Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security

Slides:



Advertisements
Similar presentations
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Advertisements

© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Preface Demo A Quick Thank You How Did We Do It?
Feature: Identity Management - Login © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Reprint Outstanding Transactions Report © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
Feature: Purchase Requisitions - Requester © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Feature: Payroll and HR Enhancements © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
Interactivity Navigating a data model Working with large quantities of data Entry Editing and adding data User feedback and validation Presentation.
Connect with life Bijoy Singhal Developer Evangelist | Microsoft India |
Co- location Mass Market Managed Hosting ISV Hosting.
Windows 7 Training Microsoft Confidential. Windows ® 7 Compatibility Version Checking.
Varun Sharma Security Engineer | ACE Team | Microsoft Information Security
Multitenant Model Request/Response General Model.
Feature: Purchase Order Prepayments II © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Announcing Demo Announcing.
Feature: OLE Notes Migration Utility
Feature: Web Client Keyboard Shortcuts © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Feature: SmartList Usability Enhancements © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Session 1.
Built by Developers for Developers…. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
 Rico Mariani Architect Microsoft Corporation.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Assign an Item to Multiple Sites © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Print Remaining Documents © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
Connect with life Connect with life
Windows Azure Connect Name Title Microsoft Corporation.
demo Receive Inventory Export Parse and Normalize.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Document Attachment –Replace OLE Notes © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
Feature: Suggested Item Enhancements – Sales Script and Additional Information © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Feature: Employee Self Service Timecard Entry © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
demo Instance AInstance B Read “7” Write “8”

customer.
demo © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Browser Identity Provider Access Control Application.
demo Demo.
Feature: Void Historical/Open Transaction Updates © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
demo QueryForeign KeyInstance /sm:body()/x:Order/x:Delivery/y:TrackingId1Z
Feature: Suggested Item Enhancements – Analysis and Assignment © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and.
Windows Azure SQL Data Sync Name Title Microsoft Corporation.
projekt202 © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
The CLR CoreCLRCoreCLR © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
Anil Revuru. Simple.NET Library Encoding Library with Multiple Contexts Protects from XSS attacks.
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
ADatum Assets ADatum REST Web Svc ADatum REST Web Svc.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Make Your Mark.. Rocky Heckman Senior Security Technologist Enterprise Threat Modeling with TAMe SEC307.

demo User Signs Up Temporary Account is Created with Verification Link Sent User Clicks Link Account is Activated Login.Register(userName,
MIX 09 4/17/2018 4:41 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Возможности Excel 2010, о которых следует знать
Title of Presentation 11/22/2018 3:34 PM
Title of Presentation 12/2/2018 3:48 PM
8/04/2019 9:13 PM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Windows 8 Security Internals
Виктор Хаджийски Катедра “Металургия на желязото и металолеене”
Feature: Multi-user Editing Allowed in RMA Entry
Шитманов Дархан Қаражанұлы Тарих пәнінің
Title of Presentation 5/24/2019 1:26 PM
Presentation transcript:

Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security

Agenda Authentication Authorization Sensitive data protection Input validation Cryptography Auditing and logging

SDL-IT SDLC SDL-IT Envision Application Entry / Risk Assessment Security Review Develop / Purchase Security Deployment Review TestRelease / Sustainment CreationAssimilation Signoff Threat Model / Design Review Design Iterative Process Security Deployment Review Define Model Measure Validate Optimize

Holistic Approach to security

Agenda Authentication Authorization Sensitive data protection Input validation Cryptography Auditing and logging

Methods of Authentication Basic Digest Integrated Kerberos v5 NTLM ASP.NET Forms Authentication Digital signatures and digital certificates Smart Cards Biometrics

Authentication Techniques Windows authentication Forms authentication

Authentication MembershipProvider Provides a consistent and simple APIs for user storage and management and enables easy implementation of Forms Authentication. ActiveDirectoryMembershipProvider SqlMembershipProvider aspnet_regsql -S (local) -E -A m S specifies the server, which is (local) in this example. E specifies to use Windows authentication to connect to SQL Server. A m specifies to add only the membership feature. For simple authentication against a SQL Server user store, only the membership feature is required.

Authentication and Membership Provider and Discovering the client identity

Agenda Authentication Authorization Sensitive data protection Input validation Cryptography Auditing and logging

Authorization What is authorization? URL Authorization selectively deny or allow access to specific files or folders File Authorization Applicable to file types like.aspx or.asmx Access check will be made for user based on windows token Role based authorization

RBAC Role manager simple APIs for role authorization and role management WindowsTokenRoleProvider / AuthorizationStoreRoleProvider (Azman) SqlRoleProvider

SQL Role Provider

URL Authorization

Imperative authorization Example of an Imperative check if(Thread.CurrentPrincipal.IsInRole(‘Administr ators')) { // Authorized }

Imperative authorization Example of an Imperative check using the ASP.NET role provider: if { //authorized }

Declarative authorization PrincipalPermission Example [PrincipalPermission(SecurityAction.Demand, Role = “Administrators")] public double Add(double a, double b) { return a + b; }

Agenda Authentication Authorization Sensitive data protection Input validation Cryptography Auditing and logging

How to encrypt the Web.Config Use aspnet_regiis RSAConfigurationProvider If you want to deploy the same encrypted configuration file on multiple servers in a Web farm, you should use the RSAProtectedConfigurationProvider. This provider makes it easy for you encrypt the data on one server computer and then export the RSA private key needed to decrypt the data. "DataProtectionConfigurationProvider"

Encrypting sections of configuration file

Agenda Authentication Authorization Sensitive data protection Input validation Cryptography Auditing and logging

Input Validation Protection against common attacks White list Vs Blacklist Client side Vs Server Side Regex validator controls

Demo of Input validations using RegEx

Agenda Authentication Authorization Sensitive data protection Input validation Cryptography Auditing and logging

Cryptographic Algorithms Symmetric Algorithms Uses same key for encryption and decryption Computationally cheaper Used to exchange or store information in secret Asymmetric Algorithms Uses separate keys for encryption and decryption Computationally more expensive Normally used to negotiate a symmetric key Both only require one key to be kept secret Hashing Algorithms

.Net supported Cryptographic Algorithms Symmetric AES DES Deprecated 3DES RC2 Deprecated RijndaelManaged Asymmetric DSACryptoServicePr ovider RSACryptoServiceP rovider ECDiffieHellmanCng ECDsaCng

.Net supported Cryptographic Algorithms.NET Supported Hash Algorithms MD5 (produces 128-bit hash value) Collisions discovered! SHA1 (produces 160-bit hash value) Has been compromised! SHA256 (produces 256-bit hash value) SHA384 (produces 384-bit hash value) SHA512 (produces 512-bit hash value)

Agenda Authentication Authorization Sensitive data protection Input validation Cryptography Auditing and logging

Auditing & Logging Threats Failure to spot the signs of intrusion Inability to prove a user's actions Difficulties in problem diagnosis. 29

Logging Keep a log trail of authentication attempts Both successful and failed Keep a log trail of all accesses to assets Log as close to an asset as possible SQL Server Stored Procedure Sometimes… a log trail is the only mitigation

What you Log “Don’t write sensitive information in logs Passwords Identify the (“who, what, where & when”): Identity Action Component/Service/Object/Method Timestamp Enterprise Library Logging Application BlockBlock

Feedback / QnA Your Feedback is Important! Please take a few moments to fill out our online feedback form Use the Question Manager on LiveMeeting to ask your questions now!

© 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.