SlideShare uma empresa Scribd logo
1 de 21
IBM Technical Summit 2013

Erik Oliveira
Senior Security Consultant, IBM Security System
erikso@br.ibm.com

© 2013 IBM Corporation
Please note the following
IBM’s statements regarding its plans, directions, and intent are subject to change or
withdrawal without notice at IBM’s sole discretion.
Information regarding potential future products is intended to outline our general product
direction and it should not be relied on in making a purchasing decision.
The information mentioned regarding potential future products is not a commitment,
promise, or legal obligation to deliver any material, code or functionality. Information
about potential future products may not be incorporated into any contract. The
development, release, and timing of any future features or functionality described for our
products remains at our sole discretion.
Performance is based on measurements and projections using standard IBM
benchmarks in a controlled environment. The actual throughput or performance that any
user will experience will vary depending upon many factors, including considerations
such as the amount of multiprogramming in the user’s job stream, the I/O configuration,
the storage configuration, and the workload processed. Therefore, no assurance can be
given that an individual user will achieve results similar to those stated here.

2
Mundo interconectado

EXPLOSÃO
DE DADOS

CONSUMERIZAÇÃO
DA TI

Com o advento da Empresa 2.0 e do negócio
social, desapareceu a linha entre tempo,
dispositivos e dados pessoais e profissionais

TUDO
ESTÁ EM TODA PARTE

Organizações continuam mudando para
novas plataformas, inclusive computação em
nuvem, virtualização, dispositivos móveis,
negócio social e muito mais

SOFISTICAÇÃO
DOS ATAQUES

3

A era do "Big Data" – a explosão da
informação digital – chegou e é facilitada pela
difusão de aplicativos acessados de todos os
lugares

A velocidade e destreza dos ataques
aumentaram, associados a novos agentes
com novas motivações, do crime cibernético e
terrorismo, até invasões patrocinadas por
governos
Seu dispositivo é

4
Mobile Malware 2013

Source: Juniper Networks Third Annual Mobile Threats Report: March 2012 through March 2013

5
Distribuição de Vulnerabilidade por linguagem

6
Contexto Mundial
Tipo de ataque

Software
Bethesda

Injeção SQL
Manipulação de URL

Northrop
Grumman

Fox News
X-Factor

Phishing focalizado

Citigroup

SW de terceiros

Policia
Federal
espanhola

DDoS
Secure ID

Sony

Lockheed
Martin

L3
Communications

O tamanho do círculo estima o
impacto relativo da quebra de
segurança

Sony BMG
Grécia

Booz
Allen
Hamilton

PBS

PBS

RSA

HB Gary

Sega

Contas do
Gmail

Epsilon

Desconhecido

Site do
premier
italiano

FMI

Vanguard
Defense

SOCA

Site do gov.
malaio Polícia
peruana
Nintendo

Gov.
Brasileiro

Governo
Turco

Monsanto

SK
Communications
Coreia

Polícia do
Arizona
OTAN

Senado dos EUA

Fev
7

Mar

Abril

Maio

Junho

Julho

Ago
Custo da brecha

Custos:
1,000,000x
Fluxo de Segurança

Dano a Empresa

Notificação ao cliente
Multas
Litígio
Exposição da reputação
Exposição da marca
Custo para reparo

Fluxo Funcional

10x
1x
Desenvolvimento
8








Teste

Produção
Detectando SQL Injection
Source – um métodos
retornando string insegura

// ...
String username = request.getParameter("username");
String password = request.getParameter("password");
// ...
String query = "SELECT * from tUsers where " +
"userid='" + username + "' " +
"AND password='" + password +Usuário pode mudar o SQL
"'";
executado commandos

// ...
ResultSet rs = stmt.executeQuery(query);

Sink – um potencial
método perigoso
9
Detectando SQL Injection

String username = request.getParameter("username");
// ...
String username = request.getParameter("username");
String password = request.getParameter("password");
// ...
String query = "SELECT * from tUsers where " +'
"userid='" + username + "' " +
"AND password='" + password + "'";
String query = "SELECT …" + username
// ...
ResultSet rs = stmt.executeQuery(query);
ResultSet rs = stmt.executeQuery(query);

10
Detectando SQL Injection

String username = request.getParameter("username");
username = ‘anything' OR 'x'='x ‘
username = ‘x' AND 1=(SELECT COUNT(*) FROM tabname); --‘
username = ‘x' AND userid IS NULL; --‘

String query = "SELECT …" + username

11
Fluxo de dados

1
2

3
4

12
Como funciona AppScan
Automação de Testes de Segurança em Aplicações

Análise

Relatório

(identificar riscos)

