Vulnerability Management in an Application Security World. AppSec DC November 12 th, 2009. The OWASP Foundation http://www.owasp.



Similar documents
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Agile and Secure: OWASP AppSec Seattle Oct The OWASP Foundation

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers

Streamlining Application Vulnerability Management: Communication Between Development and Security Teams

Using Sprajax to Test AJAX. OWASP AppSec Seattle Oct The OWASP Foundation

Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

Adobe Systems Incorporated

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Threat Modeling. 1. Some Common Definition (RFC 2828)

SAFECode Security Development Lifecycle (SDL)

Application Security Testing

Learning objectives for today s session

Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together. Dan Cornell. CTO, Denim

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

The AppSec How-To: 10 Steps to Secure Agile Development

BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES

Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan

Web application testing

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Software Development: The Next Security Frontier

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

Microsoft STRIDE (six) threat categories

How-to-Guide for Software Security Vulnerability Remediation. by Dan Cornell

Strategic Information Security. Attacking and Defending Web Services

Threat modeling. Tuomas Aura T Information security technology. Aalto University, autumn 2011

Development Processes (Lecture outline)

Secure By Design: Security in the Software Development Lifecycle

Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda

How To Protect Your Data From Attack

ISSECO Syllabus Public Version v1.0

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Threat Modeling Architecting & Designing with Security in Mind OWASP. The OWASP Foundation Venkatesh Jagannathan

Course Modules for Software Security

elearning for Secure Application Development

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Vulnerability management lifecycle: defining vulnerability management

white SECURITY TESTING WHITE PAPER

8070.S000 Application Security

Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company

Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva

FISMA / NIST REVISION 3 COMPLIANCE

Functional vs. Load Testing

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Rolling out an Effective Application Security Assessment Program. Jason Taylor, CTO

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Mobile Application Threat Analysis

Application Firewall Overview. Published: February 2007 For the latest information, please see

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Seven Practical Steps to Delivering More Secure Software. January 2011

Reducing Application Vulnerabilities by Security Engineering

2015 Vulnerability Statistics Report

An Introduction to Application Security in J2EE Environments

The Web AppSec How-to: The Defenders Toolbox

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

WHITEPAPER. Nessus Exploit Integration

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Application Security in the Software Development Lifecycle

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Integrating Web Application Security into the IT Curriculum

We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013

Passing PCI Compliance How to Address the Application Security Mandates

Transcription:

Vulnerability Management in an Application Security World AppSec DC November 12 th, 2009 Dan Cornell Global Membership Committee Denim Group dan@denimgroup.com (210) 572-4400 Twitter: @danielcornell The Foundation http://www.owasp.org

Agenda Background A Little Bit of Theatre You Found Vulnerabilities Now What? Vulnerability Management The Security Perspective Defect Management The Development Perspective Making it Work Case Studies Demo Questions 2

Background Dan Cornell : Sprajax, Open Review, San Antonio Chapter, Global Membership Committee Principal at Denim Group www.denimgroup.com Software Developer: MCSD, Java 2 Certified Programmer Denim Group Application Development and Remediation Java and.net Application Security Assessments, penetration tests, code reviews, training, process consulting 3

A Little Bit of Theatre 4

A Little Bit of Theatre This is a one-act play entitled: We Found Some Vulnerabilities Need a volunteer 5

Audience Composition? Software Developer Infrastructure Security Application Security Project Manager Other All of It 6

You Found Vulnerabilities Now What? 7

You Found Vulnerabilities Now What? Security Industry is too focused on finding vulnerabilities Especially in application security this typically isn t hard Finding vulnerabilities is of some value Fixing vulnerabilities is of great value Mark Curphey: Are You a Builder or a Breaker http://securitybuddha.com/2008/09/10/are-you-a-builder-or-a-breaker/ Organization s goal is to understand their risk exposure and bring that in-line with their policies Finding vulnerabilities is only the first step on that road 8

Vulnerability Management The Security Perspective 9

Vulnerability Management The Security Perspective Steps: Policy Baseline Prioritize Shield Mitigate Maintain For more information see: http://www.gartner.com/displaydocument?doc_cd=127481 10

So How Are We Doing? Policy Does your organization have policies for Application Security? Or is your policy Use SSL and do the Top 10? Baseline What are your organization s testing strategies? Hopefully not Run scanner XYZ the day before an application goes into production Also do you actually know how many applications you have in production? Prioritize How do you determine the business risk? Critical, High, Medium, Low often does not account for enough context To defend everything is to defend nothing 11

So How Are We Doing? (continued) Shield Have you deployed technologies to help protect you in the interim? WAFs, IDS/IPF Mitigate Do your developers know what the actual problems are? Do your developers know how to fix them? When are these vulnerabilities going to be addressed and when do they go into production? Did the application development team actually fix the vulnerabilities when they said they did? Maintain Web applications are dynamic what is the ongoing testing strategy? 12

Process 13

Defect Management The Developer Perspective 14

Defect Management The Developer Perspective Every day has 8 hours 12 if pizza and Jolt Cola are made available A given defect is going to require X hours to fix (+/- 50%) Tell me which defects you want me to fix and I will be done when I am done (+/- 50%) 15

