white SECURITY TESTING WHITE PAPER



Similar documents
NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

Security Testing and Vulnerability Management Process. e-governance

Web App Security Audit Services

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Information Technology Security Review April 16, 2012

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Network Security Audit. Vulnerability Assessment (VA)

Columbia University Web Security Standards and Practices. Objective and Scope

Functional vs. Load Testing

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Passing PCI Compliance How to Address the Application Security Mandates

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Security Testing & Load Testing for Online Document Management system

ensuring security the way how we do it

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Spigit, Inc. Web Application Vulnerability Assessment/Penetration Test. Prepared By: Accuvant LABS

ISSECO Syllabus Public Version v1.0

Penetration Test Report

Expert Services Group (Security Testing) Nilesh Dasharathi Sadaf Kazi Aztecsoft Limited

Web Application Report

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Penetration Testing Service. By Comsec Information Security Consulting

Information Security Services

05.0 Application Development

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Table of Contents. Page 2/13

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Penetration Testing Report Client: Business Solutions June 15 th 2015

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Attack Vector Detail Report Atlassian

Adobe Systems Incorporated

Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

IT Security Management Risk Analysis and Controls

Application Code Development Standards

A Practical Approach to Threat Modeling

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Overview of the Penetration Test Implementation and Service. Peter Kanters

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Enterprise Application Security Program

Pentests more than just using the proper tools

WHITEPAPER. Nessus Exploit Integration

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Penetration Testing. Presented by

Cyril Onwubiko Networking and Communications Group ncg.kingston.ac.

Pentests more than just using the proper tools

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Seven Practical Steps to Delivering More Secure Software. January 2011

MANAGED SECURITY TESTING

Effective Software Security Management

WEB Penetration Testing

External Supplier Control Requirements

Working Practices for Protecting Electronic Information

HTTPParameter Pollution. ChrysostomosDaniel

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

IY2760/CS3760: Part 6. IY2760: Part 6

SQuAD: Application Security Testing

How To Ensure That Your Computer System Is Safe

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

WEB APPLICATION VULNERABILITY STATISTICS (2013)

SECURITY. Risk & Compliance Services

What is Web Security? Motivation

Information Technology Policy

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

elearning for Secure Application Development

- Table of Contents -

SERENA SOFTWARE Serena Service Manager Security

Guideline on Auditing and Log Management

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

IT Risk Management: Guide to Software Risk Assessments and Audits

Where every interaction matters.

Web Application Security Considerations

Secure Web Applications. The front line defense

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Security and Vulnerability Testing How critical it is?

Secure in 2010? Broken in 2011!

Interactive Application Security Testing (IAST)

Transcription:

white SECURITY TESTING WHITE PAPER

Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion... 18 Our Expertise... 19 Appendix... 20 References... 21

Introduction Applications or networks always have security leaks which can cause severe damage to companies and lose important data due to these being open to outside world. Application/product security often relate to business-critical information because these require high level of security. But, with considerably less time in delivering the applications/products, thorough security audit and security assessments are often omitted. Because of these security flaws, organizations can go into legal exposure and there could be life ending situation also. Security testing and auditing with proper analysis is necessary and critical in eliminating most of the software flaws. This paper outlines a framework created by ZENQ team and on how security testing takes place in order to establish a strategy and approach by following industry standards.

The Need for Security Testing Implementing information security measures are becoming more difficult due to the huge number of possible information security threats connected to the use of the Internet. Table below describes the % of vulnerabilities across different industries with average number of days to fix the issues Figure 1. The Current state of Web Site Security Sorted by industry

Security Scorecards

MOST COMMON VULNERABILITIES The below figure depicts the most prevalent vulnerability classes calculated based on the percentage occurrence of at least one instance being found within any given website

When Information Security measures are implemented, application should be tested for external intrusion issues using methods like: XSS (Cross site scripting) Failure to restrict URL access Insecure Direct Object Reference Cross Site Request Forgery Direct SQL code injection in the web page SQL injection in the site address (url sql injection) Password cracking using decryption systems Guessing the web site session id (session prediction) Buffer overflow In general there are four basic security requirements which need to be addressed: Confidentiality: Unauthorised users are restricted from viewing the sensitive information. Integrity: Only authorized users or processes are permitted to modify data. Availability: Availability is a requirement that is often neglected when thinking about security. However, productivity of users decreases dramatically if network-based applications are not available or too slow because of denial-of-service attacks. If, for example, a web-based e-learning system is slow, users do not only require more time to do their work, but they also become frustrated, increasing the negative effect on productivity. Non-Repudiation: Users are unable to deny having carried out operations. For instance, whenever grades of students are changed, it must be possible to reliably trace who has performed the modification To overcome these attacks, early and frequent security analysis is needed At ZENQ we perform comprehensive test to make sure that Confidentiality, Integrity & Availability of the application are protected against Security breaches, with our specially designed test approach

Test Approach In order to combat the security threats in applications, the security testing has to be conducted so that appropriate measures can be taken to eliminate vulnerabilities before they are exploited. The Security testing specialists here at ZenQ, have come up with a structured approach for security testing.our approach is based on industry wide standards, best practices and methodologies such as OWASP, WASC, SANS & NIST. Indicated in the Figure1.1 below of the security testing methodology that we follow to minimize the risk of security breach and improve the security stature of the applications under test (AUT) and the phases are briefly described subsequently. Figure 1.1: Process Flow

Phase 1: Threat Modelling The initial phase of conducting penetration testing would include threat modeling of web/mobile applications i.e. to identify threats, attacks, vulnerabilities and countermeasures that could affect the application. The process is two-fold: Define Scope: We begin by gathering information below about the critical assets, target applications from client expectations document and then conduct further evaluation to define scope (Important assets/functionalities and their relative values, Areas of concern to the assets known vulnerabilities, if any) for the testing effort. Threat Profiles: The next step is to list out all the possible threats to the application. In addition, also determine possible goals of the adversary in attacking the application, which in turn would assist in identifying the vulnerabilities that exist as a result of these goals. The identified threats are classified using the STRIDE model and thread profile is created. The Threat profile created will include the following attributes: Asset Critical functionality/feature of the application under test Actor - Who or what may violate security requirements such as confidentiality, integrity and availability of an asset Motive (optional) Indication of whether the actor s intentions are deliberate or accidental Access control How the asset (functionality/feature) will be accessed by the actor Outcome Immediate result of violating the security requirements of an asset i.e. disclosure, modification, destruction, loss, interruption etc.

