DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, 2009. The OWASP Foundation http://www.owasp.



Similar documents
Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Points of View. CxO s point of view. Developer s point of view. Attacker s point of view

Web Engineering Web Application Security Issues

elearning for Secure Application Development

05.0 Application Development

What is Web Security? Motivation

Adobe Systems Incorporated

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Strategic Information Security. Attacking and Defending Web Services

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Web Application Security

Where every interaction matters.

Rational AppScan & Ounce Products

Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A.

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Criteria for web application security check. Version

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Intrusion detection for web applications

Web application security

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

90% of data breaches are caused by software vulnerabilities.

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Passing PCI Compliance How to Address the Application Security Mandates

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Thick Client Application Security

ensuring security the way how we do it

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

The Top Web Application Attacks: Are you vulnerable?

Enterprise Security API (ESAPI) Java Java User Group San Antonio. Jarret Raim June 3 rd, 2010

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

<Insert Picture Here> How to protect sensitive data, challenges & risks

Enterprise Application Security Program

(WAPT) Web Application Penetration Testing

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Table of Contents. Page 2/13

Web Application Report

Validation Procedure. ANNEX 4. Security Testing Basis

Application Code Development Standards

Pentests more than just using the proper tools

Pentests more than just using the proper tools

Magento Security and Vulnerabilities. Roman Stepanov

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Don t Get Burned! Are you Leaving your Critical Applications Defenseless?

Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group

Sitefinity Security and Best Practices

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Network Test Labs (NTL) Software Testing Services for igaming

Sichere Software- Entwicklung für Java Entwickler

MANAGED SECURITY TESTING

Web Application Vulnerability Testing with Nessus

Reducing Application Vulnerabilities by Security Engineering

Cloud Security:Threats & Mitgations

External Supplier Control Requirements

8070.S000 Application Security

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Check list for web developers

Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May Belfast

Web Application Firewall on SonicWALL SSL VPN

Web Application Security Assessment and Vulnerability Mitigation Tests

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Automating Security Testing. Mark Fallon Senior Release Manager Oracle

Implementation of Web Application Firewall

WEB APPLICATION SECURITY

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Lecture 15 - Web Security

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers

Essential IT Security Testing

WHITEPAPER. Nessus Exploit Integration

How To Write A Web Application Vulnerability Scanner And Security Auditor

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Web Application Penetration Testing

Information Security. Training

OWASP Top Ten Tools and Tactics

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Certified Secure Web Application Security Test Checklist

Executive Summary On IronWASP

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release February 2014

MySQL Security: Best Practices

Kentico CMS security facts

Columbia University Web Security Standards and Practices. Objective and Scope

Web Application Firewall on SonicWALL SRA

Application Security Testing. Generic Test Strategy

Testing the OWASP Top 10 Security Issues

Transcription:

DISA's Application Security and Development STIG: How Can Help You AppSec DC November 12, 2009 Jason Li Senior Application Security Engineer jason.li@aspectsecurity.com The Foundation http://www.owasp.org

About Me Senior Application Security Engineer Five different organizations 12 applications validated against ASD STIG this year CAT I s in almost all of them! Global Projects Committee member Star Trek Fan Ballroom Dancer 2

About DISA Defense Information Systems Agency Part of the Department of Defense Administers and protects DoD command and control systems and enterprise infrastructure 3

About DISA STIGs Offers configuration guides and checklists for: Databases Operating Systems Web Servers Etc... Provides standard findings and impact ratings CAT I, CAT II, CAT III 4

Application Security and Development STIG First draft November 2006; first release July 2008 129 requirements covering: Program Management Design & Development Software Configuration Management Testing Deployment 5

Application Security and Development STIG ASD STIG applies to all DoD developed, architected, and administered applications and systems connected to DoD networks Essentially anything plugged into DoD 6

Application Security and Development STIG Requirements can be extremely broad: e.g. APP3510: The Designer will ensure the application validates all user input e.g. APP3540: The Designer will ensure the application is not vulnerable to SQL Injection 7

Application Security and Development STIG Requirements can be extremely specific: e.g. APP3390: The Designer will ensure users accounts are locked after three consecutive unsuccessful logon attempts within one hour 8

