SlideShare uma empresa Scribd logo
1 de 28
An Enterprise
Approach to Drupal
     Security
Help! I need to secure my Drupal site!

 How do I assure trust
 in Open Source
 software?
 Will I need a new set
 of processes and
 controls?
 What resources are
 available to me?




                                         © 2009 Acquia, Inc.
Myths of Drupal Security
 PHP is less secure than ...
 Open Source is easier to
 attack
 Lack of resources such
 documentation and
 versioning information for
 Open Source 
 There aren’t a lot of
 security resources
 available
 Security starts at the
 Drupal software




                               © 2009 Acquia, Inc.
Myths of Drupal Security
 PHP is less secure than ...   PHP is as or more secure
 Open Source is easier to      than other available
 attack                        dynamic web engines out
 Lack of resources such        there. Security is a
 documentation and             process, not a product.
 versioning information for
 Open Source
 There aren’t a lot of
 security resources




                                                © 2009 Acquia, Inc.
Myths of Drupal Security
 PHP is less secure than ...   PHP is as or more secure
 Open Source is easier to      than other available
 attack                        dynamic web engines out
 Lack of resources such        there
 documentation and             Open Source means
 versioning information for    massive collaboration,
 Open Source                   high visibility, and a large
 There aren’t a lot of         pool of resources for
 security resources
 available
 Security starts at the
 Drupal software




                                                   © 2009 Acquia, Inc.
Myths of Drupal Security
 PHP is less secure than ...   PHP is as or more secure
 Open Source is easier to      than other available
 attack                        dynamic web engines out
 Lack of resources such        there
 documentation and             Open Source means
 versioning information for    massive collaboration,
 Open Source                   high visibility, and a large
 There aren’t a lot of         pool of resources for
 security resources            vulnerability discovery and
 available                     remediation. 
 Security starts at the        Documentation exists for
 Drupal software               Open Source in many
                               different forms



                                                  © 2009 Acquia, Inc.
Myths of Drupal & Open Source Security

 PHP is less secure than ...   PHP is as or more secure
 Open Source is easier to      than other available
 attack                        dynamic web engines out
 Lack of resources such        there
 documentation and             Open Source means
 versioning information for    massive collaboration,
 Open Source                   high visibility, and a large
 There aren’t a lot of         pool of resources for
 security resources            vulnerability discovery and
 available                     remediation. 
 Security starts at the        Documentation exists for
 Drupal software               Open Source in many
                               different forms
                               Publications from
                               government and
                               commercial sources
                                                  © 2009 Acquia, Inc.
Myths of Drupal & Open Source Security

 PHP is less secure than ...   PHP is as or more secure
 Open Source is easier to      than other available
 attack                        dynamic web engines out
 Lack of resources such        there
 documentation and             Open Source means
 versioning information for    massive collaboration,
 Open Source                   high visibility, and a large
 There aren’t a lot of         pool of resources for
 security resources            vulnerability discovery and
 available                     remediation. 
 Security starts at the        Documentation exists for
 Drupal software               Open Source in many
                               different forms
                               Publications from
                               government and
                               commercial sources
                                                  © 2009 Acquia, Inc.
Components of successful security
 Clear system
 boundaries
 A thorough risk
 analysis
 Security controls that
 map to the risks you
 identify
 Validation of all of
 your controls
 A plan to remediate
 open issues and
 mitigate acceptable
 risks
                                    © 2009 Acquia, Inc.
Clear System Boundaries

  Limits the scope of
  the system that you
  are validating
  Apply controls only to
  the elements under
  validation
  Leverage previously
  secured components
  and infrastructure
A thorough risk analysis

  Code analysis for all
  custom code
  Theming focus
  Penetration testing
  Vulnerability
  assessment
  Gap Analysis
Developing the right controls

 Don’t over engineer
 your controls
 Leverage your existing
 policies & procedures
 Focus on the entire
 system
 Define validation
 plans in parallel with
 controls
 Take advantage of the
 Drupal community
Security controls

  Types
    Preventative
    Detective
    Corrective
    Recovery
  Domains
    Administrative
    Logical
    Physical
Firewalls

 One layer of defense,
 preventative logical
 control
 Configuration
 management
 Outgoing as well as
 incoming ACLs!
 Limit management
 access to single IP or
 fewest possible, SSH
 not Telnet
Intrusion Detection