Scan das aplicações

(detalhado e assertivo)

Fix

13
Ciclo de Vida
CODIFICAÇÃO

BUILD

QA

SEGURANCA E
PRODUÇÃO

IBM AppScan Enterprise Server

AppScan Source users
AppScan Enterprise user

Eclipse,
Visual
Studio, RAD

AppScan Source for
Automation
AppScan Standard (via CLI)

(scanning agent)
AppScan Enterprise user
AppScan Standard

Build
Management

Gerenciamento de Ameaças

14

AppScan
Enterprise user
(web client)

AppScan
Standard
(desktop)
AppScan

Segurança

Relatório Corporativo

• Configuração de Software
• Registro de progresso

• Scan

• Compare Applications

• Triagem de Resultados
• Manage Security Policies

AppScan Enterprise
Server

• Dashboardas
customizados
• Gerenciamento de risco

• Base de conhecimento
• Banco de Assessment

IDE Plug-Ins

• Regras Customizadas

Automação

• Fluxo de Investigação
• Guia de remediação

• Scan automatizados

• Scan

• ANT, Make, Maven

• Confirmação de Fix

15

• Integração de Buidl

• APIs de acessos de
dados
AppScan
 Templates
Wizards
Importe Eclipse Workspaces e
soluções .NET
 Matrix de Vulnerabilidade
Isolamento de vulnerabilidades
confirmadas
Otimização de triagem de issues
Auxilia na falta de expertise de
segurança
 Filtros poderosos
Facilidade de utilização
Foco em baixo número de riscos
prioritários
Filtros pré definidos
16

Vulnerabilidade
Confirmadas
AppScan
 Análise rápida
– Gereciamento de memória e cache
– Otimização de re-scan
– 100+ patentes
 Fluxo de dados / Fluxo de chamadas
– Suporte para longas trilhas
– Facilidade em idetificar código
malicioso ou não
 Desconsidera coisas que a análise não
entende
 Nada é ignorado
– Relatório de “Lost Sinks”
17

 Análise de StringString Analysis
– Identifica de forma automática a
validação de rotinas
– Tecnologia de IBM Research
– Checa efetividade da validação lógica
AppScan
Linguagem Suportadas
Out-of-the-Box
 Java

 Perl

 JSP

 ColdFusion

C

 Client-Side
JavaScript

 C++
 .NET

 Server-Side
JavaScript

– C#

 VBScript

– VB.NET

 COBOL

– ASP.NET

 PL/SQL

 Classic ASP
(VB6)

 T-SQL

 PHP

 Android e IOS

 HTML
18

 SAP ABAP

Extensível
Análises por expressão regular
 Definir regras customizadas
 Usar o poder da expressões regulares
 Associação de regras com maioria das
linguagem
19
Acknowledgements and disclaimers
Availability: References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries
in which IBM operates.
The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views. They are provided
for informational purposes only, and are neither intended to, nor shall have the effect of being, legal or other guidance or advice to any
participant. While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided
AS-IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise
related to, this presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating
any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license
agreement governing the use of IBM software.
All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may
have achieved. Actual environmental costs and performance characteristics may vary by customer. Nothing contained in these materials is
intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue
growth or other results.
© Copyright IBM Corporation 2013. All rights reserved.
– U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

IBM, the IBM logo, ibm.com, Rational, the Rational logo, Telelogic, the Telelogic logo, Green Hat, the Green Hat logo, and other IBM products
and services are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or
both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these
symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may
also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at “Copyright and
trademark information” at www.ibm.com/legal/copytrade.shtml
Other company, product, or service names may be trademarks or service marks of others.

20
© Copyright IBM Corporation 2013. All rights reserved. The information
contained in these materials is provided for informational purposes only, and is
provided AS IS without warranty of any kind, express or implied. IBM shall not be
responsible for any damages arising out of the use of, or otherwise related to,
these materials. Nothing contained in these materials is intended to, nor shall
have the effect of, creating any warranties or representations from IBM or its
suppliers or licensors, or altering the terms and conditions of the applicable license
agreement governing the use of IBM software. References in these materials to
IBM products, programs, or services do not imply that they will be available in all
countries in which IBM operates. Product release dates and/or capabilities
referenced in these materials may change at any time at IBM’s sole discretion
based on market opportunities or other factors, and are not intended to be a
commitment to future product or feature availability in any way. IBM, the IBM logo,
Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products
and services are trademarks of the International Business Machines Corporation,
in the United States, other countries or both. Other company, product, or service
names may be trademarks or service marks of others.

