SlideShare uma empresa Scribd logo
1 de 61
Ensure Software Security
already during development
Lucas v. Stockhausen
Software Security Consultant
lvonstockhausen@hp.com
+49-1520 1898430
HP Enterprise Security
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Some Explanations




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Definition Hacker (Wikipedia)
         Hacker:
         A person who enjoys exploring the details of
         (programmable) systems and stretching their
         capabilities, as opposed to most users, who
         prefer to learn only the minimum necessary.


3   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Heise Newsletter 25.1.2012




                       3 % of the public available IP adresses
                       ~5000 open Video Systems.
                       Continous exploit from there.



                  http://www.h-online.com/security/news/item/Video-conferencing-systems-as-spying-tools-1421346.html
    © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
4
No “Defence in Depth” means….




5   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Heise Newsletter 26.1.2012




      Attack from 3 IP Adresses to US railway.
      No big damage – just 15 min delay.




                  http://www.h-online.com/security/news/item/Hackers-may-have-disrupted-railway-computers-and-schedules-1422666.html
    © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
6
7   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
How can HP Fortify help?
By 2016 40% of enterprises will make proof of
independent security testing a precondition
for using any type of cloud services




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Today’s approach > expensive, reactive


                                                                                       IT deploys the
                                                                                          insecure
                                                                                                                           2
                                                               1                                                                                               3
                                                                                          software
                                                                                                                                        We are breached or
               Somebody builds                                                                                                         pay to have someone
              insecure software                                                                                                          tell us our code is


                                                                                                                           4
                                                                                                                                              insecure

                                                                                    We convince &
                                                                                   pay the developer
                                                                                        to fix it


9   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Software Development Today

     Small coding errors can have a
      big effect on security
     Typical software development
      practices don’t address the
      problem
     As a group, developers tend to
      make the same security
      mistakes over and over
10   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Why it doesn’t work
30x more costly to secure in production
                                                                                                                                               30X




                                                                                                                                    15X
                 Cost




                                                                                                    10X

                                                                      5X
                                    2X

                           Requirements                         Coding                     Integration/                           System    Production
                                                                                        component testing                         testing

                 After an application is released into Production, it costs 30x more than during design.
                 Source: NIST

11   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The right approach > systematic, proactive

                        Embed security into SDLC
                         development process
                                                                           1                                                                  2
                                                                                                               Leverage Security Gate to validate
                                                                                                                resiliency of internal or external
               In-house       Outsourced Commercial Open source                                                      code before Production




                                                                                                                                                                3
                                                                                                                                        Monitor and protect software
                                                                     Improve SDLC policies                                                 running in Production




                                                             This is application security
12   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Software must be Fortify'd
                         Fortify Source Code                                                    Fortify Security                                   Fortify RTA
                                     Analysis                                                            Scope
                                                                                                HP WebInspect
                        Source Code Security Audits                                                                                           Run-Time Protection


        PLAN                              DESIGN                                  CODE                            FUNCTIONAL            ACCEPTANCE         DEPLOY
                                                                                                                     TEST                  TEST

                  Software Inventory                                                                                        Collaboration Module

                                                                        Governance Module



                                                                                         Fortify SSC Server
                                                                      Software Security Metrics and Reporting
13   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Static Analysis




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Example Process
 Development Teams                                                                                                                      Security

                                         2. Audit
                      AWB                                                                                                                Monitor          CM
                                                                                         Defect Tracking System

        Project Security                                                                                                                                   CISO
             Lead                                                                      Source Code Repository(s)

               3. Assign                                                                                                                    5. Validate
                                                                                           Central Build Server(s)
                         CM                                                                                                                           AWB
                                                                                                                                                      AWB
                                                                                   Build Tool                           Fortify SCA
          Development                                                                                                                                Security Auditor
            Manager                                                                                                1. Identify

                                                                                   Fortify CM
                                   4. Fix
                                                                                              Fortify SSC Server
                       IDE

            Developer
15   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Auditing – Different Possibilities

            Auditworkbench                                                                                                    Collaboration Module
            IDE - VS , Eclipse                                                                                                (Web-base Auditworkbench)




                        Clicking on the issue and being guided through
                        the source code is VERY important for
                        understanding and fixing a vulnerability


16   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Auditing (AWB and IDE) - Overview                                                                                                       Functions and
                                                                                                                                        Rulewriting wizard (only
            Filtering                                                                                                                   in AWB)
                                              Priorization                              Categorization




                                                                                                                          Overview



     Issue -
     Groups




17   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Auditing (AWB and IDE) – Trace the issue




Sourcecode
                                                                                                                                        Diagram
Analysis Trace




18   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Auditing (AWB and IDE) – Training on the job



                                                  Detailed description of the issue




19   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Auditing (AWB and IDE) – Training on the job



                                                                Detailed recommendation to fix the issue




20   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Auditing (AWB and IDE) - Result



                                                  Store Analysis                                        See other comments and make
                                                                                                        comments yourself




                          File a bug

21   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Dynamic Analysis




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
23
          INTRODUCTION TO WEBINSPECT
                                                                                                   WebInspect is a comprehensive Dynamic
                                                                                                   Application Security Testing (DAST) solution used
                                                                                                   by IT Security auditors and penetration testers to
                                                                                                   detect, classify and report discrete application
                                                                                                   vulnerabilities.
                                                                                                   WebInspect dynamically interacts with your
                                                                                                   application enumerating application parameters
                                                                                                   and server configuration characteristics which can
                                                                                                   be exploited by a malicious attacker.
                                                                                                   WebInspect employs “ethical” attack methods
                                                                                                   which discover and confirm vulnerabilities without
                                                                                                   actually exploiting them.

