70 likes | 83 Views
Application Assurance. Neal Ziring Information Assurance Directorate National Security Agency. OWASP AppSecDC 2010. Importance of Application Security. Applications have become the primary target of attacks. Many. Volatile. Applications. Apps are numerous and highly diverse.
E N D
Application Assurance Neal Ziring Information Assurance Directorate National Security Agency OWASP AppSecDC 2010
Importance of Application Security Applications have become the primary target of attacks. Many Volatile Applications • Apps are numerous and highly diverse. • OS and platform security improvements have helped push attackers up the stack. Platforms OS HW Few Stable
Importance of Application Security Applications have become the primary target of attacks. • Applications, including externally exposed services, interact directly with critical data. • Attackers focus on applications because they offer the best access to valuable information and functions. Application Enterprisemission data Application Application Platform
Application Assurance Resilience Visibility Application Application Governance Management Policies Application Application
Application Assurance in the Lifecycle Understand key legal, regulatory, privacy constraints that apply to the application Plan for secure decommissioning Design for visibility and management Retirement Don’t write new security code; use OS, platform, & library services. Include security testing from Unit test onwards. Audit intelligently to support visibility and facilitate continuous monitoring Stress-test security functionality
Emerging Application Security Challenge Areas • Mobility and mobile applications • Cloud computing • Web 2.0 and composable web services • “Smart things” • Trusted Computing
Wrap-up • The role for application developers is changing: they have become the first line of defense for mission. • Recommendations: • Incorporate security into the entire application lifecycle • Reducing vulnerability is necessary but not sufficient • Consider resilience, governance, visibility, and management • Use platform, OS, and library security services wherever possible • Test security in all facets of testing