+ All Categories
Home > Documents > The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight,...

The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight,...

Date post: 03-Sep-2019
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
27
Scott Snowden – CISSP, CSSLP, CEH Director of DoD Software Security Engineering The Cloud, the Software Factory and Application Security What goes where and how does this all fit together
Transcript
Page 1: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

Scott Snowden – CISSP, CSSLP, CEHDirector of DoD Software Security Engineering

The Cloud, the Software Factory and Application SecurityWhat goes where and how does this all fit together

Page 2: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

2

Key Message

Moving your application to the Cloud may make it more secure and reliable, but there are many controls and requirements that are still your responsibility.

You need to know what is addressed how and where.

Page 3: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

§ USAF Strategic Direction§ The Cloud – a level set§ Modern software development overview§ Application Security§ Putting it all together

3

Agenda - Application Security in the Cloud

Disclaimer: The views expressed in this presentation are those of the author and do not necessarily reflect the official policy or position of the Air Force, the Department of Defense, or the U.S. Government.

Page 4: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

USAF Strategy and Vision

4

Page 5: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

§ Increase resiliency, survivability, and cybersecurity of its information and systems

§ Overlap with Cloud, Software Factories and Application Security

5

SAF/CIO A6 Mission Brief

Reference: https://www.safcioa6.af.mil/

Page 6: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

SAF/CIO A6 Vision: The Air Force fully exploits the man-made domain of cyberspace to execute,

enhance and support Air Force core missions.

§ A6 Initiative - Cloud Computing: In partnership with DISA, the DoD Cloud Broker, the Air Force is

exploring the use of Cloud Computing to deliver ubiquitous access to relevant data at the point of

need.

§ Air Force Information Dominance Flight Plan (Feb, 2017)

§ Objective 1.6 – Develop and employ cyberspace risk methodology

§ Identify mission-critical cyber assets and assure they operate in a contested env.

§ Objective 1.3 – Increase cybersecurity and resiliency of weapon and mission systems

§ Objective 2.1 – Optimize Information and Intelligence Networks

§ Harness cloud computing … to increase mission effectiveness and cybersecurity while reducing costs

§ Air Force Policy Directive 17-2 - Cyber Operations

§ 2.3. AFIN Operations are actions taken to design, build, configure, secure, operate, maintain, and sustain AF IT,

to include Platform IT (PIT), cyber enabled systems/weapons systems, and National Security Systems (NSS), in

a way that creates and preserves data availability, integrity and confidentiality.

6

USAF SAF CIO A6

Page 7: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

The Cloud

7

Page 8: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

§ On-demand self-service: The ability for an end user to sign up and receive services without the long delays that have characterized traditional IT.

§ Broad network access: The ability to access the service via standard platforms (desktop, laptop, mobile, etc.).

§ Resource pooling: Resources are pooled across multiple customers.

§ Rapid elasticity: Capability can scale to cope with demand peaks.

§ Measured service: Billing is metered and delivered as a utility service.

§ Infrastructure as a Service (IaaS): A way of delivering cloud computing infrastructure (servers, storage, network, and operating systems) as an on-demand service.

§ Platform as a Service (PaaS): A computing platform that allows the creation of web applications quickly and easily. (AWS, Azure, AWS Elastic Beanstalk, Cloud Foundry, OpenShift, Google App Engine, Heroku)

§ Software as a Service (SaaS): Software that is deployed over the internet.

8

The Cloud is Just Someone Else’s Computer?NIST Definition Cloud Service Categories

Page 9: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

9

Cloud Service Categories

Source: http://headinthe.cloud/iaas-vs-paas-vs-saas/

Page 10: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

§ SaaS: GitHub, Office 365, Slack - out of scope – common

§ Application development environment- Developers using cloud based resources to write code - somewhat uncommon

§ Dev/test environment- Compiling, assembling, and testing new code - common

§ System integration environment- Assembling and packaging multiple components into a system and testing said system -common

§ Production hosting - Deploying and operating system in a cloud environment - common

10

Key Cloud Use Cases

Page 11: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

Software Development

11

Page 12: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

Software Development Lifecycle (SDLC)

Design Code TestIntegration- Staging

Operate

ProductionSystemTesting

Integration/ Component Testing

CodingRequirements

30X

15X10X

5X

1X

Cost

Security and reliability - 30x more costly in Production

Source: NIST

Page 13: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

“a set of software tools that programmers use to write their code, confirm it meets style and other requirements, collaborate with other members of the programming team, and automatically build, test, and document their progress.” § Requirements management§ Source Code Repository§ Integrated Development Environment (IDE)§ Testing framework§ Testing tools: performance, functional and security§ Issue tracking§ Configuration management§ Continuous Integration / Continuous Deployment§ Infrastructure (Cloud – IaaS, PaaS)§ Log Monitoring software – ArcSight, ELK, Logstash, Splunk, etc

