APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL



Similar documents
Application Security in the Software Development Lifecycle

HP Application Security Center

Vulnerability management lifecycle: defining vulnerability management

Global Security Report 2011

SAST, DAST and Vulnerability Assessments, = 4

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How to Grow and Transform your Security Program into the Cloud

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Enterprise Application Security Program

Passing PCI Compliance How to Address the Application Security Mandates

2015 TRUSTWAVE GLOBAL SECURITY REPORT

Rational AppScan & Ounce Products

The Web AppSec How-to: The Defenders Toolbox

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Mobile Application Security Sharing Session May 2013

Integrated Threat & Security Management.

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

McAfee Database Security. Dan Sarel, VP Database Security Products

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

IT Security & Compliance. On Time. On Budget. On Demand.

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

A Decision Maker s Guide to Securing an IT Infrastructure

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests

Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva

Vulnerability Management

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

The AppSec How-To: Achieving Security in DevOps

Simple Steps to Securing Your SSL VPN

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Put a Firewall in Your JVM Securing Java Applications!

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

WHITEPAPER. Nessus Exploit Integration

How To Ensure That Your Computer System Is Safe

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

PCI Compliance Updates

Trustwave MANAGED SECURITY TESTING

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Standard: Web Application Development

Sygate Secure Enterprise and Alcatel

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

I D C E X E C U T I V E B R I E F

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Sample Report. Security Test Plan. Prepared by Security Innovation

Avoiding the Top 5 Vulnerability Management Mistakes

The Top Web Application Attacks: Are you vulnerable?

Five keys to a more secure data environment

Information Security Services

Two Approaches to PCI-DSS Compliance

Into the cybersecurity breach

The AppSec How-To: 10 Steps to Secure Agile Development

Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers

Making Database Security an IT Security Priority

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

Recent Developments in PCI DSS. PCI in the Headlines Risks to Higher Education PCI DSS Version 1.2

Agenda , Palo Alto Networks. Confidential and Proprietary.

Seven Practical Steps to Delivering More Secure Software. January 2011

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Application Security 101. A primer on Application Security best practices

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Building a Web Application Security Program. Rich Mogull Adrian Lane Securosis, L.L.C.

How to Instrument for Advanced Web Application Penetration Testing

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

Breaking down silos of protection: An integrated approach to managing application security

WEB Penetration Testing

Improving Software Security at the. Source

From the Bottom to the Top: The Evolution of Application Monitoring

Cisco Security Optimization Service

Reducing Application Vulnerabilities by Security Engineering

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Lumension Endpoint Management and Security Suite

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Frequently Asked Questions

Extreme Networks Security Analytics G2 Vulnerability Manager

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Network Security. Intertech Associates, Inc.

Network Test Labs (NTL) Software Testing Services for igaming

Cyber Exploits: Improving Defenses Against Penetration Attempts

MANAGED SECURITY TESTING

Feeling Vulnerable? Jamie S. Herman, C CISO, CISM, CISSP Balazs Bucsay, OSCE, OSCP, GIAC, GPEN

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Strategic Information Security. Attacking and Defending Web Services

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

Challenges of Automated Web Application Scanning

Risk-based solutions for managing application security

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006

Total Protection for Compliance: Unified IT Policy Auditing

Interactive Application Security Testing (IAST)

The Art of Exploiting Logical Flaws in Web Apps. Sumit sid Siddharth Richard deanx Dean

Application Security Center overview

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Security Information Management (SIM)

Cyber Security for Start-ups: An Affordable 10-Step Plan

Third Party Security: Are your vendors compromising the security of your Agency?

elearning for Secure Application Development

Secure Web Gateways Buyer s Guide >

Transcription:

APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL Charles Henderson Trustwave SpiderLabs Session ID: Session Classification: SPO2-W25 Intermediate

AGENDA One size rarely fits all Sizing up an application Testing choices More than just testing Conclusions Q & A

ONE SIZE RARELY FITS ALL EJB for simple web app Using vi to develop an enterprise application Using a mainframe session for surfing the Internet Single server to run twitter Cracking passwords on an 80386

INFLEXIBLE APP-SEC SOLUTIONS Point and click web scanners No ability to detect complex vulnerabilities Low accuracy rate Purely automated source code review Only support common languages Low accuracy rate Fixed manual hour projects Fails to account for complexity of application

SIZING UP AN APPLICATION

WAYS TO MEASURE Platform & framework Age of application Time since last test Level of maintenance Application criticality Skill of developers Goals of testing User base Internet accessibility

PLATFORM & FRAMEWORK Only applications using specific web-based technologies have extensive automated scanning tools Some Rich Internet Application (RIA) technologies are not easily scanned Flash, Silverlight, etc. Legacy platforms and frameworks are more vulnerable to skilled attackers Embedded applications typically require a physical testing

AGE OF APPLICATION Older code tends to be more vulnerable, especially for webbased technology Older applications will often use vulnerable 3 rd -party libraries and frameworks, or vulnerable versions of currently secure ones Older applications tend to have architectural mistakes that have since been recognized and fixed passing parameters to command-line tools, building SQL with concatenated strings, for instance.

