SlideShare a Scribd company logo
Full-stack Vulnerability Management at Scale &
The Future of Security Assessment
Eoin Keary
CTO edgescan™
Eoin Keary
CTO/Founder edgescan.com
OWASP Leader/Member/Ireland Founder
OWASP Global Board Member (2009-2015)
Web Risk
• Application Security
• Host Security
• Both / Either / Or
• It’s all software right.
Full-Stack!
Web Applications
App Server
SSL/TLS
Databases
Services
Operating Systems
Networks
Full Stack Security
Appsec VA
Threat
Intel
ENdPoint
One Problem – “silos of solutions”
2015 - Year in Review
2016 – First 100 days
• 83,000 impacted by breach at Gyft Inc
• 7,000,000 Minecraft
• 55,000,000 Records - COMELEC
• Hyatt data beach 250 hotels in 50 countries
• Neiman Marcus – 5,200 accounts
• TaxSlayer – 8,800 customers
Old Vulnerabilities
99.9% of the exploited vulnerabilities in had been
compromised more than a year after the associated CVE
was published. - “Zero day’s” are overrated.
Segregated Industry
• Developers Vs Security
• Admin Vs Developers
• Security Vs Admin
Divergence
Application Security Vs Vulnerability Analysis
Market Driven Separation Vs Risk
Convergence
Developer ←→ Security ←→ Admin
DevSecOps
AppSec + HostSec -> Fullstack
Agile Risk Model
Fail Early – Fail Often
“Push Left”
Continuous Security
“Keeping up” with development.
Assisting secure deployment.
Catching bugs early – Push Left.
Help ensure “change” is secure
Host/Server/Framework
> 30 billion Open source downloads 2015
90% of application code is framework
63%* don’t monitor component security
43%* don’t have open source policy
* http://www.sonatype.com/about/2014-open-source-software-development-survey
AppSec/Component Sec
• “If you're not doing component vulnerability
management you’re not doing appsec…”
– 90% of application code is framework
• “If you’re not doing full-stack you are not doing
security…”
– Hackers don’t give a S*#t
Security by Numbers
Likelihood of a vulnerability being discovered – Web Applications
Security by Numbers
Likelihood of a vulnerability being discovered (root cause) – Hosting Layer
Security by Numbers
edgescan Vulnerability Statistics Report 2015
Thoughts – Patching & Component
Management
“Of all the vulnerabilities discovered in 2015, 63% could
have been mitigated via patch, configuration and
component management combined.”
edgescan Vulnerability Statistics Report 2015
Problems?
Security in a constant state of flux.
“We Can” scale..
Automation of assessment
Depth
Coverage / Breadth
Rigour
SCALE!
Automation
Event Driven
Frequent/Scheduled
Build Build Build
Levelling the Playing Field
Automation!!
• Jenkins, Hudson, Bamboo
– Event driven
– Scheduled
– Incremental
• CHEF, Puppet, Cloud(immutable)
Sounds great…. but
Automation and Integration
• Automation can detect technical
vulnerabilities
– Misuse of code
– Coding Bugs
– Implementation Mistakes
Automation and Integration
• Automation can NOT detect Logical
vulnerabilities
– Business Logic
– Backdoors (E.g. Juniper, Fortinet)
– Provide Risk measurement
– Business Context
Accuracy/Information/Context
The “Anti-Scale”
Risk/ Business Context