 Logical Detective
 control
 Rules must be up to
 date
 Configuration is key;
 must be able to see
 the traffic
 Vendor specific
 solutions provide a
 variety of options for
 action
Validation of controls

  Identify they have
  been implemented
  Develop testing for
  each control deployed
  Document pass/fail
  status of each control
Remediation plan

  Plan of Action:
    You don’t need to
    address every risk
    you identify
    Some will be
    acceptable for
    launch
  Remediation change
  management
  Validate remediation
Tools and Processes

  Integrate reviews early
  in your system lifecycle
  Use a mix of tools to
  validate your controls
    Coding standards
    Code analysis
    Functional tests
    Scanners
    Fuzzers
  Leverage available
  information
Coding Standards

  Start with the Drupal
  community standards
  Use Drupal APIs to
  avoid common risks
  Establish your own
  standards to further
  secure your code
  Watch adjacent
  communities for best
  practices
Code Analysis

  Ensure strict API
  syntactical adherence
  Review all custom code
  from security
  perspective
  Hook to validation
  testing
  Any variance should be
  documented
Functional Tests

  Application process
  testing
  Usual suspects:
    Forms
    Fields
    Variable handling
    App-Server trust
Scanners

  Signature based
  detection of
  vulnerabilities
  False positives
  Documentation of all
  valid results
  Examples:
    Websecurify
    Skipfish
    Grendel-scan
Fuzzers

  Bombard your app with
  possible data
  submissions
  Find strings that break
  app
  Fix your app
A collaborative approach to security

 Incorporate security
 expertise into your
 development team
 Collaborate on
 controls and
 remediation
 Include security
 activities in your
 project milestones
 Address security
 issues with each
 development iteration
Take advantage of available support

 Community security
 patches and bulletins
   Clear processes for
   addressing
   vulnerabilities
 Commercial vendors
   Formal channels to
   report and resolve
   issues
   Guaranteed levels of
   response
   Addresses many of
   the concerns of
   security professionals
Bringing the process to completion

 Verify

 Review
   Fix those errors!
 Finalize
   Get sign off by
   process owners
 Submit
   Maintain records
Completing the process

 Launch
 Follow your plan to
 remediate issues and
 acceptable risks
 Maintain your controls
 Ensure compliance
 Perform reviews
What did you think?
                 Step 1)
  Locate this session on the DCSF site
 http://sf2010.drupal.org/conference/
                schedule

                Step 2)
     Click the “Take Survey” link

Mais conteúdo relacionado

Mais procurados

Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsAmazon Web Services
 
"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark ShermanRinaldi Rampen
 
Dev week cloud world conf2021
Dev week cloud world conf2021Dev week cloud world conf2021
Dev week cloud world conf2021Archana Joshi
 
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-upEnterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-upDileep Kalidindi
 
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...Sonatype
 
OWASP - Building Secure Web Applications
OWASP - Building Secure Web ApplicationsOWASP - Building Secure Web Applications
OWASP - Building Secure Web Applicationsalexbe
 
DevSecOps, The Good, Bad, and Ugly
DevSecOps, The Good, Bad, and UglyDevSecOps, The Good, Bad, and Ugly
DevSecOps, The Good, Bad, and Ugly4ndersonLin
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeDigital Defense Inc
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101Jannis Kirschner
 
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Bringing Security Testing to Development: How to Enable Developers to Act as ...Bringing Security Testing to Development: How to Enable Developers to Act as ...
Bringing Security Testing to Development: How to Enable Developers to Act as ...Achim D. Brucker
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsUlf Mattsson
 
AllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensorAllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensorjtmelton
 
The path of secure software by Katy Anton
The path of secure software by Katy AntonThe path of secure software by Katy Anton
The path of secure software by Katy AntonDevSecCon
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
Finacle - Secure Coding Practices
Finacle - Secure Coding PracticesFinacle - Secure Coding Practices
Finacle - Secure Coding PracticesInfosys Finacle
 

Mais procurados (20)

Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman
 
Dev week cloud world conf2021
Dev week cloud world conf2021Dev week cloud world conf2021
Dev week cloud world conf2021
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
 
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-upEnterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
 
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
 
OWASP - Building Secure Web Applications
OWASP - Building Secure Web ApplicationsOWASP - Building Secure Web Applications
OWASP - Building Secure Web Applications
 
DevSecOps, The Good, Bad, and Ugly
DevSecOps, The Good, Bad, and UglyDevSecOps, The Good, Bad, and Ugly
DevSecOps, The Good, Bad, and Ugly
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Bringing Security Testing to Development: How to Enable Developers to Act as ...Bringing Security Testing to Development: How to Enable Developers to Act as ...
Bringing Security Testing to Development: How to Enable Developers to Act as ...
 
