SlideShare a Scribd company logo
Application Security: Roads to
Software Security Nirvana
Eoin Keary
• CTO BCCRISKADVISORY.COM
• OWASP GLOBAL BOARD MEMBER
• edgescan.com
Software Security Nirvana
4© 2012 WhiteHat Security, Inc.
HACKED
“(Cyber crime is the) second cause of economic crime experienced
by the financial services sector” – PwC
2012 Cyber Crime
• US $20.7 billion in direct losses
• Global $110 billion in direct losses
• Global $338 billion + downtime
“556 million adults across the world have first-hand experience of
cybercrime -- more than the entire population of the European
Union.”
Globally,
every
second, 18
adults
become
victims of
cybercrime
- Symantec
“The loss of industrial information and intellectual
property through cyber espionage constitutes the
greatest transfer of wealth in history” - Keith
Alexander
Almost 1 trillion USD was spent in
2012 protecting against cybercrime
Jimmy, I didn’t click it –
My Grandma
“One
hundred
BILLION
dollars” -
Dr Evil
Security is mostly a superstition. It does not
exist in nature, nor do the children of men as a
whole experience it. Avoiding danger is no
safer in the long run than outright exposure.
Life is either a daring adventure, or nothing.
-Helen Keller
Its (not) the $$$$
Information
security spend
Security incidents
(business impact)
But we are approaching this problem completely
wrong and have been for years…..
Problem # 1
Asymmetric Arms Race
A traditional end of cycle / Annual penetration
testing only gives minimal security…..
There are too many variables and too little time
to ensure “real security”.
• Code changes - possible introduction of vulnerabilities
• Framework vulnerabilities are discovered all the time
• Server/Hosting changes may give rise to a vulnerability
• Patching - vulnerability
• Logical/Business logic vulnerability - from new features
An inconvenient truth
Two weeks of
ethical hacking
Ten man-years of
development
Business
Logic Flaws
Code
Flaws
Security
Errors
Attacks Shift Towards Application Layer
V
"Risk comes from not knowing what you're
doing." - Warren Buffet
We know they are bad for us, but who cares, right?
If we eat too many we may get a heart attack? …sound familiar
We also write [in]secure code until we get hacked
The Cheeseburger approach: “Cheeseburger risk’ is the kind of risk you
deliberately take even knowing the consequences, until those consequences
actually come to pass.”
Cheeseburger Security
In two weeks:
Consultant “tune tools”
Use multiple tools – verify issues
Customize Attack Vectors to technology stack
Achieve 80-90 application functionality coverage
How experienced is the consultant?
Are they as good as the bad guys?
They certainly need to be, they only have 2 weeks, right!!?
Code may be pushed to live soon after the test.
Potential window of Exploitation could be until the next pen test.
6 mths, 9 mths, 1 year?
Automated Review
A fool with a tool, is still a fool”…..?
“We need an Onion”
SDL – Design review
Threat Modeling
Code review/SAST
Negative use/abuse cases/Fuzzing/DAST
Live/Ongoing - Continuous/Frequent monitoring / Testing
Manual Validation
Vulnerability management & Priority
Dependency Management ….
We need more than a Penetration test.
Large Trend towards services based Security & Vulnerability Management
All vulnerabilities are not equal:
Fixing “the right” vulns not all vulns
SDLC integration: Prevent Vs React – Cheese Burger Security
Security is changing….
From
– Securing mission
critical assets
– Point in time
Assessments
– Appliances/Software
licenses and staff to
manage perimeter
To
– Securing all assets
– Frequent scheduled
assessment of all assets
– SaaS Security –
Superior Accuracy.
Expert validation.
Fatal Flaw: “We only need to “do” security on important sites”
Make this more difficult: Lets change the application code once a month.
Continuous Security Assessment Approach
