Website Security for Developers

Slides:



Advertisements
Similar presentations
Don’t get Stung (An introduction to the OWASP Top Ten Project) Barry Dorrans Microsoft Information Security Tools NEW AND IMPROVED!
Advertisements

ATTACKING AUTHENTICATION The Web Application Hacker’s Handbook, Ch. 6 Presenter: Jie Huang 10/31/2012.
JARED BIRD Nagios: Providing Value Throughout the Organization.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Payment Card Industry (PCI) Data Security Standard
MongoDB Sharding and its Threats
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Martin Kruliš by Martin Kruliš (v1.0)1.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
OWASP Zed Attack Proxy Project Lead
The OWASP Way Understanding the OWASP Vision and the Top Ten.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
Online Translation Service Capstone Design Eunyoung Ku Jason Roberts Jennifer Pitts Gregory Woodburn Kim Tran.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Broken Authentication & Session Management. What is it ? Bad implementation of authentication and session management. If an attacker can get your session.
Module 11: Securing a Microsoft ASP.NET Web Application.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
G CITRIXHACKIN. Citrix Presentation Server 4.5 New version is called XenApp/Server Common Deployments Nfuse classic CSG – Citrix Secure Gateway Citrix.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
OWASP Building Secure Web Applications And the OWASP top 10 vulnerabilities.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Do not try any of the techniques discussed in this presentation on a system you do not own. It is illegal and you will get caught.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
ArcGIS for Server Security: Advanced
Web Application Vulnerabilities
Security Autodesk DevDays rEvolution
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Design for Security Pepper.
Federation made simple
World Wide Web policy.
API Security Auditing Be Aware,Be Safe
CS 371 Web Application Programming
Secure Software Confidentiality Integrity Data Security Authentication
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Penetration Testing following OWASP
What is REST API ? A REST (Representational State Transfer) Server simply provides access to resources and the REST client accesses and presents the.
Relevance of the OWASP Top 10
Web-Technology Lecture 11.
PHP: Security issues FdSc Module 109 Server side scripting and
An Introduction to Web Application Security
Should I Transition to .NET Core? Will it hurt?
CSC 495/583 Topics of Software Security Intro to Web Security
Lesson 16-Windows NT Security Issues
Contact Center Security Strategies
Operating System Security
SharePoint Online Authentication Patterns
Online Translation Service Capstone Design
HACKIN G CITRIX.
Designing IIS Security (IIS – Internet Information Service)
Fast-Track UiPath Developer Module 10: Sensitive Data Handling
Presentation transcript:

Website Security for Developers An Overview

Who am I? Mitchel Sellers Microsoft MVP, ASPInsider, DNN MVP CEO @ IowaComputerGurus, Inc. Contact Information msellers@iowacomputergurus.com https://www.mitchelsellers.com Twitter: @mitchelsellers

Agenda Why? What? Assumed Basics? OWASP Top 10 ASP.NET Specific Examples Resources

Don’t Get Caught With Your Guard Down

Complete Principles of Security Security – Not just a set of protocols, but a mindset Privacy – True privacy, and trust Compliance – Compliance by design, not because of “incident” Transparency – If something happens, be transparent

Legal Considerations? HIPPA – Medical Information Need to Know Environment Hardening Requirements Audit/Access Logging PCI-DSS – Credit Card/Payment Information Encryption Limitation of Storage GDPR – EU Data Protection Extract Requirements “Disappear” Requirements Explicit Consent

Assumed Basics SSL – It Fixes Everything Sadly this isn’t the case Other thoughts HSTS – Enforcing HTTPS, not just requiring it Type of SSL Certificates Content Security Policies

OWASP Top 10 - #1 Injection Most specifically talking about SQL Injection Still an issue in 2018 Bad Example – Pulling from the id query string “SELECT * FROM AccountHistory WHERE OwnerId = “ + id Many ways to break this? Random Id = Would allow users to see something they shouldn’t Breaking Query = “ 1; DELETE FROM Users” – Drop the table Good Example – Use parameterized queries, all cases “SELECT * FROM AccountHistory WHERE OwnerId = @Id” Implementation will depend on platform/language

