SlideShare uma empresa Scribd logo
1 de 43
Baixar para ler offline
IBM Rational Vision and Roadmap for
                                 Application Security
                                    John Burroughs, CISSP
                                      IBM Product Manager
                             Web Application Security and Compliance



                                                                       ASC01



© 2009 IBM Corporation
IBM Rational Software Conference 2009



Today’s Agenda

           Strategic Trends in Application Security
           Best Practices and Strategies
           Vision and Roadmap for 2009 and Beyond




                         ASC01
IBM Rational Software Conference 2009


Changing security landscape creates complex
threats
Web-enabled Applications Drive the Need for Security
    New Applications are increasing
    the attack surface
    Complex Web applications create
    complex security risks
    Making applications more
    available to “good” users, makes
    them more available to “bad”
    users
    Web attacks are evolving to
    blended attacks (i.e. planting of
    malware on legitimate web sites)
                                                       Web Applications




                         ASC01
IBM Rational Software Conference 2009



2009 Web Threats Take Center Stage

    Web application vulnerabilities
     Web applications have become the Achilles heel of Corporate IT Security
     Represent largest category in vuln disclosures (55% in 2008)
     This number does not include custom-developed Web applications!




4                        ASC01
IBM Rational Software Conference 2009



Growth of Web Application Vulnerabilities



  SQL injection                              The number of
 vulnerability                              active,
 disclosures                                automated
 more than                                  attacks on web
 doubled in                                 servers was
 comparison to                              unprecedented
 2007




                         ASC01
IBM Rational Software Conference 2009


Webapp Exploitation is Cheaper and Easier than Alternatives




                         ASC01
IBM Rational Software Conference 2009



Exploitation of SQL injection skyrocketed in 2008



      Increased by 30x from the midyear to the end of 2008




                         ASC01
IBM Rational Software Conference 2009



SQL injection used to plant Malware
   SQL injection has been used to extract information from
   databases
   Now SQL Injection is used to add info to databases
      Database is being updated with malicious script
      Users who browse the web application are being infected by script which takes advantage of
      browser/plug flows to install malware from malicious sites



 Web Application hacks have replaced email as the number 1
               delivery mechanism for malware




                           ASC01
IBM Rational Software Conference 2009



Subscription Based SQL Injection Tools
     Automating the SQL Injection attacks
         User specifies the custom payload to inject
         Tool checks a site in China to verify
         subscription fees
         Connects to Google to search for
         vulnerable sites inurl:".asp" inurl:"a=“
             Site regularly updated with new
             SQL Injection vulnerabilities
         Starts SQL injection
             Uses vulnerability-specific payloads to
             inject required commands
         Botnets used to deliver attack



     Opportunistic attack:                             Courtesy: http://isc.sans.org/diary.html?storyid=4294



     Sites not specifically targeted
                             ASC01
IBM Rational Software Conference 2009


Application Security Maturity Model
           UNAWARE     CORRECTIVE            BOLT ON   BUILT IN
                         PHASE                PHASE    PHASE


                                                       20 %

                                              50 %
Maturity




                          20 %

           10 %


                                  Duration 2-3 Years              Time



                         ASC01
IBM Rational Software Conference 2009



Driver #1 – Cost Benefits of Early Detection




                         ASC01
IBM Rational Software Conference 2009


Driver #2 – Need to Scale

                       Phase 1               Phase 2            Phase 3




                                                            Development
    # of                                                       Team
   people
  involved
                                            Development
                                               Team

                                                                QA Team
                                             QA Team
                    Security Team          Security Team    Security Team
                 Low                                                      High
                                        % Applications Tested

                         ASC01
IBM Rational Software Conference 2009




      IBM Rational Vision and Roadmap for
      Application Security




                         ASC01
IBM Rational Software Conference 2009



Securing a smarter planet
                                                            Globalization and Globally
                                                              Available Resources




    Billions of mobile devices                                                 Access to streams of
        accessing the Web                                                  information in the Real Time




                                                                           New possibilities.
                                        New Forms of Collaboration         New complexities.
                                                                                 New risks.
                           ASC01
IBM Rational Software Conference 2009



Key Focus Areas
1. Build security into the development lifecycle
            Development, QA, Security audit, Production monitoring and defense



2. Simplify tools to match security expertise of
   current users
3. Leverage IBM’s research and technology
4. Provide multiple delivery options
            Software, software as service, consulting, appliance/IPS




                         ASC01
IBM Rational Software Conference 2009

Rational AppScan End-to-End Web Application Security
REQUIREMENTS               CODE                  BUILD                        QA         SECURITY            PRODUCTION




  Req’ts Definition      AppScan            AppScan Build           AppScan Tester        AppScan                AppScan
(security templates)     Developer          (scanning agent)         (scan agent &        Standard              OnDemand
                         (desktop)                                      clients)          (desktop)               (SaaS)

                                            AppScan Enterprise / Reporting Console
                                             (enterprise-wide scanning and reporting)

     Security                                  Automate                Security /        Security &            Outsourced
  requirements          Build security         Security /         compliance testing    Compliance             testing for
  defined before       testing into the       Compliance           incorporated into      Testing,          security audits &
     design &                IDE*            testing in the             testing &        oversight,          production site
 implementation                              Build Process            remediation      control, policy,        monitoring
                                                                       workflows           audits

                                           Application Security Best Practices



 Address security                                                                             Security audit solutions
  from the start                                                                                  for IT Security



                                     Security for the development lifecycle


                               ASC01
IBM Rational Software Conference 2009

 IBM Rational AppScan – Security in the SDLC
           CODE                           BUILD                              QA                       SECURITY


                                         AppScan Enterprise / Reporting Console




                 AppScan Ent.                                       (scanning agent)                AppScan       AppScan
    AppScan                           AppScan Build Ed
  Developer Ed    QuickScan                                                       (QA clients)   Enterprise user Standard Ed
                  (web client)         (scanning agent)               AppScan Tester Ed            (web client)    (desktop)
    (desktop)

                   Ounce Labs Products


   Rational        Rational
  Application      Software        Rational         Rational                 Rational Quality
  Developer        Analyzer       ClearCase        BuildForge                   Manager

                                   Rational ClearQuest / Defect Management

                                  IBM Rational Web Based Training for AppScan

  Build security testing into       Automate Security /         Security / compliance testing     Security & Compliance
           the IDE                Compliance testing in the      incorporated into testing &        Testing, oversight,
                                      Build Process                remediation workflows           control, policy, audits

                                 ASC01
IBM Rational Software Conference 2009


Who is Ounce Labs?
       Ounce is a proven leader in Static Code
       Analysis Security
       •   Named “leader” in Gartner’s 1st Magic Quadrant for SAST (Static Application Security Testing)
       •   Software developer founded 2002
       •   Headquarters: Waltham, MA
       •   Source code security experts



                             •   Identifies security vulnerabilities in application source code
      Products               •   Automates and integrates security analysis in the SDLC
                             •   Connects source code analysis to enterprise security and GRC platforms

                             •   4 granted source code security patents, 3 pending
     Technology              •   Superior architecture for scalable enterprise deployments
                             •   Community leadership: Multiple solutions released into open source,
                                 senior-level contributions to PCI, SANS, CWE, OWASP, and more

                             •   150+ customers; 98% renewal rate
     Customers               •   Marquee financial, government, retail and e-commerce customers
                             •   Solution of choice for security SIs and consultant community



18                                ASC01
IBM Rational Software Conference 2009



Why has IBM acquired Ounce Labs?
 Ounce Labs provides application source code testing tools to help enterprises
 reduce risk and cost associated with online security and compliance breaches.