21

Mais conteúdo relacionado

Mais procurados

Cognitive Connections Architectures, Use Cases and Code
Cognitive Connections Architectures, Use Cases and CodeCognitive Connections Architectures, Use Cases and Code
Cognitive Connections Architectures, Use Cases and CodeVan Staub, MBA
 
World of Watson Ask Me Anything About IoT
World of Watson Ask Me Anything About IoTWorld of Watson Ask Me Anything About IoT
World of Watson Ask Me Anything About IoTMarkus Van Kempen
 
Managing integration in a multi cluster world
Managing integration in a multi cluster worldManaging integration in a multi cluster world
Managing integration in a multi cluster worldShikha Srivastava
 
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...paul young cpa, cga
 
4789 creating production-ready, secure and scalable applications in ibm cloud...
4789 creating production-ready, secure and scalable applications in ibm cloud...4789 creating production-ready, secure and scalable applications in ibm cloud...
4789 creating production-ready, secure and scalable applications in ibm cloud...Shikha Srivastava
 
Big Data with Graph, IBM Domino, and the OpenNTF API
Big Data with Graph, IBM Domino, and the OpenNTF APIBig Data with Graph, IBM Domino, and the OpenNTF API
Big Data with Graph, IBM Domino, and the OpenNTF APIDevin Olson
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudVincent Burckhardt
 
OpenWhisk ChatBot InterConnect 2017
OpenWhisk ChatBot InterConnect 2017OpenWhisk ChatBot InterConnect 2017
OpenWhisk ChatBot InterConnect 2017Perry Cheng
 
IC6284A - The Art of Choosing the Best Cloud Solution
IC6284A - The Art of Choosing the Best Cloud SolutionIC6284A - The Art of Choosing the Best Cloud Solution
IC6284A - The Art of Choosing the Best Cloud SolutionHendrik van Run
 
IT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
IT Roadmap Atlanta Deliver on your innovation goals with IBM BluemixIT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
IT Roadmap Atlanta Deliver on your innovation goals with IBM BluemixCarl Osipov
 
Tip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupTip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupSocialBiz UserGroup
 
Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Symantec
 
IBM UrbanCode Deploy and VMware Integrated OpenStack
IBM UrbanCode Deploy and VMware Integrated OpenStackIBM UrbanCode Deploy and VMware Integrated OpenStack
IBM UrbanCode Deploy and VMware Integrated OpenStackBradDesAulniers2
 
Ibm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcIbm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcNitin Gaur
 
DESY's new data taking and analysis infrastructure for PETRA III
DESY's new data taking and analysis infrastructure for PETRA IIIDESY's new data taking and analysis infrastructure for PETRA III
DESY's new data taking and analysis infrastructure for PETRA IIIUlf Troppens
 
Advanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAdvanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAGILLY
 
Insight_Session_2734_Presentation_Final
Insight_Session_2734_Presentation_FinalInsight_Session_2734_Presentation_Final
Insight_Session_2734_Presentation_FinalKaren He
 

Mais procurados (18)

Cognitive Connections Architectures, Use Cases and Code
Cognitive Connections Architectures, Use Cases and CodeCognitive Connections Architectures, Use Cases and Code
Cognitive Connections Architectures, Use Cases and Code
 
World of Watson Ask Me Anything About IoT
World of Watson Ask Me Anything About IoTWorld of Watson Ask Me Anything About IoT
World of Watson Ask Me Anything About IoT
 
Managing integration in a multi cluster world
Managing integration in a multi cluster worldManaging integration in a multi cluster world
Managing integration in a multi cluster world
 
WOW2016_3963
WOW2016_3963WOW2016_3963
WOW2016_3963
 
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
 
4789 creating production-ready, secure and scalable applications in ibm cloud...
4789 creating production-ready, secure and scalable applications in ibm cloud...4789 creating production-ready, secure and scalable applications in ibm cloud...
4789 creating production-ready, secure and scalable applications in ibm cloud...
 
Big Data with Graph, IBM Domino, and the OpenNTF API
Big Data with Graph, IBM Domino, and the OpenNTF APIBig Data with Graph, IBM Domino, and the OpenNTF API
Big Data with Graph, IBM Domino, and the OpenNTF API
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloud
 
OpenWhisk ChatBot InterConnect 2017
OpenWhisk ChatBot InterConnect 2017OpenWhisk ChatBot InterConnect 2017
OpenWhisk ChatBot InterConnect 2017
 
IC6284A - The Art of Choosing the Best Cloud Solution
IC6284A - The Art of Choosing the Best Cloud SolutionIC6284A - The Art of Choosing the Best Cloud Solution
IC6284A - The Art of Choosing the Best Cloud Solution
 
IT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
IT Roadmap Atlanta Deliver on your innovation goals with IBM BluemixIT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
IT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
 
Tip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupTip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundup
 
Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?
 