                                                                                                    Monthly WebInspect Technical Demonstration:
                                                                                                    http://www.hp.com/go/techdemos

     23   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Live scan visualization                                                                                                     Live Scan
     Start remediation of vuln’s immediately
                                                                                                                            Dashboard


                                                                                                                                                              Live Scan
                                                                                                                                                              Statistics
         Site tree




                                                                                                                                            Detailed Attack
     Excluded and                                                                                                                               Table
     Allowed Hosts
         Section
                                                                                                                                 Vulnerabilities
24                                                                                                                         found in application
      © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Grey Box Testing




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
27   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Integrated Analysis

                                                                                                             Application




                                          Real-time link


             • Find More
             • Fix Faster
29   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Real Time Analysis




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Fortify RTA : Components




                                                                                                                RTA
                                                                                                                             Console




31   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SSC
Software Security Center




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Fortify SSC Server – Risk Management
 Track, measure and understand software security risk
 Flexible reporting
            Dashboards to details                                                     - Metrics that matter
            Snapshots and trends                                                      - Easy to customize




33   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Fortify SSC Server – Risk Management II
 Track, measure and understand software security risk
 Centralized management of software security
            Software security policy                                       - Multiple projects
            Real-time alerts                                               - Enterprise Security Rules management




34   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Fortify Server – Risk Management III
 Track, measure and understand software security risk
 Collaborative Auditing and Remediation
            Web Base Auditworkbench like interface
            User Assignment




35   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
How can HP Fortify help?




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Software must be Fortify'd
                         Fortify Source Code                                                    Fortify Security                                   Fortify RTA
                                     Analysis                                                            Scope
                                                                                                HP WebInspect
                        Source Code Security Audits                                                                                           Run-Time Protection


        PLAN                              DESIGN                                  CODE                            FUNCTIONAL            ACCEPTANCE         DEPLOY
                                                                                                                     TEST                  TEST

                  Software Inventory                                                                                        Collaboration Module

                                                                        Governance Module



                                                                                         Fortify SSC Server
                                                                      Software Security Metrics and Reporting
37   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
And the knowledge?




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
526 Categories to Date
     SRG updates the Fortify Secure Coding Rulepacks to identify the latest categories of software vulnerabilities on
     a quarterly basis
                                  Growth in Vulnerability Categories
                                            2005 – 2012                                                                                         Examples of Categories
     600                                                                                                                                       •Command Injection
                                                                                                                                               •Cross-Build Injection
     500                                                                                                                                       •Cross-Site Request Forgery
                                                                                                                                               •Cross-Site Scripting
     400                                                                                                                                       •HTTP Response Splitting
                                                                                                                                               •JavaScript Hijacking
     300                                                                                                                                       •LDAP Injection
                                                                                                                                               •Privacy Violation
                                                                                                                                               •Session Fixation
     200
                                                                                                                                               •SQL Injection
                                                                                                                                               •System Information Leak
     100
                                                                                                                                               •Unhandled Exception
                                                                                                                                               For a complete list, go to
       0                                                                                                                                       http://www.hpenterprisesecurity.com/vulncat/e
                                                                                                                                               n/vulncat/index.html
        1

                  3

                           1

                                     3

                                              1

                                                        3

                                                                  1

                                                                           3

                                                                                     1

                                                                                              3

                                                                                                        1

                                                                                                                 3

                                                                                                                           1

                                                                                                                                     3

                                                                                                                                           1
39    © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
       Q

                 Q

                          Q

                                    Q

                                             Q

                                                       Q

                                                                 Q

                                                                          Q

                                                                                    Q

                                                                                             Q

                                                                                                       Q

                                                                                                                Q

                                                                                                                          Q

                                                                                                                                    Q

                                                                                                                                          Q
     05

             05

                      06

                                06

                                          07

                                                   07

                                                             08

                                                                      08

                                                                                09

                                                                                         09

                                                                                                   10

                                                                                                            10

                                                                                                                      11

                                                                                                                                11

                                                                                                                                         12
21 Languages to Date
     SRG leads the industry in support for the broadest array of programming languages


                                      Growth in Language Support
                                             2005 – 2012                                                                                         Language Support
     25
                                                                                                                                              •ABAB           •XML/HTML
                                                                                                                                              •Actionscript   •Classic ASP
     20
                                                                                                                                              •ASP.NET        •JSP
                                                                                                                                              •Java           •PHP
     15                                                                                                                                       •C              •Python
                                                                                                                                              •C++            •VB.NET
     10                                                                                                                                       •C#             •VBScript
                                                                                                                                              •COBOL          •VB6
      5                                                                                                                                       •Cold Fusion
                                                                                                                                              •T-SQL
      0                                                                                                                                       •Objective C
                                                                                                                                              •PL/SQL
       1

                 3

                          1

                                    3

                                             1

                                                       3

                                                                1

                                                                          3

                                                                                   1

                                                                                             3

                                                                                                      1

                                                                                                                3

                                                                                                                         1

                                                                                                                                   3

                                                                                                                                          1
      Q

                Q

                         Q

                                   Q

                                            Q

                                                      Q

                                                               Q

                                                                         Q

                                                                                  Q

                                                                                            Q

                                                                                                     Q

                                                                                                               Q

                                                                                                                        Q

                                                                                                                                  Q

                                                                                                                                         Q
     05

            05

                     06

                               06

                                         07

                                                  07

                                                            08

                                                                     08

                                                                              09

                                                                                        09

                                                                                                 10

                                                                                                           10

                                                                                                                     11

                                                                                                                              11

                                                                                                                                        12
                                                                                                                                              •JavaScript
40   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
                                                                                                                                                /AJAX
710,000+ APIs to Date
     SRG builds extensive support for the packages and frameworks used today, resulting in support for over
     710,000 APIs over 526 vulnerability categories and 21 languages
                                                        Growth in API Support
                                                            2005 – 2012                                                                               Sample Packages
     800.000
                                                                                                                                                   •JDK 1.4, 1.5, 1.6
     700.000
                                                                                                                                                   •Apache Struts 1.x, 2.x
     600.000                                                                                                                                       •Hibernate 2.x, 3.x
     500.000                                                                                                                                       •Spring 1.x, 2.x

     400.000                                                                                                                                       •JSF 1.x
                                                                                                                                                   •.NET 1.1, 2.0, 3.0, 3.5
     300.000
                                                                                                                                                   •Microsoft Practices Enterprise
     200.000                                                                                                                                       Library
     100.000                                                                                                                                       •NHibernate 1.x
               0                                                                                                                                   •Spring MVC
                                                                                                                                                   •Google GWT
                1