      Application security is the largest category of vulnerability disclosures (55%
      in 2008)
      Rational acquired Watchfire in 2007 to address customers’ Application
      Security Testing needs
            AppScan continues to be recognized as the leader in Dynamic Analysis Security Testing (DAST)
            Ounce Labs is a recognized leader in Static Analysis Security Testing (SAST)

      Application security markets are converging
            The combination of these two industry leading technologies provides the most accurate solution in the market
            Ounce’s technology enables Rational to fulfill our vision of moving testing earlier in the development process

      Continues to add to our competitive advantage in the application security
      testing segment
            Only vendor to offer complete solutions for both SAST & DAST
            Only vendor to offer complete integration across the software delivery lifecycle
            Only vendor to offer a complete IT security solution across all major domains (IBM Security Framework)

      Ounce is a good fit
            Mature technology that supports all key development technologies and languages (Java, .NET, C/C++)
            Excellent integrations with Rational SDLC products and for the developer – Rational’s traditional user base

19                               ASC01
IBM Rational Software Conference 2009

Application Security in: Code/Build
REQUIREMENTS                  CODE                   BUILD                      QA                  SECURITY             PRODUCTION




    Req’ts Definition    AppScan Developer        AppScan Build           AppScan Tester          AppScan Standard      AppScan OnDemand
  (security templates)       (desktop)            (scanning agent)      (scan agent & clients)        (desktop)              (SaaS)
                                 Ounce Labs Products
                                                    AppScan Enterprise / Reporting Console
                                                     (enterprise-wide scanning and reporting)


Security requirements                           Automate Security /     Security / compliance        Security &          Outsourced testing
defined before design       Build security       Compliance testing     testing incorporated     Compliance Testing,    for security audits &
  & implementation       testing into the IDE   in the Build Process        into testing &        oversight, control,      production site
                                                                       remediation workflows        policy, audits           monitoring


                                                    Application Security Best Practices




                                   ASC01
IBM Rational Software Conference 2009




                                          Dev Team 1
                                                  Scan
                         Scan                   Data and    Dev Team 2
                       Data and                  Reports
      Dev Team 5        Reports

                                                                  Scan
                                                                Data and
                                                                 Reports

                                        ASE Portal
                                                              Scan
                 Scan                                       Data and
               Data and                            Scan      Reports
                Reports                          Data and
                                                  Reports



     Dev Team 4
                                                               Dev Team 3


                                        Security Team


                          ASC01
IBM Rational Software Conference 2009



IBM Rational AppScan Developer & Build Editions
     Web Application Security Solutions for Development
        The most efficient place in the SDLC to find and fix security issues



                Developer Solution Empowers Developers to do
                Security Testing
                   Desktop IDE-Integrated Solution for Developers
                   Also helps build a developer’s web appsec awareness




                Build Solution Ensures All Code is Scanned
                   Many dev environments do automated regression tests in their regular build process
                      Now can include Security tests in regression tests
                   Automation-Friendly, Build time oriented solution
                   Key Stakeholder/User – Build Engineer




                            ASC01
IBM Rational Software Conference 2009


Security Issues Coverage

                                                                                          Runtime Analysis serves as
                                                                                           Runtime Analysis serves as
                                                                                          the “glue” between Static &
                                                                                           the “glue” between Static &
                                                Total Potential                           Dynamic Analysis. It helps
                                                                                           Dynamic Analysis. It helps
                                                                                          correlate results and
                                                                                           correlate results and
                                                Security Issues                           improve overall accuracy &
                                                                                           improve overall accuracy &
                                                                                          actionability
                                                                                           actionability




                                                                                   • Environment Configuration Issues
                                                                                   • Environment Configuration Issues
                                                                                   • Patch Level Issues
                                                                                   • Patch Level Issues
• Null Pointer Dereference
• Null Pointer Dereference            Static                         Dynamic       • Runtime Privileges Issues
                                                                                   • Runtime Privileges Issues
• Threading Issues
• Threading Issues                                Runtime Analysis                 • Authentication Issues
                                                                                   • Authentication Issues
• Code Quality Issues
                                     Analysis                        Analysis      • Protocol Parser/Serializer Issues
• Code Quality Issues                                                              • Protocol Parser/Serializer Issues
• Issues in Dead Code
• Issues in Dead Code                                                              • Issues in external 3rd party
                                                                                   • Issues in external 3rd party
• Insecure Crypto Functions
• Insecure Crypto Functions                                                        components
                                                                                   components
• Issues in Back-End Application
• Issues in Back-End Application
Code (Multi-Tier Applications)
Code (Multi-Tier Applications)




                                                                           • SQL Injection
                                                                           • SQL Injection
                                                                           • Cross Site Scripting
                                                                           • Cross Site Scripting
     Application Logic Issues
     Application Logic Issues                                              • HTTP Response Splitting
                                                                           • HTTP Response Splitting
                                                                           • OS Commanding
                                                                           • OS Commanding
                                                                           • LDAP Injection
                                                                           • LDAP Injection
                                                                           •…
                                                                           •…




                                   ASC01
IBM Rational Software Conference 2009



Roadmap Highlights: Code/Build
   Add new language support
      Current product only supports Java, In 2009 we will add .NET Support
      analysis of Web Applications built on .NET; using both black box and white box testing techniques



   String Analysis
      Provides automatic detection of user defined sanitizers – automating parts of the configuration to contain false positive issues from static analysis
      Included to-date as a Tech Preview; will improve accuracy and performance, modify detection methodology, and be turned on by default




   Enhanced Static Analysis engine
      Support for all Java frameworks (including Portal and services)




   Evolve performance, scalability and usability
      Responding to customer feedback to date



   Tighter integration with Code Quality tools (Software Analyzer and
   Logiscope)

                                    ASC01
IBM Rational Software Conference 2009

Application Security in: QA
REQUIREMENTS                  CODE                   BUILD                      QA                  SECURITY             PRODUCTION




    Req’ts Definition    AppScan Developer        AppScan Build           AppScan Tester          AppScan Standard      AppScan OnDemand
  (security templates)       (desktop)            (scanning agent)      (scan agent & clients)        (desktop)              (SaaS)

                                                    AppScan Enterprise / Reporting Console
                                                     (enterprise-wide scanning and reporting)


Security requirements                           Automate Security /     Security / compliance        Security &          Outsourced testing
defined before design       Build security       Compliance testing     testing incorporated     Compliance Testing,    for security audits &
  & implementation       testing into the IDE   in the Build Process        into testing &        oversight, control,      production site
                                                                       remediation workflows        policy, audits           monitoring


                                                    Application Security Best Practices




                                   ASC01
IBM Rational Software Conference 2009



Introducing AppScan Tester Edition for RQM
                                                                                                           RQM - Rational Quality Manager




      Embedd Security Testing into the QA
      Process
            Ideal way to scale security testing
            Integrated into the QA environment to enable the adoption of security testing alongside functional
            and performance testing



      Delivering the building blocks to help
      customers build a process to address
      security & compliance
            Leverage existing compliance mechanisms in the QA process
            Provides collaboration tools for security testing between development, QA and security teams