IBM UrbanCode Deploy and VMware Integrated OpenStack
IBM UrbanCode Deploy and VMware Integrated OpenStackIBM UrbanCode Deploy and VMware Integrated OpenStack
IBM UrbanCode Deploy and VMware Integrated OpenStack
 
Ibm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcIbm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dc
 
DESY's new data taking and analysis infrastructure for PETRA III
DESY's new data taking and analysis infrastructure for PETRA IIIDESY's new data taking and analysis infrastructure for PETRA III
DESY's new data taking and analysis infrastructure for PETRA III
 
Advanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAdvanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NET
 
Insight_Session_2734_Presentation_Final
Insight_Session_2734_Presentation_FinalInsight_Session_2734_Presentation_Final
Insight_Session_2734_Presentation_Final
 

Destaque

Especificação formal de protocolos de Segurança
Especificação formal de protocolos de SegurançaEspecificação formal de protocolos de Segurança
Especificação formal de protocolos de SegurançaFabian Martins
 
Requisitos de Segurança
Requisitos de SegurançaRequisitos de Segurança
Requisitos de SegurançaOWASP Brasília
 
QUALIDADE, SEGURANÇA E CONFIABILIDADE DE SOFTWARE
QUALIDADE, SEGURANÇA E CONFIABILIDADE DE SOFTWAREQUALIDADE, SEGURANÇA E CONFIABILIDADE DE SOFTWARE
QUALIDADE, SEGURANÇA E CONFIABILIDADE DE SOFTWAREFabiano Souza
 
Palestra - Desenvolvimento Seguro de Aplicações WEB - IFC 2013-09-29
Palestra - Desenvolvimento Seguro de Aplicações WEB - IFC 2013-09-29Palestra - Desenvolvimento Seguro de Aplicações WEB - IFC 2013-09-29
Palestra - Desenvolvimento Seguro de Aplicações WEB - IFC 2013-09-29cadiego
 
Aula 03 qs - confiabilidade de sw
Aula 03   qs - confiabilidade de swAula 03   qs - confiabilidade de sw
Aula 03 qs - confiabilidade de swJunior Gomes
 
Conceitos de básicos de qualidade de software
Conceitos de básicos de qualidade de softwareConceitos de básicos de qualidade de software
Conceitos de básicos de qualidade de softwareRonney Moreira de Castro
 

Destaque (7)

Especificação formal de protocolos de Segurança
Especificação formal de protocolos de SegurançaEspecificação formal de protocolos de Segurança
Especificação formal de protocolos de Segurança
 
Requisitos de Segurança
Requisitos de SegurançaRequisitos de Segurança
Requisitos de Segurança
 
QUALIDADE, SEGURANÇA E CONFIABILIDADE DE SOFTWARE
QUALIDADE, SEGURANÇA E CONFIABILIDADE DE SOFTWAREQUALIDADE, SEGURANÇA E CONFIABILIDADE DE SOFTWARE
QUALIDADE, SEGURANÇA E CONFIABILIDADE DE SOFTWARE
 
Ferranentas OWASP
Ferranentas OWASPFerranentas OWASP
Ferranentas OWASP
 
Palestra - Desenvolvimento Seguro de Aplicações WEB - IFC 2013-09-29
Palestra - Desenvolvimento Seguro de Aplicações WEB - IFC 2013-09-29Palestra - Desenvolvimento Seguro de Aplicações WEB - IFC 2013-09-29
Palestra - Desenvolvimento Seguro de Aplicações WEB - IFC 2013-09-29
 
Aula 03 qs - confiabilidade de sw
Aula 03   qs - confiabilidade de swAula 03   qs - confiabilidade de sw
Aula 03 qs - confiabilidade de sw
 
Conceitos de básicos de qualidade de software
Conceitos de básicos de qualidade de softwareConceitos de básicos de qualidade de software
Conceitos de básicos de qualidade de software
 

Semelhante a Desvendando o desenvolvimento seguro de software

4515 Modernize your CICS applications for Mobile and Cloud
4515 Modernize your CICS applications for Mobile and Cloud4515 Modernize your CICS applications for Mobile and Cloud
4515 Modernize your CICS applications for Mobile and Cloudnick_garrod
 