                         3

                                   1

                                            3

                                                     1

                                                               3

                                                                        1

                                                                                 3

                                                                                           1

                                                                                                    3

                                                                                                             1

                                                                                                                       3

                                                                                                                                1

                                                                                                                                          3

                                                                                                                                               1
               Q

                        Q

                                  Q

                                           Q

                                                    Q

                                                              Q

                                                                       Q

                                                                                Q

                                                                                          Q

                                                                                                   Q

                                                                                                            Q

                                                                                                                      Q

                                                                                                                               Q

                                                                                                                                         Q

                                                                                                                                              Q
           05

                    05

                              06

                                       06

                                                 07

                                                          07

                                                                   08

                                                                            08

                                                                                      09

                                                                                               09

                                                                                                        10

                                                                                                                  10

                                                                                                                           11

                                                                                                                                     11

                                                                                                                                          12
41    © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
                                                                                                                                                   •Java Webservices
How to use?




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Security in the Development Lifecycle




 43   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Maturity Models




44   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Four high-level Disciplines

 All security-related activities mapped under 4 Disciplines, each
  representing a group of related business functions


               Alignment &                                        Requirements &                                             Verification &       Deployment &
               Governance                                             Design                                                  Assessment           Operations

Activities related to                                      Activities related to the                              Activities related to       Activities related to
security program                                           product conception and                                 reviewing, testing, and     knowledge transfer
management and cross-                                      software design                                        validating software         and maintenance of
cutting organizational                                     processes                                                                          running software
concerns


45   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
What’s under each Discipline?
     The 4 Disciplines are high-level categories for activities
              Three security Functions under each Discipline are the specific silos for improvement within an
                organization
                    Alignment &                              Requirements &                                Verification &               Deployment &
                    Governance                                   Design                                     Assessment                   Operations
                                                                                                                                                       Disciplines

                                                                                                                                                        Functions




46   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Security Research – Fortify SSA Maturity Model
                                              Initiate               Define                 Design                Develop                 Test          Implement               Operate
                                                                                                         Education & Guidance
                Alignment &
                Governance                                                                             Standards & Compliance
                                                                                                           Strategic Planning
                                                                          Threat Modeling
              Requirements &
                  Design                       Security Requirements
                                                                         Defensive Design
                                                                                              Architecture Review
               Verification &
                                                                                                                Code Review
                Assessment
                                                                                                                                    Security Testing
                                                                                                                                                                              Vulnerability
                                                                                                                                                                              Management
               Deployment &                                                                                                                            Infrastructure
                Operations                                                                                                                               Hardening
                                                                                                                                                 Operational Enablement
                                                                                                                     SCA

                                                                                                                                        WebInspect
                 Fortify SSC
                                                                                                                                                                        RTA
47                                                                                                           Fortify SSC Server
     © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SSA Scorecard
        Blank                                                    Industry                                                            Enterprise                                   Prioritized
      Scorecard                                                Best Practices                                                         Scoring                                     Roadmap
Objective 3



Objective 2                                                                                                                                   8                                     4
                             7                                                                                 6                                          2
Objective 1                                                                                                                                                            5
                                                              1                3
Objective 0
                          Education       Standard         Planning        Threat Md         Sec Req       Def Design         Arch Rev      Code Rev   Sec Testing   Vul Mgmt   Infr Harden   Ops Enable
                                      Governance                                     Requirements                                         Verification                      Deployment
                                      & Alignment                                      & Design                                          & Assessment                       & Operations
 48   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SSA Best Practice Approach

 Key Principles
             Rapid identification and remediation of critical vulnerabilities
                        • Don‟t “forget to fix” or “boil the ocean”
             Prevent introduction of new vulnerabilities
                        • Integrate into existing SDLC with minimal process changes
                        • Provide flexibility to integrate with new SDL as it rolls-out
             Provide support for the developers
                        • Training in the context of their own code base
                        • Mentoring as required
             Monitor and control
                        • Automate gathering of vulnerability statistics and publish
                        • Enforcement via security gate
             Continuous Improvement




49   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

                                                                                                                                        49
Goals and benefits for Software Security
Assurance SSA


A successful software security initiative leads to:
Measurably reduced risk from existing applications
A controlled process for preventing vulnerabilities in new releases
Reduced costs, delays, and wasted effort from emergency bug fixes and
    incident clean-up




57   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Success is foreseeing failure.
58
                                                                                           – Henry Petroski
     © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank you
 Lucas v. Stockhausen
 lvonstockhausen@hp.com
 +49-1520 1898430




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Backup Slides




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
RAST is the key to correlation


     URL: www.
     sales.company.com

                                                                               File: NewClass.java                                      File: NewClass.java
                                                                               Line: 27                                                 Line: 27

     ID: 234                                                                       ID: 234

                                                                                                                                        Source Code: <java.sql.
                                                                                                                                           Connection.xxx>




61   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
ROI




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The Breach



The biggest ROI is no breach
No regulatory costs
No brand reputation
…

Hard to measure if it never happened to you before.




63   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Fixing Bugs Earlier in the Lifecycle

                                                                             Cost of Fixing One Vulnerability
                                                                  Based On The Stage It Was Identified

                 $15.000
                                                                                                                                                  $14,102

                 $12.000


                   $9.000
                                                                                                                                    $7,136
                   $6.000


                   $3.000

                                                                           $455                           $977
                                             $139
                             $0
                                           Requirements                      Design                       Coding                        Testing   Maintenance
64   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Example: Cost of Fixing Critical Defects

     The following case study provides an example of the savings generated by using
     source code analysis to find vulnerabilities earlier in the SDLC



                                                          •       Sample Application Size:                                               2 Million LOC
              Application



                                                          •       Defects Identified during SCA:                                        1,600
         Vulnerabilities
      Identified Using SCA
                                                          •       Defects Deemed Critical                                               200



65   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Example: Cost of Fixing Critical Defects
                      Cost of Fixing Vulnerabilities Early                                                                               Cost of Fixing Vulnerabilities Later