                  The Result: Seamless integration of security testing to
                  provide Collaboration, Automation and Reporting


                                   ASC01
IBM Rational Software Conference 2009


Rational Quality Manager – Test Management Hub

                                    IBM Collaborative Application Lifecycle Management

                                    Rational Quality Manager
                                                  Quality Dashboard

      Requirements                      Test Management and Execution                                          Defect
      Management                                                                                             Management


                                    Create          Build        Manage            Report
                                     Plan           Tests        Test Lab          Results



                                                                                                                    Open Platform
                                                Best Practice Processes


                                                JAZZ TEAM SERVER
                       SAP                                                                    System z, i
                             Java            Open Lifecycle Service Integrations
                                                                                             .NET
              Functional                                                                             Security and
               Testing        Performance                                       Code                 Compliance
                                                      Web Service
                                Testing                 Quality                Quality
                                                                                                                      homegrown




                           ASC01
IBM Rational Software Conference 2009

Application Security in: Security Team
REQUIREMENTS                  CODE                   BUILD                      QA                  SECURITY             PRODUCTION




    Req’ts Definition    AppScan Developer        AppScan Build           AppScan Tester          AppScan Standard      AppScan OnDemand
  (security templates)       (desktop)            (scanning agent)      (scan agent & clients)        (desktop)              (SaaS)

                                                    AppScan Enterprise / Reporting Console
                                                     (enterprise-wide scanning and reporting)


Security requirements                           Automate Security /     Security / compliance        Security &          Outsourced testing
defined before design       Build security       Compliance testing     testing incorporated     Compliance Testing,    for security audits &
  & implementation       testing into the IDE   in the Build Process        into testing &        oversight, control,      production site
                                                                       remediation workflows        policy, audits           monitoring


                                                    Application Security Best Practices




                                   ASC01
IBM Rational Software Conference 2009

Advancing Web 2.0 Security: automatically auditing Adobe
Flash Applications
       Evolution of Flash support
         First generation tools partially explored through Flash applications
         Second generation (emerging now) can fully explore and audit Flash applications




       Rational AppScan automatically scans Flash-based applications
            Is the first to introduce automatic Flash Execution (first “Second Generation” scanner)
            Similar to AJAX: 1st gen was parsing, 2nd gen was execution


       Automatically explores deep and complex Flash applications
       Identifies traditional, as well as Flash-specific security issues
            Cross-Site Flashing, Cross-Site Scripting through Flash, Phishing…

       Supports Flash & Flex applications
            Includes server-side testing of Flex applications (only scanner to support AMF protocol)

       Continued leadership in Flash application security
            Flash Execution is now a strategic & evolving component of AppScan




                                   ASC01
IBM Rational Software Conference 2009

Extending AppScan’s lead in Web Services security
testing
    Web Services momentum continues
       Enterprise Modernization allows organizations to transition legacy applications to sophisticated Web 2.0 and SOA solutions, driven by user demand
       Legacy applications were not designed with Web security considerations
       SOA deployments present a complex and rich technology heavy scanning environments




 Leveraging IBM’s rich investment in
 SOA
      Using established Rational SOA Tester capabilities
      Powerful functional & performance testing for SOA
      AppScan to include GSC: General SOA Client




 Testing Custom Web Services code
      Identifies business logic vulnerabilities




 Support complex Web Services
 deployments
      XML Signatures
      XML Encryption
      Complex Types in WSDL
      …




                                                  ASC01
IBM Rational Software Conference 2009
                               CVSS support provides industry
                                   standard severity rating




  Guides user through verifying
   that the issue is a legitimate
           vulnerability




                                                                    Integrated screenshots with
                                                                     explanations immediately
                                                                  demonstrate whether an issue
                                                                truly exists, saving time and effort
                          ASC01
IBM Rational Software Conference 2009



The Problem: Legitimate Sites serving Malware
   Malware is served or linked primarily from Legitimate Sites!
                                                                “Federal Travel Booking Site
                        “TrendMicro site                        Spreads Malware”
                        infected users with                               -Washington Post
                        Trojan”             “A large web
   “BusinessWeek           - CIO            hosting firm (IPower)
   website attacked and                     inflicted by mass                     “Twitter
   hosts malware”                           malware installation”                 worm strikes”
         -Net-Security                             - Washington Post
                                                                                     - New York
                                                                                                                    Times


   Flagged as the “New Biggest Problem”:
      WebSense: "Legitimate Sites Carry Increasing Portion Of Malware“ (Jan, '09)
      ScanSafe: "Web-based malware up 400%, 68% hosted on legitimate websites“ (June, '08)
      Blog: "Online Trust: A Thing of the Past?" (Jan, '09)
      X-Force: "Are Legitimate Sites the Next Malware Threat?" (Feb, '09)
      Breach: “SQL Injection Attacks Planting Malware on Web Sites Ranks #1 in Breach Security’s 2008 Web Hacking Incidents
      Database Report” (Feb, '09)




                                 ASC01
IBM Rational Software Conference 2009



AppScan’s HTTP-Based Malware Scanning

1. Discover all content and
   links in a Web Application
          Execute JavaScript & Flash
          Fill forms and login sequences
          Analyze secure pages
          …




  2. Analyze all content for
     malicious behavior
     indicators
                                              link1


                                                      link2

  3. Compare all links to                  link3

     comprehensive black-lists

                                 ASC01
IBM Rational Software Conference 2009

Application Security in: Production
REQUIREMENTS                  CODE                   BUILD                      QA                  SECURITY             PRODUCTION




    Req’ts Definition    AppScan Developer        AppScan Build           AppScan Tester          AppScan Standard      AppScan OnDemand
  (security templates)       (desktop)            (scanning agent)      (scan agent & clients)        (desktop)              (SaaS)

                                                    AppScan Enterprise / Reporting Console
                                                     (enterprise-wide scanning and reporting)


Security requirements                           Automate Security /     Security / compliance        Security &          Outsourced testing
defined before design       Build security       Compliance testing     testing incorporated     Compliance Testing,    for security audits &
  & implementation       testing into the IDE   in the Build Process        into testing &        oversight, control,      production site
                                                                       remediation workflows        policy, audits           monitoring


                                                    Application Security Best Practices




                                   ASC01
IBM Rational Software Conference 2009



Expanded Options for Production Testing and Defense

1. Testing solutions:
        –   AppScan Enterprise
        –   AppScan OnDemand
        –   ISS Managed Security Services



2. Defensive solutions:
        –   ISS Proventia IPS with New Web Protection
        –   DataPower SOA Appliance



3. Combined approach
        –   Integrated scanning and defense




                         ASC01
IBM Rational Software Conference 2009



Introducing expanded Rational AppScan OnDemand

         AppScan OnDemand:
            Comprehensive testing of pre-production applications
            Periodic assessment of applications in QA or Security
            Monthly scans
            Flexible offerings base on organization (Small/Medium/Large)

         AppScan OnDemand Production Site Monitoring:
            Continuous scanning of production Web sites for vulnerabilities
            that may have been introduced after the app went live
            Dynamic or interactive content and forms, online registrations
            Weekly scans




               The Result: Ability to address online risk without in-house
               resources with the faster route to actionable information

                                                       Policy Testing OnDemand is also available to support website
                            ASC01                       compliance management for Privacy, Quality & Accessibility
IBM Rational Software Conference 2009


WebSphere DataPower SOA Appliances
                                             An SOA Appliance…




                                            Creating customer value through extreme
                                            SOA connectivity, performance and
                                            security

                                             Simplifies SOA and accelerates time to value
                                             Helps secure SOA XML implementations
                                             Governs and enforces SOA/Web services policies



         WebSphere DataPower SOA Appliances redefine the boundaries of middleware
         extending the SOA Foundation with specialized, consumable, dedicated SOA
          appliances that combine superior performance and hardened security for
                                   SOA implementations.