Phase 2: Test Plan Once the Threat model is reviewed and established, we move forward with the test planning. A detailed test plan will be created will cover overall strategy in execution, deliverables, test cases and effort to conduct penetration testing. Test Strategy: Test Strategy included as a part of the Test Plan, describes the scope, approach, resources and schedule for the testing activities of the project. It also includes defining what will be tested, who will perform testing, how testing will be managed, and the associated risks and contingencies. Test Design: The Probability of occurrence of the event & Risk associated with each occurrence are taken into account when designing the Tests. Test cases: Once the threat profile is ready, the attack techniques to try out are determined, For each threat in the threat profile, we list down all the possible ways of realizing it. For example, we can try to view another user s account information by either an SQL injection attack or by manipulating the request variables or by accessing the information from the browser cache. The complete list of exact test cases that will be tried out for each threat are included as a part of the Test plan. Each test case will specify the page and the variable where the test will be tried out. This detailed test plan serves an important purpose: it ensures a thorough test is carried out and that no attack vector for any threat is left unexplored.

Each Test case will be comprised of the following: Threat scenario Pages/functionalities for which threat will have affect Associated attacks to be performed for each threat scenario Phase 3: Test Execution With the complete test plan reviewed and agreed upon with the client, the penetration software testing activity will be carried out by executing each test case from the test plan. As each test case is executed, there may be a need for more tests to confirm the results. Test Execution includes: Identification of vulnerabilities based on the attack performed, Exploitations, Exfiltration of data, if any

Phase 4: Result Reporting Upon completion of the test execution, root cause analysis will be done and recommendations on how vulnerabilities can be addressed will be determined. Detailed reports will then be prepared, based on which the application can be secured. Following are the reports are provided to the client upon completion of the Testing: Technical Review Report : Along with the vulnerabilities observed, the report also has the details of the impact it would have on the business, ease of exploiting it and risk rating. It also describes how the exploit was carried out with steps and screenshots wherever required and recommendations on how the vulnerability can be fixed. Executive Review Report : A high level report which describes about the process followed in security testing and would also have risk rating of the application from the business perspective. The Risk Rating Matrix that we utilize for ranking the risks is described in the Appendix.

Framework The framework consists of set of components that combine to achieve the structured approach for conducting security tests efficiently and effectively. The logical architecture and set of underlying components of the framework that combine to achieve the structured utilized by ZENQ s Security test team is depicted in the Figure below and the components are briefly explained subsequently.

Project Initiation Process Initial Call Discusses about the Security Testing Service Offering Understands the client requirements Test Proposal Creation of security test proposal Submit the security test proposal for client's approval Penetration Tests Understands the functionality of the application and creates Threat modeling sheet Perform vulnerability assessment using manual and automation tools Exploit the vulnerabilities Reports Create comprehensive audit report with vulnerabilities identified and suggestion on how to resolve these vulnerabilities Compliance certificate that adheres to security standards

Conclusion This paper elucidates the current challenges faced by applications built across different industries and need for security testing in this area. We ve reviewed the current categories, criteria and approaches for security testing to conduct security testing of applications pertaining to various industries. We believe that with our approach, based on industry recognized OWASP guidelines, our clients will be able to thwart and remediate vulnerabilities, which pose serious risk to the applications if not avoided, ensure that compliance with banking, financial and other relevant standards is met and perform their transactions and maximize the return-on-investment.

Our Expertise ZenQ s Security testing team effectively uses the process to identify threats and conduct penetration tests much like an attacker would do. Our Areas of Expertise include: Web Application Penetration Testing Web Services Security Testing Mobile Application Security Testing External Network Security Testing Internal Network Security Testing Secure Code review

Appendix Risk Rating Matrix: RATING DEFINED AS CRITICAL HIGH RISK Serious vulnerabilities that have been exploited or are highly likely to be exploited and/or significant deficiencies in design, implementation or management identified. Vulnerabilities discovered with moderate likelihood of exploitation and/or at least one significant deficiency in design, implementation or management identified. MEDIUM RISK ELEVATED RISK LOW RISK Vulnerabilities discovered with moderate likelihood of exploitation and/or multiple deficiencies in design, implementation or management identified. Vulnerabilities discovered with low likelihood of exploitation and/or minor deficiencies in design, implementation or management identified. No vulnerabilities or deficiencies in design, implementation or management. All patches and service packs have been applied.

References http://www.us-cert.gov/ncas/bulletins/sb11-108 http://repositonum.sdum.uminho.pt/bitstream/182272378//1/dca1j%20-%20mr.pdf http://www.ibm.com/developerworks/security/library/s-overflows/ http://www.mcafee.com/in/mcafee-labs.aspx ZENQ is a Pure Play Testing Services Company based in India. Our highly competent IT Professionals, Domain experts, combined with industry best practices & our investments in state-of-the-art technologies made us a dependable and long-term IT service partner to all our clients. For more details, visit our website www.zenq.com, OR send us an email at info@zenq.com