Application Software Assurance Program (ASAP) Santosh S Kandala Technical Analyst Application Consulting & Engineering Anmol Malhotra.

Slides:



Advertisements
Similar presentations
Application Security Best Practices At Microsoft Ensuring the lowest possible exposure and vulnerability to attacks Published: January 2003.
Advertisements

Risk Assessment What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling.
WwwTASK.to © Toronto Area Security Klatch 2007 Threat Modeling With STRIDE and DREAD Chuck Ben-Tzur Security Consultant Sentry Metrics March 27, 2007.
© Blackboard, Inc. All rights reserved. Developing Secure Software Bob Alcorn, Blackboard Inc.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
Microsoft Security Development Lifecycle for IT Rob Labbé Security Engagement Manager MSIT Infosec – ACE
Operational MS Tibor Kolejak Regional IT Site Manger Microsoft Czech Republic Tibor Kolejak Regional IT Site Manger Microsoft Czech Republic.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
SiteLock Internet Security: Big Threats for Small Business.
Varun Sharma Security Engineer | ACE Team | Microsoft Information Security
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Web Application Testing with AppScan Terry Labach.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
SEC835 Database and Web application security Information Security Architecture.
.NET Enterprise Architecture Michael Platt Architect Emeritus Platform Strategy Group Microsoft Corporation.
A NASSCOM ® Initiative DSCI-KPMG Survey 2010 State Of Data Security and Privacy in the Indian Banking Industry Vinayak Godse Director- Data Protection,
+ Websites Vulnerabilities. + Content Expand of The Internet Use of the Internet Examples Importance of the Internet How to find Security Vulnerabilities.
(ISC)2 SecureLondon 2009, London, United Kingdom This information is not intended, and should not be construed, as an offer to sell, or as a solicitation.
A Framework for Automated Web Application Security Evaluation
A Security Review Process for Existing Software Applications
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
Information Security Challenges & Best Practices Meng-Chow Kang, CISA, CISSP Chief Security & Privacy Advisor Microsoft Asia Pacific.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
DEP315 Microsoft’s Windows Server 2003 Worldwide Deployment Nathan Muggli Sr Systems Engineer Operations and Technology Group (OTG) Microsoft Corporation.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
CFO Summit The Business Value of IT Rick Devenuti Corporate Vice President & CIO Rick Devenuti Corporate Vice President & CIO.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Security Attacks CS 795. Buffer Overflow Problem Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program.
Input Validation – common associated risks  ______________ user input controls SQL statements ultimately executed by a database server
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security (Keep your site secure at extension level) Sergey Gorstka Fastw3b.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 9 1COMP9321, 15s2, Week.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Security Attacks CS 795. Buffer Overflow Problem Buffer overflow Analysis of Buffer Overflow Attacks.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Example – SQL Injection MySQL & PHP code: // The next instruction prompts the user is to supply an ID $personID = getIDstringFromUser(); $sqlQuery = "SELECT.
Security Development Lifecycle. Microsoft SDL 概觀 The SDL is composed of proven security practices It works in development organizations regardless of.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
CS457 Introduction to Information Security Systems
WSU IT Risk Assessment Process
Chapter 7: Identifying Advanced Attacks
Patch Management Patch Management Best Practices
Security Testing Methods
Security Standard: “reasonable security”
A Security Review Process for Existing Software Applications
Security Engineering.
COMPTIA CAS-003 Dumps VCE
5/12/2019 2:57 PM © Microsoft Corporation. All rights reserved.
Albeado - Enabling Smart Energy
In the attack index…what number is your Company?
Presentation transcript:

Application Software Assurance Program (ASAP) Santosh S Kandala Technical Analyst Application Consulting & Engineering Anmol Malhotra Technical Analyst Application Consulting & Engineering Ramshanker Krishnan Group Program Manager Application Consulting & Engineering

Sydney Chofu & Otemachi Les Ulis Thames Valley Park Dublin Benelux Madrid Dubai Singapore Johannesburg Sao Paulo 90,000 mailboxes Microsoft IT Environment Canyon Park, Redmond Las Colinas Charlotte Chicago Milan Stockholm Munich 400+ supported Microsoft sites worldwide 6-7M messages per day 300,000+ network devices 6,000 data-center servers 110 Exchange servers/36 mailbox servers Silicon Valley 400 primary LOB applications 26 million voice calls per month 55,000 employees

Enterprise Risk Model High Low High Impact to Business (Defined by Business Owner) Low Acceptable Risk Unacceptable Risk Probability of Exploit (Defined by Corporate Security) Risk assessment drives to acceptable risk Mission and Vision Operating Principles Risk Based Decision Model Tactical Prioritization

Components of Risk Assessment AssetThreat Impact VulnerabilityMitigation Probability + + = = What are you trying to assess? What are you afraid of happening? What is the impact to the business? How could the threat occur? What is currently reducing the risk? How likely is the threat given the controls? Current Level of Risk What is the probability that the threat will overcome controls to successfully exploit the vulnerability and affect the asset? Mission and Vision Operating Principles Risk Based Decision Model Tactical Prioritization

