FROM CONTINUOUS INTEGRATION TO VIRTUAL PATCHING BUILDING APPSEC ALL ALONG THE WEB APPLICATION LIFECYCLE.

Slides:



Advertisements
Similar presentations
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Advertisements

Hands on Demonstration for Testing Security in Web Applications
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
1Copyright © 2005 InfoGard Laboratories Proprietary 2005 Physical Security Conference Physical Security 101 Tom Caddy September 26, 2005.
OWASP Xenotix XSS Exploit Framework
Red Team “You keep using that word, I do not think it means what you think it means” – Inigo Montoya.
Boost your network security with NETASQ Vulnerability Manager.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
OWASP APPSEC, 2013 JEREMIAH GROSSMAN Founder and THE REAL STATE OF WEBSITE SECURITY and THE TRUTH ABOUT ACCOUNTABILITY and “BEST-PRACTICES.”
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Norman SecureSurf Protect your users when surfing the Internet.
A Scanner Sparkly Web Application Proxy Editors and Scanners.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Security and Privacy Services Cloud computing point of view October 2012.
Dell Connected Security Solutions Simplify & unify.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
CakePHP is an open source web development framework. It follows Model-View- Controller and is developed using PHP. IT is the basic for user to create.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 ITGD 2202 Supervision:- Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-SayeghStudent: Anwaar Ahmed Abu-AlQumboz.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Web Applications Testing By Jamie Rougvie Supported by.
Developer TECH REFRESH 15 Junho 2015 #pttechrefres h Understand your end-users and your app with Application Insights.
Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Blending Automated and Manual Testing Making Application Vulnerability Management Pay Dividends.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
New Techniques in Application Intrusion Detection Al Huizenga, Mykonos Product Manager May 2010.
Deconstructing API Security
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Computer Security By Duncan Hall.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
IT323 - Software Engineering 2 1 Tutorial 4.  List the main benefits of software reuse 2.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
Copyright © New Signature Who we are: Focused on consistently delivering great customer experiences. What we do: We help you transform your business.
© 2013 IBM Corporation Accelerating Product and Service Innovation Service Virtualization Testing in Managed Environments Michael Elder, IBM Senior Technical.
Checkmarx choose what developers use. About us o Founded in 2006 o Enterprise Grade Static and Interactive Application Security Testing Solutions o Hundreds.
The Security Sprint By Ramnath Cidambi. Agile and DevOps DevOps is a “recent” concept though the building blocks have existed for a while – The understanding.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Don’t Forget Security When Delivering Software
Presented by Rob Carver
Cybersecurity - What’s Next? June 2017
2016 Data Breach Investigations Report
Real-time protection for web sites and web apps against ATTACKS
Cyber Security: State of the Nation
Your Chance to Get It Right Five Keys to Building AppSec into DevOps
What if tomorrow never comes
MANAGING APPLICATION SECURITY
Speaker’s Name, SAP Month 00, 2017
Jon Peppler, Menlo Security Channels
Automate Early... But Securely!
Cyber Exposure – The Next Frontier
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Validating Your Information Security Program (ISP 3 of 3)
Virtual Patching “A security policy enforcement layer which prevents the exploitation of a known vulnerability”
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
1 5 Identify Connect Leverage MOBILE-READY SINGLE PLATFORM
Presentation transcript:

FROM CONTINUOUS INTEGRATION TO VIRTUAL PATCHING BUILDING APPSEC ALL ALONG THE WEB APPLICATION LIFECYCLE

Mikael Le Gall Security Sales Engineer EMEA, Rapid7 Application Security Testing, Application Development, Vulnerability Management, Incident Detection & Response French ✔ English ✔ Arabic ✖

APPLICATION SECURITY IS A KEY CHALLENGE

Web applications are a primary target Accounted for up to 40% of confirmed breaches in some industries. 95% of confirmed web app breaches were financially motivated. The 2016 Verizon Data Breach Investigation Report 4 40% 95%

So, why is application security so hard? 5 Are in constant evolution AttackersAttacksApplications

Evolving attackers 6 Hacktivists State Sponsored Cyber Criminals Insider Threat

Evolving Attacks OWASP Top 10 7

OK GET IT… I NEED TO SCAN MY APPLICATIONS

Plenty of free attacking tools SQLMap w3af Burp Suite Skipfish Grendel-Scan ZAP Proxy etc… All great exploit tools, good way to get started… but they can only do so much

Attacking is the easy part

You can’t attack what you can’t see

HTML Static Pages CGI Scripted Pages Web 2.0 (AJAX) Web 3.0 & Mobile AJAX, Flash/Flex, Silverlight JSON, REST, AMF, SOAP Application Frameworks (SOA’s) 2020 Javascript Evolving Application complexity

Summary 13 Economically motivated attackers use sophisticated tools Sophisticated applications confuse some automated detection Attacks are changing OWASP Top 10 is not enough AttackersAttacksApplications

DEVSECOPS

Different teams, different goals… 15

What is DevOps? DevOps is the practice of operations and development engineers participating together in the entire service lifecycle, from design through the development process to production support.

DevSecOps “Everyone is responsible for security” with the goal of safely distributing security decisions at speed and scale It does not have to be like this Image : Pete Cheslock at #DevOpsDaysAustin.

Problems with Security at the end 18 1.Increased costs 2.Delayed releases

30X 15X 10X 5X 2X Find and fix security issues early in the SDLC! After an application is released into Production, it costs 30x more than during design. Cost Source: NIST Production System testing Integration/ component testing CodingRequirements

Development Cycle based on Continuous Integration

Embed Scanning Into the Development Cycle

VIRTUAL PATCHING

How long does it take for web vulns to get fixed? From: Whitehat’s 2012 Report

Challenges around protecting the applications WAFs are a critical component of your Appsec strategy Efficiency ratio : # Attacks Blocked / # False Positives Challenges ‒ Applications are changing to quickly to keep up (technologies and pace of releases) ‒ Lack of time/expertise/resource to manage the WAF ‒ FP are paralysing (WAF used in non blocking)

Leverage the result of a scan to automate rule creation Virtual patching 25 WAF Effective custom virtual patch WAF knowledge + App knowledge Patch WAF Ineffective virtual patch Turn on default WAF rule Patch

Accelerate your remediation : the defensive workflow Run scan and import discovered vulnerabilities into rule creation module Select vulns to protect against Generate filters & upload them into WAF\IPS Run QuickScan to verify effectiveness of rules

Always measure efficiency!

THANK YOU