© Copyright 2013 Denim Group - All Rights Reserved Mean Time to Fix (MTTF) IT Risk’s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP,

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

OWASP CLASP Overview.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Internal Control in a Financial Statement Audit
Nick Feamster CS 6262 Spring 2009
Cyber Defence Data Exchange and Collaboration Infrastructure (CDXI)
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
A Scalable Secure Development Program
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Infosec 2012 | 25/4/12 Application Performance Monitoring Ofer MAOR CTO Infosec 2012.
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
State of Software Security 1 Jeff Ennis, CEH Solutions Architect Veracode.
Oracle User Productivity Kit Professional Ensuring Success with Oracle Apps
Chapter 14 Fraud Risk Assessment.
OWASP Web Vulnerabilities and Auditing
PENETRATION TESTING Presenters:Chakrit Sanbuapoh Sr. Information Security MFEC.
Risk Management a Case Study DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Barracuda Web Application Firewall
Application Security: What Does it Take to Build and Test a “Trusted” App? John Dickson, CISSP Denim Group.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Presentation Overview
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
SiteLock Internet Security: Big Threats for Small Business.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Security Scanning OWASP Education Nishi Kumar Computer based training
Norman SecureSurf Protect your users when surfing the Internet.
By: Razieh Rezaei Saleh.  Security Evaluation The examination of a system to determine its degree of compliance with a stated security model, security.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
Introduction to Application Penetration Testing
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
The OWASP Way Understanding the OWASP Vision and the Top Ten.
A Framework for Automated Web Application Security Evaluation
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Applications Testing By Jamie Rougvie Supported by.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Deconstructing API Security
Securing Java Applications
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
FFIEC Cyber Security Assessment Tool
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Ken De Souza KWSQA, April 2016 V. 1.0
FROM CONTINUOUS INTEGRATION TO VIRTUAL PATCHING BUILDING APPSEC ALL ALONG THE WEB APPLICATION LIFECYCLE.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
Defining your requirements for a successful security (and compliance
Cybersecurity - What’s Next? June 2017
Web Application Protection Against Hackers and Vulnerabilities
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Critical Security Controls
Securing Your Web Application in Azure with a WAF
Compliance with hardening standards
Penetration Testing following OWASP
Cyber Exposure – The Next Frontier
IBM GTS Storage Security and Compliance overview.
Presentation transcript:

© Copyright 2013 Denim Group - All Rights Reserved Mean Time to Fix (MTTF) IT Risk’s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

© Copyright 2013 Denim Group - All Rights Reserved Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With Vulnerable Applications Understanding the Software Attack Surface “Mean Time to Fix” (MTTF) Explained Application Testing – More Than Simple Scans How to Include AppSec in Annual Risk Assessments Tools and Resources to Assess and Audit AppSec Maturity 1

© Copyright 2013 Denim Group - All Rights Reserved Application Security Fundamentals Application security includes measures taken throughout an application's life-cycle to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgrade, or maintenance of the application.* The primary focus is on Layer 7 of the OSI Model AppSec should be part of an organization’s or vendor’s Software (or System) Development Life- Cycle (SDLC) A key component of application security should be for developers and their managers to be aware of basic AppSec requirements, common threats and effective countermeasures AppSec knowledge and maturity is significantly lower today than traditional network security 2 * Wikipedia

© Copyright 2013 Denim Group - All Rights Reserved Risks Associated With Vulnerable Applications Unauthorized access to sensitive customer or company data Theft of sensitive data to conduct identity theft, credit card fraud or other crimes Defacement of websites; strong potential for brand damage Manipulation of data impacting data integrity, quality and organization’s reputation Redirection of users to malicious web sites; phishing and malware distribution Denial of service; availability of data Attackers can assume valid user identities Access to hidden web pages using forged URLs Attacker’s hostile data can trick the interpreter to execute unintended commands 3

© Copyright 2013 Denim Group - All Rights Reserved What Is Your Software Attack Surface? 4 Software You Currently Know About Why Do These Usually Merit Consideration? Lots of monetary or brand value flows through them Compliance requirements (e.g. PCI, HIPAA, FFIEC, etc.) Formal SLAs with customers You’ve had one or more previous security incidents (or near misses) What’s Normally In This Category? Critical legacy systems Notable web applications To assess application security, many organizations focus on obvious software resources, but overlook their overall inventory of applications and code from less obvious sources when they analyze their assets.