Motivation For Application Security Cost of recovery and lost productivity Loss of data Impact on consumer confidence Legal risks

Purpose of ASAP Inventory and assess line-of-business (LOB) applications Identify and ensure resolution of security/privacy vulnerabilities found in those applications assessed. Enable Application Risk Management: –Strategic –Tactical –Operational –Legal

ASAP is Not Optional All line-of-business application teams must go through ASAP If they fail to do so, they cannot go into production Enforcement of the ASAP process attributes to it’s success

ASAP Program ASAP should be thought of as both a set of standards, and as a process –Maintain and publish standards and guidelines that align with corporate policies –Educate IT professionals –Create threat models, conduct design reviews and code-level security and privacy assessments –Assess host-level security

Program Participants Corporate Security Group ASAP Team Operations IT Group Corporate Privacy/Law and Corporate Affairs Group Business Unit IT Groups  Security policy  Impact assessment  Threat modeling  Limited and comprehensive assessments  Deploy and configure applications  Privacy policy  Action on assessment findings

ASAP Process Designed To Be Inline With SDLC Application Software Assurance Program Process: Typical Software Development Life Cycle:

Application Entry/Risk Assessment Objective: –Application Inventory –Determine Application Risk Categorization High Risk Security/Privacy Release Medium Risk Security/Privacy Release Low Risk Security/Privacy Release

Parameters involved in evaluating risk Audience –Type of users and volume Data Classification –HBI,MBI,LBI and PII Reliance / Integration –Dependency on other applications Architecture –Internal/external facing etc.

Application Risk Determines Service Level High Risk Security Release –Compulsory threat model/design review plus white box code review and host level scan Medium Risk Security Release – White box code review and host level scan Low Risk Security Release –Host level scan

Threat Model Principle: Can’t build a secure system until you’ve identified all the threats against it. –Provide capability where teams can Define – Information relevant to application security Model – Threats, Attacks, Vulnerabilities and Mitigations Measure – Impact, Probability, Cost, Benefit –Threat Categories S poofing, T ampering, R epudiation, I nformation Disclosure, D enial of Service, E levation of Privilege –Threat rating D amage Potential, R eproducibility, E xploitability, A ffected Users, D iscoverability

Threat Modeling Tool – ACE Torpedo

Application Principles Confidentiality Integrity Authentication Authorization Availability Non-repudiation

Design Review Objective: –Review and detect security vulnerabilities early in the development lifecycle. –Review application design to verify compliance with security standards and best practices. –Usually results in design changes. –Verify application meets application principles

Pre-Production Assessment Objective: –Low Risk Applications Host Level Scan –Windows –IIS –SQL

Pre-Production Assessment Objective: –High/Medium Risk Applications Host Level Scan –Windows –IIS –SQL White Box Code Review

Process –Application team provides source code –Analysts review application code uncovering security vulnerabilities –Vulnerabilities logged in bug database –Application team required to address all Sev 1 bugs prior to going into production

Some common attack patterns white box review may reveal Cross-Site Script Vulnerabilities SQL Injection Buffer Overflow Poor Authorization Controls Secrets Stored In Clear Text

XSS Attack Attacker normally exploits this by identifying the vulnerable page that outputs the invalidated input back to the browser. The following snippet of code shows the input that is accepted a vulnerable page that exploits this vulnerability Code Snippet : alert(‘Your page is hacked’) Code Snippet of home.aspx.cs : Response.Write(“Welcome” + Request.QueryString(“name”); When this link is clicked, it will show an alert message because of the script tag embedded in the url. The legitimate url is suppose to carry the original user name which can be exploited as above.home.aspx.cs

SQL Injection Following snippet of code shows how this vulnerability can be exploited. SqlDataAdapter myCommand = new SqlDataAdapter(“select * from tablename where fieldname = ‘” + userinput + “’”, myConnection); The above code gets executed based on the user input. This code can be exploited if the input is entered/passed as value’; Any valid SQL command.

Sample Bug Template Issue : User controlled Input is displayed back to User without Validation and Encoding leading to Cross Site Scripting Vulnerability File: home.aspx.cs Code Snippet (Line No 102): Response.Write(“Welcome” + Request.QueryString(“name”); For a discussion of this vulnerability type & remediation steps, please see the following link: For information on the Escalations & Exceptions process, please see the following link: ================================================================

Post-Production Assessment Objective: –High/Medium/Low Risk Applications Host Level Scan –Windows –IIS –SQL

Lessons Learned If you wait until an application is already in production to make it secure, you are too late Good security practices take into account both the host and the application client Create clearly written and easily accessible security & privacy guidelines Create checklists that include step-by-step instructions Develop a thoroughly-considered policy exception tracking process Education is crucial to the success of a security/privacy program Security is an ongoing, always changing, concern

Useful Links IT Showcase: ASAP : ity/applsa.mspx ity/applsa.mspx Improving Web Application Security: Threats and Countermeasures y/en-us/dnnetsec/html/ThreatCounter.asp y/en-us/dnnetsec/html/ThreatCounter.asp

Thank You