check 61 6.9 Unsafe threading 301 8.5 ASP.NET non serializable object in session 42 9.3 XSS (stored) 1023 9.6 Null Dereference 157 10.2 Missing Null Check 46 15.7 XSS (reflected) 25 16.2 Redundant null check 21 17.1 SQL injection 30 97.5 15

Some Thoughts and Notes Apparently deleting code and changing logging methods are easy Cross-Site Scripting Vulnerability count tracks with data from WhiteHat, Veracode, other sources Harder to fix reflected XSS than stored XSS Lack of Authorization Check Fix consisted of copy/pasting file include into a number of files SQL Injection Surprisingly high Reason: fixes were for more complicated SQL injection vulnerabilities 16

So If I Have 6 Stored XSS Vulnerabilities my remediation project should take about an hour, right? But wait! 17

Remediation Is Not Just About Coding Fixes This data is from one of four steps in one of three phases Fix Vulnerabilities step in the Execution phase What about Inception and Planning? No great data available yet What about the rest of Execution? Set up Development Environment Fix Vulnerabilities Confirm Fixes and Perform Functional Testing Deploy Overhead 18

Where Is Time Being Spent? 70% 60% 59% Indicates the weighted average versus the average of individual projects 50% 40% 37% 44% 42% 30% 20% 10% 0% 31% 17% 16% 0% Setup Development Environment 28% 29% 24% 24% 20% 15% 15% 9% 3% 2% 0% Fix Vulnerabilities Confirm Fixes / QA Deploy 0% Overhead 19

Some Thoughts and Notes Setup Development Environment Best case: existing development environment or VM Worst case: Safari expedition to recreate environment setup because organization no longer had this knowledge Instructions on setting up a development environment were a deliverable Fix Vulnerabilities This is what people focus on but there is wide variation 20

Some Thoughts and Notes (continued) Confirm Fixes / QA Sometimes this took more time than the actual fixes Best case: Existing set of automated functional / regression tests Deploy Best case: use an existing planned release Overhead Surprisingly high in some cases 21

Using the Data I thought you said to estimate bottom-up? Yes. Do that Use the vulnerability data as a guide for estimation Use the project composition data for validation Use the lessons of the data to try and minimize required investment 22

What Can I Do To Minimize Remediation Costs? Avoid introducing vulnerabilities into your software (You are all welcome for this piece of sage advice) 23

What Can I Do To Minimize Remediation Costs? Have ready access to development environments for the developers doing the remediation Automated functional / regression testing helps speed security fixes Use planned deployments when possible 24

Which Vulnerabilities Get Fixed and When? Use your data-backed, bottom-up WBS for risk management and planning Serious vulnerabilities that are easy to fix? Consider an out-of-cycle release Otherwise leverage planned releases 25

The Outlier We remediated one vulnerability not included in the study that was more expensive to fix than all vulnerabilities in the study Authentication issue in a connected system Requirements and architecture vulnerability Automated scanners static or dynamic: powerless to find it Should have / would have been caught by even a basic threat modeling or abuse case session 26

So Where Does This Leave Us Good: We have a framework We have some data Less good: The data comes with a number of caveats Given a framework and some data you should be: Better able to execute successful projects Better able to estimate projects Better able to minimize project costs 27

Next Steps For Me Release a more in-depth report Include more data in the analysis Perform deeper analysis Impact of size of project (hours) Impact of number of vulnerabilities remediated Impact of platform And so on Include data on logical vulnerabilities 28

Apply Review your existing vulnerability data Create a back of the envelope plan to address open vulnerabilities Run different scenarios: All critical and high All public-facing apps and so on Talk to developers How do they set up development environments? When do they do planned releases? Fix some vulnerabilities! Application-level vulnerabilities persist for a long time 29

Remediation Resource Center Resources for remediating software security vulnerabilities Videos How-to Guide Blog posts denimgroup.com/remediation 30

Questions? Dan Cornell dan@denimgroup.com Twitter: @danielcornell www.denimgroup.com blog.denimgroup.com www.denimgroup.com/remediation (210) 572-4400 31