IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING



Similar documents
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

The Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY

Improving your Secure SDLC ( SSDLC ) with Prevoty. How adding real-time application security dramatically decreases vulnerabilities

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Interactive Application Security Testing (IAST)

From the Bottom to the Top: The Evolution of Application Monitoring

End-to-End Application Security from the Cloud

IBM Security QRadar Risk Manager

SANS Top 20 Critical Controls for Effective Cyber Defense

Vulnerability Management

QRadar SIEM and FireEye MPS Integration

IBM Security Intelligence Strategy

The Web AppSec How-to: The Defenders Toolbox

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Решения HP по информационной безопасности

IBM SECURITY QRADAR INCIDENT FORENSICS

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company

White Paper The Dynamic Nature of Virtualization Security

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

IBM QRadar Security Intelligence April 2013

Breaking down silos of protection: An integrated approach to managing application security

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

THE TOP 4 CONTROLS.

End-user Security Analytics Strengthens Protection with ArcSight

IBM Security QRadar Risk Manager

Redefining SIEM to Real Time Security Intelligence

Continuous Network Monitoring

Security and Vulnerability Testing How critical it is?

IBM Security QRadar Vulnerability Manager

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing

Attack Intelligence: Why It Matters

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

IBM QRadar as a Service

How to Instrument for Advanced Web Application Penetration Testing

Strengthen security with intelligent identity and access management

Win the race against time to stay ahead of cybercriminals

Enterprise-Grade Security from the Cloud

High End Information Security Services

Concierge SIEM Reporting Overview

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Realize That Big Security Data Is Not Big Security Nor Big Intelligence

Introducing IBM s Advanced Threat Protection Platform

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Boosting enterprise security with integrated log management

Real-time hybrid analysis:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

The SIEM Evaluator s Guide

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

REVOLUTIONIZING ADVANCED THREAT PROTECTION

The webinar will begin shortly

FIREMON SECURITY MANAGER

IBM Security IBM Corporation IBM Corporation

Extreme Networks Security Analytics G2 Vulnerability Manager

APPLICATION PROGRAMMING INTERFACE

Bridging the gap between COTS tool alerting and raw data analysis

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

2015 Vulnerability Statistics Report

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

IT Security & Compliance. On Time. On Budget. On Demand.

1 Introduction Product Description Strengths and Challenges Copyright... 5

Application Security in the Software Development Lifecycle

FIVE PRACTICAL STEPS

Risk-based solutions for managing application security

McAfee Database Security. Dan Sarel, VP Database Security Products

How To Buy Nitro Security

HP Application Security Center

QRadar SIEM and Zscaler Nanolog Streaming Service

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

Bringing your Security Eco-System closer to Purity utilizing a Vulnerability Data Refinery

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

The Sophos Security Heartbeat:

TIBCO Cyber Security Platform. Atif Chaughtai

What is Security Intelligence?

Cybersecurity and internal audit. August 15, 2014

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

Put a Firewall in Your JVM Securing Java Applications!

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Transcription:

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation

2 ABSTRACT Enterprises today rely on applications to run their businesses as never before. The security of those applications has never been more paramount. Consequently, major investments have been made in developing and implementing application vulnerability management programs. There is a lot of pressure on both the Builders those developing applications and features and the Defenders those in charge of ensuring application security. Business needs more features and more applications quickly. The use of agile development methodologies with fast release cycles makes it extremely difficult to scan all applications and remediate all vulnerabilities prior to release. This issue is compounded by the challenges of securing resources to remediate backlogs of vulnerabilities in legacy applications. The gap between vulnerable applications in production and secure, remediated applications introduces a vulnerable zone that leaves enterprises exposed. This paper will: Identify and examine the vulnerable zone Outline how vulnerability management programs are not in themselves capable of determining an enterprise s exposure to application threats Describe how vulnerability management programs, while valuable, are incapable, on their own, of determining enterprise exposure from applications Introduce a new monitoring technology that provides real-time application threat intelligence Discuss the actions that can be taken based on this intelligence to make existing security infrastructure and vulnerability management programs more effective

3 THE VULNERABLE ZONE For enterprise application development teams also known as the Builders the pressure is on to release early and release often to keep up with the reality of modern business means that. Agile development methodologies have become the norm in most industries and anything that slows down the release of new features and new applications is considered a major negative. Application releases have almost become a continuous process. This poses a problem for the information security teams the Defenders. Vulnerability management programs will typically use a combination of Static (SAST) and Dynamic (DAST) testing together with penetration testing, and often yield long lists of identified vulnerabilities. These programs are essentially sequential by nature and, the faster that applications are released, the more often they have to be scanned. Most importantly, Builder resources are required to complete remediation and, once again, the faster the release cycle the greater the lag to remediated code. Of course, ideally all of this would happen before the application goes to production but in many cases the pressure to deliver new features and applications results in a production release with un-scanned applications or with un-remediated vulnerabilities.

