Magento Security Best practices 2015

Similar documents
Wordpress Security. A guide on how to not get hacked when using wordpress. David Kennedy (ReL1K) Twitter: Dave_ReL1K

Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes

Nikolay Zaynelov Annual LUG-БГ Meeting nikolay.zaynelov.com

Where every interaction matters.

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Hardened Hosting. Quintin Russ. OWASP New Zealand Chapter th December 2011

A Decision Maker s Guide to Securing an IT Infrastructure

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Apache & Virtual Hosts & mod_rewrite

Web Application Firewall

Railo Installation on CentOS Linux 6 Best Practices

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

How Web Application Security Can Prevent Malicious Attacks

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Bubble Code Review for Magento

CMPT 471 Networking II

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

STABLE & SECURE BANK lab writeup. Page 1 of 21

Vulnerability in Magento's implementation of PayPal

Penetration Testing Report Client: Business Solutions June 15 th 2015

Advanced Web Security, Lab

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

skype ID: store.belvg US phone number:

Forensic analysis of a Linux web server

CounterPoint SQL and Magento ecommerce Interface

Application Denial of Service Is it Really That Easy?

Reference Architecture: Enterprise Security For The Cloud

How To Protect A Web Application From Attack From A Trusted Environment

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Hacking the WordpressEcosystem

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Introduction to Endpoint Security

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Auto-Scaling WebApplication. Securityinthe Cloud. Stephen Coty. Chief Security Evangelist

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

IP Application Security Manager and. VMware vcloud Air

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

MAGENTO Migration Tools

New Systems and Services Security Guidance

TECHNICAL NOTE Stormshield Network Firewall AUTOMATIC BACKUPS. Document version: 1.0 Reference: snentno_autobackup

Recommended File System Ownership and Privileges

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Intro to Firewalls. Summary

Cloud Security:Threats & Mitgations

Web Intrusion Detection with ModSecurity. Ivan Ristic

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Firewalls and Intrusion Detection

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

What is Web Security? Motivation

Firewalls and Software Updates

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

SecurEnvoy Security Server. SecurMail Solutions Guide

Implementation of Web Application Firewall

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Joomla Security - Introduction

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

How to Grow and Transform your Security Program into the Cloud

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

A web application firewall for nginx. Thibault Koechlin (nbs-system)

Basic & Advanced Administration for Citrix NetScaler 9.2

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Network Security and Firewall 1

MySQL Security: Best Practices

Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy

Cisco Advanced Services for Network Security

WWPass External Authentication Solution for IBM Security Access Manager 8.0

Online Vulnerability Scanner Quick Start Guide

Filr 2.0 Administration Guide. April 2016

Network Test Labs (NTL) Software Testing Services for igaming

Practical Threat Intelligence. with Bromium LAVA

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Adobe Systems Incorporated

Barracuda Web Site Firewall Ensures PCI DSS Compliance

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

User Guide. You will be presented with a login screen which will ask you for your username and password.

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Installing buzztouch Self Hosted

Bubble Full Page Cache for Magento

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Self Service Penetration Testing

Introduction to the Mobile Access Gateway

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

SENSE Security overview 2014

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Windows Remote Access

Transcription:

http://goo.gl/mfpbws Grow your business safely Magento Security Best practices 2015 Q4 2015 11

e-commerce: the 60% rules >60% of web traffic is non-human >60% of attempts to steal databases target e-commerce sites >60% of growth for identity theft over three years A 2012 study showed Retailer websites are at risk 328 days/year An IP address is scanned around 40 times per day 22

The triple loot 33

A different time scale Time between attack launch and compromising Seconds Minutes Hours Days Weeks Months Years Time between compromising and discovery of it Statistics made based on large corporations in 2012 (Verizon Databreach report) 55

A *very* bad year 66

#@% A *very* bad year 7

#@% It all started with a big #fail (Shoplift) 8

#@% It all started with a big #fail (RSS orders) 9

#@% It all started with a big #fail (Magmi) 10

#@% Other SUrPrEEses 11

#@% Magento cache leak 12

But there were other before 13

#@% Did you took care of the previous ones? 14

#@% Did you took care of the previous ones? 15

#@% Did you took care of the previous ones? The PayPal / Magento integration flaw (by NBS) 16

