270 likes | 400 Views
End to end Application Security: a pre-emptive approach Michael Weider, Director of Security Products IBM Rational. Evolving Threats. Agenda. Introduction to Application Security Application Security Best Practices IBM Vision for Application Security. Desktop. Transport. Network.
E N D
End to end Application Security: a pre-emptive approachMichael Weider, Director of Security ProductsIBM Rational
Agenda • Introduction to Application Security • Application Security Best Practices • IBM Vision for Application Security
Desktop Transport Network Application Security - Understanding the Problem Info Security Landscape Web Applications Antivirus Protection Encryption (SSL) Firewalls / IDS / IPS Application Servers Backend Server Firewall Databases Web Servers
Hackers Exploit Unintended Functionality to Attack Apps Actual Functionality Intended Functionality Unintended Functionality
01/01/2006 union select userid,null,username+','+password,null fromusers-- Application responds with user names and passwords of other account holders!
Where Do These Problems Exist? Type: • Customer facing services • Partner portals • Employee intranets Source: • Applications you buy – e.g. COTS • Applications you build internally • Applications you outsource
How Common Are These Problems? 80% of Websites and applications are vulnerable to these attacks – Watchfire Research
Motives Behind Application Hacking Incidents Source: Breach/WASC 2007 Web Hacking Incident Annual Report
Growth In Browser Vulnerabilities Source: IBM Xforce 2007 Annual Report
Web Hacking Incidents by Industry Source: WASC 2007 Web Hacking Incident Annual Report
What is the Root Cause? • Developers not trained in security • Most computer science curricula have no security courses • Under investment from security teams • Lack of tools, policies, process, etc. • Growth in complex, mission critical online applications • Online banking, commerce, Web 2.0, etc • Number one focus by hackers • 75% of attacks focused on applications - Gartner Result: Application security incidents and lost data on the rise
Agenda • Introduction to Application Security • Application Security Best Practices • IBM Vision for Application Security
Application Security Maturity Model UNAWARE AWARENESS CORRECTIVE OPERATIONS PHASE PHASE EXCELLENCE PHASE 10 % 30 % Maturity 30 % 30 % Duration 2-3 Years Time
Building Security Into the Development Process Define/Design Development • Security requirements, architecture, threat modeling, etc • Test apps for security issues in Development identifying issues at their earliest point • Realize optimum security testing efficiencies (cost reduction) Production • Test existing deployed apps • Eliminate security exposure inlive applications Deploy Test • Test apps before going to production • Deploy secure web applications • Test apps for security issues in QA organization along with performance and functional testing • Reduce costs of security testing *Graphics from OWASP.com
Build Coding QA Security Production Security Testing Within the Software Lifecycle SDLC Developers Developers Developers Application Security Testing Maturity
Application Security Adoption Within the SDLC Phase 3 Phase 2 Phase 1 High Security Team Security Team Security Team Development Team Difficulty & Cost of Test Criticality & Risk of App. Development Team QA Team QA Team Low Low High % Applications Tested
Risk Oriented Approach to Application Security High Risk Exposure Low Low High Security Investment
Educating Developers and Getting “Buy in” • Establish security accountability and stds for shipping • Create a “security architect” role • Create a security community of practice • Create a secure development portal or wiki • Conduct hacking demos to demonstrate risks • Online & offline courses for secure coding • Put developers through secure coding exams • Security reviews of real applications • Pay premiums for security architects
Agenda • Introduction to Application Security • Application Security Best Practices • IBM Vision for Application Security
IBM Security Framework External Representation Security Hardware and Software Managed Security Services Professional Services The IBM Security Framework Common Policy, Event Handling and Reporting Security Governance, Risk Management and Compliance Security Governance, Risk & Compliance Solutions People and Identity Identity and Access Management Solutions Data and Information Information Security Solutions Application and Process Network, Server, and End-point Application Security Lifecycle Mgmt Solutions Physical Infrastructure Threat and Vulnerability Mgmt & Monitoring Solutions Physical Security Solutions
Software Security Development Ecosystem Control, Monitor and Report Security Auditor scanning Build System Developers Quality Assurance Testing Coding Build QA QA Security Web Based Security Training
Product and Services • Products: • AppScan: Application Security Vulnerability Assessment Tools • Services: • AppScan OnDemand • Training: • Application security Web based training and onsite courses For more information see: www.watchfire.com