5 Important Secure Coding Practices
5 Important Secure Coding Practices5 Important Secure Coding Practices
5 Important Secure Coding Practices
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
 
AllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensorAllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensor
 
Secure coding-guidelines
Secure coding-guidelinesSecure coding-guidelines
Secure coding-guidelines
 
The path of secure software by Katy Anton
The path of secure software by Katy AntonThe path of secure software by Katy Anton
The path of secure software by Katy Anton
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
Finacle - Secure Coding Practices
Finacle - Secure Coding PracticesFinacle - Secure Coding Practices
Finacle - Secure Coding Practices
 

Semelhante a An enterprise approach to drupal security

Certification and Accreditation for Your Open Government Applications
Certification and Accreditation for Your Open Government ApplicationsCertification and Accreditation for Your Open Government Applications
Certification and Accreditation for Your Open Government ApplicationsAcquia
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryBlack Duck by Synopsys
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryTim Mackey
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?F-Secure Corporation
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceTej Luthra
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Jeremy Brown
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycleEnov8
 
OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideLudovic Petit
 
Open source technology
Open source technologyOpen source technology
Open source technologyRohit Kumar
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application SecurityOpSource
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application SecurityOpSource
 
First Software Security Netherlands Meet Up - Delft - 18 May 2017
First Software Security Netherlands Meet Up - Delft - 18 May 2017First Software Security Netherlands Meet Up - Delft - 18 May 2017
First Software Security Netherlands Meet Up - Delft - 18 May 2017gmaran23
 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application securityRogue Wave Software
 
Open source technology
Open source technologyOpen source technology
Open source technologyaparnaz1
 
Security Validation as Code.pdf
Security Validation as Code.pdfSecurity Validation as Code.pdf
Security Validation as Code.pdfPrancer Io
 
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...John Kinsella
 

Semelhante a An enterprise approach to drupal security (20)

Certification and Accreditation for Your Open Government Applications
Certification and Accreditation for Your Open Government ApplicationsCertification and Accreditation for Your Open Government Applications
Certification and Accreditation for Your Open Government Applications
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle
 
OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference Guide
 
DevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docxDevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docx
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application Security
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application Security
 
The Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docxThe Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docx
 
First Software Security Netherlands Meet Up - Delft - 18 May 2017
First Software Security Netherlands Meet Up - Delft - 18 May 2017First Software Security Netherlands Meet Up - Delft - 18 May 2017
First Software Security Netherlands Meet Up - Delft - 18 May 2017
 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application security
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
Security Validation as Code.pdf
Security Validation as Code.pdfSecurity Validation as Code.pdf
Security Validation as Code.pdf
 
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
 
Autos, Wi-Fi, and IoT
Autos, Wi-Fi, and IoTAutos, Wi-Fi, and IoT
Autos, Wi-Fi, and IoT
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