Information Vs Data
Human Decisions and Intel
Technical constraints
-> Chokepoints
The “Anti-Scale”
New languages and programming methods
Growth of interpreted languages with no strong typing
(Javascript, Ruby,…) – “hurts” SAST
Few automated tools to test APIs / RESTful APIs
Testing Window is squeezed, manual testing is
doomed!?
Fighting The “Anti-Scale”
Accuracy
“Rule Tuning” – DAST & SAST
Build Fails!
White Noise Suppression
Real Security Vs “Best Practice”
Updates to Rules
Scale
“Delta Analysis”
Previous Vs Current
Changes
FP’s / FN’s
SAST Integration
• Analysis without Runtime - SAST
• More than just tooling
• Management Lifecycle
– Rule Management & Tuning / False Positives
• Cant cover Vuln Taxonomy –Blindspots
SAST Blindspots
• Storage and transmission of confidential
information
• Logic: Authentication, brute force attacks,
effectiveness of password reset etc.
• Logic: Privilege escalation and insufficient
authorization. Business Logic
• Data privacy: data retention and other compliance
(e.g. ensuring credit card numbers are masked
when displayed) - context
DAST Tool/Runtime Vulnerability
Management - Pitfalls
• Coverage Depth – can be shallow
• App Complexity - enemy
• Logical vulns – poor
• “Trial and error” testing
Vulnerability Assessment (Host)
• Easy to perform, Harder to manage
• First assessment
– higher work effort
– establish coverage (Reduce FN’s)
– Weed out FP’s
• Delta Analysis – Previous Vs Current
Component Security
Don’t forget….
• Unpredictable (Like Host Security).
• Requires frequent/continuous vigilance.
• Fix can be difficult and not backward
friendly
Delta-Metrics
• Vuln type - (CVE, OWASP, WASC,
SANS..)
• Tech Stack - (Code, F-work, Host etc)
• Layer - (App/Host)
• Root Cause - (Code, Patch, Config /
Deploy)
– Technical, Logical/Behavioural Vuln
Continuous Asset Profiling
• Detect Global Estate Changes
– New / Dead active IP’s
– Service Changes (Ports open / enabled).
– Perimeter Change – Firewall/ACL changes
– Rogue deployments
Fighting The “AntiScale” - Delta Analysis
Measure of change in a target environment.
Focusing on change in risk posture compared to last assess
-> Closed, New, False Positives
Fighting The “Anti-Scale”-
Testing like a Developer
Break testing into little pieces
Smoke / Incremental Vs full regression
testing
“Early and Often”
– Continuous, on demand
– Testing duration drives testing frequency
Business & Behavioural Testing
At scale:
Can be Difficult …..
Technical Security is covered by “tuned”
Automation…..
More Time to “Deep Dive”
“Future of Pentesting”
• Push towards Technical Vulnerabilities rooted
out using technical methods/services …..
• Push from time chasing Top 10 (SQLI, XSS,
etc) -To- Behavioural, Logical, Business flow
assessment.
• Constant flux requires constant assessment.
• Point-in-time is dead?
FIN
• We can scale but not everything is [easily]
scalable
• Discover Tech Vulns using Tech
• Consider full-stack, don’t let marketing dictate risk.
• Lets test to mirror DevOps
• Convergence is necessary to address issue.
@eoinkeary
eoin@bccriskadvisory.com

