SlideShare uma empresa Scribd logo
1 de 43
Singapore | 28 Feb - 01 Mar 2019
Jaap Karan Singh
jaap@scw.io
Co-Founder and Chief Singh, Secure Code Warrior
Why ‘Positive Security’ is the next
software security game changer
Singapore | 28 Feb - 01 Mar 2019Working or saving lives?
> Work for
We empower developers to write secure code
> Developer >> Pentester >> Developer
> Help organisations build kick-ass
training awareness programs
Singapore | 28 Feb - 01 Mar 2019
> Today’s challenges with
software security
Singapore | 28 Feb - 01 Mar 2019
Software developers around the world ~ Evans Data
22M
Source: https://evansdata.com/reports/viewRelease.php?reportID=9
Singapore | 28 Feb - 01 Mar 2019
Lines of code written by developers
every year ~ CSO Online
111BN
Source: https://www.csoonline.com/article/3151003/application-development/world-will-need-to-secure-111-billion-lines-of-new-software-code-in-2017.html
Singapore | 28 Feb - 01 Mar 2019
Exploitable Security Bugs in every 50 000
Lines of Code
1 to 4
Source: StackOverflow
Singapore | 28 Feb - 01 Mar 2019
Security incidents result from defects in the design
or code ~ DHS
90%
Source: https://www.us-cert.gov/sites/default/files/publications/infosheet_SoftwareAssurance.pdf
Singapore | 28 Feb - 01 Mar 2019
Of data breaches caused by software vulnerability ~
Verizon
21%
Source: Verizon, Data Breach Report, 2018 (but in there the last 10 years)
Singapore | 28 Feb - 01 Mar 2019
of newly scanned applications had SQL injections
over the past 5 yrs ~ Cisco
1 in 3
Source: Cybersecurity as a Growth Advantage, Cisco, 2016
Singapore | 28 Feb - 01 Mar 2019
Singapore | 28 Feb - 01 Mar 2019
> How did we end up here?
Singapore | 28 Feb - 01 Mar 2019
AppSec in 2000
Corporates had a branding website, the
Internet was mostly for geeks
> AppSec was virtually non-existent in corporate world
> Hacking was focussed on exploiting infrastructure
vulnerabilities (bof, race conditions, fmt str*)
> Research on first web app weaknesses
> OWASP started and Top 10 released!
> Penetration testing was black magic
Singapore | 28 Feb - 01 Mar 2019
We’ve got bigger problems (Y2K) than worrying
about Application Security
Singapore | 28 Feb - 01 Mar 2019
AppSec in 2010
Companies started offering web-based services;
Web 2.0 and Mobile are new
> Penetration testing was THE thing
> Web Application Firewalls will stop everything
> Paper-based secure coding guidelines
> Static Code Analysis Tools (SAST) emerge
Singapore | 28 Feb - 01 Mar 2019
Monthly data breaches,
Hackers everywhere,
Privacy, GDPR, PCI-DSS, HIPAA
Putin
Singapore | 28 Feb - 01 Mar 2019
AppSec in 2019
Everything runs on software.
Cybersecurity & AppSec are hot topics.
> Pen-testing is still here…
> Static Code Analysis Tools (SAST) is still here…
> Runtime Application Security Protection (RASP)
> Dynamic Application Security Testing (DAST)
> Interactive Application Security Testing (IAST)
> Crowd-Sourced Security Testing (CSST?)
> DevSecOps is getting traction
- Shift left
- Containerisation
- Integrating security and ops into dev
- Security pipelining
Singapore | 28 Feb - 01 Mar 2019
AppSec in 2019
Challenge - Pen-testing mostly sucks
DevelopersSecurity Experts
Singapore | 28 Feb - 01 Mar 2019
BUILDERS
Know their code
Do not speak
“security”
BREAKERS
Always pointing out
problems
Not developers
SQL Injections
XSS
Object
Deserialization
IDOR
Constructors
JAVA Spring
SWIFT
Angular.JS
vs
Singapore | 28 Feb - 01 Mar 2019
AppSec in 2019
Challenge - AppSec is often a bottleneck
Singapore | 28 Feb - 01 Mar 2019
Software Developers (Agile)
A BA
B
A
B
A
B
A
B
A
B
Application Security Experts
200
1
Singapore | 28 Feb - 01 Mar 2019
AppSec in 2019
Challenge - Security Pipelining is in its infancy
Singapore | 28 Feb - 01 Mar 2019
AppSec in 2019
Challenge - Tools mostly suck
> SAST - Expertise, false positives, slow, framework
support
> I/DAST - Expertise, false negatives, slow
> RASP - WAF++, nobody uses block mode, tech
specific
> Testing tools spit out long, mostly inaccurate reports
with often useless advice
Singapore | 28 Feb - 01 Mar 2019
AppSec in 2019
Challenge - “Black Hole” of security knowledge
Singapore | 28 Feb - 01 Mar 2019
We’re failing to learn from our mistakes
Singapore | 28 Feb - 01 Mar 2019
AppSec @ Work
Singapore | 28 Feb - 01 Mar 2019
> SHIFT START left
Scale and Make an Impact as an AppSec Pro