                               Critical Bugs           Cost of Fixing 1              Cost of Fixing                                           Critical Bugs   Cost of Fixing   Cost of Fixing
        Stage                                                                                                                  Stage
                                Identified                   Bug                       All Bugs                                                Identified        1 Bug           All Bugs


     Requirements                                               $139                                                      Requirements                            $139


        Design                                                  $455                                                          Design                              $455

        Coding                        200                       $977                     $195,400                             Coding                              $977


        Testing                                               $7,136                                                          Testing              50            $7,136          $356,800


     Maintenance                                              $14,102                                                      Maintenance            150            $14,102        $2,115,300


         Total                       200                                                $195,400                               Total              200                           $2,472,100




66
                                  Identifying the critical bugs earlier in the lifecycle reduced costs by $2.3MM
      © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Quiz




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Quiz

     String userName = ctx.getAuthenticatedUserName();
     String itemName = request.getParameter("itemName");
     String query = "SELECT * FROM items WHERE owner = '"
     + userName + "' AND itemname = „”
     + itemName + “„”;
     ResultSet rs = stmt.execute(query);


                                                  Username = lucas
                                                  Itemname = x’ or 1=1; --

68   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

                                                                                                                                        68
Quiz - Solution

     String userName = ctx.getAuthenticatedUserName();
     String itemName = request.getParameter("itemName");
     String query = "SELECT * FROM items WHERE owner = '"
     + lucas + "' AND itemname = „”
     + x’ or 1=1; -- + “„”;
     ResultSet rs = stmt.execute(query);


                                                  Username = lucas
                                                  Itemname = x’ or 1=1; --

69   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

                                                                                                                                        69
Quiz - Solution

     SELECT * FROM items WHERE owner = „lucas' AND itemname = „x’ or
      1=1; -- „”;




                                    Username = lucas
                                    Itemname = x’ or 1=1; --


70   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

                                                                                                                                        70

Mais conteúdo relacionado

Mais procurados

Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to SecurityDr. Ahmed Al Zaidy
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application SecurityDr. Ahmed Al Zaidy
 
Proposal for IT Security Team
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security TeamRishabh Gupta
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin RowneySymantec
 
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportGroup of company MUK
 
The Need For Open Software Security Standards In A Mobile And Cloudy World
The Need For Open Software Security Standards In A Mobile And Cloudy WorldThe Need For Open Software Security Standards In A Mobile And Cloudy World
The Need For Open Software Security Standards In A Mobile And Cloudy WorldDenim Group
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security LandscapeArrow ECS UK
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec UbiquitySymantec
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 blior mazor
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 

Mais procurados (20)

Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
Proposal for IT Security Team
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security Team
 
Devsec ops
Devsec opsDevsec ops
Devsec ops
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
 
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
 
The Need For Open Software Security Standards In A Mobile And Cloudy World
The Need For Open Software Security Standards In A Mobile And Cloudy WorldThe Need For Open Software Security Standards In A Mobile And Cloudy World
The Need For Open Software Security Standards In A Mobile And Cloudy World
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 

Destaque

Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Nagaraju Repala
 
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...Denim Group
 
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?Denim Group
 
Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...Kevin Fealey
 
Poster Analysis Source Code
Poster Analysis Source CodePoster Analysis Source Code
Poster Analysis Source Codekirstysals
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Marco Morana
 
DSS ITSEC 2013 Conference 07.11.2013 - Security in High Risk Environment
DSS ITSEC 2013 Conference 07.11.2013  - Security in High Risk EnvironmentDSS ITSEC 2013 Conference 07.11.2013  - Security in High Risk Environment
DSS ITSEC 2013 Conference 07.11.2013 - Security in High Risk EnvironmentAndris Soroka
 
Software Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity ModelsSoftware Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity ModelsMarco Morana
 
BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014
BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014
BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014m1splacedsoul
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Denim Group
 
SDLC Transformation-Point of View
SDLC Transformation-Point of ViewSDLC Transformation-Point of View
SDLC Transformation-Point of ViewBob Sanders
 
Securing your web apps before they hurt the organization
Securing your web apps before they hurt the organizationSecuring your web apps before they hurt the organization
Securing your web apps before they hurt the organizationAntonio Fontes
 
Web Applications Security Assessment In The Portuguese World Wide Web Panorama
Web Applications Security Assessment In The Portuguese World Wide Web PanoramaWeb Applications Security Assessment In The Portuguese World Wide Web Panorama
Web Applications Security Assessment In The Portuguese World Wide Web Panoramanfteodoro
 
Washington Mutual Bank's Collapse Under An Audit Perspective
 Washington Mutual Bank's  Collapse Under An Audit Perspective Washington Mutual Bank's  Collapse Under An Audit Perspective
Washington Mutual Bank's Collapse Under An Audit Perspectivehong_nona
 
KSA Business Intelligence Qualifications
KSA Business Intelligence QualificationsKSA Business Intelligence Qualifications
KSA Business Intelligence QualificationsJDOLIV
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1Bryan Cline, Ph.D.
 

Destaque (20)

Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)
 
Fortify - Source Code Analyzer
Fortify - Source Code AnalyzerFortify - Source Code Analyzer
Fortify - Source Code Analyzer
 
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
 
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
 
Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...
 
Source Code Scanners
Source Code ScannersSource Code Scanners
Source Code Scanners
 
Fortify dev ops (002)
Fortify   dev ops (002)Fortify   dev ops (002)
Fortify dev ops (002)
 
Poster Analysis Source Code
Poster Analysis Source CodePoster Analysis Source Code
Poster Analysis Source Code
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1
 
DSS ITSEC 2013 Conference 07.11.2013 - Security in High Risk Environment
DSS ITSEC 2013 Conference 07.11.2013  - Security in High Risk EnvironmentDSS ITSEC 2013 Conference 07.11.2013  - Security in High Risk Environment
DSS ITSEC 2013 Conference 07.11.2013 - Security in High Risk Environment
 
Software Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity ModelsSoftware Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity Models
 
BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014
BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014
BSIMM and Security Initiative Improvement @OWASPNoVA 02/06/2014
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
SDLC Transformation-Point of View
SDLC Transformation-Point of ViewSDLC Transformation-Point of View
SDLC Transformation-Point of View
 