IBM Design Thinking + Agile + DevOps Interconnect 2017
IBM Design Thinking + Agile + DevOps Interconnect 2017IBM Design Thinking + Agile + DevOps Interconnect 2017
IBM Design Thinking + Agile + DevOps Interconnect 2017David Luke
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finaleileendohertysmith
 
Improve Predictability & Efficiency with Kanban Metrics using IBM Rational In...
Improve Predictability & Efficiency with Kanban Metrics using IBM Rational In...Improve Predictability & Efficiency with Kanban Metrics using IBM Rational In...
Improve Predictability & Efficiency with Kanban Metrics using IBM Rational In...Marc Nehme
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualsflynn073
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualsflynn073
 
10.8.2013 Continuous Delivery - Mobile Applications
10.8.2013 Continuous Delivery - Mobile Applications10.8.2013 Continuous Delivery - Mobile Applications
10.8.2013 Continuous Delivery - Mobile ApplicationsIBM Rational
 
IBM Technical Summit 2013 - Desenvolvimento e Qualidade
IBM Technical Summit 2013 - Desenvolvimento e QualidadeIBM Technical Summit 2013 - Desenvolvimento e Qualidade
IBM Technical Summit 2013 - Desenvolvimento e QualidadeGustavo Grillo
 
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...IBM Rational software
 
OpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOpsOpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOpsSanjeev Sharma
 
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...SocialBiz UserGroup
 
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...Karen He
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Michael Elder
 
DNUG Closing Session - ICS App Dev Update - 06/07/13
DNUG Closing Session - ICS App Dev Update - 06/07/13DNUG Closing Session - ICS App Dev Update - 06/07/13
DNUG Closing Session - ICS App Dev Update - 06/07/13Niklas Heidloff
 
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and RoadmapDaniel Berg
 
Witness the Evolution of Teamwork
Witness the Evolution of TeamworkWitness the Evolution of Teamwork
Witness the Evolution of TeamworkMatt Holitza
 
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed ITAligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed ITDevOps for Enterprise Systems
 

Semelhante a Desvendando o desenvolvimento seguro de software (20)

4515 Modernize your CICS applications for Mobile and Cloud
4515 Modernize your CICS applications for Mobile and Cloud4515 Modernize your CICS applications for Mobile and Cloud
4515 Modernize your CICS applications for Mobile and Cloud
 
IBM Design Thinking + Agile + DevOps Interconnect 2017
IBM Design Thinking + Agile + DevOps Interconnect 2017IBM Design Thinking + Agile + DevOps Interconnect 2017
IBM Design Thinking + Agile + DevOps Interconnect 2017
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_final
 
Improve Predictability & Efficiency with Kanban Metrics using IBM Rational In...
Improve Predictability & Efficiency with Kanban Metrics using IBM Rational In...Improve Predictability & Efficiency with Kanban Metrics using IBM Rational In...
Improve Predictability & Efficiency with Kanban Metrics using IBM Rational In...
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
 
10.8.2013 Continuous Delivery - Mobile Applications
10.8.2013 Continuous Delivery - Mobile Applications10.8.2013 Continuous Delivery - Mobile Applications
10.8.2013 Continuous Delivery - Mobile Applications
 
IBM Technical Summit 2013 - Desenvolvimento e Qualidade
IBM Technical Summit 2013 - Desenvolvimento e QualidadeIBM Technical Summit 2013 - Desenvolvimento e Qualidade
IBM Technical Summit 2013 - Desenvolvimento e Qualidade
 
IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
 
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
 
OpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOpsOpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOps
 
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
 
sMash AppBuilder
sMash AppBuildersMash AppBuilder
sMash AppBuilder
 
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...
MOB-1298_How to Harness Human Data and Insights to Develop Better Mobile Expe...
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018
 
DNUG Closing Session - ICS App Dev Update - 06/07/13
DNUG Closing Session - ICS App Dev Update - 06/07/13DNUG Closing Session - ICS App Dev Update - 06/07/13
DNUG Closing Session - ICS App Dev Update - 06/07/13
 
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
[IBM Pulse 2014] #1579 DevOps Technical Strategy and Roadmap
 
Witness the Evolution of Teamwork
Witness the Evolution of TeamworkWitness the Evolution of Teamwork
Witness the Evolution of Teamwork
 
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed ITAligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
 
Why Ibm cloud private
Why Ibm cloud private Why Ibm cloud private
Why Ibm cloud private
 

Mais de Allyson Chiarini

Indústria 4.0: uma realidade no Brasil
Indústria 4.0: uma realidade no BrasilIndústria 4.0: uma realidade no Brasil
Indústria 4.0: uma realidade no BrasilAllyson Chiarini
 