time
Problem # 2
You are what you eat
Software food chain
23
Application
Code
COTS
(Commercial off
the shelf
Outsourced
development Sub-
Contractors
Bespoke
outsourced
development
Bespoke Internal
development
Third Party
API’s
Third Party
Components
& Systems
Degrees of trust
You may not let some of the people who have developed your code into your offices!!
More Less
2012- Study of 31 popular open source libraries.
- 19.8 million (26%) of the library downloads
have known vulnerabilities.
- Today's applications may use up to 30 or more
libraries - 80% of the codebase
Spring - application development framework :
downloaded 18 million times by over 43,000
organizations in the last year. – Vulnerability:
Information leakage CVE-2011-2730
http://support.springsource.com/security/cve-2011-2730
In Apache CXF– application framework: 4.2
million downloads.- Vulnerability: high risk CVE-
2010-2076 & CVE 2012-0803
http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf
http://cxf.apache.org/cve-2012-0803.html
Problem # 3
Bite off more than we chew
How can we manage vulnerabilities on a large
scale….
Web security – application security roads to software security nirvana   iisf version
“We can’t improve what we can’t measure”
Say 300 web applications:
300 Annual Penetration tests
10’s of different penetration testers?
300 reports
How do we consume this Data?
Enterprise Security Intelligence:
Consolidation of vulnerability data.
Continuous active monitoring
Vulnerability Management solutions
Metrics: We can measure what problems we have
Measure: We cant improve what we cant measure
Priority: If we can measure we can prioritise
Delta: If we can measure we can detect change
Apply: We can apply our (small) budget on the right things
Improve: We can improve where it matters……
Value: Demonstrate value to our business
Answer the question: “Are we secure?” < a little better?
Problem # 4
Information flooding
(Melting a developers brain, White noise and
“compliance”)
Doing things right != Doing the right things.
“Not all bugs/vulnerabilities are equal”
(is HttpOnly important if there is no XSS?)
Contextualize Risk
(is XSS /SQLi always High Risk?)
Do developers need to fix everything?
- Limited time
- Finite Resources
- Task Priority
- Pass internal audit?
White Noise
Compliance
There’s Compliance:
EU directive:
http://register.consilium.europa.eu/pdf/en/12/st05/st05853.
en12.pdf
Article 23,24 & 79, - Administrative sanctions
“The supervisory authority shall impose a fine up to 250 000
EUR, or in case of an enterprise up to 0.5 % of its annual
worldwide turnover, to anyone who, intentionally or
negligently does not protect personal data”
Clear and Present Danger!!
…and there’s Compliance
Problem
Explain issues in “Developer speak” (AKA
English)
Is Cross-Site Scripting the same as SQL injection?
Both are injection attacks -> code and data
being confused by system.
LDAP Injection, Command Injection, Log Injection, XSS, SQLI etc etc
Think old phone systems, Captain Crunch (John Draper).
Signaling data and voice data on same logical connection – Phone Phreaking
XSS causes the browser to execute user
supplied input as code. The input breaks out of
the "Data" context and becomes execution
context.
SQLI causes the database or source code
calling the database to confuse data [context]
and ANSI SQL [ execution context].
Command injection mixes up data [context]
and the command [context].
So….
We need to understand what we are protecting against.
We need to understand that secure applications are in the hands of developers
You can only improve what you can measure
Not all bugs are created equal.
Bugs are Bugs. Explain security issues to developers in “Dev speak”
www.bccriskadvisory.com
© BCC Risk Advisory Ltd 2013 ..
All rights reserved.
Thanks for Listening
@eoinkeary
eoin@bccriskadvisory.com