More Related Content

What's hot (19)

PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Kymberlee Price
 
PDF
OSB130 Patch Management Best Practices
Ivanti
 
PPT
Secure by design and secure software development
Bill Ross
 
PDF
Threat Modeling to Reduce Software Security Risk
Security Innovation
 
PPTX
PHDays 9: new methods of Vulnerability Prioritization in Vulnerability Manage...
Alexander Leonov
 
PPTX
Six Steps to SIEM Success
AlienVault
 
PPT
Software safety in embedded systems & software safety why, what, and how
bdemchak
 
PDF
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Damon Small
 
PPTX
Secure Software Development Lifecycle
1&1
 
PPT
Concepts in Software Safety
dalesanders
 
PPT
Software Security Frameworks
Marco Morana
 
PPTX
Information Security and the SDLC
BDPA Charlotte - Information Technology Thought Leaders
 
PPTX
Agile and Secure SDLC
Nazar Tymoshyk, CEH, Ph.D.
 
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault
 
PDF
Secure Coding and Threat Modeling
Miriam Celi, CISSP, GISP, MSCS, MBA
 
PDF
SANS 2013 Critical Security Controls Survey
Edgar Alejandro Villegas
 
ODP
Basic of SSDLC
Chitpong Wuttanan
 
PPTX
SecPod Saner
Chandrashekhar B
 
PDF
Vulnerability and Patch Management
n|u - The Open Security Community
 
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Kymberlee Price
 
OSB130 Patch Management Best Practices
Ivanti
 
Secure by design and secure software development
Bill Ross
 
Threat Modeling to Reduce Software Security Risk
Security Innovation
 
PHDays 9: new methods of Vulnerability Prioritization in Vulnerability Manage...
Alexander Leonov
 
Six Steps to SIEM Success
AlienVault
 
Software safety in embedded systems & software safety why, what, and how
bdemchak
 
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Damon Small
 
Secure Software Development Lifecycle
1&1
 
Concepts in Software Safety
dalesanders
 
Software Security Frameworks
Marco Morana
 
Agile and Secure SDLC
Nazar Tymoshyk, CEH, Ph.D.
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault
 
Secure Coding and Threat Modeling
Miriam Celi, CISSP, GISP, MSCS, MBA
 
SANS 2013 Critical Security Controls Survey
Edgar Alejandro Villegas
 
Basic of SSDLC
Chitpong Wuttanan
 
SecPod Saner
Chandrashekhar B
 
Vulnerability and Patch Management
n|u - The Open Security Community
 

Similar to Full stack vulnerability management at scale (20)

PPTX
Skillful scalefull fullstack security in a state of constant flux
Eoin Keary
 
PPTX
Vulnerability management and threat detection by the numbers
Eoin Keary
 
PPTX
Vulnerability management and threat detection by the numbers
Eoin Keary
 
PPTX
Allianz Global CISO october-2015-draft
Eoin Keary
 
PPTX
One login enemy at the gates
Eoin Keary
 
PPTX
Security by the numbers
Eoin Keary
 
PDF
edgescan vulnerability stats report (2018)
Eoin Keary
 
PPTX
Hide and seek - Attack Surface Management and continuous assessment.
Eoin Keary
 
PDF
edgescan vulnerability stats report (2019)
Eoin Keary
 
PDF
Building Your Application Security Data Hub - OWASP AppSecUSA
Denim Group
 
PPTX
Keeping the wolf from 1000 doors.
Eoin Keary
 
PPTX
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Eoin Keary
 
PPTX
Vulnerability Intelligence - Standing Still in a world full of change
Eoin Keary
 
PPTX
Online Gaming Cyber security and Threat Model
Eoin Keary
 
PDF
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Black Duck by Synopsys
 
PPTX
Web security – everything we know is wrong cloud version
Eoin Keary
 
PDF
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
PDF
DevSecOps: essential tooling to enable continuous security 2019-09-16
Rich Mills
 
PPT
BSidesJXN 2017 - Improving Vulnerability Management
Andrew McNicol
 
PDF
Edgescan vulnerability stats report 2020
Eoin Keary
 
Skillful scalefull fullstack security in a state of constant flux
Eoin Keary
 
Vulnerability management and threat detection by the numbers
Eoin Keary
 
Vulnerability management and threat detection by the numbers
Eoin Keary
 
Allianz Global CISO october-2015-draft
Eoin Keary
 
One login enemy at the gates
Eoin Keary
 
Security by the numbers
Eoin Keary
 
edgescan vulnerability stats report (2018)
Eoin Keary
 
Hide and seek - Attack Surface Management and continuous assessment.
Eoin Keary
 
edgescan vulnerability stats report (2019)
Eoin Keary
 
Building Your Application Security Data Hub - OWASP AppSecUSA
Denim Group
 
Keeping the wolf from 1000 doors.
Eoin Keary
 
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Eoin Keary
 
Vulnerability Intelligence - Standing Still in a world full of change
Eoin Keary
 
Online Gaming Cyber security and Threat Model
Eoin Keary
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Black Duck by Synopsys
 
Web security – everything we know is wrong cloud version
Eoin Keary
 
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
DevSecOps: essential tooling to enable continuous security 2019-09-16
Rich Mills
 
BSidesJXN 2017 - Improving Vulnerability Management
Andrew McNicol
 
Edgescan vulnerability stats report 2020
Eoin Keary
 
Ad

More from Eoin Keary (15)