A nova rota da seda e o ganho de competitividade da China 2015 bsp
A nova rota da seda e o ganho de competitividade da China 2015   bspA nova rota da seda e o ganho de competitividade da China 2015   bsp
A nova rota da seda e o ganho de competitividade da China 2015 bspAllyson Chiarini
 
Marketing Plan - Leite MOÇA
Marketing Plan - Leite MOÇAMarketing Plan - Leite MOÇA
Marketing Plan - Leite MOÇAAllyson Chiarini
 
Plano de Marketing Leite MOÇA
Plano de Marketing Leite MOÇA Plano de Marketing Leite MOÇA
Plano de Marketing Leite MOÇA Allyson Chiarini
 
Brasil e China - Tecnologia da Informação
Brasil e China - Tecnologia da InformaçãoBrasil e China - Tecnologia da Informação
Brasil e China - Tecnologia da InformaçãoAllyson Chiarini
 
Gestão de Portfólio para DevOps
Gestão de Portfólio para DevOpsGestão de Portfólio para DevOps
Gestão de Portfólio para DevOpsAllyson Chiarini
 
As rupturas tecnológicas e o futuro dos desenvolvedores
As rupturas tecnológicas e o futuro dos desenvolvedoresAs rupturas tecnológicas e o futuro dos desenvolvedores
As rupturas tecnológicas e o futuro dos desenvolvedoresAllyson Chiarini
 
Vivenciando a experiência web pelos olhos de seu cliente
Vivenciando a experiência web pelos olhos de seu clienteVivenciando a experiência web pelos olhos de seu cliente
Vivenciando a experiência web pelos olhos de seu clienteAllyson Chiarini
 
Entregando inovação de forma contínua com maior agilidade
Entregando inovação de forma contínua com maior agilidadeEntregando inovação de forma contínua com maior agilidade
Entregando inovação de forma contínua com maior agilidadeAllyson Chiarini
 
Agile transformation best practices
Agile transformation best practicesAgile transformation best practices
Agile transformation best practicesAllyson Chiarini
 

Mais de Allyson Chiarini (15)

Indústria 4.0: uma realidade no Brasil
Indústria 4.0: uma realidade no BrasilIndústria 4.0: uma realidade no Brasil
Indústria 4.0: uma realidade no Brasil
 
A Nova Rota da Seda
A Nova Rota da SedaA Nova Rota da Seda
A Nova Rota da Seda
 
A nova rota da seda e o ganho de competitividade da China 2015 bsp
A nova rota da seda e o ganho de competitividade da China 2015   bspA nova rota da seda e o ganho de competitividade da China 2015   bsp
A nova rota da seda e o ganho de competitividade da China 2015 bsp
 
Lindt
Lindt Lindt
Lindt
 
IBM Watson
IBM WatsonIBM Watson
IBM Watson
 
A arte da Guerra
A arte da GuerraA arte da Guerra
A arte da Guerra
 
Marketing Plan - Leite MOÇA
Marketing Plan - Leite MOÇAMarketing Plan - Leite MOÇA
Marketing Plan - Leite MOÇA
 
Plano de Marketing Leite MOÇA
Plano de Marketing Leite MOÇA Plano de Marketing Leite MOÇA
Plano de Marketing Leite MOÇA
 
Brasil e China - Tecnologia da Informação
Brasil e China - Tecnologia da InformaçãoBrasil e China - Tecnologia da Informação
Brasil e China - Tecnologia da Informação
 
Gestão de Portfólio para DevOps
Gestão de Portfólio para DevOpsGestão de Portfólio para DevOps
Gestão de Portfólio para DevOps
 
As rupturas tecnológicas e o futuro dos desenvolvedores
As rupturas tecnológicas e o futuro dos desenvolvedoresAs rupturas tecnológicas e o futuro dos desenvolvedores
As rupturas tecnológicas e o futuro dos desenvolvedores
 
Vivenciando a experiência web pelos olhos de seu cliente
Vivenciando a experiência web pelos olhos de seu clienteVivenciando a experiência web pelos olhos de seu cliente
Vivenciando a experiência web pelos olhos de seu cliente
 
Entregando inovação de forma contínua com maior agilidade
Entregando inovação de forma contínua com maior agilidadeEntregando inovação de forma contínua com maior agilidade
Entregando inovação de forma contínua com maior agilidade
 
DevOps - visão geral
DevOps - visão geralDevOps - visão geral
DevOps - visão geral
 
Agile transformation best practices
Agile transformation best practicesAgile transformation best practices
Agile transformation best practices
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Desvendando o desenvolvimento seguro de software