TIME SINCE LAST TEST Frequently tested applications may not need a comprehensive test if there are no major changes since last test Only incremental testing may be required, along with basic automated scanning

LEVEL OF MAINTENANCE Unmaintained code is typically at a high risk of compromise Original developers may no longer work for company Third-party components (libraries, controls, etc.) are unlikely to have been patched

APPLICATION CRITICALITY Sensitivity of data handled Financial Medical PII Business Revenue generated by application Disruption to business processes if application fails Compliance or regulatory mandates

SKILL OF DEVELOPERS Security staff usually have an idea about the skills of inhouse developers Software vendors or open source projects that are popular may have a reputation about their security skills; niche products are usually a mystery Outsourced developers are usually a mystery unless there is a high degree of visibility into the provider. Provider training, turnover rates, and skill are often difficult to assess.

USER BASE & INTERNET ACCESS Applications used by only 10 trusted administrators may not need comprehensive testing beyond authentication enforcement Self-provisioned users that are offered extensive interfaces may pose a great threat Private applications may have a lower risk profile, especially if source IP filtering is being used

GOALS OF TESTING Compliance mandate Internal policies Proactive security Post-breach security

TESTING CHOICES

TEST TYPES Fully automated scanning Manual pen testing Code review Deep static analysis

TOP 10 WEB APP VULNERABILITIES Source: 2013 Trustwave GSR

FULLY AUTOMATED SCANNING Appropriate only when accompanied with manual review of results Non-critical applications Relatively modern application & frameworks Only for web-based applications Impossible to discover complex vulnerabilities, including all logic flaws Will miss most authorization and authentication flaws

PRIVATE PERFORMANCES Online theater seat reservation system Put seats into a cart, then checkout later Once seats are in a cart, they are held so that seats are not overbooked Using multiple sessions 1. Put the seats you want into a cart 2. Put the remaining open seats into the second cart 3. Complete the checkout of the first cart 4. Never complete the checkout of the second cart.

SALAMI SLICING VARIANT Traditional Salami Slicing has been well known since at least the 1970 s Office Space, Superman III... Stealing small amounts of money repeatedly can add up

SALAMI SLICING VARIANT From June 2007 to May 2008, Michael Largent obtained at least $60,000 from E-trade, Schwab.com, Google Brokerages will commonly deposit a few cents to confirm new bank accounts Largent programmatically opened thousands of accounts The transfers were legal, the phony checking accounts were not 11,385 Schwab accounts were opened as Speed Apex from only five AT&T IP addresses

MANUAL PENETRATION TESTING Quantity of manual testing important to establish Size of application Number of pages Number of inputs Complexity of functionality Workflows User groups / classifications Permission levels Does not have internal visibility into application

CODE REVIEW Allows for thorough internal analysis of application Requires extensive development and security skills Can only be performed when source code available Better when combined with manual penetration testing

DEEP STATIC ANALYSIS Effective when source code is not available Allows for internal analysis of application internals Best when combined with manual penetration testing Enterprise-wide use of a single library or framework could be a single point of failure

ACTUAL FRAMEWORK FLAWS Apache MyFaces Insecure use of client-side view state Sun Mojarra Insecure use of client-side view state Oracle Application Framework Profoundly flawed diagnostic mode Unnamed game engine Systemic buffer overflows

MORE THAN JUST TESTING

AFTER THE TEST Testing only defines the risk; does nothing to solve it Remediation options: For web applications, virtual patching is an option Risk reduction by restrictive firewall rules, bolt-on IPSec Third-party assistance Deferment Lessons learned Developer training is critical Examples from their own apps are ideal for developers Learning how to hack an application can get devs excited about security

TACTICS VS. STRATEGY Application security programs are more than single tests strung together Inventory applications Prioritization of applications Clear SDLC mandates Application vendor review Commonly used frameworks and libraries must receive extensive attention, regardless of their source May vary testing on application; one year pen test, next year code review

WRAPPING UP

CONCLUSIONS Unless you are only securing one application, AppSec requires a diverse arsenal Multiple factors must be considered when determining what approach is appropriate for a specific target Budgets are not unlimited and it is important to make dollars spent count Understanding what you have is the first step to understanding what you need to protect

QUESTIONS & ANSWERS