+ All Categories
Home > Documents > Web Application Security for a Smarter Planet

Web Application Security for a Smarter Planet

Date post: 12-Sep-2021
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
35
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP http://www.owasp.org Web Application Security for a Smarter Planet Danny Allan IBM [email protected] Sept 10, 2009
Transcript
Page 1: Web Application Security for a Smarter Planet

Copyright © The OWASP FoundationPermission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.

The OWASP Foundation

OWASP

http://www.owasp.org

Web Application Securityfor a Smarter Planet

Danny Allan

IBM

[email protected]

Sept 10, 2009

Page 2: Web Application Security for a Smarter Planet

2OWASP

A Smarter Planet

Page 3: Web Application Security for a Smarter Planet

3OWASP

New Forms of Collaboration

Globalization and Globally

Available Resources

Access to streams of

information in the Real Time

Billions of mobile devices

accessing the Web

New possibilities.

New complexities.

New risks.

The Smarter Planet

Page 4: Web Application Security for a Smarter Planet

4OWASP

Businesses face an unparalleled rate of change

Manage business transformations

Enable business flexibility

The successful businesses of the future will be those that use software to a competitive advantage

Differentiate products

Delivery real customer innovation

React to market shifts

Manage regulatorymandates

Exploit globalization

Page 5: Web Application Security for a Smarter Planet

5OWASP

Enabling business innovation and agility requires a significant investment in software

� Software is increasingly being managed as a strategic business asset, key enabling sustained business differentiation and flexible operations

� Businesses everywhere are deploying increasingly intelligent, interconnected and instrumented software & products

� Enabling innovation, lowering costs and managing changedepends on effective and secure software delivery

$600B spent annually on Software & Information Technology

Page 6: Web Application Security for a Smarter Planet

6OWASP

Increasingly interconnected software supply chain

External Supply Chain

In-house Development

Manufactured Systems

Outsourced projects

SOA

Cloud / SaaS

End UserApplications

Always Changing

ConnectedReal-time

Inter-dependent

Common Data User integrated

Acquired Software

Redundant Capability

In-house developed

Composed of purchased, outsourced and in-house built software assets which are ever-evolving and increasingly interdependent

Page 7: Web Application Security for a Smarter Planet

7OWASP

“How do I further automate software

delivery within my organization?”

“How can I unobtrusively gather measurements to

ensure progress towards desired business outcomes?”

“How can I enable collaboration throughout the software delivery process?”

“How do I make incremental, iterative progresstowards more effective software delivery?”

How can I improve software delivery?

Page 8: Web Application Security for a Smarter Planet

8OWASP

Software delivery is a business process that must be continuously measured and improved

Requirements

Design

Implementation / Sourcing

Quality Assurance

Deployment

CIO’s top priority on behalf of the CEOover last three years:

“Improving Business Processes”Source: Gartner, “Making the Difference: The 2008 CIO Agenda,” Jan. 2008

Page 9: Web Application Security for a Smarter Planet

9OWASP

Software Security

Page 10: Web Application Security for a Smarter Planet

10OWASP

The Security Equation Has Changed

�How businesses look at security has changed�Security is now business driven not technology driven

�Security is now defined through risk management and compliance disciplines instead of threat and technology disciplines

�The threat landscape has changed�Traditional operating system and native client application

security risks have become somewhat passé

�Client threats are now all about the browser environment

�Server threats are now all about web applications

Page 11: Web Application Security for a Smarter Planet

11OWASP

The Security Landscape of Old

�Traditional Infrastructure was easier to protect . . .�Concrete entities that were

easy to understand

�Attack surface and vectors were very well-defined

�Application footprint very static

�Perimeter defense was king

Page 12: Web Application Security for a Smarter Planet

12OWASP

Changing Security Landscape of Today

“Webification” has changed everything ...

� Infrastructure is more abstract and less defined

�Everything needs a web interface

�Agents and heavy clients are no longer acceptable

�Traditional defenses no longer apply

Web Applications

Page 13: Web Application Security for a Smarter Planet

13OWASP

Growth of Web Application Vulnerabilities

�SQL injection

vulnerability

disclosures

more than

doubled in

comparison to

2007

�The number of

active,

automated

attacks on web

servers was

unprecedented

Page 14: Web Application Security for a Smarter Planet

14OWASP

Attack Techniques are Plentiful and Trivial

� SQL injection and cross-site scriptingare the two largestcategories of Web application vulnerabilities

� Automated toolkits have allowed for mass defacements and planting of malware

Page 15: Web Application Security for a Smarter Planet

15OWASP

Attacks & Exploitation are Rampant

Page 16: Web Application Security for a Smarter Planet

16OWASP

Web Threats Will Become More Complex

�Web becoming main application delivery interface and ecosystem

�Popularization of new web technologies (Web 2.0) growing attack surface

�New techniques and scenarios for targeting web infrastructure

Page 17: Web Application Security for a Smarter Planet

17OWASP

Vulnerability Probability (32,717 sites)

Source: WASC 2007 Web Application Security Statistics

Page 18: Web Application Security for a Smarter Planet

18OWASP

18

Page 19: Web Application Security for a Smarter Planet

19OWASP

Explore source code and/or web site to detect structure

Identify Vulnerabilities ranked after severity and show how it

was identified

Advanced remediation, fix recommendations and security

enablement

Application Security Testing?