                         ASC01
IBM Rational Software Conference 2009



Virtual Application Security Patch
 1. Rational AppScan Scans Web Application,
    Uncovers Security Issues
 2. WebSphere DataPower Rules are Auto-Created,
    Based on Found Issues
 3. Custom protection blocks exploits on vulnerable
    locations, blocking where required while
    avoiding False Positives
 4. Vulnerabilities are remediated in the next
    release of Web Application                        2   1



                                                 3




                                                              4
                         ASC01
IBM Rational Software Conference 2009


Rational/ISS Vision: Application & Network Security Ecosystem




                                                          Proventia IDS/IPS




                                    Site Protector        Enterprise Scanner




     Joint interface for Application & Network Security    AppScan Agent
     Collaborative flow of product usage
     Mutual leveraging of technology
                         ASC01
IBM Rational Software Conference 2009



Block attacks in real-time with Proventia Web application
security
 Intrusion prevention just got
 smarter with web application
   protection backed by the
       power of X-Force



    Virtual Patch            Threat Detection &                Content Analysis                  Web Protection              Network Policy
                                Prevention                                                                                    Enforcement
What It Does:                                              What It Does:                      What It Does:
Shields vulnerabilities     What It Does:                  Monitors and identifies            Protects web applications   What It Does:
from exploitation           Detects and prevents           unencrypted personally             against sophisticated       Manages security policy
independent of a software   entire classes of threats as   identifiable information (PII)     application-level attacks   and risks within defined
patch, and enables a        opposed to a specific          and other confidential             such as SQL Injection,      segments of the network,
responsible patch           exploit or vulnerability.      information for data awareness.    XSS (Cross-site             such as ActiveX
management process that                                    Also provides capability to        scripting), PHP file-       fingerprinting, Peer To
can be adhered to without   Why Important:                 explore data flow through the      includes, CSRF (Cross-      Peer, Instant Messaging,
fear of a breach            Eliminates need of             network to help determine if any   site request forgery).      and tunneling.
                            constant signature             potential risks exist.
Why Important:              updates. Protection                                               Why Important:              Why Important:
At the end of 2008, 53%     includes the proprietary       Why Important:                     Expands security            Enforces network
of all vulnerabilities      Shellcode Heuristics (SCH)     Flexible and scalable              capabilities to meet both   application and service
disclosed during the year   technology, which has an       customized data search criteria;   compliance requirements     access based on
had no vendor-supplied      unbeatable track record of     serves as a complement to data     and threat evolution.       corporate policy and
patches available to        protecting against zero day    security strategy
remedy the vulnerability                                                                                                  governance.
                            vulnerabilities.



                                   ASC01
IBM Rational Software Conference 2009



2009 Roadmap
Q1
   New AppScan Releases
      AppScan Standard, Express, Developer, Build

   Product Translations
      Available for all products
      Japanese, Korean, Traditional Chinese, Simplified Chinese, French, Italian, and German

   Expanded SaaS offering
      Production Site Monitoring




Q3
   Web-based Malware Detection & Scanning
   AppScan-ISS SiteProtector Integration


Q4
   Portfolio-wide release (including Ounce)
   Joint ISS initiatives



                                          ASC01
IBM Rational Software Conference 2009




                         ASC01          42
IBM Rational Software Conference 2009




© Copyright IBM Corporation 2009. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have
the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM
software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities
referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature
availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines
Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.


                                                  ASC01                                                                                                                                         43

Mais conteúdo relacionado

Mais procurados

Application Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability ManagerApplication Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability Manager
Denim Group
 
Mobile to Mainframe - the Challenges of Enterprise DevOps Adoption
Mobile to Mainframe - the Challenges of Enterprise DevOps AdoptionMobile to Mainframe - the Challenges of Enterprise DevOps Adoption
Mobile to Mainframe - the Challenges of Enterprise DevOps Adoption
Sanjeev Sharma
 
1 what verona_does_barry
1 what verona_does_barry1 what verona_does_barry
1 what verona_does_barry
BarryMKane
 
Kony Development Cloud
Kony Development CloudKony Development Cloud
Kony Development Cloud
Dipesh Mukerji
 

Mais procurados (20)

Ibm innovate ci for system z
Ibm innovate ci for system zIbm innovate ci for system z
Ibm innovate ci for system z
 
Application Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability ManagerApplication Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability Manager
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Easily Create Scalable Automation using Selenium
Easily Create Scalable Automation using SeleniumEasily Create Scalable Automation using Selenium
Easily Create Scalable Automation using Selenium
 
IBM Innovate DevOps for Mobile Apps
IBM Innovate DevOps for Mobile Apps IBM Innovate DevOps for Mobile Apps
IBM Innovate DevOps for Mobile Apps
 
Kony - The multi Channel Challenge
Kony - The multi Channel Challenge Kony - The multi Channel Challenge
Kony - The multi Channel Challenge
 
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
 
Webcast Automação Implantação de Aplicações (DevOps)
Webcast Automação Implantação de Aplicações (DevOps)Webcast Automação Implantação de Aplicações (DevOps)
Webcast Automação Implantação de Aplicações (DevOps)
 
Mobile to Mainframe - the Challenges of Enterprise DevOps Adoption
Mobile to Mainframe - the Challenges of Enterprise DevOps AdoptionMobile to Mainframe - the Challenges of Enterprise DevOps Adoption
Mobile to Mainframe - the Challenges of Enterprise DevOps Adoption
 
Sybrant Technologies Company Presentation
Sybrant Technologies Company PresentationSybrant Technologies Company Presentation
Sybrant Technologies Company Presentation
 
1 what verona_does_barry
1 what verona_does_barry1 what verona_does_barry
1 what verona_does_barry
 
Kony Development Cloud
Kony Development CloudKony Development Cloud
Kony Development Cloud
 
Twelve factor-app
Twelve factor-appTwelve factor-app
Twelve factor-app
 
Kony Mobile Management
Kony Mobile ManagementKony Mobile Management
Kony Mobile Management
 
SaaS Testing on an Agile World
SaaS Testing on an Agile WorldSaaS Testing on an Agile World
SaaS Testing on an Agile World
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
Webcast urbancodemobiltomainframe
Webcast urbancodemobiltomainframeWebcast urbancodemobiltomainframe
Webcast urbancodemobiltomainframe
 
Udvikling af apps til mobile enheder med IBM Worklight, Christina Møller, IBM
Udvikling af apps til mobile enheder med IBM Worklight, Christina Møller, IBMUdvikling af apps til mobile enheder med IBM Worklight, Christina Møller, IBM
Udvikling af apps til mobile enheder med IBM Worklight, Christina Møller, IBM
 
Mobile to Mainframe - En-to-end transformation
Mobile to Mainframe - En-to-end transformationMobile to Mainframe - En-to-end transformation
Mobile to Mainframe - En-to-end transformation
 
