Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP



Similar documents
Learning objectives for today s session

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Using Free Tools To Test Web Application Security

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Rational AppScan & Ounce Products

How to Build a Trusted Application. John Dickson, CISSP

Application Code Development Standards

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

The Top Web Application Attacks: Are you vulnerable?

Web Application Penetration Testing

HP Application Security Center

Reducing Application Vulnerabilities by Security Engineering

Adobe Systems Incorporated

05.0 Application Development

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

WebGoat for testing your Application Security tools

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Automatic vs. Manual Code Analysis

From the Bottom to the Top: The Evolution of Application Monitoring

SAST, DAST and Vulnerability Assessments, = 4

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Enterprise Application Security Program

Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together. Dan Cornell. CTO, Denim

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

IBM Rational AppScan: Application security and risk management

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Passing PCI Compliance How to Address the Application Security Mandates

Security Testing and Vulnerability Management Process. e-governance

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper

Streamlining Application Vulnerability Management: Communication Between Development and Security Teams

Web Application Security Roadmap

Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group

Strategic Information Security. Attacking and Defending Web Services

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Where every interaction matters.

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications

Web application security: automated scanning versus manual penetration testing.

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Comparing the Effectiveness of Penetration Testing and Static Code Analysis

Metrics, methods and tools to measure trustworthiness

Web Application Report

Table of Contents. Page 2/13

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Magento Security and Vulnerabilities. Roman Stepanov

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

A Network Administrator s Guide to Web App Security

elearning for Secure Application Development

F5 Silverline Web Application Firewall Onboarding: Technical Note

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Development Processes (Lecture outline)

External Supplier Control Requirements

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Five Steps to Achieve Risk-Based Application Security Management Make application security a strategically managed discipline

Your world runs on applications. Secure them with Veracode.

Integrating Tools Into the SDLC

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Building a Robust Web Application Security Plan

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Integrating Security Testing into Quality Control

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Leveraging OWASP to Reduce Web App Data Breach Risk

Software Security. Group project: application security verification using OWASP ASVS

Building Assurance Into Software Development Life- Cycle (SDLC)

Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan

Application Security 101. A primer on Application Security best practices

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Transcription:

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Learning objectives for today s session Understand different types of application assessments and how they differ Be exposed to some of the tools of the trade Understand testing coverage and limitation of automated tools

Denim Group Background Professional services firm that builds & secures enterprise applications Application security services include: Black-box and white-box assessments Secure application development and remediation Application security training for developers, security professionals, and auditors Software development lifecycle development (SDLC) consulting Application identity management enablement Competencies in the following areas: PCI pre-assessment readiness Secure agile development Threat modeling

Personal Background 15-year information security consultant background Principal at Denim Group Ex-Air Force security analyst at AFCERT Trident Data Systems, KPMG, SecureLogix, and Denim Group information security consultant Works with CISOs to help them develop and deploy more secure systems and applications CISSP since 1998

Key Challenges Why is it that serious web application vulnerabilities still exist in organizations what have been conducting network and hostbased assessments for years? How do information security professionals reduce the risk that Internet-facing applications represent to the enterprise when they have little control over development efforts? How can they quantify the risk when application security scanners identify only ~30% of the most serious flaws that exist in large-scale web software systems?

5 Software Implementation Perfect World Actual Functionality Actual Intended Functionality Intended Functionality

6 Software Implementation Real World Intended Functionality Actual Functionality Bugs Intended Actual Functionality Functionality Unintended and Undocumented Functionality Built Features

Nature of Application Security Problem Most security professionals do not have a development background Security managers do not control application development Security requirements rarely are central to development priorities Attackers are focusing more on web applications as network perimeters are more secure Fielded applications developed over the years are largely insecure Who gets fired first when penetration occurs via web application?

1999 Network Security Question? Firewall?

2009 Application Security Question? Automated Application Scanner?

Types of Application Vulnerabilities Technical Implementation flaws introduced at the keyboard Straightforward to identify and mitigate Most analogous to TCP vulnerabilities Scanners best suited to identify technical flaws Logical Architectural or design flaws typically introduced before coding Much harder to identify potentially painful to mitigate Fix might include an architectural re-write Scanners deeply limited in ID ing logical flaws

Dynamic, Static and Manual Testing

Black Box Assessments Automated application security testing that view the security state of an application from the outside looking in Mirrors the perspective of an outside attacker Infers that certain vulnerabilities exist by sending inputs to an application and analyzing outputs Does not involve review of application source code

Pro s for black box assessment approach Well understood by security professionals Network vulnerability analogy Measures security state of environment in which application resides Can quantify security risks of third-party components or other resources outside the application

Con s for black box assessment approach Results tell you what vulnerabilities exist, not how or why they exist Can only test the attack surface they identify May be additional endpoints with vulnerabilities Provides less input for remediation

White Box Assessments Involve reviewing application source code to determine the difference between what security was designed in the system and what was built Typically complemented with an architectural design review to ID non-code problems

Pro s for white box assessment approach Identifies exactly where vulnerabilities exist and why/how they occurred Tells you definitively whether code design is implemented in source code Easier to begin remediation because the exact location of the vulnerabilities has been identified

Con s for white box assessment approach Potentially can generate a large number of false positives ( noise ) if source code analyzer is not tuned well Provides less feedback on environmental components that affect the security of an application Likely the sole domain of developers security staff are less trained to interpret results Sometimes hard to identify context

Black box automated assessment tools HP (SPI Dynamics) WebInspect & DevInspect IBM Rational (Watchfire) AppScan Cenzic Hailstorm NT Objectives NTO Spider Acunetix Web Vulnerability Scanner

White box assessment tools Major product vendors: Fortify Source Code Analyzer Ounce Labs Coverity Prevent SQS Attributes Licenses are often priced by LOC Most web languages, some legacy languages

Limitations of Automated Tools Only find technical flaws in applications What about Logical flaws? Don t not capture security state of application Threat modeling helps here Can require sophisticated users to drive them correctly Can provide a false sense of security

Software as a Service Hybrid approach to assessing application security Two primary approaches Dynamic scanning with some manual verification Testing of binaries Initial vendors: Veracode WhiteHat Security

Potential security points in SDLC Inception Design Development QA Deployment

OWASP Top 10 Critical Web Application Security Vulnerabilities Cross Site Scripting (XSS) Injection Flaws Malicious File Execution Insecure Direct Object Reference Cross Site Request Forgery Information Leakage and Improper Error Handling Broken Authentication and Session Management Insecure Cryptographic Storage Insecure Communications Failure to Restrict URL Access http://www.owasp.org/documentation/topten.html

25 Q&A + Giveaway Contact Information John B. Dickson, CISSP Principal Denim Group, Ltd. John.Dickson@denimgroup.com (210) 572-4400