Consider this

OWASP Top 10 - #2 Broken Authentication Common Issues Prevention Permits automated login attacks Allows default user passwords Uses weak/insecure recovery processes (Security Question is considered “weak”) Uses Plain-Text, Encrypted, or Weak encryption for passwords Exposes the sessionID in URL Consider Multi-Factor Authentication Don’t use defaults Check against common passwords Ensure integrity in password requirements Login, Lockout, Failure messages should be the same Limit brute-force logins, and notify admins when suspected

OWASP Top 10 - #2 (ASP.NET Notes) Default ASP.NET Auth covers some, but not all aspects of this Older Methods (Membership vs. Identity) Validate password formats Validate & Update Password recovery New Installations Multi-Factor not enabled by default Lockout Notifications (Not logged or implemented) Complexity Requirements – Typically ok No “known password list”

OWASP Top 10 - #3 Sensitive Data Exposure Is Clear Text Transmission Used? HTTP vs HTTPS Non-secure Email FTP? Avoid storing sensitive information. (PCI-DSS Specifically) Disable Caching for confidential data Always use secure transmission

OWASP Top 10 - #4 XML External Entities Limited to XML Data Processing SAML & SOAP are two most common Best Prevention is to validate XML before parsing, and disable DTD External Processing Details: https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Preven tion_Cheat_Sheet

OWASP Top 10 - #5 Broken Access Control Risks Similar to risk in #1 – Situations where the URL could be modified to change access protocols Missing authentication on child methods Assuming that if you can see ____ that by default you cannot see the rest. CORS Misconfiguration – Allowing other clients Prevention Log misuse, notify if excessive Rate Limit API’s Invalidate tokens at logout

OWASP Top 10 - #6 Security Misconfiguration Risks Forgetting to remove defaults. (Ex sample project, Module, File) Unnecessary features/ports (FTP, Utility Modules, etc) Patching not followed Prevention Documented and repeatable hardening process (Install/Config) Minimize platform, use custom install options Automated validated of configuration (Trust but verify)

OWASP Top 10 - #7 Cross-Site Scripting Risks Using untrusted values and displaying Response.Write($”<script>alert(‘{Request.Querystring[“msg”]}’);</script>”) Can be JS or HTML Think of Rich Text Editor Prevention Escape untrusted XML/HTML Consider Content Security Policy to truly lock down data https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Ch eat_Sheet

OWASP Top 10 - #8 Insecure Deserialization Could happen with any serialized data that was outside of your control Prevention is to distrust all Examples Cookies with list of permissions Hidden field with userId values Must verity, similar to that of #1, and #5

OWASP Top 10 - #9 Using Components With Known Vulnerabilities Not patching a framework to deal with security issues Not patching third-party componeents with known issues Not patching Windows Not patching ASP.NET Using older FTP software Etc.

OWASP Top 10 - #10 Insufficient Logging & Monitoring Logging is great, but what do you do with it? Monitoring/Alerting is often overlooked, until it is a problem Activity logging should be repeatable/detailed for high-risk transactions. (Delete, etc) Establish a response protocol

ASP.NET Specific Examples Known vs. User Supplied Values UserId Querystring Parameters Store/Update Data based on the combination of values Delete – Require both the UserId and the ItemId in the SQL, prevent random delete, of non-owned content Edit – Require UserId and ItemId when retrieving to validate it is that the user has access

Third-Party Stuff Do they follow these practices? Just because you can’t see it, doesn’t mean it isn’t there Review & Patching notifications

Upcoming Sessions Later Today: Should I migrate to ASP.NET Core? Will it Hurt?

Resources Microsoft GDPR Recommendations: https://www.microsoft.com/en- us/TrustCenter/Privacy/gdpr/readiness OWASP Top 10 2017: https://www.owasp.org/images/7/72/OWASP_Top_10- 2017_%28en%29.pdf.pdf