More Related Content

What's hot (20)

PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
PPTX
Jack Whitsitt - Yours, Anecdotally
EnergySec
 
PDF
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
PDF
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
EC-Council
 
PPTX
Valuing Data in the Age of Ransomware
IBM Security
 
PDF
Slide Griffin - Practical Attacks and Mitigations
EnergySec
 
PPTX
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
EnergySec
 
PPTX
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
PPTX
New Paradigms for the Next Era of Security
Sounil Yu
 
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 
PDF
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 
PPTX
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
centralohioissa
 
PDF
How to Reduce the Attack Surface Created by Your Cyber-Tools
Enterprise Management Associates
 
PDF
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings
 
PPTX
Bob West - Educating the Board of Directors
centralohioissa
 
PDF
Future of Cybersecurity 2016 - M.Rosenquist
Matthew Rosenquist
 
PDF
Next-level mobile app security: A programmatic approach
NowSecure
 
PPT
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
PDF
Building secure mobile apps
Martin Vigo
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
Jack Whitsitt - Yours, Anecdotally
EnergySec
 
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
EC-Council
 
Valuing Data in the Age of Ransomware
IBM Security
 
Slide Griffin - Practical Attacks and Mitigations
EnergySec
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
EnergySec
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
New Paradigms for the Next Era of Security
Sounil Yu
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
centralohioissa
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
Enterprise Management Associates
 
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings
 
Bob West - Educating the Board of Directors
centralohioissa
 
Future of Cybersecurity 2016 - M.Rosenquist
Matthew Rosenquist
 
Next-level mobile app security: A programmatic approach
NowSecure
 
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
Building secure mobile apps
Martin Vigo
 

Similar to Web security – application security roads to software security nirvana iisf version (20)

PPTX
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
 
PPTX
00. introduction to app sec v3
Eoin Keary
 
PPTX
CyberSecurityppt. pptx
iamayesha2526
 
PPTX
Web Security Overview
Noah Jaehnert
 
PDF
Streamlining AppSec Policy Definition.pptx
tmbainjr131
 
PDF
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Veracode
 
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
Cenzic
 
PPT
Software Security in the Real World
Mark Curphey
 
PPT
六合彩香港-六合彩
baoyin
 
PDF
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
PPTX
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
OWASP Delhi
 
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins
 
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
PPTX
Application Security: What do we need to know?
Jose L. Quiñones-Borrero
 
PPT
Intro to-ssdl--lone-star-php-2013
nanderoo
 
PPTX
Web Application Security
sudip pudasaini
 
PPT
Web Application Security
Colin English
 
PPTX
Built-in Security Mindfulness for Software Developers
Phú Phùng
 
PDF
Secure coding guidelines
Zakaria SMAHI
 
PDF
C01461422
IOSR Journals
 
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
 
00. introduction to app sec v3
Eoin Keary
 
CyberSecurityppt. pptx
iamayesha2526
 
Web Security Overview
Noah Jaehnert
 
Streamlining AppSec Policy Definition.pptx
tmbainjr131
 
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Veracode
 
Essentials of Web Application Security: what it is, why it matters and how to...
Cenzic
 
Software Security in the Real World
Mark Curphey
 
六合彩香港-六合彩
baoyin
 
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
OWASP Delhi
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
Application Security: What do we need to know?
Jose L. Quiñones-Borrero
 
Intro to-ssdl--lone-star-php-2013
nanderoo
 
Web Application Security
sudip pudasaini
 
Web Application Security
Colin English
 
Built-in Security Mindfulness for Software Developers
Phú Phùng
 
Secure coding guidelines
Zakaria SMAHI
 
C01461422
IOSR Journals
 
Ad

More from Eoin Keary (20)

PPTX
IISF-March2023.pptx
Eoin Keary
 
PDF
Validation of vulnerabilities.pdf
Eoin Keary
 
PDF
Does a Hybrid model for vulnerability Management Make Sense.pdf
Eoin Keary
 
PDF
Edgescan 2022 Vulnerability Statistics Report
Eoin Keary
 
PPTX
Edgescan 2021 Vulnerability Stats Report
Eoin Keary
 
PPTX
One login enemy at the gates
Eoin Keary
 
PDF
Edgescan vulnerability stats report 2020
Eoin Keary
 
PDF
edgescan vulnerability stats report (2018)
Eoin Keary
 
PDF
edgescan vulnerability stats report (2019)
Eoin Keary
 
PPTX
Full stack vulnerability management at scale
Eoin Keary
 
PPTX
Vulnerability Intelligence - Standing Still in a world full of change
Eoin Keary
 