4 The gap that is introduced between released, un-remediated applications in production and those with all of identified vulnerabilities fully addressed can be characterized as the Vulnerable Zone. For larger enterprises with lots of applications, particularly those with a significant number of known-to-be-vulnerable legacy applications, the vulnerable zone can have a major impact on an enterprise s risk profile. Today, because there is simply no visibility into what attacks are actually hitting these applications when they are running in production, it is impossible to determine the true, actual impact of each vulnerability on the enterprise. This leaves security and application development executives with some serious questions to answer: Are the vulnerabilities actually being exploited? If the application was remediated, did the developers succeed in plugging all the holes? Did the application security testing tools and penetration testers find all the vulnerabilities in the application? How will I know if there is a zero day that my testing tools and penetration testers don t know about? Which applications should I prioritize for remediation? Proper application security monitoring should be able to provide the necessary intelligence to support answering all of these questions.

5 INTRODUCING APPLICATION SECURITY The concept of application performance monitoring (APM) using technologies from vendors such as New Relic and AppDynamics is well understood. What if it was possible to use the same monitoring approach -- not for application performance, but for application security attacks? Prevoty Application Security Monitoring (ASM) is a new capability designed to give enterprises: The ability to determine which applications are actually under attack in order to manage risk and prioritize remediation efforts and increase effectiveness of vulnerability management programs Accurate intelligence to enable an instant, effective response by proactively blocking IP addresses of bad actors without the risk of false positives Detailed information on all database queries issued by specific applications, allowing for detailed audit trails and supporting root cause analysis for data breaches An easy upgrade to runtime application self-protection (RASP) in order to automatically neutralize the identified attacks

6 Without requiring any changes to the application, plug-ins enable Prevoty to run inside the application itself. Prevoty-enabled applications are able to deliver unparalleled insights into what is happening in the application from a security perspective, including the Four W s of an attack: WHO IDENTIFY THE ORIGIN OF THE THREAT Includes IP address, session information (including User ID if available), cookie detail WHAT PROVIDE DETAILS OF THE NATURE OF THE THREAT Contents of the payload, payload intelligence WHERE WHERE THE EXPLOIT HAPPENED IN YOUR APPLICATIONS URL for web applications, stack trace for SQL queries WHEN WHEN DID THE ATTACK TAKE PLACE Timestamp (down to the nanosecond)

7 This intelligence is available in real-time for consumption by SIEM s such as Splunk, ArcSight, QRadar, etc. and can be used as a definitive source of information for root cause analysis (RCA).

8 HOW IT WORKS At a conceptual level, Prevoty ASM works as follows: Analyze Alert Plug-Ins 1 2 3 4 1 Applications are instrumented to call the security engine via Plug-ins (no coding required) 2 At runtime, the application automatically sends payloads to the security engine via the Prevoty API 3 The security engine analyzes the incoming payload and determines whether it is malicious. The analysis is effected with no dependence on signatures, definitions or pattern matching 4 If the payload is malicious, alerts are issued to the Prevoty console plus any logs and SIEM s configured. Detailed information on who / what / where / when of the attack is included

9 MANAGING THE VULNERABLE ZONE Prevoty ASM can help answer the questions raised around improving the effectiveness of an enterprise vulnerability management program Are the vulnerabilities actually being exploited? Prevoty ASM accurately identifies those applications that are under attack and those that are not If the application was remediated, did the developers succeed in plugging all the holes? Prevoty ASM accurately identifies any exploited vulnerability by detailing the URL for web applications and a full stack trace for SQL injections Did the application security testing tools and penetration testers find all the vulnerabilities in the application? Any incident reported by Prevoty ASM is an actual exploit of a vulnerability, whether this was a known vulnerability or not Which applications should I prioritize for remediation? Knowing which applications are actually under attack is a great start. Evaluating risk based on the business-criticality of the application and the data it accesses allows for better decision-making With Prevoty ASM s application monitoring capabilities in place, it s simple and easy to upgrade services to add real-time application protection. Prevoty provides a scalable means to dramatically reduce vulnerability backlogs in legacy applications. It also gives Builders and Defenders the time to remediate the most critical applications on their own schedule without leaving the applications exposed.

10 SUMMARY The demands of modern business and its impact on application release cycles means that most enterprise are continuously dealing with a vulnerable zone. Builders and Defenders both want the same thing: to be able to continuously release secure applications. But it s not easy without visibility into what is actually happening to the production application portfolio. Prevoty s application security monitoring capability can identify the applications that are actually under attack, the nature of those attacks, where they originated from, and -- most important from a remediation standpoint -- the weak points in the applications that are being exploited. Using this intelligence to determine both the efficacy of vulnerability management programs and prioritize remediation efforts helps Builders and Defenders work more effectively together. A basic version Prevoty ASM is available as a cloud service free of charge. For details, to request access to the service, see a live demo, or simply get more information, please visit. PREVOTY: SECURE THE HEART OF YOUR BUSINESS