Singapore | 28 Feb - 01 Mar 2019
SHIFT START left
Solution – Better Pen-Testing
> Bobby’; DROP TABLE pentesting_attitude;
> Provide a FIX more than input_validation();
> Create a JIRA ticket with advise/fix
> Create a pull request (wishful thinking)
> Lessons Learned to dev teams to distribute
knowledge
Less finding problems, more security engineering
Singapore | 28 Feb - 01 Mar 2019
SHIFT START left
Solution – Weaknesses vs Controls
Singapore | 28 Feb - 01 Mar 2019
Solution – Distribute Knowledge
Application Security
Secure Coding Guidelines
e.g.
● Ensure application logging (Where, What, When, Who, Why)
● Use context encoding on untrusted user input
1
Singapore | 28 Feb - 01 Mar 2019
200
Secure Coding Guidelines
1. Ensure application logging (Where, What, When, Who, Why)
2. Use context encoding on untrusted user input
Project X - Secure Coding rules for
<insert your favourite coding framework>
1. Use SecureLogger log_object;
2. Don’t use GetParameter(), Use LibSafe_GetParam()
Solution – Distribute Knowledge
Singapore | 28 Feb - 01 Mar 2019
Secure Coding Guidelines
1. Ensure application logging (Where, What, When, Who, Why)
2. Use context encoding on untrusted user input
Project X - Secure Coding rules for
<insert your favourite coding framework>
1. Use SecureLogger log_object;
2. Don’t use GetParameter(), Use LibSafe_GetParam()
Upon Commit
1. Your code violates security rules: You shall not pass!
2. Your code violates security rules: Fill in your get out of jail card
(JIRA ticket)
3. Points++ for delivering secure code
Solution – Distribute Knowledge
200
Singapore | 28 Feb - 01 Mar 2019
Application Security
1
Developer fixes issue
● Use TLS() for any sensitive data
Security Vulnerabilities
● Sensitive data not
transported securely
Solution – Learn from Mistakes
Singapore | 28 Feb - 01 Mar 2019
Developer fixes issue
● Use TLS() for any sensitive data
Security Vulnerabilities
● Sensitive data not transported securely
Project X - Secure Coding rules for
<insert your favourite coding framework>
1. Use SecureLogger log_object;
2. Don’t use GetParameter(), Use LibSafe_GetParam()
3. Use TLS() for any sensitive data
200
Solution – Learn from Mistakes
Singapore | 28 Feb - 01 Mar 2019
> Build a positive
security culture
Break down “us” vs “them” culture
Singapore | 28 Feb - 01 Mar 2019
Positive
Security Culture
Create a brand
> People remember a memorable brand
> Make it fun and geeky!
> AppSec are not marketing experts,,get help from
Security Awareness
Singapore | 28 Feb - 01 Mar 2019
Singapore | 28 Feb - 01 Mar 2019
Positive
Security Culture
Answer the “why”
> Teachable moments
> Make it personal
Singapore | 28 Feb - 01 Mar 2019
Positive
Security Culture
Build a community
> Special interest group for those interested in AppSec
and cyber security
> Not a one-time event, self-sustaining community that
carries the culture forward
> Fun events and competitions – write your best
phishing email, lock picking, hack internal applications
Singapore | 28 Feb - 01 Mar 2019
Security Champions
Jane Doe John Smith
> Interested in AppSec
> Great grasp of security concepts
> coding_skills++ - best coder in the team
> Well respected by peers
> Not part of other communities
Works with AppSec doing security
engineering
> Interested in AppSec
> Good grasp of security concepts
> Good coding skills
> Well liked by peers
> Part of internal communities
Helps spread the word and drive behaviour
change
Singapore | 28 Feb - 01 Mar 2019
Positive
Security Culture
Reward good behaviour
> Cash prize - reward developers for finding security
bugs you would pay pen-tester for
> Level up program
> Peer and executive recognition
> Speeding pass - prove security awareness, introduce
security pipelining and skip manual security checks
Singapore | 28 Feb - 01 Mar 2019
Positive
Security Culture
Remember – it’s not easy!
> Crawl…walk…RUN
> Visible management buy-in
> Harder to change mindset of existing employees,
easier to introduce to new starters
If at first you don’t succeed, try again
Singapore | 28 Feb - 01 Mar 2019Secure Developers Are Superheroes
Takeaways:
● Demand better outcomes in security testing
● Distribute knowledge to scale AppSec
● Build a positive security culture
● Reward good behaviour
Singapore | 28 Feb - 01 Mar 2019
Jaap Karan Singh
jaap@scw.io
Co-Founder & Chief Singh, Secure Code Warrior
> the_end();

