250 likes | 383 Views
Application Security Lessons from the Pro’s How leading US online banks secured their applications. Software isn’t complete unless its secure. Rob Rachwald August 2007. Wii Olympics & Free Beer (Boxing and Tennis) Fortify & Watchfire Tonight: 5 PM Maryland Room B & C Prizes include Wii
E N D
Application Security Lessons from the Pro’sHow leading US online banks secured their applications Software isn’t complete unless its secure Rob Rachwald August 2007
Wii Olympics & Free Beer (Boxing and Tennis) Fortify & Watchfire Tonight: 5 PM Maryland Room B & C Prizes include Wii iPod Shuffles
Evidence Total online banking customers at the top 10 online banks surpasses Internet growth with 44M users. (Comscore Networks, April 2007) Strong Growth Only 8% top of US banks reported external hacks against their systems yet 2006 was the worst year for web application hacking in history. (Gartner 2007) Less Hacking 60% of banks report suffering from phishing attacks—security burden is on authentication and fraud detection. (Gartner 2007) New Forms of Attacks Required Hackers are targeting smaller banks with few resources with hacking and phishing schemes. (Gartner 2007) Weaker Banks Targeted 68 percent of respondents believe that their financial institutions’ websites are more secure. (Comscore Networks, April 2007) Better Perception
Banking Online is Safer than Banking Offline? Around 75% of Fraud is Offline Less than 15% of Fraud is Online
Can You Trust Your Mom? I want your password
The Hackers “Oceans 1100” Followers (thousands and growing)
Hacker Economics “The potential gain from even one successful computer intrusion makes [hacking] an attractive, relatively low-risk option… and the risk to sensitive information on US computer systems will increase.” —US Defense Security Service, 2007
Defensive Economics “If the bear continues biting you long after you assume a defensive posture, it likely is a predatory attack. Fight back vigorously.”
Online Banking Defensive Economics Don’t Run Fast, Just Faster
Complex Code • Applications addressing • Personal banking • Retirement accounts • Stocks • Loans • Credit cards • Lots more • BIG: Online banking apps often 10 million lines of code • Lots of Java and .NET • Large attack surface • Hundreds of applications • Thousands of entry points
Other Top Hacks Cross-Site Scripting Biggest avenue for phishing. Large attack surface and obtaining bits of customer data are critical in executing attacks. SQL Injection Horizontal or vertical escalations are especially pernicious. Authentication and fraud detection technologies are critical. Privilege Escalation OWASP Top 10 They never go out of style.
The Software Security Problem "Since most security for Web applications can be implemented by a system administrator, application developers need not pay attention to the details of securing the application…" – BEA WebLogic Server Security Documentation
Stage 1: Reactionary Code Developed Functional Tests Unit Tests Production
Stage 2: Apply band aids Pen Test Code Developed Functional Tests Unit Tests Production
Stage 3: Beyond the badness-ometer Code Reviews Code Developed Functional Tests Pen Test Unit Tests Production
Stage 4: Teach a Man to Fish Static Analysis Functional Tests Code Developed Unit Tests Pen Test Code Reviews Production
Stage 5: Homo securus Devs Trained Pen & Functional Static Analysis Unit Tests Code Reviews Code Developed Production
Challenges Remain • New Web 2.0, SOA=Same problems all over again • Hacker sophistication continues to rise, especially phishing attacks • Keeping developer mindshare • Ensuring 3rd party code is secure (remember BEA?)
Lessons • Security requires executive initiative • Security is a programming problem • Security is a process: Define a Secure Development Lifecycle (SDL) and implement it
Don’t forget the whitepaperRob Rachwaldrr@fortify.com(650) 213-5683
Fortify Within the Secure Software Lifecycle FPR Fortify ManagerCentral reporting and management of software security across the enterprise Fortify SCA Fortify SCA Dev Proactive security with targeted, accurate analysis tuned for low false positives Security Ops Team Management Fortify Defender Monitors and measures web applications in production Developers Fortify SCA Analyzes code comprehensively and accurately Security Testers Fortify TracerMakes every black box security test measurable and actionable Build Server Fortify Tracer & Watchfire AppScanThorough black box application security testing Security Leads / Auditors
Wii Olympics & Free Beer (Boxing and Tennis) Fortify & Watchfire Tonight: 5 PM Maryland Room B & C Prizes include Wii iPod Shuffles
Thanks Software isn’t complete unless its secure