Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006



Similar documents
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Learning objectives for today s session

How to Build a Trusted Application. John Dickson, CISSP

Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Application Code Development Standards

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Adobe Systems Incorporated

Passing PCI Compliance How to Address the Application Security Mandates

Reducing Application Vulnerabilities by Security Engineering

Using Free Tools To Test Web Application Security

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

An Introduction to Application Security in J2EE Environments

Rational AppScan & Ounce Products

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Enterprise Application Security Program

Agile and Secure: OWASP AppSec Seattle Oct The OWASP Foundation

Magento Security and Vulnerabilities. Roman Stepanov

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

Secure Code Development

The Top Web Application Attacks: Are you vulnerable?

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Using Sprajax to Test AJAX. OWASP AppSec Seattle Oct The OWASP Foundation

Web Application Penetration Testing

8070.S000 Application Security

Strategic Information Security. Attacking and Defending Web Services

WEB APPLICATION SECURITY

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Vulnerability Management in an Application Security World. AppSec DC November 12 th, The OWASP Foundation

Integrigy Corporate Overview

Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?

New IBM Security Scanning Software Protects Businesses From Hackers

Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May Belfast

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Security Testing and Vulnerability Management Process. e-governance

Development Processes (Lecture outline)

What is Web Security? Motivation

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

How To Write A Web Application Vulnerability Scanner And Security Auditor

05.0 Application Development

Web Engineering Web Application Security Issues

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

WebGoat for testing your Application Security tools

Application Security Best Practices. Wally LEE Principal Consultant

Building Security into the Software Life Cycle

Security Testing & Load Testing for Online Document Management system

Integrating Security Testing into Quality Control

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

Web Application Security

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

A Network Administrator s Guide to Web App Security

Application Security Testing

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together. Dan Cornell. CTO, Denim

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Threat Modeling. Deepak Manohar

Effective Software Security Management

Metrics, methods and tools to measure trustworthiness

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Web Applications The Hacker s New Target

Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden

State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters rd@rd1.net

Don t Get Burned! Are you Leaving your Critical Applications Defenseless?

HP Application Security Center

External Supplier Control Requirements

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

Transcription:

Turning the Battleship: How to Build Secure Software in Large Organizations Dan Cornell May 11 th, 2006

Overview Background and key questions Quick review of web application security The web application security scanner: a tool not a panacea To create secure software, build a process that embraces security Navigating organizational boundaries still a challenge Conclusion and Q&A 1

Key Learning Points Building a comprehensive application security program is not as easy as running an app vulnerability scanner or installing an application security firewall In order to build secure software, you need to have a software development lifecycle that considers security implications at every step You must overcome certain organizational, cultural, and business realities that prevent a large organization from building secure software on a consistent basis 2

Denim Group Background SA-based consultancy that builds and secures large-scale web applications Application development experience provides valued perspective on all aspects of software development process Application security services include: Black-box and white-box assessments Secure application development and remediation Application security training for developers, security professionals, and auditors Software development lifecycle development (SDLC) consulting Application security tool development Sponsors local Open Web Application Security Project Chapter 3

Myself Dan Cornell Founder of/partner in Denim Group Application developer J2EE.NET LAMP (Linux, Apache, MySQL, Perl/PHP) ASP, VB, ColdFusion, Python, C++, Started doing work in application security area after working on a number of e-commerce and other high-security-required applications 4

Key Questions Why is it that serious web application vulnerabilities still exist in organizations what have been conducting network and host-based assessments for years? How do information security professionals reduce the risk that Internet-facing applications represent to the enterprise? How can they quantify the risk when application security scanners identify only 30% of the most serious flaws that exist in large-scale web software systems? 5

OWASP Top 10 Critical Web Application Security Vulnerabilities Unvalidated Input Broken Access Control Broken Authentication and Authorization Cross Site Scripting (XSS) Buffer Overflows Injection Flaws Improper Error Handling Insecure Storage Denial of Service Insecure Configuration Management http://www.owasp.org/documentation/topten.html 6

Example App Vulnerability: SQL Injection SQL statements are created from a combination of static text and user inputs Assumption: users will enter well-formed inputs Attacker crafts a custom input to hijack control of the SQL interpreter and execute arbitrary code Very common flaw with tremendous security implications 7