Mais conteúdo relacionado

Mais de DevSecCon

DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon
 
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...DevSecCon
 
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...DevSecCon
 
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)DevSecCon
 
DevSecCon London 2018: Security in the serverless world
DevSecCon London 2018: Security in the serverless worldDevSecCon London 2018: Security in the serverless world
DevSecCon London 2018: Security in the serverless worldDevSecCon
 
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...DevSecCon
 
DevSecCon London 2018: Whatever happened to attack aware applications?
DevSecCon London 2018: Whatever happened to attack aware applications?DevSecCon London 2018: Whatever happened to attack aware applications?
DevSecCon London 2018: Whatever happened to attack aware applications?DevSecCon
 
DevSecCon London 2018: A Journey to Continuous Cloud Compliance
DevSecCon London 2018: A Journey to Continuous Cloud ComplianceDevSecCon London 2018: A Journey to Continuous Cloud Compliance
DevSecCon London 2018: A Journey to Continuous Cloud ComplianceDevSecCon
 
DevSecCon London 2018: Securing a web app: business security VS the OWASP top 10
DevSecCon London 2018: Securing a web app: business security VS the OWASP top 10DevSecCon London 2018: Securing a web app: business security VS the OWASP top 10
DevSecCon London 2018: Securing a web app: business security VS the OWASP top 10DevSecCon
 

Mais de DevSecCon (20)

DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for Kubernetes
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heel
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificates
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOps
 
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
 
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...
DevSecCon London 2018: Variant Analysis – A critical step in handling vulnera...
 
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
 
DevSecCon London 2018: Security in the serverless world
DevSecCon London 2018: Security in the serverless worldDevSecCon London 2018: Security in the serverless world
DevSecCon London 2018: Security in the serverless world
 
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
 
DevSecCon London 2018: Whatever happened to attack aware applications?
DevSecCon London 2018: Whatever happened to attack aware applications?DevSecCon London 2018: Whatever happened to attack aware applications?
DevSecCon London 2018: Whatever happened to attack aware applications?
 
