BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM



Similar documents
ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Think like an MBA not a CISSP

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX

Goals. Understanding security testing

elearning for Secure Application Development

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Concierge SIEM Reporting Overview

PENETRATION TESTING GUIDE. 1

Secure Web Applications. The front line defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

WEB Penetration Testing

SECURITY. Risk & Compliance Services

(WAPT) Web Application Penetration Testing

Learning objectives for today s session

Network Security Audit. Vulnerability Assessment (VA)

5 Steps to Advanced Threat Protection

IT Security & Compliance. On Time. On Budget. On Demand.

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

Application Security Testing

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

Passing PCI Compliance How to Address the Application Security Mandates

THE TOP 4 CONTROLS.

SAST, DAST and Vulnerability Assessments, = 4

Where every interaction matters.

Give Vendors Access to the Data They Need NOT Access to Your Network

Overview of the Penetration Test Implementation and Service. Peter Kanters

The Top Web Application Attacks: Are you vulnerable?

Penetration Testing Services. Demonstrate Real-World Risk

Protecting Your Organisation from Targeted Cyber Intrusion

Marble & MobileIron Mobile App Risk Mitigation

Spigit, Inc. Web Application Vulnerability Assessment/Penetration Test. Prepared By: Accuvant LABS

Simple Steps to Securing Your SSL VPN

Security Testing and Vulnerability Management Process. e-governance

Web Application Security

Managing IT Security with Penetration Testing

Cloud Security:Threats & Mitgations

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Application Security in the Software Development Lifecycle

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

External Supplier Control Requirements

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Top 20 Critical Security Controls

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Cybersecurity and internal audit. August 15, 2014

An approach to Web Application Penetration Testing. By: Whiskah

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Web Application security testing: who tests the test?

Integrating Security Testing into Quality Control

Network Test Labs (NTL) Software Testing Services for igaming

Enterprise Application Security Program

Continuous Network Monitoring

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

The Web AppSec How-to: The Defenders Toolbox

Penetration Testing in Romania

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Jumpstarting Your Security Awareness Program

NATIONAL CYBER SECURITY AWARENESS MONTH

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Reducing Application Vulnerabilities by Security Engineering

Cybersecurity The role of Internal Audit

Introduction to Penetration Testing Graham Weston

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

HIPAA: Compliance Essentials

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

FERPA: Data & Transport Security Best Practices

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

IT Security Risks & Trends

Critical Controls for Cyber Security.

locuz.com Professional Services Security Audit Services

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance

McAfee Database Security. Dan Sarel, VP Database Security Products

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS. Junos WebApp Secure Junos Spotlight Secure

Adobe Systems Incorporated

Secure Coding in Node.js

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Transcription:

BUILDING AN OFFENSIVE SECURITY PROGRAM

Common Gaps in Security Programs Outsourcing highly skilled security resources can be cost prohibitive. Annual assessments don t provide the coverage necessary. Software is purchased with minimal or no assurance. Deficiencies exist within internal security teams.

What skills do we need? Deep technical roots Understanding of underlying fundamentals of networking and applications Self-reliance Willing to try something new on their own. Creativity Security testing is as much of an art that it is a science. Certifications Maybe?

Building Security Internally Frequent network scanning deputize a network admin to conduct scans. Inventory applications and or network services. Know your perimeter. Build Application penetration testing into SDLC

A New Focus on AppSec Fuel to the fire: Increasing criminal sophistication Increasing security of networks and endpoints Increasing rapid application development A risk analysis is not enough. Security on paper can build a house of cards.

Understanding Application Attacks Attacks vary in nature, they may: Force a user to perform an operation Steal session tokens to hijack the user s session Perform an operations as another user View another user s data Extract database contents

A New Application / Browser Security Model Leveraging security controls in web browsers is crucial for building robust applications. X-FRAME-OPTIONS Used to prevent clickjacking attacks HTTP Strict Transport Security Used to enforce secure protocol use. Content Security Policy Used to mitigate XSS and content injection attacks.

Managing Security Vendors Rotate vendors (Required by many regulators) Perform comparative tests, vendor scorecards. Evaluate volume vs. boutique vendors. Encourage vendors to contribute to your process.

Getting the Most Out of Vendors Vendors should produce a VA report for their software, and bear the cost (standard procedure). Use conditional POs when purchasing software. Must decide if the vendor s third party is reputable. Vendors have often never test their own software until they need to. Explain expectations of assessments. No software is perfect A report with zero issues is a red flag.

Policy Getting people to act Use internal policy to require action on assessment results. Require remediation times for High/Medium/Low risk issues (30/60/120 days) Prevent applications and infrastructure from moving from staging to production.

Meaningful Remediation: System Hardening Invest in yourself - One change can fix many vulnerabilities across the organization. Avoid squashing ants. Public frameworks exist to create hardened system builds for all popular server software (CIS Benchmark). Can be performed by almost any IT staff. Checklists are public and trivial to follow.

Vulnerability Assessments vs. Pentests Vulnerability Assessment Identify vulnerabilities without exploitation (most cost effective) Penetration test VA with exploitation. Shows true impact (useful for budget justification and attention from stakeholders). Risk of availability impact.

Scoping Application Assessments Black Box No authentication, no prior knowledge of the application Grey Box Credentials provided, simulates a true insider threat. White Box In depth code review, looks for deep rooted vulnerabilities and backdoors.

Scoping Network Assessments External only No authentication, no physical access, no prior knowledge of the network. Internal and External Covers both external perimeter and internal network. Internal Authenticated grants access to automated tools to perform authenticated tests.

Wireless Self Assessments War walks Can be performed easily by technical staff. Wireless surveying apps are freely available for mobile devices. Configuration based testing Most wireless networks can be assessed passively. Weak and broken protocols are publicly documented.

Moving Forward Embracing hacker culture: Manage organization goals with security goals Like herding cats

Build a Creative Process Develop security processes and controls but also foster creativity and new ideas. Encourage the use of new testing tools and methods.. But avoid shiny box syndrome Security should be research driven.

Other Recommendations Reduce unnecessary network services at all cost. Close gaps between assessments. Know what applications are public facing. Know if applications can be leveraged in phishing attacks. Focus on monitoring, detection, and response.

Questions? Elliott.Frantz@virtuesecurity.com 646-577-8901