  • 1. IBM Technical Summit 2013 Erik Oliveira Senior Security Consultant, IBM Security System erikso@br.ibm.com © 2013 IBM Corporation
  • 2. Please note the following IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 2
  • 3. Mundo interconectado EXPLOSÃO DE DADOS CONSUMERIZAÇÃO DA TI Com o advento da Empresa 2.0 e do negócio social, desapareceu a linha entre tempo, dispositivos e dados pessoais e profissionais TUDO ESTÁ EM TODA PARTE Organizações continuam mudando para novas plataformas, inclusive computação em nuvem, virtualização, dispositivos móveis, negócio social e muito mais SOFISTICAÇÃO DOS ATAQUES 3 A era do "Big Data" – a explosão da informação digital – chegou e é facilitada pela difusão de aplicativos acessados de todos os lugares A velocidade e destreza dos ataques aumentaram, associados a novos agentes com novas motivações, do crime cibernético e terrorismo, até invasões patrocinadas por governos
  • 5. Mobile Malware 2013 Source: Juniper Networks Third Annual Mobile Threats Report: March 2012 through March 2013 5
  • 7. Contexto Mundial Tipo de ataque Software Bethesda Injeção SQL Manipulação de URL Northrop Grumman Fox News X-Factor Phishing focalizado Citigroup SW de terceiros Policia Federal espanhola DDoS Secure ID Sony Lockheed Martin L3 Communications O tamanho do círculo estima o impacto relativo da quebra de segurança Sony BMG Grécia Booz Allen Hamilton PBS PBS RSA HB Gary Sega Contas do Gmail Epsilon Desconhecido Site do premier italiano FMI Vanguard Defense SOCA Site do gov. malaio Polícia peruana Nintendo Gov. Brasileiro Governo Turco Monsanto SK Communications Coreia Polícia do Arizona OTAN Senado dos EUA Fev 7 Mar Abril Maio Junho Julho Ago
  • 8. Custo da brecha Custos: 1,000,000x Fluxo de Segurança Dano a Empresa Notificação ao cliente Multas Litígio Exposição da reputação Exposição da marca Custo para reparo Fluxo Funcional 10x 1x Desenvolvimento 8       Teste Produção
  • 9. Detectando SQL Injection Source – um métodos retornando string insegura // ... String username = request.getParameter("username"); String password = request.getParameter("password"); // ... String query = "SELECT * from tUsers where " + "userid='" + username + "' " + "AND password='" + password +Usuário pode mudar o SQL "'"; executado commandos // ... ResultSet rs = stmt.executeQuery(query); Sink – um potencial método perigoso 9
  • 10. Detectando SQL Injection String username = request.getParameter("username"); // ... String username = request.getParameter("username"); String password = request.getParameter("password"); // ... String query = "SELECT * from tUsers where " +' "userid='" + username + "' " + "AND password='" + password + "'"; String query = "SELECT …" + username // ... ResultSet rs = stmt.executeQuery(query); ResultSet rs = stmt.executeQuery(query); 10
  • 11. Detectando SQL Injection String username = request.getParameter("username"); username = ‘anything' OR 'x'='x ‘ username = ‘x' AND 1=(SELECT COUNT(*) FROM tabname); --‘ username = ‘x' AND userid IS NULL; --‘ String query = "SELECT …" + username 11
  • 13. Como funciona AppScan Automação de Testes de Segurança em Aplicações Análise Relatório (identificar riscos) Scan das aplicações (detalhado e assertivo) Fix 13
  • 14. Ciclo de Vida CODIFICAÇÃO BUILD QA SEGURANCA E PRODUÇÃO IBM AppScan Enterprise Server AppScan Source users AppScan Enterprise user Eclipse, Visual Studio, RAD AppScan Source for Automation AppScan Standard (via CLI) (scanning agent) AppScan Enterprise user AppScan Standard Build Management Gerenciamento de Ameaças 14 AppScan Enterprise user (web client) AppScan Standard (desktop)
  • 15. AppScan Segurança Relatório Corporativo • Configuração de Software • Registro de progresso • Scan • Compare Applications • Triagem de Resultados • Manage Security Policies AppScan Enterprise Server • Dashboardas customizados • Gerenciamento de risco • Base de conhecimento • Banco de Assessment IDE Plug-Ins • Regras Customizadas Automação • Fluxo de Investigação • Guia de remediação • Scan automatizados • Scan • ANT, Make, Maven • Confirmação de Fix 15 • Integração de Buidl • APIs de acessos de dados
  • 16. AppScan  Templates Wizards Importe Eclipse Workspaces e soluções .NET  Matrix de Vulnerabilidade Isolamento de vulnerabilidades confirmadas Otimização de triagem de issues Auxilia na falta de expertise de segurança  Filtros poderosos Facilidade de utilização Foco em baixo número de riscos prioritários Filtros pré definidos 16 Vulnerabilidade Confirmadas
  • 17. AppScan  Análise rápida – Gereciamento de memória e cache – Otimização de re-scan – 100+ patentes  Fluxo de dados / Fluxo de chamadas – Suporte para longas trilhas – Facilidade em idetificar código malicioso ou não  Desconsidera coisas que a análise não entende  Nada é ignorado – Relatório de “Lost Sinks” 17  Análise de StringString Analysis – Identifica de forma automática a validação de rotinas – Tecnologia de IBM Research – Checa efetividade da validação lógica
  • 18. AppScan Linguagem Suportadas Out-of-the-Box  Java  Perl  JSP  ColdFusion C  Client-Side JavaScript  C++  .NET  Server-Side JavaScript – C#  VBScript – VB.NET  COBOL – ASP.NET  PL/SQL  Classic ASP (VB6)  T-SQL  PHP  Android e IOS  HTML 18  SAP ABAP Extensível Análises por expressão regular  Definir regras customizadas  Usar o poder da expressões regulares  Associação de regras com maioria das linguagem
  • 19. 19
  • 20. Acknowledgements and disclaimers Availability: References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views. They are provided for informational purposes only, and are neither intended to, nor shall have the effect of being, legal or other guidance or advice to any participant. While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided AS-IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. © Copyright IBM Corporation 2013. All rights reserved. – U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. IBM, the IBM logo, ibm.com, Rational, the Rational logo, Telelogic, the Telelogic logo, Green Hat, the Green Hat logo, and other IBM products and services are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml Other company, product, or service names may be trademarks or service marks of others. 20
  • 21. © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. 21