DevSecCon London 2018: A Journey to Continuous Cloud Compliance
DevSecCon London 2018: A Journey to Continuous Cloud ComplianceDevSecCon London 2018: A Journey to Continuous Cloud Compliance
DevSecCon London 2018: A Journey to Continuous Cloud Compliance
 
DevSecCon London 2018: Securing a web app: business security VS the OWASP top 10
DevSecCon London 2018: Securing a web app: business security VS the OWASP top 10DevSecCon London 2018: Securing a web app: business security VS the OWASP top 10
DevSecCon London 2018: Securing a web app: business security VS the OWASP top 10
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

DevSecCon Singapore 2019: Why ‘Positive Security’ is the next software security game changer, and how to do it successfully

  • 1. Singapore | 28 Feb - 01 Mar 2019 Jaap Karan Singh jaap@scw.io Co-Founder and Chief Singh, Secure Code Warrior Why ‘Positive Security’ is the next software security game changer
  • 2. Singapore | 28 Feb - 01 Mar 2019Working or saving lives? > Work for We empower developers to write secure code > Developer >> Pentester >> Developer > Help organisations build kick-ass training awareness programs
  • 3. Singapore | 28 Feb - 01 Mar 2019 > Today’s challenges with software security
  • 4. Singapore | 28 Feb - 01 Mar 2019 Software developers around the world ~ Evans Data 22M Source: https://evansdata.com/reports/viewRelease.php?reportID=9
  • 5. Singapore | 28 Feb - 01 Mar 2019 Lines of code written by developers every year ~ CSO Online 111BN Source: https://www.csoonline.com/article/3151003/application-development/world-will-need-to-secure-111-billion-lines-of-new-software-code-in-2017.html
  • 6. Singapore | 28 Feb - 01 Mar 2019 Exploitable Security Bugs in every 50 000 Lines of Code 1 to 4 Source: StackOverflow
  • 7. Singapore | 28 Feb - 01 Mar 2019 Security incidents result from defects in the design or code ~ DHS 90% Source: https://www.us-cert.gov/sites/default/files/publications/infosheet_SoftwareAssurance.pdf
  • 8. Singapore | 28 Feb - 01 Mar 2019 Of data breaches caused by software vulnerability ~ Verizon 21% Source: Verizon, Data Breach Report, 2018 (but in there the last 10 years)
  • 9. Singapore | 28 Feb - 01 Mar 2019 of newly scanned applications had SQL injections over the past 5 yrs ~ Cisco 1 in 3 Source: Cybersecurity as a Growth Advantage, Cisco, 2016
  • 10. Singapore | 28 Feb - 01 Mar 2019
  • 11. Singapore | 28 Feb - 01 Mar 2019 > How did we end up here?
  • 12. Singapore | 28 Feb - 01 Mar 2019 AppSec in 2000 Corporates had a branding website, the Internet was mostly for geeks > AppSec was virtually non-existent in corporate world > Hacking was focussed on exploiting infrastructure vulnerabilities (bof, race conditions, fmt str*) > Research on first web app weaknesses > OWASP started and Top 10 released! > Penetration testing was black magic
  • 13. Singapore | 28 Feb - 01 Mar 2019 We’ve got bigger problems (Y2K) than worrying about Application Security
  • 14. Singapore | 28 Feb - 01 Mar 2019 AppSec in 2010 Companies started offering web-based services; Web 2.0 and Mobile are new > Penetration testing was THE thing > Web Application Firewalls will stop everything > Paper-based secure coding guidelines > Static Code Analysis Tools (SAST) emerge