DevOps for the Mobile Enterprise: Build and Connect
DevOps for the Mobile Enterprise: Build and ConnectDevOps for the Mobile Enterprise: Build and Connect
DevOps for the Mobile Enterprise: Build and Connect
 

Semelhante a Application security vision - John b

Semelhante a Application security vision - John b (20)

IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 
IBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionIBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solution
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
Going Mobile at a Glance - Do you need to build from scratch?
Going Mobile at a Glance - Do you need to build from scratch?Going Mobile at a Glance - Do you need to build from scratch?
Going Mobile at a Glance - Do you need to build from scratch?
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 
Outpost24 webinar - Api security
Outpost24 webinar - Api securityOutpost24 webinar - Api security
Outpost24 webinar - Api security
 
PCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter Eibak
PCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter EibakPCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter Eibak
PCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter Eibak
 
Who owns Software Security
Who owns Software SecurityWho owns Software Security
Who owns Software Security
 
Who Owns Software Security?
Who Owns Software Security?Who Owns Software Security?
Who Owns Software Security?
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
The Reconstitution of Middleware with APIs
The Reconstitution of Middleware with APIsThe Reconstitution of Middleware with APIs
The Reconstitution of Middleware with APIs
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
CI/CD for Modern Applications
CI/CD for Modern ApplicationsCI/CD for Modern Applications
CI/CD for Modern Applications
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
 
App checker
App checkerApp checker
App checker
 
Embedded software validation best practices with NI and RQM
Embedded software validation best practices with NI and RQMEmbedded software validation best practices with NI and RQM
Embedded software validation best practices with NI and RQM
 
Collaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile Software Collaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile Software
 
Collaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile SoftwareCollaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile Software
 

Mais de Roopa Nadkarni

New integrations for synergy and change - Sean Innes
New integrations for synergy and change - Sean InnesNew integrations for synergy and change - Sean Innes
New integrations for synergy and change - Sean Innes
Roopa Nadkarni
 
Best practices for effective doors implementation-Ashwini Patil
Best practices for effective doors implementation-Ashwini PatilBest practices for effective doors implementation-Ashwini Patil
Best practices for effective doors implementation-Ashwini Patil
Roopa Nadkarni
 
Accelerated test case - Anish bhanu
Accelerated test case - Anish bhanuAccelerated test case - Anish bhanu
Accelerated test case - Anish bhanu
Roopa Nadkarni
 
web 2. 0 performance testing - Dave chadwick
web 2. 0 performance testing - Dave chadwickweb 2. 0 performance testing - Dave chadwick
web 2. 0 performance testing - Dave chadwick
Roopa Nadkarni
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
Roopa Nadkarni
 
RQM in scrum agile testing - Raj kumar
RQM in scrum agile testing - Raj kumarRQM in scrum agile testing - Raj kumar
RQM in scrum agile testing - Raj kumar
Roopa Nadkarni
 
Req Pro - Andreas gschwind
Req Pro - Andreas gschwindReq Pro - Andreas gschwind
Req Pro - Andreas gschwind
Roopa Nadkarni
 
Extending Rhapsody -Rick boldt
Extending Rhapsody -Rick boldtExtending Rhapsody -Rick boldt
Extending Rhapsody -Rick boldt
Roopa Nadkarni
 
EM overview- - Hayden lindsey
EM overview- - Hayden lindseyEM overview- - Hayden lindsey
EM overview- - Hayden lindsey
Roopa Nadkarni
 
Smarter Products For A Smarter PLanet - Neeraj Chandra
Smarter Products For A Smarter PLanet - Neeraj ChandraSmarter Products For A Smarter PLanet - Neeraj Chandra
Smarter Products For A Smarter PLanet - Neeraj Chandra
Roopa Nadkarni
 
Real Insights Real Results - Steve Robinson
Real Insights Real Results - Steve RobinsonReal Insights Real Results - Steve Robinson
Real Insights Real Results - Steve Robinson
Roopa Nadkarni
 
Overcoming Contradictions - Mike O Rourke
Overcoming Contradictions - Mike O RourkeOvercoming Contradictions - Mike O Rourke
Overcoming Contradictions - Mike O Rourke
Roopa Nadkarni
 
Opportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve RobinsonOpportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve Robinson
Roopa Nadkarni
 
How To Make It Real - Hayden Lindsey
How To Make It Real - Hayden LindseyHow To Make It Real - Hayden Lindsey
How To Make It Real - Hayden Lindsey
Roopa Nadkarni
 
Achieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin NallyAchieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin Nally
Roopa Nadkarni
 
RPT Oracle Plugin - Anitha Krishnamurthy
RPT Oracle Plugin - Anitha KrishnamurthyRPT Oracle Plugin - Anitha Krishnamurthy
RPT Oracle Plugin - Anitha Krishnamurthy
Roopa Nadkarni
 

Mais de Roopa Nadkarni (20)

Agile - Monojit basu
Agile - Monojit basuAgile - Monojit basu
Agile - Monojit basu
 
New integrations for synergy and change - Sean Innes
New integrations for synergy and change - Sean InnesNew integrations for synergy and change - Sean Innes
New integrations for synergy and change - Sean Innes
 
Best practices for effective doors implementation-Ashwini Patil
Best practices for effective doors implementation-Ashwini PatilBest practices for effective doors implementation-Ashwini Patil
Best practices for effective doors implementation-Ashwini Patil
 
Agile - Monojit Basu
Agile - Monojit BasuAgile - Monojit Basu
Agile - Monojit Basu
 
Accelerated test case - Anish bhanu
Accelerated test case - Anish bhanuAccelerated test case - Anish bhanu
Accelerated test case - Anish bhanu
 
web 2. 0 performance testing - Dave chadwick
web 2. 0 performance testing - Dave chadwickweb 2. 0 performance testing - Dave chadwick
web 2. 0 performance testing - Dave chadwick
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
 
RTF - Prasad bhatt
RTF - Prasad bhattRTF - Prasad bhatt
RTF - Prasad bhatt
 
RQM in scrum agile testing - Raj kumar
RQM in scrum agile testing - Raj kumarRQM in scrum agile testing - Raj kumar
RQM in scrum agile testing - Raj kumar
 
Req Pro - Andreas gschwind
Req Pro - Andreas gschwindReq Pro - Andreas gschwind
Req Pro - Andreas gschwind
 
RFT - Ashish Mathur
RFT - Ashish MathurRFT - Ashish Mathur
RFT - Ashish Mathur
 
Extending Rhapsody -Rick boldt
Extending Rhapsody -Rick boldtExtending Rhapsody -Rick boldt
Extending Rhapsody -Rick boldt
 
EM overview- - Hayden lindsey
EM overview- - Hayden lindseyEM overview- - Hayden lindsey
EM overview- - Hayden lindsey
 
Smarter Products For A Smarter PLanet - Neeraj Chandra
Smarter Products For A Smarter PLanet - Neeraj ChandraSmarter Products For A Smarter PLanet - Neeraj Chandra
Smarter Products For A Smarter PLanet - Neeraj Chandra
 
Real Insights Real Results - Steve Robinson
Real Insights Real Results - Steve RobinsonReal Insights Real Results - Steve Robinson
Real Insights Real Results - Steve Robinson
 
Overcoming Contradictions - Mike O Rourke
Overcoming Contradictions - Mike O RourkeOvercoming Contradictions - Mike O Rourke
Overcoming Contradictions - Mike O Rourke
 
Opportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve RobinsonOpportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve Robinson
 
How To Make It Real - Hayden Lindsey
How To Make It Real - Hayden LindseyHow To Make It Real - Hayden Lindsey
How To Make It Real - Hayden Lindsey
 
Achieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin NallyAchieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin Nally
 
RPT Oracle Plugin - Anitha Krishnamurthy
RPT Oracle Plugin - Anitha KrishnamurthyRPT Oracle Plugin - Anitha Krishnamurthy
RPT Oracle Plugin - Anitha Krishnamurthy
 

Application security vision - John b

  • 1. IBM Rational Vision and Roadmap for Application Security John Burroughs, CISSP IBM Product Manager Web Application Security and Compliance ASC01 © 2009 IBM Corporation
  • 2. IBM Rational Software Conference 2009 Today’s Agenda Strategic Trends in Application Security Best Practices and Strategies Vision and Roadmap for 2009 and Beyond ASC01
  • 3. IBM Rational Software Conference 2009 Changing security landscape creates complex threats Web-enabled Applications Drive the Need for Security New Applications are increasing the attack surface Complex Web applications create complex security risks Making applications more available to “good” users, makes them more available to “bad” users Web attacks are evolving to blended attacks (i.e. planting of malware on legitimate web sites) Web Applications ASC01
  • 4. IBM Rational Software Conference 2009 2009 Web Threats Take Center Stage Web application vulnerabilities Web applications have become the Achilles heel of Corporate IT Security Represent largest category in vuln disclosures (55% in 2008) This number does not include custom-developed Web applications! 4 ASC01
  • 5. IBM Rational Software Conference 2009 Growth of Web Application Vulnerabilities SQL injection The number of vulnerability active, disclosures automated more than attacks on web doubled in servers was comparison to unprecedented 2007 ASC01
  • 6. IBM Rational Software Conference 2009 Webapp Exploitation is Cheaper and Easier than Alternatives ASC01
  • 7. IBM Rational Software Conference 2009 Exploitation of SQL injection skyrocketed in 2008 Increased by 30x from the midyear to the end of 2008 ASC01
  • 8. IBM Rational Software Conference 2009 SQL injection used to plant Malware SQL injection has been used to extract information from databases Now SQL Injection is used to add info to databases Database is being updated with malicious script Users who browse the web application are being infected by script which takes advantage of browser/plug flows to install malware from malicious sites Web Application hacks have replaced email as the number 1 delivery mechanism for malware ASC01
  • 9. IBM Rational Software Conference 2009 Subscription Based SQL Injection Tools Automating the SQL Injection attacks User specifies the custom payload to inject Tool checks a site in China to verify subscription fees Connects to Google to search for vulnerable sites inurl:".asp" inurl:"a=“ Site regularly updated with new SQL Injection vulnerabilities Starts SQL injection Uses vulnerability-specific payloads to inject required commands Botnets used to deliver attack Opportunistic attack: Courtesy: http://isc.sans.org/diary.html?storyid=4294 Sites not specifically targeted ASC01
  • 10. IBM Rational Software Conference 2009 Application Security Maturity Model UNAWARE CORRECTIVE BOLT ON BUILT IN PHASE PHASE PHASE 20 % 50 % Maturity 20 % 10 % Duration 2-3 Years Time ASC01
  • 11. IBM Rational Software Conference 2009 Driver #1 – Cost Benefits of Early Detection ASC01
  • 12. IBM Rational Software Conference 2009 Driver #2 – Need to Scale Phase 1 Phase 2 Phase 3 Development # of Team people involved Development Team QA Team QA Team Security Team Security Team Security Team Low High % Applications Tested ASC01
  • 13. IBM Rational Software Conference 2009 IBM Rational Vision and Roadmap for Application Security ASC01
  • 14. IBM Rational Software Conference 2009 Securing a smarter planet Globalization and Globally Available Resources Billions of mobile devices Access to streams of accessing the Web information in the Real Time New possibilities. New Forms of Collaboration New complexities. New risks. ASC01
  • 15. IBM Rational Software Conference 2009 Key Focus Areas 1. Build security into the development lifecycle Development, QA, Security audit, Production monitoring and defense 2. Simplify tools to match security expertise of current users 3. Leverage IBM’s research and technology 4. Provide multiple delivery options Software, software as service, consulting, appliance/IPS ASC01
  • 16. IBM Rational Software Conference 2009 Rational AppScan End-to-End Web Application Security REQUIREMENTS CODE BUILD QA SECURITY PRODUCTION Req’ts Definition AppScan AppScan Build AppScan Tester AppScan AppScan (security templates) Developer (scanning agent) (scan agent & Standard OnDemand (desktop) clients) (desktop) (SaaS) AppScan Enterprise / Reporting Console (enterprise-wide scanning and reporting) Security Automate Security / Security & Outsourced requirements Build security Security / compliance testing Compliance testing for defined before testing into the Compliance incorporated into Testing, security audits & design & IDE* testing in the testing & oversight, production site implementation Build Process remediation control, policy, monitoring workflows audits Application Security Best Practices Address security Security audit solutions from the start for IT Security Security for the development lifecycle ASC01
  • 17. IBM Rational Software Conference 2009 IBM Rational AppScan – Security in the SDLC CODE BUILD QA SECURITY AppScan Enterprise / Reporting Console AppScan Ent. (scanning agent) AppScan AppScan AppScan AppScan Build Ed Developer Ed QuickScan (QA clients) Enterprise user Standard Ed (web client) (scanning agent) AppScan Tester Ed (web client) (desktop) (desktop) Ounce Labs Products Rational Rational Application Software Rational Rational Rational Quality Developer Analyzer ClearCase BuildForge Manager Rational ClearQuest / Defect Management IBM Rational Web Based Training for AppScan Build security testing into Automate Security / Security / compliance testing Security & Compliance the IDE Compliance testing in the incorporated into testing & Testing, oversight, Build Process remediation workflows control, policy, audits ASC01
  • 18. IBM Rational Software Conference 2009 Who is Ounce Labs? Ounce is a proven leader in Static Code Analysis Security • Named “leader” in Gartner’s 1st Magic Quadrant for SAST (Static Application Security Testing) • Software developer founded 2002 • Headquarters: Waltham, MA • Source code security experts • Identifies security vulnerabilities in application source code Products • Automates and integrates security analysis in the SDLC • Connects source code analysis to enterprise security and GRC platforms • 4 granted source code security patents, 3 pending Technology • Superior architecture for scalable enterprise deployments • Community leadership: Multiple solutions released into open source, senior-level contributions to PCI, SANS, CWE, OWASP, and more • 150+ customers; 98% renewal rate Customers • Marquee financial, government, retail and e-commerce customers • Solution of choice for security SIs and consultant community 18 ASC01
  • 19. IBM Rational Software Conference 2009 Why has IBM acquired Ounce Labs? Ounce Labs provides application source code testing tools to help enterprises reduce risk and cost associated with online security and compliance breaches. Application security is the largest category of vulnerability disclosures (55% in 2008) Rational acquired Watchfire in 2007 to address customers’ Application Security Testing needs AppScan continues to be recognized as the leader in Dynamic Analysis Security Testing (DAST) Ounce Labs is a recognized leader in Static Analysis Security Testing (SAST) Application security markets are converging The combination of these two industry leading technologies provides the most accurate solution in the market Ounce’s technology enables Rational to fulfill our vision of moving testing earlier in the development process Continues to add to our competitive advantage in the application security testing segment Only vendor to offer complete solutions for both SAST & DAST Only vendor to offer complete integration across the software delivery lifecycle Only vendor to offer a complete IT security solution across all major domains (IBM Security Framework) Ounce is a good fit Mature technology that supports all key development technologies and languages (Java, .NET, C/C++) Excellent integrations with Rational SDLC products and for the developer – Rational’s traditional user base 19 ASC01
