Software Security. Software Security Touchpoints. Touchpoints. March 27, 2006. March 27, 2006. Three pillars of security. Risk Management.



Similar documents
Software Security. Building Security In. Gary McGraw. A Addison-Wesley

Developing Secure Software, assignment 1

Cutting Edge Practices for Secure Software Engineering

Software Security Touchpoint: Architectural Risk Analysis

Development Processes (Lecture outline)

112 BSIMM Activities at a Glance

Software Security Testing

NWEN405: Security Engineering

Information Security Services

Threat Modeling for Secure Embedded Software

Adobe Systems Incorporated

Source Code Review Using Static Analysis Tools

Learning Course Curriculum

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Risk Based Security Testing

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Effective Software Security Management

Secure Programming Lecture 9: Secure Development

Seven Practical Steps to Delivering More Secure Software. January 2011

In Building Security In, Gary McGraw proposes three pillars to use throughout the lifecycle: I: Applied Risk Management

Automatic vs. Manual Code Analysis

Web Application Security

Software security specification and verification

90% of data breaches are caused by software vulnerabilities.

ANALYSIS OF SOFTWARE THREATS AND SOFTWARE SECURITY. Department of Computer Science & IT University of Jammu, Jammu

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Learning objectives for today s session

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Secure Software Programming and Vulnerability Analysis

Application Code Development Standards

Designing and Coding Secure Systems

Course Modules for Software Security

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Building Security into the Software Life Cycle

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Testing for Security

Security testing has recently moved beyond the

X05. An Overview of Source Code Scanning Tools. Loulwa Salem. Las Vegas, NV. IBM Corporation IBM System p, AIX 5L & Linux Technical University

D. Best Practices D.1. Assurance The 5 th A

Application Security and the SDLC. Dan Cornell Denim Group, Ltd.

elearning for Secure Application Development

Application Security and the SDLC. Dan Cornell Denim Group, Ltd.

Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1

WHITEPAPER. Nessus Exploit Integration

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

SAFECode Security Development Lifecycle (SDL)

Application Security in the Software Development Lifecycle

Network Test Labs (NTL) Software Testing Services for igaming

Threat Modeling. Deepak Manohar

Security Considerations for the Spiral Development Model

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

Enterprise Application Security Program

How To Ensure Your Software Is Secure

Building a Corporate Application Security Assessment Program

Network Mission Assurance

Source Code Security Analysis Tool Functional Specification Version 1.0

Web Application security testing: who tests the test?

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

-.% . /(.0/ ) 53%/( (01 (%((. * 7071 (%%2 $,( . 8 / 9!0/!1 . # (3(0 31.%::((. ;.!0.!1 %2% . ".(0.1 $) (%+"",(%$.(6

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

! Resident of Kauai, Hawaii

Reducing Application Vulnerabilities by Security Engineering

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

Improving Software Security at the. Source

The Need for Fourth Generation Static Analysis Tools for Security From Bugs to Flaws

Secure Coding in Node.js

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

DEVELOPING SECURE SOFTWARE

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Preventive Approach for Web Applications Security Testing OWASP 10/30/2009. The OWASP Foundation

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Guideline on Vulnerability and Patch Management

BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES

CS 392/681 - Computer Security. Module 16 Vulnerability Analysis

Application Security 101. A primer on Application Security best practices

Software Development: The Next Security Frontier

Aligning Application Security and Compliance

Bridging the Gap - Security and Software Testing. Roberto Suggi Liverani ANZTB Test Conference - March 2011

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES

Mobile Application Security Study

Applied Software Project Management

CDM Vulnerability Management (VUL) Capability

FREQUENTLY ASKED QUESTIONS

Points of View. CxO s point of view. Developer s point of view. Attacker s point of view

CS52600: Information Security

How to Build a Trusted Application. John Dickson, CISSP

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Comparison of Secure Development Frameworks for Korean e- Government Systems

About Effective Penetration Testing Methodology

Testing Your Security A Security Testing How To From Someone Who s Likely Broken Into An Organization Just Like Yours

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance

Passing PCI Compliance How to Address the Application Security Mandates

Transcription:

Software Security Touchpoints March 27, 2006 March 27, 2006 Three pillars of security Software Security Risk Management Touchpoints Knowledge

Architectural risk analysis Applied risk management Sometimes called threat modeling or security design analysis Is a best practice and is a touchpoint Risk management framework Considers risk analysis and mitigation as a full life cycle activity Risk management framework RMF occurs in parallel with SDLC activities Measurement and reporting 1 2 Identify 3 4 Understand the Business Define Synthesize the Business and Technical and the Risk Mitigation Rank context Risk the Risks Strategy Artifact Analysis Business Context 5 Carry out fixes And validate

Software security touchpoints Software security is not security software Software security is system-wide issues (security mechanisms and design security) Emergent property Touchpoints in order of effectiveness (based on experience) Code review (bugs) Architectural risk analysis (flaws) These two can be swapped Penetration testing Risk-based security tests Abuse cases Security requirements Security operations Many organization Penetration first Is a reactive approach Software security touchpoints CR and ARA can be switched however skipping one solves only half of the problem Big organization may adopt these touchpoints simultaneously