  • 15. Singapore | 28 Feb - 01 Mar 2019 Monthly data breaches, Hackers everywhere, Privacy, GDPR, PCI-DSS, HIPAA Putin
  • 16. Singapore | 28 Feb - 01 Mar 2019 AppSec in 2019 Everything runs on software. Cybersecurity & AppSec are hot topics. > Pen-testing is still here… > Static Code Analysis Tools (SAST) is still here… > Runtime Application Security Protection (RASP) > Dynamic Application Security Testing (DAST) > Interactive Application Security Testing (IAST) > Crowd-Sourced Security Testing (CSST?) > DevSecOps is getting traction - Shift left - Containerisation - Integrating security and ops into dev - Security pipelining
  • 17. Singapore | 28 Feb - 01 Mar 2019 AppSec in 2019 Challenge - Pen-testing mostly sucks DevelopersSecurity Experts
  • 18. Singapore | 28 Feb - 01 Mar 2019 BUILDERS Know their code Do not speak “security” BREAKERS Always pointing out problems Not developers SQL Injections XSS Object Deserialization IDOR Constructors JAVA Spring SWIFT Angular.JS vs
  • 19. Singapore | 28 Feb - 01 Mar 2019 AppSec in 2019 Challenge - AppSec is often a bottleneck
  • 20. Singapore | 28 Feb - 01 Mar 2019 Software Developers (Agile) A BA B A B A B A B A B Application Security Experts 200 1
  • 21. Singapore | 28 Feb - 01 Mar 2019 AppSec in 2019 Challenge - Security Pipelining is in its infancy
  • 22. Singapore | 28 Feb - 01 Mar 2019 AppSec in 2019 Challenge - Tools mostly suck > SAST - Expertise, false positives, slow, framework support > I/DAST - Expertise, false negatives, slow > RASP - WAF++, nobody uses block mode, tech specific > Testing tools spit out long, mostly inaccurate reports with often useless advice
  • 23. Singapore | 28 Feb - 01 Mar 2019 AppSec in 2019 Challenge - “Black Hole” of security knowledge
  • 24. Singapore | 28 Feb - 01 Mar 2019 We’re failing to learn from our mistakes
  • 25. Singapore | 28 Feb - 01 Mar 2019 AppSec @ Work
  • 26. Singapore | 28 Feb - 01 Mar 2019 > SHIFT START left Scale and Make an Impact as an AppSec Pro
  • 27. Singapore | 28 Feb - 01 Mar 2019 SHIFT START left Solution – Better Pen-Testing > Bobby’; DROP TABLE pentesting_attitude; > Provide a FIX more than input_validation(); > Create a JIRA ticket with advise/fix > Create a pull request (wishful thinking) > Lessons Learned to dev teams to distribute knowledge Less finding problems, more security engineering
  • 28. Singapore | 28 Feb - 01 Mar 2019 SHIFT START left Solution – Weaknesses vs Controls
  • 29. Singapore | 28 Feb - 01 Mar 2019 Solution – Distribute Knowledge Application Security Secure Coding Guidelines e.g. ● Ensure application logging (Where, What, When, Who, Why) ● Use context encoding on untrusted user input 1
  • 30. Singapore | 28 Feb - 01 Mar 2019 200 Secure Coding Guidelines 1. Ensure application logging (Where, What, When, Who, Why) 2. Use context encoding on untrusted user input Project X - Secure Coding rules for <insert your favourite coding framework> 1. Use SecureLogger log_object; 2. Don’t use GetParameter(), Use LibSafe_GetParam() Solution – Distribute Knowledge
