OWASP Application Security Verification Standard

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

OWASP Application Security Verification Standard 2009
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
WebGoat & WebScarab “What is computer security for $1000 Alex?”
Achieving (and Maintaining) Compliance With Secure Software Development Compliance Requirements (ISC)² SecureSDLC May 17, 2012.
Automating Bespoke Attack Ruei-Jiun Chapter 13. Outline Uses of bespoke automation ◦ Enumerating identifiers ◦ Harvesting data ◦ Web application fuzzing.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Leveraging User Interactions for In-Depth Testing of Web Applications Sean McAllister, Engin Kirda, and Christopher Kruegel RAID ’08 1 Seoyeon Kang November.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Senior Design – Acceptance Test Plan Review The goal is to: define the criteria for approving the application. Tightly coupled to the Requirements document.
Leveraging User Interactions for In-Depth Testing of Web Application Sean McAllister Secure System Lab, Technical University Vienna, Austria Engin Kirda.
By: Razieh Rezaei Saleh.  Security Evaluation The examination of a system to determine its degree of compliance with a stated security model, security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
SEC835 Database and Web application security Information Security Architecture.
A Framework for Automated Web Application Security Evaluation
A Security Review Process for Existing Software Applications
Topics Covered: Software requirement specification(SRS) Software requirement specification(SRS) Authors of SRS Authors of SRS Need of SRS Need of SRS.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Computer Security and Penetration Testing
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
U.S. General Services Administration FTS2001 Transition Baseline Inventory Tool Adam Lesser GSA Networx Transition Team (Booz Allen Hamilton) October 25,
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SWIS Digital Inspections Project Chris Allen, Information Management Branch California Integrated Waste Management Board August 22, 2008.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Getting Started with OWASP The Top 10, ASVS, and the Guides Dave Wichers COO, Aspect Security OWASP Board Member OWASP Top 10 and ASVS Projects Lead.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP ASVS Levels1234 Tools Manual Test and Review Manual Design Review At higher levels in ASVS,the use of tools is encouraged. But to be effective,the.
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
‘Supporting and Developing the Tool’ Amanda Norris Julian Fox
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
ONAP security meeting
Securing Your Web Application in Azure with a WAF
OWASP Static Analysis (SA) Track Goals, Objectives, and Track Roadmap
Secure Software Confidentiality Integrity Data Security Authentication
Finding and Fighting the Causes of Insecure Applications
^ About the.
A Security Review Process for Existing Software Applications
GCE Applied ICT G053: Lesson 01 Introduction To The Unit
Relevance of the OWASP Top 10
ONAP Security Sub-committee Update
HTML Level II (CyberAdvantage)
Practice Insight Instructional Webinar Series Reporting
OWASP Application Security Verification Standard 2009
Eoin Keary Code review Lead Irish Chapter Lead
Tour of OWASP’s projects
2-1-1 Automated Verifications
CVE.
Software Verification and Validation
Learning Common GIS Workflows
Software Verification and Validation
Finding and Fighting the Causes of Insecure Applications
OWASP Application Security Verification Standard
Software Verification and Validation
PSS0 Configuration Management,
ESAPI Design Patterns November 2009 Mike Boberski Booz Allen Hamilton
OWASP Application Security Verification Standard
Presentation transcript:

OWASP Application Security Verification Standard – Web Application Edition Mike Boberski (Booz Allen Hamilton) boberski_michael@bah.com Jeff Williams (Aspect Security) jeff.williams@aspectsecurity.com Dave Wichers (Aspect Security) dave.wichers@aspectsecurity.com 12/08

What questions does ASVS answer? How do I know how much trust can be placed in a web application or web service? How do I know what features to build into security controls used by a web application or web service? How do I acquire a web application or web service that is verified to have a certain range in coverage and level of rigor? ? ?

How is the ASVS intended to be used? It can be used to provide a yardstick with which to assess the degree of trust that can be placed in their web applications and services, It can be used to provide guidance to security control developers as to what to build into their commercial products in order to satisfy web application and service security requirements, and It can be used to provide a basis for specifying web application and web service security requirements in contracts.   