© Copyright 2013 Denim Group - All Rights Reserved What Is Your Software Attack Surface – Part 2? 5 Add In the Rest of the Web Applications Your Organization Actually Develops and Maintains Why Could You Miss Them in Your Analysis ? Lack of knowledge, overlooked or forgot they were there Line of business procured through non- standard channels Added through a merger or acquisition Believed to be retired but still active What’s Normally in This Category? Line of business applications Event-specific applications, e.g. holiday apps, sales support, open enrollments

© Copyright 2013 Denim Group - All Rights Reserved What Is Your Software Attack Surface – Part 3? 6 Add In the Software You Bought from Somewhere Why Could You Miss Them in Your Analysis? Automated scanners are good at finding web applications. Non-web, not so much. Contract language or un-validated assumptions that the application vendor has security “covered” What’s Normally in This Category? Less known or utilized line of business applications Support applications Infrastructure applications

© Copyright 2013 Denim Group - All Rights Reserved What Is Your Software Attack Surface – Part 4? 7 Mobile Cloud Why Could You Miss Them in Your Analysis? Decentralized procurement Ineffective security policies Use of prohibited software Lack of awareness What’s Normally in This Category? Support for line of business functions General marketing and promotion Financial analysis applications Software as a Service (SaaS) Mobile applications User procured software

© Copyright 2013 Denim Group - All Rights Reserved As perception of the problem of attack surface grows, the scope of the problem increases – or, the more you know, the more you need to assess Attack Surface: The Security Officer’s and Auditor’s Perspective 8 Perception Insight Web Applications Client-Server Applications Desktop Applications Cloud Applications and Services Mobile Applications

© Copyright 2013 Denim Group - All Rights Reserved Value and Risk Are Not Equally Distributed Some Applications Matter More Than Others –Value and character of data being managed –Value of the transactions being processed –Cost of downtime and breaches Therefore All Applications Should Not Be Treated the Same –Allocate different levels of resources to assurance –Select different assurance activities –Also must often address compliance and regulatory requirements 9

© Copyright 2013 Denim Group - All Rights Reserved Myth #1 – I Don’t Need AppSec Because My Network is Secure 10 Technical Rationale Non-Technical Rationale

© Copyright 2013 Denim Group - All Rights Reserved Mean Time to Fix (MTTF) A 2013 industry study from White Hat Security revealed that the “Mean Time to Fix” for web application flaws categorized as “serious” averaged 193 days across all industries. In the same study, for one industry (Education) the figure jumped to 342 days of exposure In a similar study from Veracode, 70% of 22,430 applications submitted to their testing platform in 2012 contained exploitable security vulnerabilities How would you report to your management that a “serious” and likely exploitable vulnerability was present on your primary public facing web site or a 3 rd party hosted portal for more than six months? What compensating control or controls do you think you could explain to placate management that a serious vulnerability could not be exploited? Verizon’s 2013 Breach Report says 90% of attacks last year were perpetrated by outsiders and 52% used some form of hacking. How does this help you explain application risk? 11

© Copyright 2013 Denim Group - All Rights Reserved Myth #2 – An Automated Scanner Can Find All The Application Vulnerabilities That Exist There is no “silver bullet” for identifying application security vulnerabilities. There are different classes of tools ranging from static code scanners that assess the code to dynamic scanners that analyze logic and data flow. Generally, 30% to 40% of vulnerabilities can be identified by scanners; the remainder are uncovered by other means. Manual testing allows an informed and experienced tester to attempt to manipulate the application, escalate privileges or get the application to operate in a way it was not designed to do. But wait, there’s more………… 12

© Copyright 2013 Denim Group - All Rights Reserved Unauthenticated Automated Scan What Goes Into An Application Test? 13 Automated Source Code Scanning Blind Penetration Testing Manual Source Code Review Authenticated Automated Scan Informed Manual Testing Automated Binary Analysis Manual Binary Analysis Application security goes well beyond simply running a scanning tool. For critical or high value applications, or those that process sensitive data, thorough testing may actually include a combination of several methods.