PPTX
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Eoin Keary
 
PPTX
Hide and seek - Attack Surface Management and continuous assessment.
Eoin Keary
 
PPTX
Online Gaming Cyber security and Threat Model
Eoin Keary
 
PPTX
Keeping the wolf from 1000 doors.
Eoin Keary
 
PPTX
Security by the numbers
Eoin Keary
 
PPTX
Cybersecurity by the numbers
Eoin Keary
 
PPTX
Ebu class edgescan-2017
Eoin Keary
 
PPTX
Vulnerability management and threat detection by the numbers
Eoin Keary
 
PPTX
14. html 5 security considerations
Eoin Keary
 
IISF-March2023.pptx
Eoin Keary
 
Validation of vulnerabilities.pdf
Eoin Keary
 
Does a Hybrid model for vulnerability Management Make Sense.pdf
Eoin Keary
 
Edgescan 2022 Vulnerability Statistics Report
Eoin Keary
 
Edgescan 2021 Vulnerability Stats Report
Eoin Keary
 
One login enemy at the gates
Eoin Keary
 
Edgescan vulnerability stats report 2020
Eoin Keary
 
edgescan vulnerability stats report (2018)
Eoin Keary
 
edgescan vulnerability stats report (2019)
Eoin Keary
 
Full stack vulnerability management at scale
Eoin Keary
 
Vulnerability Intelligence - Standing Still in a world full of change
Eoin Keary
 
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Eoin Keary
 
Hide and seek - Attack Surface Management and continuous assessment.
Eoin Keary
 
Online Gaming Cyber security and Threat Model
Eoin Keary
 
Keeping the wolf from 1000 doors.
Eoin Keary
 
Security by the numbers
Eoin Keary
 
Cybersecurity by the numbers
Eoin Keary
 
Ebu class edgescan-2017
Eoin Keary
 
Vulnerability management and threat detection by the numbers
Eoin Keary
 
14. html 5 security considerations
Eoin Keary
 
Ad

Recently uploaded (20)

PDF
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
PPTX
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
PPTX
英国学位证(RCM毕业证书)皇家音乐学院毕业证书如何办理
Taqyea
 
PPTX
internet básico presentacion es una red global
70965857
 
PPT
introductio to computers by arthur janry
RamananMuthukrishnan
 
PPTX
sajflsajfljsdfljslfjslfsdfas;fdsfksadfjlsdflkjslgfs;lfjlsajfl;sajfasfd.pptx
theknightme
 
PDF
Slides PDF format Eco Economic Epochs.pdf
Steven McGee
 
PPTX
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
PPTX
Cost_of_Quality_Presentation_Software_Engineering.pptx
farispalayi
 
PDF
DevOps Design for different deployment options
henrymails
 
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
PDF
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
PPTX
Random Presentation By Fuhran Khalil uio
maniieiish
 
PPTX
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
PDF
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
PPTX
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
PDF
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
PPTX
Powerpoint Slides: Eco Economic Epochs.pptx
Steven McGee
 
PPTX
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
PDF
How to Fix Error Code 16 in Adobe Photoshop A Step-by-Step Guide.pdf
Becky Lean
 
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
英国学位证(RCM毕业证书)皇家音乐学院毕业证书如何办理
Taqyea
 
internet básico presentacion es una red global
70965857
 
introductio to computers by arthur janry
RamananMuthukrishnan
 
sajflsajfljsdfljslfjslfsdfas;fdsfksadfjlsdflkjslgfs;lfjlsajfl;sajfasfd.pptx
theknightme
 