NBS System will release a new vulnerability soon 17

#@% Or even the one that were not Magento specific? 18

PHP: two versions behind, really? PHP versions in use, in our parc: 88% are outdated and not supported anymore No security fixes. (and +12% to +40% performances to gain) 19

Easily exploitable things beyond classical vulnerabilities 20

When Magento support is being creative Magento Support giving dangerous advices Chmod 777 your document root *REALLY*? Magento is not compatible with Reverse proxies. *Woot*? Give me your root password so we can look *NO KIDDING*? Etc Don t go to a car dealer to fix a bad tooth 21

Classical mistakes that cost Leaving your logs accessible, especially Debug one Leaving payment gateway logs accessible to all Not hiding Magento, PHP, Apache versions Use a minimum of unaudited extensions, a lot are BAD Weak passwords, along with no locking policies are a plague 22

Applicative level D.o.S attacks Leaving import/export scripts, reindexers, crontabs accessible Try calling pages that load very slowly Access directly the API to import / export Etc. 23

Securing Magento Flaws 24

Securing Magento flaws Update to versions CE > 1.9 or EE > 1.14.1 Use PHP 5.6 Shoplift, Magmi, XML-RPC-XEE : filter the access with a.htaccess file (or an nginx rule) 25

Securing recent flaws Example with Magmi (using Apache) RewriteCond %{REQUEST_URI} ^/(index.php/)?magmi/ [NC] RewriteCond %{REMOTE_ADDR}!^192.168.0.1 RewriteRule ^(.*)$ http://%{http_host}/ [R=302,L] Example with Magmi (using Nginx) location ~* ^/(index.php/)?magmi { allow 192.168.0.1; deny all; location ~*.(php) { include fastcgi_params; } } 26

Protect your backoffice & updater Example using Apache <Location /wp-admin> AuthType Basic AuthName "Restricted Area" AuthUserFile /etc/apache2/access/htpasswd Require valid-user Order deny,allow Allow from [MY_IP] Satisfy any </Location> Then, just add a user: htpasswd c /etc/apache2/access/htpasswd [user] 27

Leveraging native Magento security Use HTTPS in Backoffice & order tunnels access Change your backoffice default URL Do *NOT* use a weak password (no «tommy4242» is not safe) Put some limits to number of failed login attempts Put a password expiration time and change it every 3 months Enforce use of case sensitive password Disable email password recovery 28

Securing Web application 29

Organizational security Get a security review Keep track of vulnerabilities on Magento ecosystem Have serious passwords, change them every 3 months Do not keep informations unless they are needed Pick a PCI/DSS certified hosting company Use 3D secure Keep up to date versions of Magento & PHP 30

Infrastructure security Keep a daily backup Use a WAF, NAXSI is opensource, free and stable Put rate limits on your Reverse Proxies Filter your outgoing trafic It s the job of your managed services provider. 31

Host level security Change default backoffice URL Disable directory indexing Have correct permissions : file=644, directory=755 No follow, no index on preprod Use the best practices mentioned before It s the job of your managed services provider. 32

High end security 33

CerberHost Humans Website Database Applicative stack Network Operating system Hardware Motivating wages Equipe SOC Security trainings Background checks N.A.X.S.I (web application firewall) ReqLimit (Anti applicative DoS) ExecVE killer File Upload checker PHP Suhosin V2 App scan Threadfix virtual patching MySQL Interceptor PHP Suhosin V2 Daemon hardening Anti DDoS Isolated Vlans Firewalling PAX GrSec Watch Folder PHP Malware finder Redundant hardware Redundant datacenters Redundant data storage Redundant telecom uplinks Log central Security Event Manager Ban Commander Flex Dynamic Firewall 34 9

Grow your business safely Contact contact@nbs-system.com +33.1.58.56.60.80 Twitter : @nbs_system 35