What is the status of the ASVS as an OWASP standard? 12/8/2008 - OWASP ASVS Final assistance required! Please join the mailing list for more information and assignments. 12/5/2008 - OWASP ASVS exits the Summer of Code 2008! The Beta draft of the Web Application Edition is released! Mike Boberski, Jeff Williams, and Dave Wichers are the primary authors. 10/3/2008 - OWASP ASVS Alpha draft is released! Mike Boberski is the primary author. 4/16/2008 - OWASP ASVS Summer of Code 2008 proposal submitted by Mike Boberski wins!

What does the ASVS look like? “Verification Levels” section “Detailed Verification Requirements” section “Verification Reporting Requirements” section

What are ASVS verification levels?

Earning a level…

Level 1 – Automated Verification Levels in more detail Level 1 – Automated Verification Level 1A – Dynamic Scan (Partial Automated Verification) Level 1B – Source Code Scan (Partial Automated Verification) Level 2 – Manual Verification Level 2A – Penetration Test (Partial Manual Verification) Level 2B – Code Review (Partial Manual Verification) Level 3 – Design Verification Level 4 – Internal Verification

Breadth – Number of Requirements Coverage Depth – Level of Rigor No malicious developers The design has to be right The controls have to be right Scan  Breadth – Number of Requirements   

Level 1 in more detail Automated verification of a web application or web service treated as groups of components within single monolithic entity.

Application Security Verification Techniques Find Vulnerabilities Using the Running Application Find Vulnerabilities Using the Source Code Manual Application Penetration Testing Manual Security Code Review Automated Application Vulnerability Scanning Automated Static Code Analysis

Tools – At Best 45% MITRE found that all application security tool vendors’ claims put together cover only 45% of the known vulnerability types (695) They found very little overlap between tools, so to get 45% you need them all (assuming their claims are true)

Level 2 in more detail Manual verification of a web application or web service organized into a high-level architecture.

Manual Penetration Test Level 2B Manual Code Review Level 2 Options Level 2A Manual Penetration Test Level 2B Manual Code Review Need BOTH to achieve a full level 2 But requirements can be filled by either

Level 3 in more detail Design verification of a web application or web service organized into a high-level architecture.

Level 4 in more detail Internal verification by searching for malicious code (not malware) and examining how security controls work.

What are ASVS verification requirements? Security architecture verification requirements Security control verification requirements  Security architecture information puts verification results into context and helps testers and reviewers to determine if the verification was accurate and complete

A positive approach Negative Positive The tester shall search for XSS holes Positive Verify that the application performs input validation and output encoding on all user input

Requirement Summary Security Area Level 1A 1B 2A 2B Level 3 Level 4 V1 – Security Architecture Verification Requirements 1 2 4 5 V2 – Authentication Verification Requirements 3 9 13 14 V3 – Session Management Verification Requirements 6 7 8 V4 – Access Control Verification Requirements 12 15 V5 – Input Validation Verification Requirements V6 – Output Encoding/Escaping Verification Requirements 10 V7 – Cryptography Verification Requirements V8 – Error Handling and Logging Verification Requirements V9 – Data Protection Verification Requirements V10 – Communication Security Verification Requirements V11 – HTTP Security Verification Requirements V12 – Security Configuration Verification Requirements V13 – Malicious Code Search Verification Requirements V14 – Internal Security Verification Requirements Totals 22 51 83 96 112

What are ASVS reporting requirements? R1 – Report Introduction R2 – Application/Service Description R3 – Application/Service Security Architecture R4 – Verification Results  Is the report sufficiently detailed to make verification repeatable? Does the report have sufficient types of information to allow a reviewer to determine if the verification was accurate and complete? 

You can download a copy from the project web page: Where do I go from here? You can download a copy from the project web page: http://www.owasp.org/index.php/ASVS You can send comments and suggestions for improvement using the project mailing list: See “Mailing List/Subscribe” link on project web page.

Questions? ?