Securing your web apps before they hurt the organization
Securing your web apps before they hurt the organizationSecuring your web apps before they hurt the organization
Securing your web apps before they hurt the organization
 
Web Applications Security Assessment In The Portuguese World Wide Web Panorama
Web Applications Security Assessment In The Portuguese World Wide Web PanoramaWeb Applications Security Assessment In The Portuguese World Wide Web Panorama
Web Applications Security Assessment In The Portuguese World Wide Web Panorama
 
Washington Mutual Bank's Collapse Under An Audit Perspective
 Washington Mutual Bank's  Collapse Under An Audit Perspective Washington Mutual Bank's  Collapse Under An Audit Perspective
Washington Mutual Bank's Collapse Under An Audit Perspective
 
KSA Business Intelligence Qualifications
KSA Business Intelligence QualificationsKSA Business Intelligence Qualifications
KSA Business Intelligence Qualifications
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1
 
Lan & Wan
Lan & WanLan & Wan
Lan & Wan
 

Semelhante a Ensure Software Security already during development

Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Aggregage
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfSavinder Puri
 
Scaling AppSec through Education
Scaling AppSec through EducationScaling AppSec through Education
Scaling AppSec through EducationGrant Ongers
 
Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryGilles Sgro
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure DevelopmentBosnia Agile
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?F-Secure Corporation
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogStefan Streichsbier
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaChris Bailey
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for JavaTim Ellison
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET Journal
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Clouditalia Telecomunicazioni
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionLeMeniz Infotech
 
SecureDELTA - Pitch Deck Gallery - Innovation Labs
SecureDELTA - Pitch Deck Gallery - Innovation LabsSecureDELTA - Pitch Deck Gallery - Innovation Labs
SecureDELTA - Pitch Deck Gallery - Innovation Labsstartupro
 

Semelhante a Ensure Software Security already during development (20)

Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
Scaling AppSec through Education
Scaling AppSec through EducationScaling AppSec through Education
Scaling AppSec through Education
 
Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summary
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for Java
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 
Software security
Software securitySoftware security
Software security
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of Code
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
SecureDELTA - Pitch Deck Gallery - Innovation Labs
SecureDELTA - Pitch Deck Gallery - Innovation LabsSecureDELTA - Pitch Deck Gallery - Innovation Labs
SecureDELTA - Pitch Deck Gallery - Innovation Labs
 

Mais de IT Weekend

Quality attributes testing. From Architecture to test acceptance
Quality attributes testing. From Architecture to test acceptanceQuality attributes testing. From Architecture to test acceptance
Quality attributes testing. From Architecture to test acceptanceIT Weekend
 
Mobile development for JavaScript developer
Mobile development for JavaScript developerMobile development for JavaScript developer
Mobile development for JavaScript developerIT Weekend
 
Building an Innovation & Strategy Process
Building an Innovation & Strategy ProcessBuilding an Innovation & Strategy Process
Building an Innovation & Strategy ProcessIT Weekend
 
IT Professionals – The Right Time/The Right Place
IT Professionals – The Right Time/The Right PlaceIT Professionals – The Right Time/The Right Place
IT Professionals – The Right Time/The Right PlaceIT Weekend
 
Building a Data Driven Organization
Building a Data Driven OrganizationBuilding a Data Driven Organization
Building a Data Driven OrganizationIT Weekend
 
7 Tools for the Product Owner
7 Tools for the Product Owner 7 Tools for the Product Owner
7 Tools for the Product Owner IT Weekend
 
Hacking your Doorbell
Hacking your DoorbellHacking your Doorbell
Hacking your DoorbellIT Weekend
 
An era of possibilities, a window in time
An era of possibilities, a window in timeAn era of possibilities, a window in time
An era of possibilities, a window in timeIT Weekend
 
Web services automation from sketch
Web services automation from sketchWeb services automation from sketch
Web services automation from sketchIT Weekend
 
REST that won't make you cry
REST that won't make you cryREST that won't make you cry
REST that won't make you cryIT Weekend
 
Как договариваться с начальником и заказчиком: выбираем нужный протокол общения
Как договариваться с начальником и заказчиком: выбираем нужный протокол общенияКак договариваться с начальником и заказчиком: выбираем нужный протокол общения
Как договариваться с начальником и заказчиком: выбираем нужный протокол общенияIT Weekend
 
Обзор программы SAP HANA Startup Focus
Обзор программы SAP HANA Startup FocusОбзор программы SAP HANA Startup Focus
Обзор программы SAP HANA Startup FocusIT Weekend
 
World of Agile: Kanban
World of Agile: KanbanWorld of Agile: Kanban
World of Agile: KanbanIT Weekend
 
Risk Management
Risk ManagementRisk Management
Risk ManagementIT Weekend
 
«Spring Integration as Integration Patterns Provider»
«Spring Integration as Integration Patterns Provider»«Spring Integration as Integration Patterns Provider»
«Spring Integration as Integration Patterns Provider»IT Weekend
 
Cutting edge of Machine Learning
Cutting edge of Machine LearningCutting edge of Machine Learning
Cutting edge of Machine LearningIT Weekend
 
Parallel Programming In Modern World .NET Technics
Parallel Programming In Modern World .NET TechnicsParallel Programming In Modern World .NET Technics
Parallel Programming In Modern World .NET TechnicsIT Weekend
 
Parallel programming in modern world .net technics shared
Parallel programming in modern world .net technics   sharedParallel programming in modern world .net technics   shared
Parallel programming in modern world .net technics sharedIT Weekend
 
Maximize Effectiveness of Human Capital
Maximize Effectiveness of Human CapitalMaximize Effectiveness of Human Capital
Maximize Effectiveness of Human CapitalIT Weekend
 

Mais de IT Weekend (20)

Quality attributes testing. From Architecture to test acceptance
Quality attributes testing. From Architecture to test acceptanceQuality attributes testing. From Architecture to test acceptance
Quality attributes testing. From Architecture to test acceptance
 
Mobile development for JavaScript developer
Mobile development for JavaScript developerMobile development for JavaScript developer
Mobile development for JavaScript developer
 
