web appsec and it’s 10 best sdlc practices

23
WebAppSec and it’s 10 Best SDLC Practices By: John Patrick Lita – C)SS Philippine Institute of Cyber Security Professionals (OWASP Academic Supporter) with the Partnership of The Open Web Application Security Project (OWASP) (OWASP Philippines) Open InfoSec Education Project

Upload: globe-telecom

Post on 12-Jan-2017

466 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Web appsec and it’s 10 best SDLC practices

WebAppSec and it’s 10 Best SDLC PracticesBy: John Patrick Lita – C)SS

Philippine Institute of Cyber SecurityProfessionals (OWASP Academic Supporter)

with the Partnership of

The Open Web Application Security Project (OWASP)(OWASP Philippines)Open InfoSec Education Project

Page 2: Web appsec and it’s 10 best SDLC practices

FOCUS ON COMMON SECURITY CHALLENGES

Page 3: Web appsec and it’s 10 best SDLC practices

Most Developers already think there web application isSecure.Majority of web applcations have serious security vulnerabilitiesMost of the the developers not aware of the issue.And we are thinking that all the application are secure?

Page 4: Web appsec and it’s 10 best SDLC practices

EMAIL Social Networking Online Shopping

Research Online Banking Multimedia

NOT SECURE

Page 5: Web appsec and it’s 10 best SDLC practices

MOST SITES NOT SECURE•Attacker can access unauthorized data

•Attacker can use the application to attack other users

Page 6: Web appsec and it’s 10 best SDLC practices

THE WEB WASN’T DESIGN TO BE SECURE!

• The website is design for static, read only pages to be share internally

• Almost no intrinsic security• A few security features was develope

Page 7: Web appsec and it’s 10 best SDLC practices

WHAT DOES THAT MEAN?•COOKIE-BASED SESSIONS CAN HIJACKED•NO SEPARATION OF LOGIC DATA•ALL CLIENT SUPPLIED DATA CANNOT BE TRUSTED

Page 8: Web appsec and it’s 10 best SDLC practices

The Attacker MindSet

Browser WebServe

r

WebServer

DatabasesAccess Control

Authentication

FireWall

Click-Jacking

XSS CSRF

Tampering Sniffing

DirectoryTraversal

XMLInjection

SQLInjection

DirectObject

ReferenceForged Token

Page 9: Web appsec and it’s 10 best SDLC practices

- AJAX- FLASH / FLEX- SILVERLIGHT- APPLETS

THE ATTACK SURFACE AREA IS GROWING!

Page 10: Web appsec and it’s 10 best SDLC practices

APPLICATION SECURITY!THREAT

MODELING CODECHANGES

SECURE ARCHITECTUR

E

DEVELOPER &

ARCHITECT AWARENES

S

COMMON SECURITY CONTROLS

SOFTWAREDEVELOPMEN

TLIFECYCLE

Page 11: Web appsec and it’s 10 best SDLC practices

The Ten Best Practices for Secure Software Development

Page 12: Web appsec and it’s 10 best SDLC practices

SOFTWAREDEVELOPMENTSTAKEHOLDERS

TOP MANAGEMENT

CLIENTS

MANAGERS, ETC...

Page 13: Web appsec and it’s 10 best SDLC practices

TEN BEST PRACTICESProtect the brand your customers trust

Base in ISC(2) : The Ten Best Practices for Secure Software Development

Page 14: Web appsec and it’s 10 best SDLC practices

TEN BEST PRACTICESKnow your business and support it with secure solutions

Base in ISC(2) : The Ten Best Practices for Secure Software Development

Page 15: Web appsec and it’s 10 best SDLC practices

TEN BEST PRACTICESUndestand the technology of the software

Base in ISC(2) : The Ten Best Practices for Secure Software Development

Page 16: Web appsec and it’s 10 best SDLC practices

TEN BEST PRACTICESEnsure compliance to governance, regulations and privacy

Base in ISC(2) : The Ten Best Practices for Secure Software Development

Page 17: Web appsec and it’s 10 best SDLC practices

TEN BEST PRACTICESKnow the basic components of software securityProtection from Disclosure (Confidentiality)

Protection from Alteration (Integrity)Protection from Destruction (Availability)Who is making the request (Authentication)What rights/privileges they have (Authorization)The ability to build historical evidence (Auditing)And the Management of configuration, sessions exceptions

Base in ISC(2) : The Ten Best Practices for Secure Software Development

Page 18: Web appsec and it’s 10 best SDLC practices

TEN BEST PRACTICESEnsure the protection of sensitive information

Base in ISC(2) : The Ten Best Practices for Secure Software Development

Page 19: Web appsec and it’s 10 best SDLC practices

TEN BEST PRACTICESDesign software with secure features

Base in ISC(2) : The Ten Best Practices for Secure Software Development

Page 20: Web appsec and it’s 10 best SDLC practices

TEN BEST PRACTICESDevelop software with secure features

Base in ISC(2) : The Ten Best Practices for Secure Software Development

Page 21: Web appsec and it’s 10 best SDLC practices

TEN BEST PRACTICEsDeploy software withSecure features

Base in ISC(2) : The Ten Best Practices for Secure Software Development

Page 22: Web appsec and it’s 10 best SDLC practices

TEN BEST PRACTICEs

Educate yourself& others on how to build securesoftware

Base in ISC(2) : The Ten Best Practices for Secure Software Development

Page 23: Web appsec and it’s 10 best SDLC practices