Example App Vulnerability: SQL Injection Specially crafted input contains SQL control characters Malicious user sends in a username parameter of: Dcornell ; DROP DATABASE Ecommerce; -- Attacker can execute arbitrary database queries with the same permissions as the application View sensitive data Modify data Destroy data 8

Software Implementation Perfect World Actual Functionality Intended Functionality 9

Software Implementation Real World Actual Functionality Intended Functionality Built Features Bugs Unintended And Undocumented Functionality 10

Application Security Scanners Background Very adept at identifying technical flaws in applications via black-box approach Automated crawling of large applications essential Through 2010, enterprise that scan their web applications will experience a 70% reduction in security incidents in these apps* By 2008, at least 40% of enterprises will have adopted web scanning tools as part of dev process* Best of breed tools include SPI Dynamic s WebInspect and Watchfire s AppScan; Acunetix getting market attention Gartner 2006 11

Application Security Scanners Background Conventional wisdom is that scanners only get 30% of types of vulnerabilities Scanners are almost powerless to identify logical errors Usually these are the scariest vulnerabilities Authentication, authorization, trust assumptions, session management In the hands of most networks security professionals, results difficult to interpret Even tougher to provide recommendations to developers Numerous examples of security groups spinning their wheels Application security scanners identify vulnerabilities that need to be remediated, not patched Ultimately, as a standalone process, scanning alone creates a significant false sense of security 12

Application Security Scanning Recommendations Recommendations Conduct qualitative risk ranking of applications deployed Internet-facing and business critical applications first! Scan applications in black-box mode Perform focused white-box code review of hot spots Provide remediation recommendations based upon trade-offs Consider integrating results into tracking or QA systems Ultimately application security should become part of application quality Augment your team with internal or external resources that are web development savvy Auditors consider auditing scanning process and not applications themselves 13

Maslow s Hierarchy of Human Needs Actualization! Esteem Love/Belonging Safety Physiological 14

Dickson s Hierarchy of AppSec Needs SDLC Security Integration! App FW s Attack Modeling White Box Code Review Black Box Scanning 15

Building a Better and More Secure SDLC The iterative nature and rapid development of web software drives security throughout the process Different players (audit, security, architecture, app dev, and PM) need to know when they enter and exit the process Security professionals need a more fundamental understanding of their organization s development processes MSF vs. waterfall? Scrum vs. XP Different security concepts apply to different points of the SDLC Inception, design, development, QA, and deployment 16

Security Integration Points within the SDLC Inception Design Development QA Deployment Source: Gartner (February 2006) 17

Security Integration Points within the SDLC Define Security Coding Standards Capture Security Requirements Security Requirement Mapping Inception Design Development QA Deployment Source: Gartner (February 2006) 18

Security Integration Points within the SDLC Security Design Review Security Use Cases Definition of Security Test Cases in Dev & QA Threat Modeling Inception Design Development QA Deployment Source: Gartner (February 2006) 19

Security Integration Points within the SDLC Security Code Review Security Unit Testing Automated Security Build Process Testing Automated Security White-Box Code Scanning Tools Inception Design Development QA Deployment Source: Gartner (February 2006) 20

Security Integration Points within the SDLC Security System and Functional Test Automated Black-box Security Scanning Automated Security Code Scanning Security Regression Testing Inception Design Development QA Deployment Source: Gartner (February 2006) 21

Security Integration Points within the SDLC Automated Black-Box Scanning Security Issues Tracking Weekly QA/Support Security Issues Meeting Security Update Patch Test, Release and Distribution Process Inception Design Development QA Deployment Source: Gartner (February 2006) 22

Bridge Cultural Gap Between Security and Developers A huge roadblock to implementing secure software Key Challenge: Build vs. Measure Cultures Application Development groups are building technical capabilities based upon evolving business requirements Corporate IS Security dept. in charge of ongoing security operations Although mostly security managers worry about secure software, ultimately it will be the development teams that solve the problem. Results of informal survey! 23

Conclusion Application security scanning is a first step to tackling the application security problem Ultimately, you need to help build a software development lifecycle that considers security implications at every step Organizational, cultural, and business sometimes are a bigger challenge than technical issues to fixing the problem 24

Questions & Answers Dan Cornell dan@denimgroup.com, 210.572.4400 Web Site: www.denimgroup.com Blog: denimgroup.typepad.com Jumpstart Document and OWASP A Guide to Building Secure Applications and Secure Web Services available upon request 25