Why is Vulnerability Management Hard for Application-Level Vulnerabilities Actual business risk is challenging to determine People who find the problems do not typically know how to fix them Or at the very least they are not going to be the people who fix them People who have to fix the problems often do not understand them 16

Why is Vulnerability Management Hard for Application-Level Vulnerabilities Infrastructure fixes are typically cookie-cutter, Application fixes are much more varied Patches and configuration settings Versus a full custom software development effort Software development teams are already overtaxed Applications no longer under active development may not have development environments, deployment procedures, etc 17

Making It Work 18

Making It Work Application security vulnerabilities must be treated as software defects Use risk and effort to prioritize 19

Application Vulnerabilities as Software Defects Track them in your defect management system (bug tracker) Select defects to address for each development cycle or release Serious vulnerabilities may require out-of-cycle releases 20

Risk and Effort Risk crossed with remediation effort Risk: STRIDE and DREAD (there are others) Effort: Development hours and other resources 21

Risk Calculation Exercise Quantitative risk can be hard to calculate Weighted Cost = Likelihood of occurrence x Cost of occurrence What is the chance (%) that Amazon.com will have a publicly-accessible SQL injection vulnerability exploited within the next year? What would the financial damage be to Amazon.com if a publicly-accessible SQL injection vulnerability was exploited? 22

STRIDE Spoofing Identity Tampering with Data Repudiation Information Disclosure Denial of Service Elevation or Privilege 23

DREAD Damage Potential Reproducibility Exploitability Affected Users Discoverability Assign levels: 1, 2, 3 with 3 being the most severe Average the level of all 5 factors Key: Define your DREAD levels up-front and apply consistently Organization-wide DREAD baseline Application-specific DREAD standards 24

Level of Effort Calculation Varies widely by type of vulnerability and number of vulnerabilities Logical Vulnerabilities versus Technical Vulnerabilities Technical Vulnerabilities tend to be based on coding issues Injection flaws, XSS, configuration issues Logical Vulnerabilities are specific to the application Depend on business logic and business context Authentication, authorization, trust Don t guess - build a Work Breakdown Structure (WBS) 25

Estimating Technical Vulnerabilities Go back to coding phase of SDLC Time per fix x Number of issues Grouping similar vulnerabilities into a smaller number of defects can aid communication Verification typically straightforward Application should behave as it always did, except that it now handles problem inputs correctly In some cases, the application depends on the vulnerable behavior 26

Estimating Logical Vulnerabilities May have to go farther back in the SDLC Coding Architecture/Design Even Requirements Fix strategies are more varied than technical vulnerabilities Change may require more broad change management initiatives Interaction between applications and systems within your organization Interaction between applications and systems in other organizations 27

Great Remediation Resource: ESAPI Enterprise Security API http://www.owasp.org/index.php/esapi Provide developers with an easy-to-understand API allowing them to code securely Encoding functions are great for remediating technical flaws Framework has components that help remediate logical flaws 28

Case Studies 29

Case Studies Authentication FUBAR Legacy Nightmares When Tools Fail 30

Authentication FUBAR Situation Several public-facing flagship applications under moderate ongoing development Vulnerabilities Various SQL injection and XSS Authorization problems Pervasive poor deployment practices (backup files, configuration issues) Verbose HTML comments with sensitive information Major, fundamental issue with Authentication Along the line of using SSNs to authenticate users to a system Connected to many partner organizations 31

Authentication FUBAR (continued) Approach Fix the serious SQL injection and publicly-accessible XSS immediately in an out-of-cycle release Address authorization problems and some other issues during next planned release Major full lifecycle, change management initiative to address Authentication issue Defer remaining issues as nice to fix 32

Legacy Nightmares Situation 10 year old application with hundreds of pages Has been on end-of-life status for 5 years NO active development Vulnerabilities Hundreds of SQL injection, XSS Authorization issues Approach Sit in the corner and cry softly for a few minutes Identify most critical SQL injection and XSS issues for code-level fixes Fix authorization issues Rely on WAF to address remaining issues 33

When Tools Fail Situation Thick-client application with a local database Connects to web services and ERP Vulnerabilities Code scanner identified many SQL injection vulnerabilities affecting the local database Code scanner identified some quality issues that could impact security Manual code inspection identified some frightening design issues affecting attack surface Approach Ignore local SQL injection issues for now Ignore quality issues for now Address design issues before the initial release 34

Recommendations Policy Have actual policies for secure software development and risk acceptance Must go beyond Top 10 or SANS 25 Tool classifications can be incorporated into these standards, but the standards must be business-focused rather than technology-focused Pennies spent on prevention save dollars spent on cures Baseline Know your application portfolio Have an ongoing program of controls in place Prioritize Static testing Dynamic testing Involve development teams Determine business risk Determine fix level of effort 35

Recommendations (continued) Shield Consider using adding signatures to WAFs or web-relevant IDS/IPS systems Understand that these do not address the underlying problem Mitigate Features > Performance > Security (unfortunate fact of life in many cases) Communicate the business risk and compliance implications Work into development schedules as resources are available Consider out-of-cycle releases for serious vulnerabilities Maintain Web applications are dynamic and attacks evolve this is an ongoing process 36

Demo 37

Questions? Dan Cornell dan@denimgroup.com Twitter: @danielcornell (210) 572-4400 Web: www.denimgroup.com Blog: denimgroup.typepad.com 38