© Copyright 2013 Denim Group - All Rights Reserved AppSec – What Can You Do and Why? Information Security Professionals Promote AppSec awareness in your organization Confirm that application security testing is part of your overall security program Demand that all applications developed by 3 rd parties be tested and remediated prior to being placed in production Get all developers and their managers trained on AppSec Obtain and review the SDLC from a security perspective IT Auditors Influence your Chief Audit Executive to include AppSec in the organization’s annual risk assessment Increase your relevance and value to your organization by identifying risks associated with poorly coded applications Conduct a simple initial audit to assess what controls are in place Conduct a subsequent audit to determine the effectiveness of those controls; measure MTTF 14

© Copyright 2013 Denim Group - All Rights Reserved Tools and Resources Open Software Assurance Maturity Model (OpenSAMM) – A freely available open source framework that organizations can use to build and assess their software security programs The Open Web Application Security Project (OWASP) – Worldwide not-for-profit organization focused on improving the security of software. Source of valuable free resources Open Source or Low Cost Application Security Scanners – OWASP Zed Attack Proxy (ZAP), w3af, Mavituna Netsparker, Websecurify, Wapiti, N- Stalker, SkipFish, Scrawlr, Acunetix, and many more to do basic discovery work 15

© Copyright 2013 Denim Group - All Rights Reserved The OWASP Top 10 For 2013 A1 Injection A2 Broken Authentication and Session Management A3 Cross-Site Scripting (XSS) A4 Insecure Direct Object References A5 Security Misconfiguration A6 Sensitive Data Exposure A7 Missing Function Level Access Control A8 Cross-Site Request Forgery (CSRF) A9 Using Components with Known Vulnerabilities A10 Unvalidated Redirects and Forwards 16

© Copyright 2013 Denim Group - All Rights Reserved Example AppSec Audit Work Program 17 Software Assurance Maturity Model (SAMM) Scorecard Level 1 Maturity Level Activity Business Functions #Security Practices/PhaseAB Governance 1Strategy & Metrics Policy & Compliance Education & Guidance000 Construction 4Threat Assessment000 5Security Requirements Secure Architecture000 Verification 7Design Review Code Review000 9Security Testing000 Deployment 10Vulnerability Management111 11Environment Hardening111 12Operational Enablement000 SAMM Valid Maturity Levels 0 Implicit starting point representing the activities in the Practice being unfulfilled 1 Initial understanding and ad hoc provision of Security Practice 2 Increase efficiency and/or effectiveness of the Security Practice 3 Comprehensive mastery of the Security Practice at scale Legend Objective Activity was met. Objective Activity was not met.

© Copyright 2013 Denim Group - All Rights Reserved Open Source Software Vulnerability Management Tool –Supports consolidation and de-duplication of imported results from scanner tools, manual testing and threat modeling –Provides reports on application security status and trending over time –Translates application vulnerabilities into software defects and pushes tasks to developers in the tools and systems they are already using –Creates virtual Web Application Firewall (WAF) rules to help block malicious traffic while vulnerabilities are being resolved. While your organization takes on remediation of your applications, virtual patching helps guard against common vulnerabilities such as Cross-Site Scripting (XSS) and SQL Injections. –Compatible with a number of commercial and freely available dynamic and static scanning technologies, SaaS testing platforms, IDS/IPS and WAFs and defect trackers ThreadFix Auditor –Currently in Development – Virtual Application Scanner – Will allow audit and security professionals to identify, track and report on application security vulnerabilities and remediation activities/effectiveness 18

© Copyright 2013 Denim Group - All Rights Reserved 19 Questions / Contact Information Joe Krull Director (210) blog.denimgroup.com