Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
OWASP Secure Coding Practices Quick Reference Guide
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© 2008 All Right Reserved Fortify Software Inc. Hybrid 2.0 – In search of the holy grail… A Talk for OWASP BeNeLux by Roger Thornton Founder/CTO Fortify.
Engineering Secure Software. Does Security Even Matter?  At your table, introduce yourselves: Your name, degree, & app domain What is your favorite software.
Visual Studio Team System (VSTS). Richard Hundhausen Author of software development books Microsoft Regional Director Microsoft MVP (VSTS) MCT, MCSD,
Barracuda Web Application Firewall
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Maintaining and Updating Windows Server 2008
Security Scanning OWASP Education Nishi Kumar Computer based training
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
CPTE 209 Software Engineering Summary and Review.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Information Systems Analysis and Design
CSCE 548 Secure Software Development Test 1 Review.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
SIGITE 2008: Oct Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University.
OWASP Top Ten #1 Unvalidated Input. Agenda What is the OWASP Top 10? Where can I find it? What is Unvalidated Input? What environments are effected? How.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Testing and Maintenance 1 Code Review  Introduction  How to Conduct Code Review  Practical Tips  Tool Support  Summary.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CSCE 548 Building Secure Software. CSCE Farkas2 Reading This lecture: – McGraw: Chapter 1 – Recommended: CyberInsecurity: The Cost of Monopoly,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Automated Testing April 2001WISQA Meeting Ronald Utz, Automated Software Testing Analyst April 11, 2001.
By Ramesh Mannava.  Overview  Introduction  10 secure software engineering topics  Agile development with security development activities  Conclusion.
Engineering Secure Software. Does Security Even Matter?  Find two other people near you Introduce yourself What is your favorite software development.
Maintaining and Updating Windows Server 2008 Lesson 8.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Database and Cloud Security
Web Application Security
Presented by Rob Carver
Web Application Protection Against Hackers and Vulnerabilities
Chapter 7: Identifying Advanced Attacks
Secure Software Confidentiality Integrity Data Security Authentication
^ About the.
CSCE 548 Secure Software Development Test 1 Review
Engineering Secure Software
Engineering Secure Software
Engineering Secure Software
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP Organizing a Defensive Posture Source Code, Runtime, WAF, Business Logic, … Fred Donovan OWASP ASDR Member Attack Logic September 2009

OWASP 2 Corporate Needs and IT Posture  Detection vs. Prevention vs. Correction?  Which is more important?  Each is equally important  All are required for a Defensive Posture

OWASP 3 Awareness Test

OWASP 4 Awareness Test – Application Security What are we to be aware of? Should we be preventative or defensive? Perhaps we should rather ask who we are looking for? What are questions to ask the C-level’s?

OWASP 5 Preparatory Questions for Business Execs  What are your application security strengths?  How do you measure Risk?  What is the different between an attack and a vulnerability?  Describe the Architecture of your Security  Hardware vs. Software  What learning processes are in place?  Training  Knowledge Transfer  Lessons Learned

OWASP 6 Preparatory Questions for Business Clients  What tools do you have in place?  People  Hardware  Software  What areas in your program are excelling?  How many people in your organization are able to assist in building this new program?  What are you looking for?

OWASP 7 The Fight You can’t fix what hasn’t been found Hardware Security Solutions vs. Ethical Hacking

OWASP 8 Ethical Hacking  Assign a person to your team, that has skills in identifying vulnerabilities on running applications  It is likely that this person does not exist in your current resource pool  Do not hire or use an individual who has been in trouble cracking Websites  Consider the benefit of hiring a temporary resource to build, train, and implement this program

OWASP 9 Ethical Hacking SStart your AppSec program by looking at your existing Website(s) TTake the precaution of attacking your own Beta/Dev server rather than a Live system. BBe cool: It is not yet time to perform a SQL Injection or Denial of Service, or anything that is AAggressive

OWASP 10 Ethical Hacking – Examples in Action Let’s look at some examples of common mistakes that can be identified with no knowledge of the Development Language in which a Website was coded  These are Hypothetical