  • 20. IBM Rational Software Conference 2009 Application Security in: Code/Build REQUIREMENTS CODE BUILD QA SECURITY PRODUCTION Req’ts Definition AppScan Developer AppScan Build AppScan Tester AppScan Standard AppScan OnDemand (security templates) (desktop) (scanning agent) (scan agent & clients) (desktop) (SaaS) Ounce Labs Products AppScan Enterprise / Reporting Console (enterprise-wide scanning and reporting) Security requirements Automate Security / Security / compliance Security & Outsourced testing defined before design Build security Compliance testing testing incorporated Compliance Testing, for security audits & & implementation testing into the IDE in the Build Process into testing & oversight, control, production site remediation workflows policy, audits monitoring Application Security Best Practices ASC01
  • 21. IBM Rational Software Conference 2009 Dev Team 1 Scan Scan Data and Dev Team 2 Data and Reports Dev Team 5 Reports Scan Data and Reports ASE Portal Scan Scan Data and Data and Scan Reports Reports Data and Reports Dev Team 4 Dev Team 3 Security Team ASC01
  • 22. IBM Rational Software Conference 2009 IBM Rational AppScan Developer & Build Editions Web Application Security Solutions for Development The most efficient place in the SDLC to find and fix security issues Developer Solution Empowers Developers to do Security Testing Desktop IDE-Integrated Solution for Developers Also helps build a developer’s web appsec awareness Build Solution Ensures All Code is Scanned Many dev environments do automated regression tests in their regular build process Now can include Security tests in regression tests Automation-Friendly, Build time oriented solution Key Stakeholder/User – Build Engineer ASC01
  • 23. IBM Rational Software Conference 2009 Security Issues Coverage Runtime Analysis serves as Runtime Analysis serves as the “glue” between Static & the “glue” between Static & Total Potential Dynamic Analysis. It helps Dynamic Analysis. It helps correlate results and correlate results and Security Issues improve overall accuracy & improve overall accuracy & actionability actionability • Environment Configuration Issues • Environment Configuration Issues • Patch Level Issues • Patch Level Issues • Null Pointer Dereference • Null Pointer Dereference Static Dynamic • Runtime Privileges Issues • Runtime Privileges Issues • Threading Issues • Threading Issues Runtime Analysis • Authentication Issues • Authentication Issues • Code Quality Issues Analysis Analysis • Protocol Parser/Serializer Issues • Code Quality Issues • Protocol Parser/Serializer Issues • Issues in Dead Code • Issues in Dead Code • Issues in external 3rd party • Issues in external 3rd party • Insecure Crypto Functions • Insecure Crypto Functions components components • Issues in Back-End Application • Issues in Back-End Application Code (Multi-Tier Applications) Code (Multi-Tier Applications) • SQL Injection • SQL Injection • Cross Site Scripting • Cross Site Scripting Application Logic Issues Application Logic Issues • HTTP Response Splitting • HTTP Response Splitting • OS Commanding • OS Commanding • LDAP Injection • LDAP Injection •… •… ASC01
  • 24. IBM Rational Software Conference 2009 Roadmap Highlights: Code/Build Add new language support Current product only supports Java, In 2009 we will add .NET Support analysis of Web Applications built on .NET; using both black box and white box testing techniques String Analysis Provides automatic detection of user defined sanitizers – automating parts of the configuration to contain false positive issues from static analysis Included to-date as a Tech Preview; will improve accuracy and performance, modify detection methodology, and be turned on by default Enhanced Static Analysis engine Support for all Java frameworks (including Portal and services) Evolve performance, scalability and usability Responding to customer feedback to date Tighter integration with Code Quality tools (Software Analyzer and Logiscope) ASC01
  • 25. IBM Rational Software Conference 2009 Application Security in: QA REQUIREMENTS CODE BUILD QA SECURITY PRODUCTION Req’ts Definition AppScan Developer AppScan Build AppScan Tester AppScan Standard AppScan OnDemand (security templates) (desktop) (scanning agent) (scan agent & clients) (desktop) (SaaS) AppScan Enterprise / Reporting Console (enterprise-wide scanning and reporting) Security requirements Automate Security / Security / compliance Security & Outsourced testing defined before design Build security Compliance testing testing incorporated Compliance Testing, for security audits & & implementation testing into the IDE in the Build Process into testing & oversight, control, production site remediation workflows policy, audits monitoring Application Security Best Practices ASC01
  • 26. IBM Rational Software Conference 2009 Introducing AppScan Tester Edition for RQM RQM - Rational Quality Manager Embedd Security Testing into the QA Process Ideal way to scale security testing Integrated into the QA environment to enable the adoption of security testing alongside functional and performance testing Delivering the building blocks to help customers build a process to address security & compliance Leverage existing compliance mechanisms in the QA process Provides collaboration tools for security testing between development, QA and security teams The Result: Seamless integration of security testing to provide Collaboration, Automation and Reporting ASC01
  • 27. IBM Rational Software Conference 2009 Rational Quality Manager – Test Management Hub IBM Collaborative Application Lifecycle Management Rational Quality Manager Quality Dashboard Requirements Test Management and Execution Defect Management Management Create Build Manage Report Plan Tests Test Lab Results Open Platform Best Practice Processes JAZZ TEAM SERVER SAP System z, i Java Open Lifecycle Service Integrations .NET Functional Security and Testing Performance Code Compliance Web Service Testing Quality Quality homegrown ASC01
  • 28. IBM Rational Software Conference 2009 Application Security in: Security Team REQUIREMENTS CODE BUILD QA SECURITY PRODUCTION Req’ts Definition AppScan Developer AppScan Build AppScan Tester AppScan Standard AppScan OnDemand (security templates) (desktop) (scanning agent) (scan agent & clients) (desktop) (SaaS) AppScan Enterprise / Reporting Console (enterprise-wide scanning and reporting) Security requirements Automate Security / Security / compliance Security & Outsourced testing defined before design Build security Compliance testing testing incorporated Compliance Testing, for security audits & & implementation testing into the IDE in the Build Process into testing & oversight, control, production site remediation workflows policy, audits monitoring Application Security Best Practices ASC01
  • 29. IBM Rational Software Conference 2009 Advancing Web 2.0 Security: automatically auditing Adobe Flash Applications Evolution of Flash support First generation tools partially explored through Flash applications Second generation (emerging now) can fully explore and audit Flash applications Rational AppScan automatically scans Flash-based applications Is the first to introduce automatic Flash Execution (first “Second Generation” scanner) Similar to AJAX: 1st gen was parsing, 2nd gen was execution Automatically explores deep and complex Flash applications Identifies traditional, as well as Flash-specific security issues Cross-Site Flashing, Cross-Site Scripting through Flash, Phishing… Supports Flash & Flex applications Includes server-side testing of Flex applications (only scanner to support AMF protocol) Continued leadership in Flash application security Flash Execution is now a strategic & evolving component of AppScan ASC01