PPTX
IISF-March2023.pptx
Eoin Keary
 
PDF
Validation of vulnerabilities.pdf
Eoin Keary
 
PDF
Does a Hybrid model for vulnerability Management Make Sense.pdf
Eoin Keary
 
PDF
Edgescan 2022 Vulnerability Statistics Report
Eoin Keary
 
PPTX
Edgescan 2021 Vulnerability Stats Report
Eoin Keary
 
PPTX
Cybersecurity by the numbers
Eoin Keary
 
PPTX
Ebu class edgescan-2017
Eoin Keary
 
PPTX
14. html 5 security considerations
Eoin Keary
 
PPTX
04. xss and encoding
Eoin Keary
 
PPTX
03. sql and other injection module v17
Eoin Keary
 
PPTX
02. input validation module v5
Eoin Keary
 
PPTX
01. http basics v27
Eoin Keary
 
PPTX
00. introduction to app sec v3
Eoin Keary
 
PPTX
Media-web_application_security_and_vulnerabilities
Eoin Keary
 
PPTX
Web security – application security roads to software security nirvana iisf...
Eoin Keary
 
IISF-March2023.pptx
Eoin Keary
 
Validation of vulnerabilities.pdf
Eoin Keary
 
Does a Hybrid model for vulnerability Management Make Sense.pdf
Eoin Keary
 
Edgescan 2022 Vulnerability Statistics Report
Eoin Keary
 
Edgescan 2021 Vulnerability Stats Report
Eoin Keary
 
Cybersecurity by the numbers
Eoin Keary
 
Ebu class edgescan-2017
Eoin Keary
 
14. html 5 security considerations
Eoin Keary
 
04. xss and encoding
Eoin Keary
 
03. sql and other injection module v17
Eoin Keary
 
02. input validation module v5
Eoin Keary
 
01. http basics v27
Eoin Keary
 
00. introduction to app sec v3
Eoin Keary
 
Media-web_application_security_and_vulnerabilities
Eoin Keary
 
Web security – application security roads to software security nirvana iisf...
Eoin Keary
 
Ad

Recently uploaded (20)

PPTX
PE introd.pptxfrgfgfdgfdgfgrtretrt44t444
nepmithibai2024
 
PDF
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 
PPTX
Powerpoint Slides: Eco Economic Epochs.pptx
Steven McGee
 
PPTX
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
PDF
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
PDF
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
PDF
How to Fix Error Code 16 in Adobe Photoshop A Step-by-Step Guide.pdf
Becky Lean
 
PDF
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
PPTX
Random Presentation By Fuhran Khalil uio
maniieiish
 
PPTX
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
PPTX
PM200.pptxghjgfhjghjghjghjghjghjghjghjghjghj
breadpaan921
 
PDF
Internet Governance and its role in Global economy presentation By Shreedeep ...
Shreedeep Rayamajhi
 
PDF
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
PPTX
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
PPT
introduction to networking with basics coverage
RamananMuthukrishnan
 
PPTX
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
PPT
Agilent Optoelectronic Solutions for Mobile Application
andreashenniger2
 
PPTX
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
PPT
introductio to computers by arthur janry
RamananMuthukrishnan
 
PPTX
Orchestrating things in Angular application
Peter Abraham
 
PE introd.pptxfrgfgfdgfdgfgrtretrt44t444
nepmithibai2024
 
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 
Powerpoint Slides: Eco Economic Epochs.pptx
Steven McGee
 
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
How to Fix Error Code 16 in Adobe Photoshop A Step-by-Step Guide.pdf
Becky Lean
 
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
Random Presentation By Fuhran Khalil uio
maniieiish
 
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
PM200.pptxghjgfhjghjghjghjghjghjghjghjghjghj
breadpaan921
 
Internet Governance and its role in Global economy presentation By Shreedeep ...
Shreedeep Rayamajhi
 
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
introduction to networking with basics coverage
RamananMuthukrishnan
 
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
Agilent Optoelectronic Solutions for Mobile Application
andreashenniger2
 
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
introductio to computers by arthur janry
RamananMuthukrishnan
 
Orchestrating things in Angular application
Peter Abraham
 

Full stack vulnerability management at scale