An enterprise approach to drupal security

  • 1. An Enterprise Approach to Drupal Security
  • 2. Help! I need to secure my Drupal site! How do I assure trust in Open Source software? Will I need a new set of processes and controls? What resources are available to me? © 2009 Acquia, Inc.
  • 3. Myths of Drupal Security PHP is less secure than ... Open Source is easier to attack Lack of resources such documentation and versioning information for Open Source  There aren’t a lot of security resources available Security starts at the Drupal software © 2009 Acquia, Inc.
  • 4. Myths of Drupal Security PHP is less secure than ... PHP is as or more secure Open Source is easier to than other available attack dynamic web engines out Lack of resources such there. Security is a documentation and process, not a product. versioning information for Open Source There aren’t a lot of security resources © 2009 Acquia, Inc.
  • 5. Myths of Drupal Security PHP is less secure than ... PHP is as or more secure Open Source is easier to than other available attack dynamic web engines out Lack of resources such there documentation and Open Source means versioning information for massive collaboration, Open Source high visibility, and a large There aren’t a lot of pool of resources for security resources available Security starts at the Drupal software © 2009 Acquia, Inc.
  • 6. Myths of Drupal Security PHP is less secure than ... PHP is as or more secure Open Source is easier to than other available attack dynamic web engines out Lack of resources such there documentation and Open Source means versioning information for massive collaboration, Open Source high visibility, and a large There aren’t a lot of pool of resources for security resources vulnerability discovery and available remediation.  Security starts at the Documentation exists for Drupal software Open Source in many different forms © 2009 Acquia, Inc.
  • 7. Myths of Drupal & Open Source Security PHP is less secure than ... PHP is as or more secure Open Source is easier to than other available attack dynamic web engines out Lack of resources such there documentation and Open Source means versioning information for massive collaboration, Open Source high visibility, and a large There aren’t a lot of pool of resources for security resources vulnerability discovery and available remediation.  Security starts at the Documentation exists for Drupal software Open Source in many different forms Publications from government and commercial sources © 2009 Acquia, Inc.
  • 8. Myths of Drupal & Open Source Security PHP is less secure than ... PHP is as or more secure Open Source is easier to than other available attack dynamic web engines out Lack of resources such there documentation and Open Source means versioning information for massive collaboration, Open Source high visibility, and a large There aren’t a lot of pool of resources for security resources vulnerability discovery and available remediation.  Security starts at the Documentation exists for Drupal software Open Source in many different forms Publications from government and commercial sources © 2009 Acquia, Inc.
  • 9. Components of successful security Clear system boundaries A thorough risk analysis Security controls that map to the risks you identify Validation of all of your controls A plan to remediate open issues and mitigate acceptable risks © 2009 Acquia, Inc.
  • 10. Clear System Boundaries Limits the scope of the system that you are validating Apply controls only to the elements under validation Leverage previously secured components and infrastructure
  • 11. A thorough risk analysis Code analysis for all custom code Theming focus Penetration testing Vulnerability assessment Gap Analysis
  • 12. Developing the right controls Don’t over engineer your controls Leverage your existing policies & procedures Focus on the entire system Define validation plans in parallel with controls Take advantage of the Drupal community
  • 13. Security controls Types Preventative Detective Corrective Recovery Domains Administrative Logical Physical
  • 14. Firewalls One layer of defense, preventative logical control Configuration management Outgoing as well as incoming ACLs! Limit management access to single IP or fewest possible, SSH not Telnet
  • 15. Intrusion Detection Logical Detective control Rules must be up to date Configuration is key; must be able to see the traffic Vendor specific solutions provide a variety of options for action
  • 16. Validation of controls Identify they have been implemented Develop testing for each control deployed Document pass/fail status of each control
  • 17. Remediation plan Plan of Action: You don’t need to address every risk you identify Some will be acceptable for launch Remediation change management Validate remediation
  • 18. Tools and Processes Integrate reviews early in your system lifecycle Use a mix of tools to validate your controls Coding standards Code analysis Functional tests Scanners Fuzzers Leverage available information
  • 19. Coding Standards Start with the Drupal community standards Use Drupal APIs to avoid common risks Establish your own standards to further secure your code Watch adjacent communities for best practices
  • 20. Code Analysis Ensure strict API syntactical adherence Review all custom code from security perspective Hook to validation testing Any variance should be documented
  • 21. Functional Tests Application process testing Usual suspects: Forms Fields Variable handling App-Server trust
  • 22. Scanners Signature based detection of vulnerabilities False positives Documentation of all valid results Examples: Websecurify Skipfish Grendel-scan
  • 23. Fuzzers Bombard your app with possible data submissions Find strings that break app Fix your app
  • 24. A collaborative approach to security Incorporate security expertise into your development team Collaborate on controls and remediation Include security activities in your project milestones Address security issues with each development iteration
  • 25. Take advantage of available support Community security patches and bulletins Clear processes for addressing vulnerabilities Commercial vendors Formal channels to report and resolve issues Guaranteed levels of response Addresses many of the concerns of security professionals
  • 26. Bringing the process to completion Verify Review Fix those errors! Finalize Get sign off by process owners Submit Maintain records
  • 27. Completing the process Launch Follow your plan to remediate issues and acceptable risks Maintain your controls Ensure compliance Perform reviews
  • 28. What did you think? Step 1) Locate this session on the DCSF site  http://sf2010.drupal.org/conference/ schedule Step 2) Click the “Take Survey” link

Notas do Editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n