  • 30. IBM Rational Software Conference 2009 Extending AppScan’s lead in Web Services security testing Web Services momentum continues Enterprise Modernization allows organizations to transition legacy applications to sophisticated Web 2.0 and SOA solutions, driven by user demand Legacy applications were not designed with Web security considerations SOA deployments present a complex and rich technology heavy scanning environments Leveraging IBM’s rich investment in SOA Using established Rational SOA Tester capabilities Powerful functional & performance testing for SOA AppScan to include GSC: General SOA Client Testing Custom Web Services code Identifies business logic vulnerabilities Support complex Web Services deployments XML Signatures XML Encryption Complex Types in WSDL … ASC01
  • 31. IBM Rational Software Conference 2009 CVSS support provides industry standard severity rating Guides user through verifying that the issue is a legitimate vulnerability Integrated screenshots with explanations immediately demonstrate whether an issue truly exists, saving time and effort ASC01
  • 32. IBM Rational Software Conference 2009 The Problem: Legitimate Sites serving Malware Malware is served or linked primarily from Legitimate Sites! “Federal Travel Booking Site “TrendMicro site Spreads Malware” infected users with -Washington Post Trojan” “A large web “BusinessWeek - CIO hosting firm (IPower) website attacked and inflicted by mass “Twitter hosts malware” malware installation” worm strikes” -Net-Security - Washington Post - New York Times Flagged as the “New Biggest Problem”: WebSense: "Legitimate Sites Carry Increasing Portion Of Malware“ (Jan, '09) ScanSafe: "Web-based malware up 400%, 68% hosted on legitimate websites“ (June, '08) Blog: "Online Trust: A Thing of the Past?" (Jan, '09) X-Force: "Are Legitimate Sites the Next Malware Threat?" (Feb, '09) Breach: “SQL Injection Attacks Planting Malware on Web Sites Ranks #1 in Breach Security’s 2008 Web Hacking Incidents Database Report” (Feb, '09) ASC01
  • 33. IBM Rational Software Conference 2009 AppScan’s HTTP-Based Malware Scanning 1. Discover all content and links in a Web Application Execute JavaScript & Flash Fill forms and login sequences Analyze secure pages … 2. Analyze all content for malicious behavior indicators link1 link2 3. Compare all links to link3 comprehensive black-lists ASC01
  • 34. IBM Rational Software Conference 2009 Application Security in: Production REQUIREMENTS CODE BUILD QA SECURITY PRODUCTION Req’ts Definition AppScan Developer AppScan Build AppScan Tester AppScan Standard AppScan OnDemand (security templates) (desktop) (scanning agent) (scan agent & clients) (desktop) (SaaS) AppScan Enterprise / Reporting Console (enterprise-wide scanning and reporting) Security requirements Automate Security / Security / compliance Security & Outsourced testing defined before design Build security Compliance testing testing incorporated Compliance Testing, for security audits & & implementation testing into the IDE in the Build Process into testing & oversight, control, production site remediation workflows policy, audits monitoring Application Security Best Practices ASC01
  • 35. IBM Rational Software Conference 2009 Expanded Options for Production Testing and Defense 1. Testing solutions: – AppScan Enterprise – AppScan OnDemand – ISS Managed Security Services 2. Defensive solutions: – ISS Proventia IPS with New Web Protection – DataPower SOA Appliance 3. Combined approach – Integrated scanning and defense ASC01
  • 36. IBM Rational Software Conference 2009 Introducing expanded Rational AppScan OnDemand AppScan OnDemand: Comprehensive testing of pre-production applications Periodic assessment of applications in QA or Security Monthly scans Flexible offerings base on organization (Small/Medium/Large) AppScan OnDemand Production Site Monitoring: Continuous scanning of production Web sites for vulnerabilities that may have been introduced after the app went live Dynamic or interactive content and forms, online registrations Weekly scans The Result: Ability to address online risk without in-house resources with the faster route to actionable information Policy Testing OnDemand is also available to support website ASC01 compliance management for Privacy, Quality & Accessibility
  • 37. IBM Rational Software Conference 2009 WebSphere DataPower SOA Appliances An SOA Appliance… Creating customer value through extreme SOA connectivity, performance and security Simplifies SOA and accelerates time to value Helps secure SOA XML implementations Governs and enforces SOA/Web services policies WebSphere DataPower SOA Appliances redefine the boundaries of middleware extending the SOA Foundation with specialized, consumable, dedicated SOA appliances that combine superior performance and hardened security for SOA implementations. ASC01
  • 38. IBM Rational Software Conference 2009 Virtual Application Security Patch 1. Rational AppScan Scans Web Application, Uncovers Security Issues 2. WebSphere DataPower Rules are Auto-Created, Based on Found Issues 3. Custom protection blocks exploits on vulnerable locations, blocking where required while avoiding False Positives 4. Vulnerabilities are remediated in the next release of Web Application 2 1 3 4 ASC01
  • 39. IBM Rational Software Conference 2009 Rational/ISS Vision: Application & Network Security Ecosystem Proventia IDS/IPS Site Protector Enterprise Scanner Joint interface for Application & Network Security AppScan Agent Collaborative flow of product usage Mutual leveraging of technology ASC01
  • 40. IBM Rational Software Conference 2009 Block attacks in real-time with Proventia Web application security Intrusion prevention just got smarter with web application protection backed by the power of X-Force Virtual Patch Threat Detection & Content Analysis Web Protection Network Policy Prevention Enforcement What It Does: What It Does: What It Does: Shields vulnerabilities What It Does: Monitors and identifies Protects web applications What It Does: from exploitation Detects and prevents unencrypted personally against sophisticated Manages security policy independent of a software entire classes of threats as identifiable information (PII) application-level attacks and risks within defined patch, and enables a opposed to a specific and other confidential such as SQL Injection, segments of the network, responsible patch exploit or vulnerability. information for data awareness. XSS (Cross-site such as ActiveX management process that Also provides capability to scripting), PHP file- fingerprinting, Peer To can be adhered to without Why Important: explore data flow through the includes, CSRF (Cross- Peer, Instant Messaging, fear of a breach Eliminates need of network to help determine if any site request forgery). and tunneling. constant signature potential risks exist. Why Important: updates. Protection Why Important: Why Important: At the end of 2008, 53% includes the proprietary Why Important: Expands security Enforces network of all vulnerabilities Shellcode Heuristics (SCH) Flexible and scalable capabilities to meet both application and service disclosed during the year technology, which has an customized data search criteria; compliance requirements access based on had no vendor-supplied unbeatable track record of serves as a complement to data and threat evolution. corporate policy and patches available to protecting against zero day security strategy remedy the vulnerability governance. vulnerabilities. ASC01
  • 41. IBM Rational Software Conference 2009 2009 Roadmap Q1 New AppScan Releases AppScan Standard, Express, Developer, Build Product Translations Available for all products Japanese, Korean, Traditional Chinese, Simplified Chinese, French, Italian, and German Expanded SaaS offering Production Site Monitoring Q3 Web-based Malware Detection & Scanning AppScan-ISS SiteProtector Integration Q4 Portfolio-wide release (including Ounce) Joint ISS initiatives ASC01
  • 42. IBM Rational Software Conference 2009 ASC01 42
  • 43. IBM Rational Software Conference 2009 © Copyright IBM Corporation 2009. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. ASC01 43