Building an Innovation & Strategy Process
Building an Innovation & Strategy ProcessBuilding an Innovation & Strategy Process
Building an Innovation & Strategy Process
 
IT Professionals – The Right Time/The Right Place
IT Professionals – The Right Time/The Right PlaceIT Professionals – The Right Time/The Right Place
IT Professionals – The Right Time/The Right Place
 
Building a Data Driven Organization
Building a Data Driven OrganizationBuilding a Data Driven Organization
Building a Data Driven Organization
 
7 Tools for the Product Owner
7 Tools for the Product Owner 7 Tools for the Product Owner
7 Tools for the Product Owner
 
Hacking your Doorbell
Hacking your DoorbellHacking your Doorbell
Hacking your Doorbell
 
An era of possibilities, a window in time
An era of possibilities, a window in timeAn era of possibilities, a window in time
An era of possibilities, a window in time
 
Web services automation from sketch
Web services automation from sketchWeb services automation from sketch
Web services automation from sketch
 
Why Ruby?
Why Ruby? Why Ruby?
Why Ruby?
 
REST that won't make you cry
REST that won't make you cryREST that won't make you cry
REST that won't make you cry
 
Как договариваться с начальником и заказчиком: выбираем нужный протокол общения
Как договариваться с начальником и заказчиком: выбираем нужный протокол общенияКак договариваться с начальником и заказчиком: выбираем нужный протокол общения
Как договариваться с начальником и заказчиком: выбираем нужный протокол общения
 
Обзор программы SAP HANA Startup Focus
Обзор программы SAP HANA Startup FocusОбзор программы SAP HANA Startup Focus
Обзор программы SAP HANA Startup Focus
 
World of Agile: Kanban
World of Agile: KanbanWorld of Agile: Kanban
World of Agile: Kanban
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
«Spring Integration as Integration Patterns Provider»
«Spring Integration as Integration Patterns Provider»«Spring Integration as Integration Patterns Provider»
«Spring Integration as Integration Patterns Provider»
 
Cutting edge of Machine Learning
Cutting edge of Machine LearningCutting edge of Machine Learning
Cutting edge of Machine Learning
 
Parallel Programming In Modern World .NET Technics
Parallel Programming In Modern World .NET TechnicsParallel Programming In Modern World .NET Technics
Parallel Programming In Modern World .NET Technics
 
Parallel programming in modern world .net technics shared
Parallel programming in modern world .net technics   sharedParallel programming in modern world .net technics   shared
Parallel programming in modern world .net technics shared
 
Maximize Effectiveness of Human Capital
Maximize Effectiveness of Human CapitalMaximize Effectiveness of Human Capital
Maximize Effectiveness of Human Capital
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Ensure Software Security already during development