OWASP 11 Ethical Looks – Examples in Action

OWASP 12 Ethical Looks – Examples in Action

OWASP 13 Ethical Looks – Examples in Action

OWASP 14 Order of Risk – Where to Begin the Process 1.Internet facing – Existing Applications 1.Compliance Risk 2.Personally Identifiable Information 3.Dynamic Functions 2.Intranet Facing 1.Compliance Risk 2.Personally Identifiable Information 3.Dynamic Functionality 3.Desktop Applications 4.Applications Entering SDLC Process

OWASP 15 Order of Risk – Measurements  Your task is not to break programs  Your task is to solve a problem that is likely misunderstood  Management will need you to provide statistical measurements  Foremost measurement is Cost  Showing success factors  Be sure to use a common guide for measuring application Risk (e.g. Microsoft DREAD Model)

OWASP 16 Order of Risk – Decompose Your Application  Threat Modeling  Identify the entry points of your application  Use Cases  UML Diagrams  Functional Specifications (If they exist)  Identify Data Flow  Diagrams showing the flow of data as it should travel through the application  Identify Data Handoff  Functional Specifications  3 rd party PCI processor  Backend Provisioning

OWASP 17 Order of Risk – Mechanisms of Insecurity  Input and Data Validation  Authentication  Authorization  Configuration Management  Cryptography  Hidden Fields (Parameter Manipulation)  Sensitive Information Leakage  Session Management  Exception Handling  Auditing and Logging (Lack of)

OWASP 18 Source Code – Another Battle Static vs. Automated

OWASP 19 Source Code Cont.  When to utilize Static Source code analysis  Part of the common SDLC Process  Part of the uncommon SDLC Process  What about applications that are built by a third party development group?  Get it in writing!  Acceptance should follow a standard

OWASP 20 Source Code Cont A Common Picture of an SDLC Approach  Traditional Pier Review finds the functional bugs in the developers code  This leaves out many of the more serious or critical defects of a program Enter the Security Engineer

OWASP 21 Source Code Cont Common Diagram / Un-Common SDLC Approach  Security Engineer  At Design – partner of the normal Design Review Process  At Construction – While developer would Unit Test, the SE provide a more thorough review  At Testing – Perform Automated Review and confirm through Manual verification

OWASP 22 Source Code Cont Automated Source Code Scanners CCommon Misunderstanding EEliminates the need for a Security Engineer who can code in multiple languages PPoint and Click BBetter Usage – As a starting point for Source Code Review

OWASP 23 Web Application Firewalls Benefits (When aware of Security Violations)  Can be used to harden or validate parameter value formats (In addition to server-side validation or in place of missing validation)  Can implement customized (temporary) signature detection and validation to address known bugs/vulnerabilities that would take much longer to fix in the source code

OWASP 24 Web Application Firewalls cont Benefits (When aware of Security Violations)  Can see malicious traffic beyond most IDS/IPS and firewalls  Can be used to force Web page redirects when violations occur

OWASP 25 Web Application Firewalls cont  Important Defensive Measure  They are reactionary  Although they prevent attacks, they are not preventive  Choosing to utilize one is a good decision  If you know what you are doing  They Mitigate Risk – They do not Eliminate Risk  Their benefits do not replace the need for Developer Training or Employee Awareness

OWASP 26 Awareness and Training  All employees can benefit from an awareness program  Don’t expect employees to read Policies  Providing a class or an interactive Online awareness practicum  Make this mandatory  Implement Annual Re-certifications  Training  Developers, Architects and Testers  Expect Pushback from Personnel  Let them vent – but make them attend

OWASP 27 It’s been said…  Cost of repairing a Web Application flaw early in the SDLC is 2% of what it is in Production Ounce Labs (2009)  Pen-testing is a badness-o-meter Gary McGraw  Application Security involves Awareness, Prevention, Detection, and Correction Fred

OWASP 28 Summary  Fight your way using the only skills you have  Improve team skills gradually by adding knowledge, tools, or ability experts in areas where skills do not exist  Understand Mitigation vs. Remediation  Integrate Hardware Options (with limitations)  Know What is Acceptable from Management (don’t over do it)  Implement Training and Awareness Programs  Rock on!