OWASP Cornucopia. Ecommerce Website Edition. The OWASP Foundation. OWASP London https://www.owasp.org. 3rd June 2013



Similar documents
Criteria for web application security check. Version

Mobile Application Threat Analysis

Security Testing. How security testing is different Types of security attacks Threat modelling

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

PCI Compliance Updates

Development Processes (Lecture outline)

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Web Application Guidelines

PCI DSS E-commerce Guidelines

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Web Application Security. Srikumar Venugopal S2, Week 8, 2013

Understanding and evaluating risk to information assets in your software projects

Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A.

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Standard: Web Application Development

IT TECHNICAL SECURITY REVIEW CHECKLISTS FOR E-COMMERCE WEBSITES

Thick Client Application Security

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Software Security Touchpoint: Architectural Risk Analysis

Microsoft STRIDE (six) threat categories

Certification Report

elearning for Secure Application Development

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Sitefinity Security and Best Practices

PCI DSS: An Evolving Standard

Magento Security and Vulnerabilities. Roman Stepanov

What is Web Security? Motivation

The DirectOne E-Commerce System

Secure development and the SDLC. Presented By Jerry

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

ICANWK406A Install, configure and test network security

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

OWASP AND APPLICATION SECURITY

Evaluation of different Open Source Identity management Systems

SAFECode Security Development Lifecycle (SDL)

Security Characteristics of Cryptographic Mobility Solutions

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

Web application security

Web Application Security

PCI Security Standards Council

Security and Privacy in Cloud Computing

Chapter 10. Cloud Security Mechanisms

Introduction to Information Security

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

The Top Web Application Attacks: Are you vulnerable?

The Prevalence of Flash Vulnerabilities on the Web

OWASP Secure Coding Practices Quick Reference Guide

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Controller of Certification Authorities of Mauritius

Threat modeling. Tuomas Aura T Information security technology. Aalto University, autumn 2011

SENSE Security overview 2014

Central Agency for Information Technology

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Ecommerce Guide to PCI DSS 3.0

Penetration Test Report

Public Key Infrastructure (PKI)

Security features of ZK Framework

APIs The Next Hacker Target Or a Business and Security Opportunity?

Where every interaction matters.

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Cisco Trust Anchor Technologies

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Data Protection: From PKI to Virtualization & Cloud

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Strategic Platforms Information Security 2014

Know your enemy. Class Objectives Threat Model Express. and know yourself and you can fight a hundred battles without disaster.

Database security issues PETRA BILIĆ ALEXANDER SPARBER

ISO 27002:2013 Version Change Summary

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

INFORMATION TECHNOLOGY SECURITY STANDARDS

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Evaluate the Usability of Security Audits in Electronic Commerce

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

05.0 Application Development

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

How To Manage Security On A Networked Computer System

CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

IT Governance Committee Review and Recommendation

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Web Application Security Considerations

Guide for Securing With WISeKey CertifyID Personal Digital Certificate (Personal eid)

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Enterprise Application Security Workshop Series

Web Application Security

Secure Data Exchange Solution

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Network Test Labs (NTL) Software Testing Services for igaming

Threat Modeling Using Fuzzy Logic Paradigm

How To Secure Cloud Computing

Workday Mobile Security FAQ

An Approach to Threat Modeling in Web Application Security Analysis

Mobile & Security? Brice Mees Security Services Operations Manager

Transcription:

The OWASP Foundation OWASP London https://www.owasp.org 3rd June 2013 OWASP Cornucopia Ecommerce Website Edition OWASP Cornucopia - Ecommerce Website Edition helps developers identify security requirements from the OWASP Secure Coding Practices - Quick Reference Guide Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License Colin Watson Watson Hall Ltd London, United Kingdom https://www.watsonhall.com

SAFECode - Practical Security Stories and Security Tasks for Agile Development Environments 2

OWASP Secure Coding Practices Quick Reference Guide https://www.owasp.org/index.php/owasp_secure_coding_practices_-_quick_reference_guide 3

Microsoft Elevation of Privilege (EoP) Card Game http://www.microsoft.com/security/sdl/adopt/eop.aspx 4

Downloads for EoP http://www.microsoft.com/en-us/download/details.aspx?id=20303 5