Page 20: Web Application Security for a Smarter Planet

20OWASP

Web Application Security for a Smarter Planet

Page 21: Web Application Security for a Smarter Planet

21OWASP

Organization

Secure Web Applications: Who is responsible?

Client

Desktop

�Anti-virus

�Anti-malware

�Personal firewall

Defend Network

�Firewall

�IDS / IPS

�Web App Firewall

�Anti-virus

Application

Development

�Requirements

�Secure Design

�Dynamic Analysis

�Static Analysis

Secure Hosting Environment

�Vulnerability management

�Network

�Host

�Application

�Incident & event management

�Identity & access management

�Malware detection

BackendServer

Database

Application Server

Web Server

Protect Data

across Internet

�SSL Encryption

Page 22: Web Application Security for a Smarter Planet

22OWASP

Secure Application Development

�Challenge�Ensure the creation of high quality, secure

and compliant software

�Ensure effective management of secure requirements, design and testing

�Lifecycle management of vulnerabilities

�Application Lifecycle Management (ALM)

�Industry Technologies�Dynamic Analysis

�Static Analysis

�Runtime Analysis

Application

Development

�Requirements

�Secure Design

�Dynamic Analysis

�Static Analysis

Page 23: Web Application Security for a Smarter Planet

23OWASP

Essential Technologies for Secure Software

1. Source Control & Change Request Management

2. Requirements & Test Management

3. Education Services

4. Development Automation

5. Artifact Management

Page 24: Web Application Security for a Smarter Planet

24OWASP

WHAT IF …

We introduced ESAPI intothe major frameworks

Page 25: Web Application Security for a Smarter Planet

25OWASP

Secure Hosting Environment

�Challenges�Maintain a secure environment

�Ensure security policies are implemented and enforced

�Lifecycle management of vulnerabilities and incidents

�Assess production systems for malware

� Industry Solutions�Automated Scanners

�Manual Analysis

�Operational Management

Secure Hosting Environment

�Vulnerability management

�Network

�Host

�Application

�Incident & event management

�Identity & access management

�Malware detection

Page 26: Web Application Security for a Smarter Planet

26OWASP

Essential Technologies for Secure Operations

�Protect�Web Application Firewalls

�Assess�Host Configuration

�Network

�Application

�Management�Vulnerabilities

�Incidents

Page 27: Web Application Security for a Smarter Planet

27OWASP

WHAT IF …

There was correlationbetween the engines

Page 28: Web Application Security for a Smarter Planet

28OWASP

Defending the Network

�Challenge�Protect your business from Internet threats without

jeopardizing bandwidth or availability

�Protect your end users from spam and other productivity drainers

�Conserve resources by eliminating the need for specialized security expertise

� Industry Solutions�Firewalls

� Intrusion Detections Systems

� Intrusion Prevention Systems

Defend Network

�Firewall

�IDS / IPS

�Anti-virus

Page 29: Web Application Security for a Smarter Planet

29OWASP

WHAT IF …

We could turn on the IPS

Page 30: Web Application Security for a Smarter Planet

30OWASP

Encrypting transmission across the Internet

�Challenge�Ensuring data and intellectual property is not

stolen while crossing the Internet

�Ensuring that data is not tampered with or altered between the server and client

�Ensure that a malicious site does not impersonate the legitimate serverand establish communication with the client

�Industry Solutions�SSL Encryption

Protect Data

across Internet

�SSL Encryption

Page 31: Web Application Security for a Smarter Planet

31OWASP

WHAT IF …

We dropped MD5 hashes and used SSL properly

Page 32: Web Application Security for a Smarter Planet

32OWASP

Client-side Security

�Organization can not control their external clients

� Internal client challenges�Mitigating risks posed by zero-day, targeted attacks�Protecting critical data and intellectual property �Minimizing costs and lost productivity associated with

remediating infected endpoints�Reducing help desk calls

� Industry Solutions�Anti-virus�Anti-malware�Personal firewall

Desktop

�Anti-virus

�Anti-malware

�Personal firewall

Page 33: Web Application Security for a Smarter Planet

33OWASP

WHAT IF …

We could deliver a level of control to the server

Page 34: Web Application Security for a Smarter Planet

34OWASP

Organization

Web Applications: A Smarter Approach

Desktop

�Anti-virus

�Anti-malware

�Personal firewall

Defend Network

�Firewall

�IDS / IPS

�Web App Firewall

�Anti-virus

Application

Development

�Requirements

�Secure Design

�Dynamic Analysis

�Static Analysis

Secure Hosting Environment

�Vulnerability management

�Network

�Host

�Application

�Incident & event management

�Identity & access management

�Malware detection

BackendServer

Database

Application Server

Web Server

Protect Data

across Internet

�SSL Encryption

Page 35: Web Application Security for a Smarter Planet

35OWASP

35


Recommended