hybrid 2.0 – in search of the holy grail… · • fortify runtime analysis + webinspect = hybrid...

20

Upload: others

Post on 13-Aug-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results
Page 2: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Hybrid 2.0 – In search of the holy grail…

© 2008 All Right Reserved Fortify Software Inc.

A Talk for OWASP BeNeLux

by

Roger Thornton

Founder/CTO Fortify Software Inc

2

Page 3: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Before we Begin:

• Expectations

• Objectives

© 2009 All Right Reserved Fortify Software Inc.

• Objectives

• Agenda

Page 4: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

About Your Presenter

• 22 years of Engineering (“building stuff”) in the Silicon Valley

– Semiconductors

– Operating Systems

© 2009 All Right Reserved Fortify Software Inc.

– Development Tools

– Brokerage / E-Commerce

• The Last 6 years working on Securing that Stuff

– Founder & CTO of Fortify Software

Page 5: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

A Simple, Reasonable, Question….

If I run software, am I putting my business, data, customers or even life on earth at risk?

© 2009 All Right Reserved Fortify Software Inc. 5

Unfortunately not so simple

to answer…

If so, how serious is the threat?

Page 6: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Three Basic Approaches

Exactly what the bad guy

does..

Cheap and easy way to

find the most obvious

issues

Look for root cause issues

from the “inside out” – the

code

Hire an expert Ethical Hacking

Automate HackingBlack Box / Penetration Test

Analyze the SoftwareStatic and Dynamic Analysis

© 2009 All Right Reserved Fortify Software Inc.

• Hard to know if your

“experts” are as good as

the bad guy

• Prohibitively expensive to

do on a regular basis

• No advantage over the

bad guys

• Identifies the result – not

the root cause

• “Badness-ometer”

limitations and issues

• Automated crawler and

web traffic analysis can

yield

• Identifies the result – not

the root cause

• Requires intimate access to

the software

• Requires programming

knowledge and expertise

• Exploitability information is

not present as with other

two.

• Identifies the root cause not

the result

Page 7: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Software Security Assurance (SSA)The management & prevention of security risks in software

Operation ConstructionTest

© 2009 All Right Reserved Fortify Software Inc.

RemediateVulnerabilities found in

softwareAssess

Software for security vulnerabilities

PreventSoftware security

vulnerabilities

Page 8: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Software Security Maturity

Proving the problem or

meeting a basic

regulatory requirement

Fixing security issues

uncovered from

assessments

Secure the development

and procurement lifecycle

avoiding issues altogether

Risk AwarenessVulnerability Assessment

Risk Reduction Analysis & Remediation

PreventionSecure SDL & Software

© 2009 All Right Reserved Fortify Software Inc.

• An info-sec project

• Generates awareness &

support security initiatives

• Consulting, PenTesting &

some manual code review

• Info-sec driven project

with development support

• Forces a rework of code

• “Inside-out” Static and

Dynamic Analysis required

Recurring cost that does

not “fix” anything

Lowering risk but costs

too high

• Info-sec-sponsored

Development-led project

• Requires significant

organizational buy-in

• Requires more than a point

solution

Minimizing business risk

systematically

Page 9: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Systemic Problem

Software Procurement & Development Cycle

Immediate Problem

Existing Legacy Applications

The Challenge

Compliance & Regulatory

© 2009 All Right Reserved Fortify Software Inc. 9

Prevention of the introduction of new risk

Assessment & remediation of existing software

Compliance & RegulatoryRequirements

Page 10: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Benefits of a “Hybrid” Approach

• A seamless flow from Assessment to Prevention

– Facilitates growth in maturity from assessment to prevention

• Combined benefits at Testing phase - “Remediation Gap”

– Application Testing & Software Analysis:

• Rapid identification of high priority issues (DAST)

© 2009 All Right Reserved Fortify Software Inc.

• Precise description of root cause vulnerability in code (SAST)

• Reduced time and costs to remediate vulnerabilities

�By mapping each security issue to root cause in source code

• Developers understand security findings – faster fixes

• Security findings are more accurate – less research

• Security findings are more comprehensive – less rework

Reduced time to fix

Reduced false

positives

Less conflict between

security and development

Page 11: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Dynamic Application Security Testing“Black Box”

Security TesterWeb Application

HPWebInspect

Challenges

-Visibility to “root cause”…

- It is called “Black Box”

- 1 Issue may be indicative

of many

© 2009 All Right Reserved Fortify Software Inc. 11

Development

Results

of many- Multiple issues may trace

back to one problem

-Communicating to developers

- URLs and hacking

technique vs. code errors

- Validating behavior (FP)

Page 12: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Security Tester

© 2009 All Right Reserved Fortify Software Inc. 12

Development

Page 13: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Security Tester

© 2009 All Right Reserved Fortify Software Inc. 13

Page 14: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Hybrid Integrated Security Testing

Security TesterWeb Application

HPWebInspect

© 2009 All Right Reserved Fortify Software Inc. 14

Source Code

Development

FortifySource Code

AnalysisResultsHybrid

Results

Results

Page 15: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

FortifyHybrid Integration Demo

© 2009 All Right Reserved Fortify Software Inc.

FortifyHybrid Integration Demo

15

Page 16: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

How did we do that?

© 2009 All Right Reserved Fortify Software Inc. 16

• “Runtime Data” comes from Runtime Analysis

�Today Fortify leverages this to monitor and guard applications

• Fortify Runtime Analysis + WebInspect = Hybrid 2.0

• Runtime Analysis is required to ensure proper mapping of SAST/DAST results

• Runtime Analysis allows testers and programmers to see “inside” the app

• Runtime analysis makes black box testing – white box testing

Page 17: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Introducing Hybrid 2.0

Pen Tester

FortifyRuntime Analysis

HPWebInspect

Web Application

© 2009 All Right Reserved Fortify Software Inc. 17

Source Code

DevelopmentResultsHybrid+

Results

Results

FortifySource Code

Analysis

Page 18: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Hybrid Aggregation: The complete set of results

Unified management & reporting

Ability to combine SAST and DAST

findings for integrated prioritization

and reporting.

Hybrid 1.0 (2005 Technology – Available since 2006)

© 2009 All Right Reserved Fortify Software Inc. 18

Reduced time and cost to fix vulnerabilities

Ability to follow test findings “into”

the program and the code to see the

root cause.

Hybrid CorrelationThe accurate results

Hybrid InsightThe actionable results

Hybrid 2.0 (An HP/Fortify exclusive advantage)

Page 19: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results

Thank you !

© 2009 All Right Reserved Fortify Software Inc.

Page 20: Hybrid 2.0 – In search of the holy grail… · • Fortify Runtime Analysis + WebInspect = Hybrid 2.0 • Runtime Analysis is required to ensure proper mapping of SAST/DAST results