Knowledge Software security knowledge catalogs Principles Guidelines Rules Vulnerabilities Exploits Attack patterns Historical risks These can be grouped into following categories Prescriptive knowledge Diagnostic knowledge Historical knowledge Code review Focus is on implementation bugs Essentially those that static analysis can find Security bugs are real problems but architectural flaws are just as big a problem Code review can capture only half of the problems E.g. Buffer overflow bug in a particular line of code Architectural problems are very difficult to find by looking at the code Specially true for today s large software

Code review Taxonomy of coding errors Input validation and representation Some source of problems Metacharacters, alternate encodings, numeric representations Forgetting input validation Trusting input too much Example: buffer overflow; integer overflow API abuse API represents contract between caller and callee E.g., failure to enforce principle of least privilege Security features Getting right security features is difficult E.g., insecure randomness, password management, authentication, access control, cryptography, privilege management, etc. Code review Taxonomy of coding errors Time and state Typical race condition issues E.g., TOCTOU; deadlock Error handling Security defects related to error handling are very common Two ways Forget to handle errors or handling them roughly Produce errors that either give out way too much information or so radioactive no one wants to handle them E.g., unchecked error value; empty catch block

Code review Taxonomy of coding errors Code quality Poor code quality leads to unpredictable behavior Poor usability Allows attacker to stress the system in unexpected ways E.g., Double free; memory leak Encapsulation Object oriented approach Include boundaries E.g., comparing classes by name Environment Everything outside of the code but is important for the security of the software E.g., password in configuration file (hardwired) Code review Static analysis tools False negative (wrong sense of security) A sound tool does not generate false negatives False positives Some examples ITS4 (It s The Software Stupid Security Scanner); RATS; Flawfinder

Cigital Static analysis process Figure 4-7 Architectural risk analysis Design flaws about 50% of security problem Can t be found by looking at code A higher level of understanding required Risk analysis Track risk over time Quantify impact Link system-level concerns to probability and impact measures Fits with the RMF

ARA within RMF 2 Identify Measurement and reporting the Business Technical and Technical expertise Risk Artifact Analysis 1 4 5 Understand Business Define Synthesize the Business and the Risk Context Mitigation Rank context the Risks Strategy 3 Identify the Business and Technical Risk Artifact Analysis 7 6 Validate the Initiate process Fix artifacts the artifacts improvement Validation loop Figure 5-4 ARA process

ARA process Attack resistance analysis Steps Identify general flaws using secure design literature and checklists Knowledge base of historical risks useful Map attack patterns using either the results of abuse case or a list of attack patterns Identify risk based on checklist Understand and demonstrate the viability of these known attacks Use exploit graph or attack graph - Note: particularly good for finding known problems ARA process Ambiguity analysis Discover new risks creativity requried A group of analyst and experience helps use multiple points of view Unify understanding after independent analysis Uncover ambiguity and inconsistencies Weakness analysis Assess the impact of external software dependencies Modern software is built on top of middleware such as.net and J2EE Use DLLs or common libraries Need to consider COTS Framework Network topology Platform Physical environment Build environment

Software penetration testing Most commonly used today Currently Outside->in approach Better to do after code review and ARA As part of final preparation acceptance regimen One major limitation Almost always a too-little-too-late attempt at the end of a development cycle Fixing things at this stage» May be very expensive» Reactive and defensive Software penetration testing A better approach Penetration testing from the beginning and throughout the life cycle Penetration test should be driven by perceived risk Best suited for finding configuration problems and other environmental factors Make use of tools Takes care of majority of grunt work Tool output lends itself to metrics Eg., fault injection tools; attacker s toolkit: disassemblers and decompilers; coverage tools monitors

Risk based security testing Testing must be Risk-based grounded in both the system s architectural reality and the attacker s mindset Better than classical black box testing Different from penetration testing Level of approach Timing of testing Penetration testing is primarily on completed software in operating environment; outside->in Security testing Risk based security testing Should start at feature or component/unit level testing Must involve two diverse approaches Functional security testing Testing security mechanisms to ensure that their functionality is properly implemented Adversarial security testing Performing risk-based security testing motivated by understanding and simulating the attacker s approach

Abuse cases Figure 8-1 Abuse cases Creating anti-requirements Important to think about Things that you don t want your software to do Requires: security analysis + requirement analysis Anti-requirements Provide insight into how a malicious user, attacker, thrill seeker, competitor can abuse your system Considered throughout the lifecyle indicate what happens when a required security function is not included

Abuse cases Creating an attack model Based on known attacks and attack types Do the following Select attack patterns relevant to your system build abuse case around the attack patterns Include anyone who can gain access to the system because threats must encompass all potential sources Also need to model attacker Security requirements and operations Security requirements Difficult tasks Should over both overt functional security and emergent characteristics Use requirements engineering approach Security operations Integrate security operations E.g., software security should be integrated with network security