13

Software Factory

Reference: DSB – Design and Acquisition of Software for Defense Systems (Feb 2018)

Page 14: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

14

Software Factory

CodeCode

Code

Test

Code

Integrate / Stage

Page 15: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

Application Security

15

Page 16: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

Known vulnerability vs. undisclosed potential vulnerability (Zero Days)Bad Software - CVE vs. CWE

CWE: Common Weakness Enumeration§ Weakness in software that could affect the security of the system and may or may not result in a

vulnerability

CVE: Common Vulnerability Enumeration§ Known publically disclosed vulnerabilities in software

CVSS: Common Vulnerability Scoring System§ Requires human input related to a number of metrics to calculate a severity score

OVAL: Open Vulnerability Assessment Language§ Represent and communicate the system characteristics, machine state and results of a vulnerability

assessment

Note: cve.mitre.org, cwe.mitre.org, https://danielmiessler.com/blog/mitre-quick-reference/

Page 17: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

§ Security Architecture design/review§ Threat modeling§ Source code review (Static Analysis - Fortify)§ Automated fuzzing/penetration testing (Dynamic Analysis -

WebInspect)§ Manual Pen testing§ Documentation§ Verification and Validation§ Monitoring and Audit Logs

Traditional Application Security Tasks

Page 18: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

Application/Software Security Assurance Life Cycle

Requirements Design Develop Test Deploy

Release Security Review

Application Security

Protection, Monitoring, & Response Plan

Dynamic Analysis

Security Test CasesStatic Analysis

Peer ReviewSecurity Design Review

Threat Modeling

Map Security & Privacy

Requirements

Page 19: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

Application Security and Development Stig v4.7Most controls are implemented by the application not underlying infrastructure

19

§ 290 total controls§ Primary categories

§ Application functionality§ Policies and process

§ External validation§ Architecture§ Documentation

§ Many are specific to the application itself: SQLi, XSS, Command Injection, Privacy Violation, etc

§ ~150 can be identified statically or dynamically

Page 20: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

20

Application Dev Processes + Security

Reference: DSB – Design and Acquisition of Software for Defense Systems (Feb 2018)

Page 21: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

Putting it all Together

21

Page 22: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

22

Cloud System Security Responsibility

Reference: DISA – Cloud Computing Security Requirements Guide (SRG)

Page 23: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

Cloud System Security Responsibility and Inheritance

Executive Summary The ASD STIG is published as a tool to improve the security of Department of Defense (DoD) information systems.

This document is meant for use in conjunction with the Enclave, Network Infrastructure, Application Server, Database, Browser, and appropriate Operating System (OS) STIGsand relevant technology Security Requirement Guides (SRGs).

23

Application

DOD Cloud Instance

CCE / HmC

Cloud PaaS

Aws / Azure

Application Security and Development STIG

Page 24: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

§ Software Factory – provides repeatable process with known results. Can provide supply chain assurance

§ Application Security Testing – ensures applications produced in the factory do not contain weaknesses and/or security vulnerabilities

§ Cloud PaaS – provides hardened operating environment for applications to operate in

24

What

Page 25: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

SF

C N

A

C N

PP

The Control PuzzleEverything everywhere

25

§ Controls: System Function (SF), Application (App), Audit (A), Component (C), Network (N), Process/Policy (PP)

§ Domain: Application, Configuration, Build/Package, Infrastructure, Platform

Build & Package

Configuration

Application

Platform Components

InfrastructureSF

APP

A

A

A

A

PP

PP

PP

DeploySoftware Factory

Production System

Page 26: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

§ Cloud – another operating environment with certain benefits and constraints

§ Build security In - it can not be bolted on or inherited from the environment

§ Know what goes where – some controls can only be added at certain points, others cross boundaries and domains

§ Validate – it’s a complex ecosystem you need to test at each stage to ensure you are meeting security requirements

§ Combination of software factory, application security testing and Cloud provide the highest likelihood of repeatedly producing and hosting secure applications

26

Key Takeaways

Page 27: The Cloud, the Software Factory and Application Security · § Log Monitoring software –ArcSight, ELK, Logstash, Splunk, etc 13 Software Factory Reference: DSB –Design and Acquisition

Recommended