Slides PDF format Eco Economic Epochs.pdf
Steven McGee
 
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
Cost_of_Quality_Presentation_Software_Engineering.pptx
farispalayi
 
DevOps Design for different deployment options
henrymails
 
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
Random Presentation By Fuhran Khalil uio
maniieiish
 
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
Powerpoint Slides: Eco Economic Epochs.pptx
Steven McGee
 
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
How to Fix Error Code 16 in Adobe Photoshop A Step-by-Step Guide.pdf
Becky Lean
 

Web security – application security roads to software security nirvana iisf version

  • 1. Application Security: Roads to Software Security Nirvana
  • 2. Eoin Keary • CTO BCCRISKADVISORY.COM • OWASP GLOBAL BOARD MEMBER • edgescan.com
  • 4. 4© 2012 WhiteHat Security, Inc. HACKED
  • 5. “(Cyber crime is the) second cause of economic crime experienced by the financial services sector” – PwC 2012 Cyber Crime • US $20.7 billion in direct losses • Global $110 billion in direct losses • Global $338 billion + downtime “556 million adults across the world have first-hand experience of cybercrime -- more than the entire population of the European Union.” Globally, every second, 18 adults become victims of cybercrime - Symantec “The loss of industrial information and intellectual property through cyber espionage constitutes the greatest transfer of wealth in history” - Keith Alexander Almost 1 trillion USD was spent in 2012 protecting against cybercrime Jimmy, I didn’t click it – My Grandma “One hundred BILLION dollars” - Dr Evil
  • 6. Security is mostly a superstition. It does not exist in nature, nor do the children of men as a whole experience it. Avoiding danger is no safer in the long run than outright exposure. Life is either a daring adventure, or nothing. -Helen Keller
  • 7. Its (not) the $$$$ Information security spend Security incidents (business impact)
  • 8. But we are approaching this problem completely wrong and have been for years…..
  • 10. A traditional end of cycle / Annual penetration testing only gives minimal security…..
  • 11. There are too many variables and too little time to ensure “real security”. • Code changes - possible introduction of vulnerabilities • Framework vulnerabilities are discovered all the time • Server/Hosting changes may give rise to a vulnerability • Patching - vulnerability • Logical/Business logic vulnerability - from new features
  • 12. An inconvenient truth Two weeks of ethical hacking Ten man-years of development Business Logic Flaws Code Flaws Security Errors
  • 13. Attacks Shift Towards Application Layer V
  • 14. "Risk comes from not knowing what you're doing." - Warren Buffet
  • 15. We know they are bad for us, but who cares, right? If we eat too many we may get a heart attack? …sound familiar We also write [in]secure code until we get hacked The Cheeseburger approach: “Cheeseburger risk’ is the kind of risk you deliberately take even knowing the consequences, until those consequences actually come to pass.” Cheeseburger Security
  • 16. In two weeks: Consultant “tune tools” Use multiple tools – verify issues Customize Attack Vectors to technology stack Achieve 80-90 application functionality coverage How experienced is the consultant? Are they as good as the bad guys? They certainly need to be, they only have 2 weeks, right!!? Code may be pushed to live soon after the test. Potential window of Exploitation could be until the next pen test. 6 mths, 9 mths, 1 year? Automated Review A fool with a tool, is still a fool”…..?
  • 17. “We need an Onion” SDL – Design review Threat Modeling Code review/SAST Negative use/abuse cases/Fuzzing/DAST Live/Ongoing - Continuous/Frequent monitoring / Testing Manual Validation Vulnerability management & Priority Dependency Management …. We need more than a Penetration test.
  • 18. Large Trend towards services based Security & Vulnerability Management All vulnerabilities are not equal: Fixing “the right” vulns not all vulns SDLC integration: Prevent Vs React – Cheese Burger Security