Notas do Editor

  1. Author Notes: This is the PowerPoint template for the IBM Technical Summit breakout sessions This template has been built in PowerPoint 2003. If you’re using PowerPoint 2007 or above, you may experience different usability results than what is provided as guidance here. To allow all masters of your exiting presentation to be updated correctly, download this template to your hard drive and copy your existing slides into the new template using slide sorter. IBMers can find additional information on presentation guidelines and resources at:https://w3-connections.ibm.com/wikis/home?lang=en-us#!/wiki/Rational%20Presentation%20Templates,%20Guidelines,%20and%20Resources IBM Rational presenters can leverage existing brand-level assets and sparklers (including Rational Brand Messaging Slides, Client Success Slides and Client Quotes, Statistics) from SSW’s Brand Content Page:https://w3-03.sso.ibm.com/software/xl/myportal/content?synKey=R789607U42052O71 Imagery guidelines: Avoid using cartoon like clip-art, use photo-art instead. Third party material cannot be used in a presentation without written permission (this includes product and Web page screen shots, and photos). Images must be acquired from a ‘royalty-free to use’ source such as: Microsoft or Lotus Symphony Clip Art library http://www.freebyte.com/clipart_images_photos_icons/#freevectorgraphics http://www.freedigitalphotos.net/ IBMers can use royalty-free images from the following repositories: IBM Brand Systems Center / Assets / PhotographyLogin instructions: https://w3-connections.ibm.com/forums/html/topic?id=c1082624-e54c-4e04-bad1-ddb150ac7540 IBM Software Story Imageshttps://w3-connections.ibm.com/files/app#/collection/b7570645-b2f8-4450-a27f-9269a163fc2d IBM Rational Presentation Image Library: https://w3-connections.ibm.com/wikis/home?lang=en_US#!/wiki/Rational%20Presentation%20Templates,%20Guidelines,%20and%20Resources/page/Presentation%20Image%20Library
  2. Please note the following IBMers must include the next slide (verbatim) after your title slide. IBMers must also include the mandatory “Acknowledgements and Disclaimers” slide (see slide 10) at the end of your presentation before the closing “Thank You” slide. - You will need to customize the “Acknowledgements and Disclaimers” text in red appropriately.
  3. Optional slide. Graphic is available in English only.
  4. Mandatory closing slide (1 of 2) Acknowledgements and disclaimers IBMers must include This mandatory “Acknowledgements and Disclaimers” slide at the end of your presentation before the closing “Thank You” slide. - You will need to customize the “Acknowledgements and Disclaimers” text in red appropriately.
  5. Mandatory closing slide (2 of 2) Thank You Slide (available in English only).