41
© Copyright 2011 Denim Group - All Rights Reserved Software Security: Is OK Good Enough? AppSec EU 2011 John B. Dickson, CISSP Denim Group, Ltd. [email protected]

Software Security: Is OK Good Enough?

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Software Security: Is OK Good

Enough?

AppSec EU 2011

John B. Dickson, CISSP

Denim Group, Ltd.

[email protected]

Page 2: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Software Security: Is OK Good Enough?

• Current State of Affairs in Software Security

• What we can Learn from Other Justification Models

• Potential Software Security Justification Models

• Questions and Answers

1

Page 3: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Personal Background

2

Page 4: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Personal Background

3

Page 5: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Denim Group Background

– Professional services firm that builds & secures enterprise

applications

– Secure development services:

• Secure .NET and Java application development

• Post-assessment remediation

4

Page 6: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Current State of Affairs in Software Security

• Focus on OWASP Top 10 List

• Testing approaches differ greatly

• Existing application security scanners identify a subset of

vulnerabilities in applications

– 30-40% Coverage level is accepted norm

– SQL injection/XSS – yes

– Authorization & business logic – not so much

5

Page 7: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Firewall?

1996 Network Security Question?

Page 8: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

I’ve run my Automated SQL

Injection & XSS Application

Scanner?

2011 Application Security Question?

Page 9: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Page 10: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Checkbox Culture

• Compliance culture and resource constraints have limited software

security coverage

• This cuts to the heart of “OK”

• Heartland Payments Systems breach and PCI test coverage

– Organizations try to limit PCI audit by design, even if many view PCI DSS as the

most rigorous application security compliance framework

9

Page 11: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 10

How Many Angels Can Sit On The Head Of A Pin?

Page 12: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 11

Page 13: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 12

(drawn to scale)

Page 14: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 13

Page 15: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 14

Page 16: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 15

Going Concern: In accounting,

"going concern" refers to a

company's ability to continue

functioning as a business entity.

Page 17: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 16

Page 18: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 17

What do Street Vendor food and iTunes applications have in

common?

Page 19: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 18

Introduction of malware into iTunes & Droid Apps stores

• Applications submitted to the Apple iTunes AppStore and the Google

Android store do not undergo rigorous security testing

• Both application stores do not do "white listing” per se

Page 20: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 19

What we can Learn from Other Justification Models

– Earthquake Building Codes

Haiti vs. Chile

Page 21: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 20

What we can Learn from Other Justification Models

– Earthquake Building Codes

• Shared understanding for need

• Establish compliance regimes

• Rule of law for enforcement

Page 22: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 21

New York City

• 24,000 restaurants inspected/year

• Point-based rating scale

• 3 Categories of violations

• Public health hazard (7 points)

• Critical violation (5 points)

• General violation (2 points)

Page 23: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 22

Venture a Guess?

• 3 Categories of violations

• Public health hazard (7 points)

• Critical violation (5 points)

• General violation (2 points)

Page 24: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 23

Venture a Guess?

• 3 Categories of violations

• Public health hazard (7 points)

• Critical violation (5 points)

• General violation (2 points)

Page 25: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 24

What we can Learn from Other Justification Models

• What we can learn from these two models?

• No model is based purely on industry-driven compliance

– Have no regulation is bad

• Starting point is a generally accepted need for regulation

– Buyers need to demand software “seatbelts”

– Political consensus in Chile & California to enforce more stringent building codes

• Must have Rule of Law present to enforce regulation

– Building codes were in place in both Chile & Haiti

• Misguided regulation may be more destructive than no regulation at all

– e.g., Sarbanes Oxley

Page 26: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 25

So where do you go from here?

Page 27: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

We need more Earthquakes

26

Page 28: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

We Need Better Mainstream Scary Stories

27

Page 29: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

We Need Better Mainstream Scary Stories

28

Page 30: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

We Need Smarter buyers

29

Page 31: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 30

There’s an App for That!

Page 32: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Potential Software Security Justification Models

31

Page 33: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Realize that Sales & Marketing is our #1 Job

32

Page 34: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

We Need Better Developers

• Is it enough to say you are “Rugged”

• We need software developers to elevate their coding practices to

lower the number of obvious security vulnerabilities

• These developers need better tools

– Modern frameworks

– Static analysis baked into build

• Starting point – software engineers need to be further along out of

college

• Industry responses

– Carrot & stick models

33

Page 35: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

The New Negligence:

Eliminate SQL Injections and XSS

34

Page 36: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

The Negligence:

SQL Injections and XSS

35

XSS &

SQL Injections

Page 37: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

We need better coverage of attack space

36

Page 38: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

We need better coverage of attack space

37

Page 39: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

We need better coverage of attack space

38

Page 40: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved

Tailor Responses for Limited Resources

39

• OWASP 1-2 Punch • ASVS

• Open SAMM

Measure, Measure, Measure

Page 41: Software Security: Is OK Good Enough?

© Copyright 2011 Denim Group - All Rights Reserved 40

Questions, Answers, & Contact

John B. Dickson, CISSP

[email protected]

(210) 572-4400

www.denimgroup.com

blog.denimgroup.com

Twitter: @johnbdickson