  • 1. Ensure Software Security already during development Lucas v. Stockhausen Software Security Consultant lvonstockhausen@hp.com +49-1520 1898430 HP Enterprise Security © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 2. Some Explanations © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 3. Definition Hacker (Wikipedia) Hacker: A person who enjoys exploring the details of (programmable) systems and stretching their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 3 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 4. Heise Newsletter 25.1.2012 3 % of the public available IP adresses ~5000 open Video Systems. Continous exploit from there. http://www.h-online.com/security/news/item/Video-conferencing-systems-as-spying-tools-1421346.html © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 4
  • 5. No “Defence in Depth” means…. 5 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 6. Heise Newsletter 26.1.2012 Attack from 3 IP Adresses to US railway. No big damage – just 15 min delay. http://www.h-online.com/security/news/item/Hackers-may-have-disrupted-railway-computers-and-schedules-1422666.html © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 6
  • 7. 7 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 8. How can HP Fortify help? By 2016 40% of enterprises will make proof of independent security testing a precondition for using any type of cloud services © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 9. Today’s approach > expensive, reactive IT deploys the insecure 2 1 3 software We are breached or Somebody builds pay to have someone insecure software tell us our code is 4 insecure We convince & pay the developer to fix it 9 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 10. Software Development Today Small coding errors can have a big effect on security Typical software development practices don’t address the problem As a group, developers tend to make the same security mistakes over and over 10 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 11. Why it doesn’t work 30x more costly to secure in production 30X 15X Cost 10X 5X 2X Requirements Coding Integration/ System Production component testing testing After an application is released into Production, it costs 30x more than during design. Source: NIST 11 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 12. The right approach > systematic, proactive Embed security into SDLC development process 1 2 Leverage Security Gate to validate resiliency of internal or external In-house Outsourced Commercial Open source code before Production 3 Monitor and protect software Improve SDLC policies running in Production This is application security 12 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 13. Software must be Fortify'd Fortify Source Code Fortify Security Fortify RTA Analysis Scope HP WebInspect Source Code Security Audits Run-Time Protection PLAN DESIGN CODE FUNCTIONAL ACCEPTANCE DEPLOY TEST TEST Software Inventory Collaboration Module Governance Module Fortify SSC Server Software Security Metrics and Reporting 13 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 14. Static Analysis © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 15. Example Process Development Teams Security 2. Audit AWB Monitor CM Defect Tracking System Project Security CISO Lead Source Code Repository(s) 3. Assign 5. Validate Central Build Server(s) CM AWB AWB Build Tool Fortify SCA Development Security Auditor Manager 1. Identify Fortify CM 4. Fix Fortify SSC Server IDE Developer 15 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 16. Auditing – Different Possibilities Auditworkbench Collaboration Module IDE - VS , Eclipse (Web-base Auditworkbench) Clicking on the issue and being guided through the source code is VERY important for understanding and fixing a vulnerability 16 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 17. Auditing (AWB and IDE) - Overview Functions and Rulewriting wizard (only Filtering in AWB) Priorization Categorization Overview Issue - Groups 17 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 18. Auditing (AWB and IDE) – Trace the issue Sourcecode Diagram Analysis Trace 18 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 19. Auditing (AWB and IDE) – Training on the job Detailed description of the issue 19 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 20. Auditing (AWB and IDE) – Training on the job Detailed recommendation to fix the issue 20 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 21. Auditing (AWB and IDE) - Result Store Analysis See other comments and make comments yourself File a bug 21 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 22. Dynamic Analysis © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 23. 23 INTRODUCTION TO WEBINSPECT WebInspect is a comprehensive Dynamic Application Security Testing (DAST) solution used by IT Security auditors and penetration testers to detect, classify and report discrete application vulnerabilities. WebInspect dynamically interacts with your application enumerating application parameters and server configuration characteristics which can be exploited by a malicious attacker. WebInspect employs “ethical” attack methods which discover and confirm vulnerabilities without actually exploiting them. Monthly WebInspect Technical Demonstration: http://www.hp.com/go/techdemos 23 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 24. Live scan visualization Live Scan Start remediation of vuln’s immediately Dashboard Live Scan Statistics Site tree Detailed Attack Excluded and Table Allowed Hosts Section Vulnerabilities 24 found in application © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 25. Grey Box Testing © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 26. 27 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 27. Integrated Analysis Application Real-time link • Find More • Fix Faster 29 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 28. Real Time Analysis © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 29. Fortify RTA : Components RTA Console 31 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 30. SSC Software Security Center © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 31. Fortify SSC Server – Risk Management Track, measure and understand software security risk Flexible reporting Dashboards to details - Metrics that matter Snapshots and trends - Easy to customize 33 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 32. Fortify SSC Server – Risk Management II Track, measure and understand software security risk Centralized management of software security Software security policy - Multiple projects Real-time alerts - Enterprise Security Rules management 34 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 33. Fortify Server – Risk Management III Track, measure and understand software security risk Collaborative Auditing and Remediation Web Base Auditworkbench like interface User Assignment 35 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 34. How can HP Fortify help? © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 35. Software must be Fortify'd Fortify Source Code Fortify Security Fortify RTA Analysis Scope HP WebInspect Source Code Security Audits Run-Time Protection PLAN DESIGN CODE FUNCTIONAL ACCEPTANCE DEPLOY TEST TEST Software Inventory Collaboration Module Governance Module Fortify SSC Server Software Security Metrics and Reporting 37 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 36. And the knowledge? © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 37. 526 Categories to Date SRG updates the Fortify Secure Coding Rulepacks to identify the latest categories of software vulnerabilities on a quarterly basis Growth in Vulnerability Categories 2005 – 2012 Examples of Categories 600 •Command Injection •Cross-Build Injection 500 •Cross-Site Request Forgery •Cross-Site Scripting 400 •HTTP Response Splitting •JavaScript Hijacking 300 •LDAP Injection •Privacy Violation •Session Fixation 200 •SQL Injection •System Information Leak 100 •Unhandled Exception For a complete list, go to 0 http://www.hpenterprisesecurity.com/vulncat/e n/vulncat/index.html 1 3 1 3 1 3 1 3 1 3 1 3 1 3 1 39 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q 05 05 06 06 07 07 08 08 09 09 10 10 11 11 12
  • 38. 21 Languages to Date SRG leads the industry in support for the broadest array of programming languages Growth in Language Support 2005 – 2012 Language Support 25 •ABAB •XML/HTML •Actionscript •Classic ASP 20 •ASP.NET •JSP •Java •PHP 15 •C •Python •C++ •VB.NET 10 •C# •VBScript •COBOL •VB6 5 •Cold Fusion •T-SQL 0 •Objective C •PL/SQL 1 3 1 3 1 3 1 3 1 3 1 3 1 3 1 Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q 05 05 06 06 07 07 08 08 09 09 10 10 11 11 12 •JavaScript 40 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. /AJAX
  • 39. 710,000+ APIs to Date SRG builds extensive support for the packages and frameworks used today, resulting in support for over 710,000 APIs over 526 vulnerability categories and 21 languages Growth in API Support 2005 – 2012 Sample Packages 800.000 •JDK 1.4, 1.5, 1.6 700.000 •Apache Struts 1.x, 2.x 600.000 •Hibernate 2.x, 3.x 500.000 •Spring 1.x, 2.x 400.000 •JSF 1.x •.NET 1.1, 2.0, 3.0, 3.5 300.000 •Microsoft Practices Enterprise 200.000 Library 100.000 •NHibernate 1.x 0 •Spring MVC •Google GWT 1 3 1 3 1 3 1 3 1 3 1 3 1 3 1 Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q 05 05 06 06 07 07 08 08 09 09 10 10 11 11 12 41 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. •Java Webservices
  • 40. How to use? © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 41. Security in the Development Lifecycle 43 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 42. Maturity Models 44 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 43. Four high-level Disciplines All security-related activities mapped under 4 Disciplines, each representing a group of related business functions Alignment & Requirements & Verification & Deployment & Governance Design Assessment Operations Activities related to Activities related to the Activities related to Activities related to security program product conception and reviewing, testing, and knowledge transfer management and cross- software design validating software and maintenance of cutting organizational processes running software concerns 45 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 44. What’s under each Discipline? The 4 Disciplines are high-level categories for activities Three security Functions under each Discipline are the specific silos for improvement within an organization Alignment & Requirements & Verification & Deployment & Governance Design Assessment Operations Disciplines Functions 46 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 45. Security Research – Fortify SSA Maturity Model Initiate Define Design Develop Test Implement Operate Education & Guidance Alignment & Governance Standards & Compliance Strategic Planning Threat Modeling Requirements & Design Security Requirements Defensive Design Architecture Review Verification & Code Review Assessment Security Testing Vulnerability Management Deployment & Infrastructure Operations Hardening Operational Enablement SCA WebInspect Fortify SSC RTA 47 Fortify SSC Server © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 46. SSA Scorecard Blank Industry Enterprise Prioritized Scorecard Best Practices Scoring Roadmap Objective 3 Objective 2 8 4 7 6 2 Objective 1 5 1 3 Objective 0 Education Standard Planning Threat Md Sec Req Def Design Arch Rev Code Rev Sec Testing Vul Mgmt Infr Harden Ops Enable Governance Requirements Verification Deployment & Alignment & Design & Assessment & Operations 48 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 47. SSA Best Practice Approach Key Principles Rapid identification and remediation of critical vulnerabilities • Don‟t “forget to fix” or “boil the ocean” Prevent introduction of new vulnerabilities • Integrate into existing SDLC with minimal process changes • Provide flexibility to integrate with new SDL as it rolls-out Provide support for the developers • Training in the context of their own code base • Mentoring as required Monitor and control • Automate gathering of vulnerability statistics and publish • Enforcement via security gate Continuous Improvement 49 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 49
  • 48. Goals and benefits for Software Security Assurance SSA A successful software security initiative leads to: Measurably reduced risk from existing applications A controlled process for preventing vulnerabilities in new releases Reduced costs, delays, and wasted effort from emergency bug fixes and incident clean-up 57 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 49. Success is foreseeing failure. 58 – Henry Petroski © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 50. Thank you Lucas v. Stockhausen lvonstockhausen@hp.com +49-1520 1898430 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 51. Backup Slides © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 52. RAST is the key to correlation URL: www. sales.company.com File: NewClass.java File: NewClass.java Line: 27 Line: 27 ID: 234 ID: 234 Source Code: <java.sql. Connection.xxx> 61 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 53. ROI © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 54. The Breach The biggest ROI is no breach No regulatory costs No brand reputation … Hard to measure if it never happened to you before. 63 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 55. Fixing Bugs Earlier in the Lifecycle Cost of Fixing One Vulnerability Based On The Stage It Was Identified $15.000 $14,102 $12.000 $9.000 $7,136 $6.000 $3.000 $455 $977 $139 $0 Requirements Design Coding Testing Maintenance 64 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 56. Example: Cost of Fixing Critical Defects The following case study provides an example of the savings generated by using source code analysis to find vulnerabilities earlier in the SDLC • Sample Application Size: 2 Million LOC Application • Defects Identified during SCA: 1,600 Vulnerabilities Identified Using SCA • Defects Deemed Critical 200 65 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 57. Example: Cost of Fixing Critical Defects Cost of Fixing Vulnerabilities Early Cost of Fixing Vulnerabilities Later Critical Bugs Cost of Fixing 1 Cost of Fixing Critical Bugs Cost of Fixing Cost of Fixing Stage Stage Identified Bug All Bugs Identified 1 Bug All Bugs Requirements $139 Requirements $139 Design $455 Design $455 Coding 200 $977 $195,400 Coding $977 Testing $7,136 Testing 50 $7,136 $356,800 Maintenance $14,102 Maintenance 150 $14,102 $2,115,300 Total 200 $195,400 Total 200 $2,472,100 66 Identifying the critical bugs earlier in the lifecycle reduced costs by $2.3MM © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 58. Quiz © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 59. Quiz String userName = ctx.getAuthenticatedUserName(); String itemName = request.getParameter("itemName"); String query = "SELECT * FROM items WHERE owner = '" + userName + "' AND itemname = „” + itemName + “„”; ResultSet rs = stmt.execute(query); Username = lucas Itemname = x’ or 1=1; -- 68 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 68
  • 60. Quiz - Solution String userName = ctx.getAuthenticatedUserName(); String itemName = request.getParameter("itemName"); String query = "SELECT * FROM items WHERE owner = '" + lucas + "' AND itemname = „” + x’ or 1=1; -- + “„”; ResultSet rs = stmt.execute(query); Username = lucas Itemname = x’ or 1=1; -- 69 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 69
  • 61. Quiz - Solution SELECT * FROM items WHERE owner = „lucas' AND itemname = „x’ or 1=1; -- „”; Username = lucas Itemname = x’ or 1=1; -- 70 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 70