ü More web application relevant EoP examples An attacker could squat on the random port or socket that the server normally uses An attacker can confuse a client because there are too many ways to identify a server An attacker can make [your authentication system client server] unusable or unavailable [without ever authenticating] [but the problem goes away when the attacker stops and the problem persists after the attacker goes away] (10 cards) An attacker can provide a pointer across a trust boundary, rather than data which can be validated Cornucopia examples Gary can take over a user's session because there is a long or no inactivity timeout, or a long or no overall session time limit, or the same session can be used from more than one device/location Marce can forge requests because persession, or per-request for more critical actions, strong random tokens or similar are not being used for actions that change state Eduardo can access data he does not have permission to, even though he has permission to the form/page/url/entry point 6

More coverage of web security requirements EoP suits = STRIDE Cornucopia suits Spoofing Tampering Impersonating something or someone else Repudiation Information Disclosure Session management Maintenance of user state Exposing information to someone not authorized to see it Authorization User/role permission controls Authentication Verification of identity claims and related processes Claiming to have not performed an action Data validation and encoding Input and output data validation and escaping Modifying data or code ü Denial of Service Cryptography Hashing, digital signatures, encryption and random number generation processes and their usage including key management Deny or degrade service to users Elevation of Privilege Gain capabilities without proper authorization Cornucopia (everything else) Including information leakage, data loss, dependencies, abuse of trust, non-repudiation, configuration management, function misuse, denial of service http://stride 7

Less colourful and less pictorial EoP playing cards ü û Cornucopia playing cards 8

Less vendor specific and more webapp/owasp specific EoP examples An attacker could take advantage of.net permissions you ask for, but don t use An attacker can alter information in a data store because it has weak ACLs or includes a group which is equivalent to everyone ( all LIve ID holders ) ü Cornucopia examples Bob can influence, alter or affect the application so that it no longer complies with legal, regulatory, contractual or other organizational mandates You have invented a new attack of any type Read more about application security in OWASP s free Guides on Requirements, Development, Code Review and Testing, the Cheat Sheet series, and the Open Software Assurance Maturity Model You have invented a new attack against Authorization Read more about this topic in OWASP s Development and Testing Guides 9

ü More information rich EoP Cornucopia Suit name (e.g. Denial of Service) Suit name (e.g. Authentication) Attack description Attack description Ranking (card number) Ranking (card number) Cross-referencing Security requirements, security verification checks, attack detection points, attack patterns and Agile user stories 10

ü More individual EoP An attacker could steal credentials stored on the server and reuse them (for example, a key is stored in a world readable file) An attacker can manipulate data because there s no integrity protection for data on the network An attacker can provide or control state information Cornucopia Shamun can bypass input validation or output validation checks because validation failures are not rejected or sanitized Kyun can access data because it has been obfuscated rather than using an approved cryptographic function Keith can perform an action and it is not possible to attribute it to him An attacker can say I didn t do that, and you d have no way to prove them wrong 11

ü What's in a name? The names can represent External or internal people Aliases for computer system components The application itself Other applications Services Operating systems Infrastructure Jim can undertake malicious, nonnormal, actions without real-time detection and response by the application 12

Identifying requirements with each card played Suit and value Attack description Cross-referencing Is this a viable attack for the function/system under consideration? Document the attack Subsequently use the cross-references to help create security requirements: User stories Unit tests Configurations etc 13

Example: Third party hosted payment form 1/3 Common e-commerce implementations Merchant-managed e-commerce implementations Commercial shopping cart/payment application Shared-management e-commerce implementations Proprietary/custom developed shopping cart/payment application Third-party embedded application programming interfaces (APIs) with Direct Post An inline frame (or iframe ) that allows a payment form hosted by a third party to be embedded within the merchant s page(s) Third-party hosted payment page which redirects the consumer to a page on an entirely different domain for payment entry Wholly outsourced e-commerce implementations 14

Example: Third party hosted payment form 2/3 The template used at the third party could be modified by an attacker 15

Example: Third party hosted payment form 3/3 Content on the page is included from a less trusted source JavaScript CSS Images Another third party (e.g. metrics, hosted JavaScript library) First party (i.e. merchant) 16

Deal the deck of cards Erik Ferdinand Outcomes: 10 72 Q 9 8 4 5 JK 8 A 7 Imogen Players have the same number of cards each Randomly select one player to lead the play for the first round e.g. Ferdinand Martin 17