  • 19. Security is changing…. From – Securing mission critical assets – Point in time Assessments – Appliances/Software licenses and staff to manage perimeter To – Securing all assets – Frequent scheduled assessment of all assets – SaaS Security – Superior Accuracy. Expert validation. Fatal Flaw: “We only need to “do” security on important sites”
  • 20. Make this more difficult: Lets change the application code once a month.
  • 22. Problem # 2 You are what you eat
  • 23. Software food chain 23 Application Code COTS (Commercial off the shelf Outsourced development Sub- Contractors Bespoke outsourced development Bespoke Internal development Third Party API’s Third Party Components & Systems Degrees of trust You may not let some of the people who have developed your code into your offices!! More Less
  • 24. 2012- Study of 31 popular open source libraries. - 19.8 million (26%) of the library downloads have known vulnerabilities. - Today's applications may use up to 30 or more libraries - 80% of the codebase
  • 25. Spring - application development framework : downloaded 18 million times by over 43,000 organizations in the last year. – Vulnerability: Information leakage CVE-2011-2730 http://support.springsource.com/security/cve-2011-2730 In Apache CXF– application framework: 4.2 million downloads.- Vulnerability: high risk CVE- 2010-2076 & CVE 2012-0803 http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf http://cxf.apache.org/cve-2012-0803.html
  • 26. Problem # 3 Bite off more than we chew
  • 27. How can we manage vulnerabilities on a large scale….
  • 29. “We can’t improve what we can’t measure”
  • 30. Say 300 web applications: 300 Annual Penetration tests 10’s of different penetration testers? 300 reports How do we consume this Data?
  • 31. Enterprise Security Intelligence: Consolidation of vulnerability data. Continuous active monitoring Vulnerability Management solutions
  • 32. Metrics: We can measure what problems we have Measure: We cant improve what we cant measure Priority: If we can measure we can prioritise Delta: If we can measure we can detect change Apply: We can apply our (small) budget on the right things Improve: We can improve where it matters…… Value: Demonstrate value to our business Answer the question: “Are we secure?” < a little better?
  • 33. Problem # 4 Information flooding (Melting a developers brain, White noise and “compliance”)
  • 34. Doing things right != Doing the right things. “Not all bugs/vulnerabilities are equal” (is HttpOnly important if there is no XSS?) Contextualize Risk (is XSS /SQLi always High Risk?) Do developers need to fix everything? - Limited time - Finite Resources - Task Priority - Pass internal audit? White Noise
  • 35. Compliance There’s Compliance: EU directive: http://register.consilium.europa.eu/pdf/en/12/st05/st05853. en12.pdf Article 23,24 & 79, - Administrative sanctions “The supervisory authority shall impose a fine up to 250 000 EUR, or in case of an enterprise up to 0.5 % of its annual worldwide turnover, to anyone who, intentionally or negligently does not protect personal data”
  • 36. Clear and Present Danger!! …and there’s Compliance
  • 37. Problem Explain issues in “Developer speak” (AKA English)
  • 38. Is Cross-Site Scripting the same as SQL injection? Both are injection attacks -> code and data being confused by system. LDAP Injection, Command Injection, Log Injection, XSS, SQLI etc etc Think old phone systems, Captain Crunch (John Draper). Signaling data and voice data on same logical connection – Phone Phreaking
  • 39. XSS causes the browser to execute user supplied input as code. The input breaks out of the "Data" context and becomes execution context. SQLI causes the database or source code calling the database to confuse data [context] and ANSI SQL [ execution context]. Command injection mixes up data [context] and the command [context].
  • 40. So…. We need to understand what we are protecting against. We need to understand that secure applications are in the hands of developers You can only improve what you can measure Not all bugs are created equal. Bugs are Bugs. Explain security issues to developers in “Dev speak”
  • 41. www.bccriskadvisory.com © BCC Risk Advisory Ltd 2013 .. All rights reserved. Thanks for Listening @eoinkeary [email protected]