  • 31. Singapore | 28 Feb - 01 Mar 2019 Secure Coding Guidelines 1. Ensure application logging (Where, What, When, Who, Why) 2. Use context encoding on untrusted user input Project X - Secure Coding rules for <insert your favourite coding framework> 1. Use SecureLogger log_object; 2. Don’t use GetParameter(), Use LibSafe_GetParam() Upon Commit 1. Your code violates security rules: You shall not pass! 2. Your code violates security rules: Fill in your get out of jail card (JIRA ticket) 3. Points++ for delivering secure code Solution – Distribute Knowledge 200
  • 32. Singapore | 28 Feb - 01 Mar 2019 Application Security 1 Developer fixes issue ● Use TLS() for any sensitive data Security Vulnerabilities ● Sensitive data not transported securely Solution – Learn from Mistakes
  • 33. Singapore | 28 Feb - 01 Mar 2019 Developer fixes issue ● Use TLS() for any sensitive data Security Vulnerabilities ● Sensitive data not transported securely Project X - Secure Coding rules for <insert your favourite coding framework> 1. Use SecureLogger log_object; 2. Don’t use GetParameter(), Use LibSafe_GetParam() 3. Use TLS() for any sensitive data 200 Solution – Learn from Mistakes
  • 34. Singapore | 28 Feb - 01 Mar 2019 > Build a positive security culture Break down “us” vs “them” culture
  • 35. Singapore | 28 Feb - 01 Mar 2019 Positive Security Culture Create a brand > People remember a memorable brand > Make it fun and geeky! > AppSec are not marketing experts,,get help from Security Awareness
  • 36. Singapore | 28 Feb - 01 Mar 2019
  • 37. Singapore | 28 Feb - 01 Mar 2019 Positive Security Culture Answer the “why” > Teachable moments > Make it personal
  • 38. Singapore | 28 Feb - 01 Mar 2019 Positive Security Culture Build a community > Special interest group for those interested in AppSec and cyber security > Not a one-time event, self-sustaining community that carries the culture forward > Fun events and competitions – write your best phishing email, lock picking, hack internal applications
  • 39. Singapore | 28 Feb - 01 Mar 2019 Security Champions Jane Doe John Smith > Interested in AppSec > Great grasp of security concepts > coding_skills++ - best coder in the team > Well respected by peers > Not part of other communities Works with AppSec doing security engineering > Interested in AppSec > Good grasp of security concepts > Good coding skills > Well liked by peers > Part of internal communities Helps spread the word and drive behaviour change
  • 40. Singapore | 28 Feb - 01 Mar 2019 Positive Security Culture Reward good behaviour > Cash prize - reward developers for finding security bugs you would pay pen-tester for > Level up program > Peer and executive recognition > Speeding pass - prove security awareness, introduce security pipelining and skip manual security checks
  • 41. Singapore | 28 Feb - 01 Mar 2019 Positive Security Culture Remember – it’s not easy! > Crawl…walk…RUN > Visible management buy-in > Harder to change mindset of existing employees, easier to introduce to new starters If at first you don’t succeed, try again
  • 42. Singapore | 28 Feb - 01 Mar 2019Secure Developers Are Superheroes Takeaways: ● Demand better outcomes in security testing ● Distribute knowledge to scale AppSec ● Build a positive security culture ● Reward good behaviour
  • 43. Singapore | 28 Feb - 01 Mar 2019 Jaap Karan Singh jaap@scw.io Co-Founder & Chief Singh, Secure Code Warrior > the_end();