Let play commence First round 1 0 Requirements 0 Rounds 10 7 8 1 0 Requirements 1 0 Rounds 7 3 J Erik Schedule of requirements K J A Ferdinand 8 Imogen 8 4 Q 0 Requirements 0 Rounds 9 2 Martin 9 5 A 10 Assume every player Except Imogen identified a security requirement, thus 1 point each for the others Ferdinand won the round with the King so he gets an additional 1 point, and leads the play for the next round 2 0 Requirements 1 0 Rounds 18

Second round 1 Requirements 0 Rounds 10 7 2 1 Requirements 1 Rounds 7 3 J Erik Schedule of requirements J Ferdinand A 8 Imogen 8 4 Q 1 0 Requirements 0 Rounds 9 Martin 9 5 A Only Ferdinand and Imogen identified new requirements and they each receive 1 point Martin won the round with the Ace so he gets 1 point for that, and leads the play for the next round 2 1 Requirements 0 Rounds 1 19

Third round 2 1 Requirements 0 Rounds 10 7 3 2 Requirements 1 Rounds 7 J Erik Schedule of requirements A Ferdinand 8 Imogen 8 Q 2 1 Requirements 1 0 Rounds 9 Everyone identified new requirements and they each receive 1 point Imogen won the round with the Queen so she gets 1 point for that, and leads the play for the next round Martin 9 5 2 1 Requirements 2 1 Rounds 20

Fourth round 3 2 Requirements 0 Rounds 10 4 3 Requirements 2 1 Rounds 7 Erik Schedule of requirements Schedule of requirements J A Ferdinand Imogen 8 3 2 Requirements 1 Rounds 9 Martin 5 Everyone identified new requirements and they again each receive 1 point Ferdinand won the round with the Jack so he gets 1 point for that, and leads the play for the final round he also has the most points so far 2 2 Requirements 3 1 Rounds 21

Fifth and final round 33 Requirements 00 Rounds 5 4 Requirements 2 Rounds 10 Schedule of requirements Schedule of requirements A Erik Ferdinand Imogen Martin 8 4 3 Requirements 2 1 Rounds Everyone except Erik identified new requirements and they each receive 1 point Imogen won the round with the 8 (trumps) so she gets 1 point for that Overall Ferdinand wins the game with a total of 7 points 2 3 Requirements 4 1 Rounds 22

Choose your deck of cards Cornucopia suits Data validation and encoding Input and output data validation and escaping Authentication Verification of identity claims and related processes Session management Maintenance of user state Authorization User/role permission controls Cryptography Hashing, digital signatures, encryption and random number generation processes and their usage including key management Cornucopia (everything else) Everything else including information leakage, data loss, configuration management, denial of service Full deck 23

Application-specific decks Cornucopia suits Data validation and encoding Input and output data validation and escaping Authentication Verification of identity claims and related processes Public information website Session management Maintenance of user state Authorization User/role permission controls f Cryptography Hashing, digital signatures, encryption and random number generation processes and their usage including key management Cornucopia (everything else) Everything else including information leakage, data loss, configuration management, denial of service Extranet 24

Development-specific decks Cornucopia suits Data validation and encoding Input and output data validation and escaping Authentication Verification of identity claims and related processes Organisation's coding and configuration standards Maintenance of user state or Compliance requirements (e.g. PCIDSS) Session management Authorization User/role permission controls Cryptography Hashing, digital signatures, encryption and random number generation processes and their usage including key management Cornucopia (everything else) Everything else including information leakage, data loss, configuration management, denial of service Framework X 25

Does Cornucopia matter? 26

Project plan Improvements Other editions Complete framework-specific card decks (Ecommerce website) Enhance text and mappings Web services Further developer feedback Mobile app Issue further releases Smart meter Graphical design Printing and distribution 27

Project on the OWASP wiki https://www.owasp.org/index.php/owasp_cornucopia 28

The project OWASP Cornucopia https://www.owasp.org/index.php/owasp_cornucopia https://lists.owasp.org/mailman/listinfo/owasp_cornucopia Download Cornucopia Ecommece Website Edition v1.00 https://www.owasp.org/index.php/file:owasp-cornucopia-ecommerce_website.docx Colin Watson colin.watson(at)owasp.org 29