Download presentation
Presentation is loading. Please wait.
Published byMoris Sullivan Modified over 9 years ago
1
OWASP
2
To ensure that strong simple security controls are available to every developer in every environment ESAPI Mission
3
Where Do Vulnerabilities Come From?
4
Controls Every Application Needs Access Control Authenti- cation and Identity App Firewall Access Reference Map Output Escaping Input Validation Logging Exception Handling Secure Config Intrusion Detection HTTP Utilities Encryption and Signing
5
Security Controls Are Hard
6
Escaping Gone Wild Percent Encoding %3c %3C HTML Entity Encoding < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < &lT &Lt < < &lT; ≪ < JavaScript Escape \< \x3c \X3c \u003c \U003c \x3C \X3C \u003C \U003C CSS Escape \3c \03c \003c \0003c \00003c \3C \03C \003C \0003C \00003C Overlong UTF-8 %c0%bc %e0%80%bc %f0%80%80%bc %f8%80%80%80%bc %fc%80%80%80%80%bc US-ASCII ¼ UTF-7 +ADw- Punycode <- < <
7
Cheaper, Better, Faster
8
Independence
9
Positive Security attacks threatsexploits vulnerabilities risks controls accountability pentest scanning assurance patterns verification architecture policy impact flaws metrics visibility completeness
10
ESAPI Scorecard Authentication Identity Access Control ** ** Input Validation Output Escaping Canonicalization Encryption Random Numbers Exceptions Logging IntrusionDetection Security Config App Firewall Scorecard
11
Assurance
12
Deceptively Tricky Problems for Developers 1.Input Validation and Output Encoding 2.Authentication and Identity 3.URL Access Control 4.Business Function Access Control 5.Data Layer Access Control 6.Presentation Layer Access Control 7.Errors, Logging, and Intrusion Detection 8.Encryption, Hashing, and Randomness Lots more…
13
Stopping Injection 13 Quick and Dirty Ad Hoc Escaping Generic Validation
14
Stopping Injection 14 Enterprise Automatic Escaping Managed Specific Validation Managed Generic Validation
15
Questions
17
Stopping Injection 17 Quick and Dirty Ad Hoc Escaping Generic Validation
18
Stopping Injection 18 Strong Application Mandatory Escaping Specific Validation Generic Validation (+can)
19
ESAPI Web App Firewall (WAF) attacker user ESAPI WAF Critical Application? PCI requirement? 3 rd party application? Legacy application? Incident response? Virtual patches Authentication rules URL access control Egress filtering Attack surface reduction Real-time security
20
AuthN and AuthZ 20 Quick and Dirty User in Session Simple Authentication Model Ad Hoc Authorization
21
AuthN and AuthZ 21 Strong Application Identity Everywhere Automatic CG Authorization Alternate Authentication Automatic FG Authorization
22
AuthN and AuthZ 22 Enterprise AuthZ Policy Management AuthZ Entitlement Mgmt Identity Management
23
Applications Enjoy Attacks YouTube Live Search Blogger
24
Accountability and Detection 24 Quick and Dirty Ad Hoc Security Logging Security Exceptions (2 msgs) Ad Hoc Authorization
25
Accountability and Detection 25 Strong Application Intrusion Detection Automatic Security Logging
26
Accountability and Detection 26 Enterprise Log Policy Management Dynamic Incident Response Centralized Logging
27
ESAPI Swingset
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.