SlideShare uma empresa Scribd logo
1 de 8
Web Application Security
From reactive to proactive
Eugenij Safonov
WebOps Engineer / Scrum Master / Kainos Smart
18 May 2016
5/24/16 2●
Health
5/24/16 3●
InfoSec
Informati
on
Security
Pricedaily=
Risk yearly∗Costbreach
365
5/24/16 4●
InfoSec
Confidentiality
●
Access Control Systems
●
Encryption
●
Obscurity
Integrity
●
Access Logs
●
Hashing
Availability
●
Fault-tolerance
●
Redundancy
●
Disaster recovery
C A
I
Best practices
5/24/16 5●
Best practices
Obscurity
●
SSH ports
●
Random
usernames
●
Non-default
settings
Layering
●
MFA
●
Network →
TrueCrypt →
SSH Key →
OTP →
sudo pass
Least privilege
●
Deny by
default
●
Disable root
●
Named
accounts
Separation of
duties
●
Code reviews
●
Deployment
approvals
●
Operations
audit
Security
habit loop
5/24/16 6●
Habit loop
Learn
Communicate
Celebrate
Probe
Automate
Habit
●
Three 'R's of habit formation
●
Support group
●
Start small
Security basics
●
CIA Triad
●
Best Practices
Compromise
●
Security vs Usability
5/24/165/24/16 77●
Conclusion●
Conclusion
Be
healthy
Be secure
Atmosphere 2016 - Eugenij Safanov - Web Application Security: from reactive to proactive

Mais conteúdo relacionado

Semelhante a Atmosphere 2016 - Eugenij Safanov - Web Application Security: from reactive to proactive

Android security and parsing 101
Android security  and parsing  101Android security  and parsing  101
Android security and parsing 101
Lifeparticle
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 

Semelhante a Atmosphere 2016 - Eugenij Safanov - Web Application Security: from reactive to proactive (20)

Security .NET.pdf
Security .NET.pdfSecurity .NET.pdf
Security .NET.pdf
 
Top 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsTop 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security Problems
 
Computer Security Workshop
Computer Security Workshop Computer Security Workshop
Computer Security Workshop
 
Secure at Speed @ Solent.tech
Secure at Speed @ Solent.techSecure at Speed @ Solent.tech
Secure at Speed @ Solent.tech
 
Mobile security recipes for xamarin
Mobile security recipes for xamarinMobile security recipes for xamarin
Mobile security recipes for xamarin
 
Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...
Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...
Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...
 
Android security and parsing 101
Android security  and parsing  101Android security  and parsing  101
Android security and parsing 101
 
Data security in the age of GDPR – most common data security problems
Data security in the age of GDPR – most common data security problemsData security in the age of GDPR – most common data security problems
Data security in the age of GDPR – most common data security problems
 
Threat Modeling for Web Applications (and other duties as assigned)
Threat Modeling for Web Applications (and other duties as assigned)Threat Modeling for Web Applications (and other duties as assigned)
Threat Modeling for Web Applications (and other duties as assigned)
 
OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
Cybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational InstitutionsCybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational Institutions
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Atmosphere 2016 - Eugenij Safanov - Web Application Security: from reactive to proactive

Notas do Editor

  1. Less technical Inherently boring How good Parental precept Overwhelming complexity
  2. In many ways alike Build to do more The same as happiness Race against time Understate the risks Science of habits
  3. - property of a system which guarantees that data can not be disclosed to unauthorized users, processes or entities - feature guaranteeing consistency, accuracy and trustworthiness. - of data to authorized users when they need it speaks for itself. increases cost. We usually pay the most attention to this particular feature as it is the most visible for our users. - keeping personally identifiable information confidential
  4. security-first perspective First impression, brag, no care, weakest Onion-like Inconvenient, Reduce damage, annoying Think differently – unnecessary well messages, shiny new, block by default Missile launch, fraud and errors Separating dev/ops/qa, no single person gets absolute powers
  5. - positive perspecitve and best practices – good start - not a process – habit, automatic behaviour, nurse - awareness, vector, accountability, support, reward - learning careers, scrap, start small - communicate discuss, awaresness, support group. Educating – human factor, role model, encourage and condemn, not chastised - probe, formula? Fire. Assessments, pinpoint, external to stay compiant. Accountability and more green marks - celebration the most important, praise, proud, brag; but don't tell, paranoid freak. Team events , if no critical or major - automate, delegate, security checks, keep code free, enable updates. Start small with reminders and booking calendar
  6. We've covered all of them Along with Not to overwhelm actually advantageous to form a positive perspective. decide for themselves Exactly like health Technically possible totally Deprive of pleasures 5 years running Keeping data safe / actual functionality Makes application useful