Copyright © 2006 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

McAfee One Time Password
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Computer Monitoring System for EE Faculty By Yaroslav Ross And Denis Zakrevsky Supervisor: Viktor Kulikov.
1 RUP Workshop By George Merguerian Senior Partner Business Management Consultants
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 24 NTFS Permissions and Sharing Printers 1.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
PaperCut NG Chris Dance. Copyright © PaperCut Software Pty. Ltd. 2 Overview Overview of PaperCut NG Why we offer a Mac Version The story of our.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
DONE-10: Adminserver Survival Tips Brian Bowman Product Manager, Data Management Group.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
About Dynamic Sites (Front End / Back End Implementations) by Janssen & Associates Affordable Website Solutions for Individuals and Small Businesses.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Budget Module For Sage MIP Fund Accounting. Sage Requirements Fund Accounting 10.0 or higher Budget Module optional but required for multiple budget versions.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
© 2007 by Prentice Hall 1 Introduction to databases.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Visual Studio 2005 Team System Winning the testing space with advanced testing tools Eric Adams Program Manager Visual Studio 2005 Team System Microsoft.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Enterprise Cloud Computing
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Paperless Timesheet Management Project Anant Pednekar.
Identity Management and Enterprise Single Sign-On (ESSO)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Importance of Physical Security Common Security Mistakes 1.Security Awareness 2.Incident Response 3.Poor Password Management 4.Bad administrative.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
David Saslav Principal Product Manager Database and Application Server Technologies Oracle Corporation.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
How We Got Here PC and Internet changed the rules –Viruses, information sharing, “outside” and “inside” indistinguishable –Vulnerability research for.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Architecture Review 10/11/2004
Best Practices for Dynamics NAV Administration and Security
Case Management System
Introduction to SQL Server 2000 Security
Common Security Mistakes
What Is Sharepoint? Mohsen Ashkboos
Lesson 16-Windows NT Security Issues
Implementation Lessons Learned Application Security Summit 2007
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit The OWASP Foundation OWASP AppSec Seattle Oct From Startup to IPO: Managing Security Risk in a Rapidly Growing Enterprise Brian Chess Founder / Chief Scientist Fortify Software

OWASP AppSec Seattle Motivation “It’s time for software developers and security people to work together.” (Famous Security Person)

OWASP AppSec Seattle SDL

OWASP AppSec Seattle Motivation “It’s time for software developers and security people to work together.” (Famous Security Person)

OWASP AppSec Seattle This Talk  Background  Business  Architecture  Risk  Authentication  Access Control  Attacks and Other Security Challenges  Security Today  Silver Bullets

OWASP AppSec Seattle The business  Started in 1998: 4 founders  Today: 500+ employees  First $1M month in 2004  $42M revenue in 2005

OWASP AppSec Seattle The Application  Online business services  Accounting  Payroll  CRM (Salesforce Automation/Customer Support)  Web Store  Employee Self-service (expense reports)  Vendor/Partner Self-service

OWASP AppSec Seattle Architecture: Basic Apache Internet Database Java

OWASP AppSec Seattle Database Java Apache Architecture: Scaling Apache Internet Database Java

OWASP AppSec Seattle Database Java Apache Architecture: Scaling Apache Internet Database Java Directory

OWASP AppSec Seattle Database Java Apache Architecture: Hot fix Apache Internet Database Java Directory Java

OWASP AppSec Seattle Database Java Apache Architecture: Multiple versions Apache Internet Database Java Directory Java Database

OWASP AppSec Seattle Database Java Apache Architecture: Billing/Provisioning Apache Internet Database Java Directory Java Database Corp

OWASP AppSec Seattle Database Java Apache Architecture: Monitoring Apache Internet Database Java Directory Java Database Corp PerformanceLogging

OWASP AppSec Seattle Risk “Security is all about Risk Management.” (‘Enlightened’ Security Person)

OWASP AppSec Seattle Architecture: Risk My data Your data

OWASP AppSec Seattle My data Your data Architecture: Risk #1 fear: data bleed  Solution: virtual private tables  Problem: too expensive  Solution: build in-house  Problem: is it done right?

OWASP AppSec Seattle Risk in a startup Time Risk Market Risk Security Risk

OWASP AppSec Seattle Infrastructure  Application began as a demo  Very early use of server-side Java  Maintained custom application server at one point  90% JSP at first, 5% JSP now

OWASP AppSec Seattle Authentication  Access to admin pages  Customers curse a lot  10% based on default  8% curse words  40% (total) easy to guess  Password != hashed password

OWASP AppSec Seattle Access Control  Application:  Complex, user-defined roles  Administration  progression of security measures: IP address, login, authenticate against CORP, auditing  problem w. log security--need to give access to outsourced support

OWASP AppSec Seattle Noteworthy Security Challenges  bug #1

OWASP AppSec Seattle bug #1 (of 125,000) Abstract: Apostrophes aren't correctly handled by data entry fields. 3/18/1999 3:28 pm XXX, XXXXXXXX Inputting an apostrophe ' into one of the registers or text fields causes the form to generate an error message. *** XXXXX 18-MAR-99 03:28 PM *** Fixed in all Activities and anything else that uses base Input class (e.g. Lists) Severity S5 - Minor Priority 9

OWASP AppSec Seattle Noteworthy Security Challenges  bug #1  SSH with blackberry  Installing X Windows  Playing nicely with partners  problem w. logging: must not log passwords, cc#s

OWASP AppSec Seattle Attacks and Incidents  Security conscious new customers attack the permission system  Day of the DOS attack (bad code)  “Security consultant” in need of iPod

OWASP AppSec Seattle Security Today  Evolution from success through heroism to success through process  Growing organization creates new issues  Access to errors  Access to test data  AJAX  Web Services

OWASP AppSec Seattle Security Today: SDL  OWASP Guide has been a big help  Easiest way to get developers to fix bugs: compliance

OWASP AppSec Seattle Tools  Black box testing  Source code analysis  (External review also quite helpful.)

OWASP AppSec Seattle No Silver Bullet  No Silver Bullet: Essence and Accidents of Software Engineering by Fredrick Brooks (author of The Mythical Man Month)  Are Security mistakes  An accidental artifact of programming languages and systems?  An unavoidable (essential) problem?