Notas do Editor

  1. Hi, my name is [Name]. I work as a [Title/ Role] at HP, in the Enterprise Security Products business unit. Today, I’ll be talking about application security and why governments and modern enterprises need it. What is application security? Simply put, it is about ensuring that every single line of code is secure and every single software application– whether it is built for the desktop, cloud or mobile device— is safe from cyber attackers and hackers. The goal here is about eliminating exploitablesecurity risk in software at the application code level, making it immune to attack even if intruders get past perimeter defenses.
  2. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  3. Angriff aus der Zukunft
  4. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  5. How did we get here? There’s always been a communication/ collaboration gulf between Security and Development. These 2 teams don’t normally work together; they don’t even belong in the same group.Typically, Security receives code to deploy. You trust that the application you were given (whether developed in house, outsourced, open sourced, or commercial) is fully tested and secured. In many cases, you don’t have the time, skills or authority to stop that application deployment. So you end up rolling it out, not knowing whether the code is secure or not until it’s breached.
  6. How expensive is this approach? According to an NIST study, the cost of fixing software increases substantially further along the Software Development Lifecycle (SDLC). It costs 30x more to fix security issues after a breach in Production than to build security into your code at the beginning during Design.
  7. How do we fix this, how do we ensure that only secure software is deployed? Ideally, security should be built into software during the Design phase. Many times, it’s not possible. A pragmatic approach is to put a Security Gate in place before the software is deployed into Production. Before you rollout any application, you must first determine whether it is resilient and secure. If you look at the Development cycle, you have Engineers who develop the code and then QA who test the functionality, i.e. a Software Quality Assurance (SQA) role. The gap right now is that there’s no one comparable in Security. Do you have someone who performs a Software Security Assurance (SSA) role? No! Just as Development has QA to keep them honest, Security needs someone or something in a similar QA capability.
  8. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  9. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  10. BUILD (Auto)
  11. AMP Sensor(WebInspect without local GUI)
  12. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  13. Angriff aus der Zukunft
  14. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  15. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  16. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  17. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  18. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  19. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  20. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…
  21. Why is there a problem, and why do you need application security?Like all organizations, you’ve undoubtedly, invested a lot of time and money attempting to insulate and protect your assets. Your networks are protected – firewalls are in nearly every devices that connects to a network. Your servers are protected, thanks to advances in intrusion prevention systems. But your software applications are still largely unprotected and vulnerable.Companies believed that if you protect the perimeter (network and server), the software will be unreachable and therefore not breachable. However, that has not proven to be the case: software is the New Entry Point.Let’s take a look at how…