Notas do Editor

  1. Intro Why I am presenting this topic
  2. We went from 16M in 2014 to 22M today and 26M tomorrow. How many of those software “engineers” have been told about the dangers in their job? Developers learn about security by making mistakes and “on the job” How many civil engineers know that if you’re building a house, the safety and security of the construction is important?
  3. The whole world runs on software. Its not only the banks, but cars (Tesla, BMW, etc), oil rigs, airplanes, stock exchanges and soon, your mum’s water kettle will be running some form of Linux with a crappy PHP interface to remotely manage the water kettle.
  4. Roughly 2 million exploitable security bugs written every year
  5. The interesting part about Verizon data breach report is that AppSec has been mentioned in there since 2010 as one of the biggest causes of data breaches. We must be doing something wrong.
  6. We have known about SQL injection for 20 years, still making the same mistakes
  7. Speak about Twitter and what just happened.
  8. > AppSec Virtually nonexistent. Nobody cared > Exploits techniques very simple (BoF, Race conditions, etc). > Security was solved by infrastructure technology and perimeter security. > First major focus of hackers on WebApp & Database Vulnerabilities (e.g. SQLi & XSS)
  9. Let’s look at WHY this is happening
  10. SAST, 10 year old technology, usually run when code has been written already RASP, an agent you install in production that tries to analyse data flows and stop the attack. Even if you’re code is bad, they claim they can stop everything. DAST, tools you can run on a QA version of your software. Tries to blindly poke holes in what it can access and determine whether its a problem BugBounties, let’s take pentesting but multiply it with 1000 resources. Surely one of them will find something usefull
  11. Results of your test highly depend on the skills of who you hire. The customer, usually has no clue which skills are required to perform a proper test. The pentester, usually does not have all the skills Tell story about our platform being tested by 2 firms with credible reputation (CREST, etc). They found some small stuff (outdated library stuff) but nothing major. Two weeks later, one of our own staff (not certified) found a law in our assessment engine which would allow anyone to pass an exam. Customers don’t understand the criteria required to select a good security tester, usually pick on a combination of price+reputation. The price pressure results into good companies to be competitive, they down scope it, not enough time to go in depth and to understand the business behind the application. They focus on getting low hanging fruits into a paper document.
  12. The business wants to go all hands agile and to 10 code-drops per day You’re on your own. Trying to prioritise what’s important and what can be skipped That’s usually what happens with you if you work too long in AppSec. You bleed :)
  13. No budget Even if you found budget, not enough people in infosec Security experts don’t know the code – hard time scaling New technology/hotness – cannot keep up
  14. There are so many tools, for so many stacks, for so many problems. GuardRails for Github commits
  15. RASP - Imperva bought Prevoty (WAFng, WAF++) Exciting RIPsTech -> automatic code patch generation in specific framework Veracode -> analyse path of execution and advise where to patch
  16. According to the NIST (National Institute of Standards and Technology, US Dept. of Commerce), there are 125 frequent occurring vulnerabilities. Each developer of the team can not master how to tackle all these vulnerabilities (think juniors). Developers work on different bits of the code so security knowledge and best practices need to be shared (hard as class room style training and wiki’s aren’t effective, , time consuming, not a priority). New developers join and need to be trained on best practices, developers leave (is their knowledge preserved?). Once a vulnerability is fixed, the ‘how it was fixed’ isn’t typically shared or if shared it is done in wiki’s, confluence etc. Big chance vulnerability will be reintroduced: again research on how to fix or even worse a different fix (new library f.e.). All the above cause security bugs to be present and hard to eradicate.
  17. We as an industry need to stp focussing on negatives Old standard – gatekeepers, say no Don’t tell them what NOT to do, provide guidance on what todo. Make sure secure foundations can be built
  18. Create a memorable brand so people remember. I am from Appsec so I know we are not branding experts. Leverage security awareness teams, they are great at internal marketing.
  19. Forget to tell people why they should care Need a teachable moment – failed project delivery, worse breach (better if its your competitor) Talk about how long it takes to fix a bug for a developer, unknowns for project delivery, competitors taking the lead to business folks
  20. Home on internal social media – news reports, lessons learnt, fun events Takes a while to create a vibrant community
  21. Everyone needs to be security aware but not everyone needs to be an expert. Identify those interested in security and help them gain deeper knowledge. Not a hacking expert, still focussed on secure coding Reward for being a champion! Send them to conferences, pay for more training, help make decisions on tooling
  22. Currently negative experience for developers when they find bugs - Increase work for themselves or their peers, not a positive experience
  23. Currently negative experience for developers when they find bugs - Increase work for themselves or their peers, not a positive experience
  24. We want to turn developers into heroes.