Application Security and Development STIG Requirements can be esoteric: e.g. APP3150: The Designer will ensure the application uses FIPS 140-2 validated cryptographic modules to implement encryption, key exchange, digital signature, and hash functionality 9

Application Security and Development STIG Requirements can be expensive: e.g. APP2120: The Program Manager will ensure developers are provided with training on secure design and coding practices on at least an annual basis 10

Lost in the Weeds 11

Roadmap to Success 12

Start Right Allocate Time Proper allowances in scheduling are key! Improve Acquisitions See Secure Software Development Contract Annex Become Aware See Application Security Verification Standard 13

Improving Developer Awareness Top Ten provides a high level overview Development Guide provides more specific development guidance ESAPI Project provides standard controls 14

Improving Developer Awareness Top Ten 2007 A1 Cross Site Scripting A2 Injection Flaws A3 Malicious File Execution A4 Insecure Direct Object Reference A5 Cross Site Request Forgery A6 Information Leakage and Improper Error Handling A7 Broken Authentication and Session Management A8 Insecure Cryptographic Storage A9 Insecure Communications A10 Failure to Restrict URL Access ASD STIG APP3580 APP3540, APP3570 APP3740 APP3450, APP3480, APP3620 N/A APP3120, APP3620 APP3460, APP3415, APP3420, APP3430 APP3210, APP3340 APP3250, APP3330 APP3620 15

Improving Developer Awareness Top Ten 2004 A1 2004 Unvalidated Input A2 2004 Broken Access Control A3 2004 = A7 2007 A4 2004 = A1 2007 A5 2004 Buffer Overflow A6 2004 = A2 2007 A7 2004 = A6 2007 A8 2004 = A8 2007 A9 2004 Application Denial of Service A10 2004 Insecure Configuration Management ASD STIG APP3510 APP3470, APP3480 APP3590 APP6080 APP3110, APP3290, APP3450, APP3470, APP3480, AP3500, APP6030, APP6040, APP6050, APP6210, APP6240, APP6250, APP6260, APP6260 16

Improving Developer Awareness Use the Development Guide Provides background about key appsec areas http://www.owasp.org/index.php/category:_guide_project 17

ESAPI Project Use standardized security controls Standardized library means faster development! Custom Enterprise Web Application Enterprise Security API Validator User Security configuration Randomizer Logger Log Factory Intrusion Detector HTTP Utilities Executor Encryptor Encrypted Properties Encoder Authenticator Access Reference Map Access Controller http://www.owasp.org/index.php/esapi 18

ASD Gotchas APP3010: Label all external links APP3270: Identify classification of pages APP3440: Include the DoD Logon banner APP3530: Set charset in the Content-Header APP3320: Enforce DoD password policy 19

ASD Gotchas (cont.) APP3390: Lock users after 3 attempts w/in 1 hr APP3400: Do not allow automatic timed unlock APP3660: Show last and failed login details, including date, time and IP address APP3415: Enforce session idle timeout APP3420: Include a logout link 20

Do Self Validation ASD Checklist provides a starting point for tests Testers are often left unable to thoroughly test Testing Guide provides guidance for testers of web applications: http://www.owasp.org/index.php/ Testing_Guide 21

Boldy Go Level Program Management Design & Development Testing 3 Provide Security Awareness Training Standardize dev, build, and test platforms Create Application Threat Model Develop Security Logging Policy Perform Third Party Code Reviews Maintain Code Coverage Statistics 2 Add ASD STIG to Contract Language Use Common Criteria Validated Products Enforce All Data Input Specifications Use Standardized Security Controls and Libraries Perform Fuzz Testing Use Automated Security Tools 1 Allocate Time in Program Schedule Distribute Secure Coding Guidelines Use SSL with DoD Issued PKI Certificates Fix Easy ASD Gotchas Track Security Flaws Create and Perform Security Tests 22

Summary Know the variety of ASD STIG requirements Leverage Projects: Secure Software Development Contract Annex Application Security Verification Standards Top Ten Development Guide ESAPI Testing Guide 23

Questions? Management Implementation Verification Foundation Contact: Jason Li jason.li@aspectsecurity.com 24