security as a new metric for business, product and development lifecycle

68
Security as a New Metric for Your Business, Product and Development Lifecycle by Nazar Tymoshyk, SoftServe, Ph.D., CEH

Upload: nazar-tymoshyk-ceh-phd

Post on 12-Apr-2017

419 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Security as a new metric for Business, Product and Development Lifecycle

Security as a New Metric for Your Business, Product and

Development Lifecycle

by Nazar Tymoshyk, SoftServe, Ph.D., CEH

Page 2: Security as a new metric for Business, Product and Development Lifecycle

OWASP Chapter Lviv запрошує на останню зустріч групи OWASP Ukraine

цього року. Проведіть чудові 2 дні у Львові з найкращими Security спеціалістами України.

Реєстрація у: https://goo.gl/5hdvPH http://owasp-lviv.blogspot.com/

Тематика:• Безпека Веб і Мобільних аплікацій• Взлом REST і JavaScript базованих

аплікацій• Розслідування взломів• Reverse-Engineering• Розвод, кідалово і маніпуляція

свідомістю юзерів• Хмарна і безхмарна безпека• Фізичний взлом + Escape Quest

14 листопада 2015, субота, Львів, вул. Садова 2А

Львівка кава, кавярні і пиво, круте товариство, нові знайомства, воркшопи, знання на халяву – все це чекає на вас у нашому затишному місті!

OWASP Ukraine 2015

Security meetup у Львові

Page 3: Security as a new metric for Business, Product and Development Lifecycle

Physical Hacking

Escape questOWASP Ukraine 2015 Lviv meetup, November 14, 2015

Elite HACKERS

Industry Experts

The most interesting Security event of Ukraine

Hands on Labs

Collaboration

Competition

Powered by

Page 4: Security as a new metric for Business, Product and Development Lifecycle

Security as a metric

Total served: 24Completed: 10Internal: 3Lost: 14Win rate: 67%

H1 2014

Total served: 26Completed: 12Internal: 3Lost: 14Win rate: 46%

H1 2015

Updated business model allow us to generate more revenue from same amount of opportunities

Page 5: Security as a new metric for Business, Product and Development Lifecycle

Agenda

Business

Products

Your imaginary

Questions

Developers

Page 6: Security as a new metric for Business, Product and Development Lifecycle

BUSINESS

Page 7: Security as a new metric for Business, Product and Development Lifecycle

A rough year in 2012

Page 8: Security as a new metric for Business, Product and Development Lifecycle

A more challenging year - 2013

• Akamai reports that 2013 attack traffic is averaging over 86% above normal.

• This report shows April 30 attack traffic is 117.53% higher than the 42% increase seen in 2012

Page 10: Security as a new metric for Business, Product and Development Lifecycle
Page 11: Security as a new metric for Business, Product and Development Lifecycle
Page 12: Security as a new metric for Business, Product and Development Lifecycle

WHY your clients NEED Security

IndustryComplia

nce

Government

RegulationBusiness

availability

CapitalizationStatistic of Breaches

Customer requirem

entPrevious bad

experience

Page 13: Security as a new metric for Business, Product and Development Lifecycle

Consequences of Security FAILURE

TrustMoney

Datastolen

Timeto recover

Penaltiesfor

incident

Customers

Reputation

Page 14: Security as a new metric for Business, Product and Development Lifecycle

Super user

Subscriptions

Your very sad

client

Penalty tool

We were hacked

because of YOU!

Page 15: Security as a new metric for Business, Product and Development Lifecycle

If your Cloud server is hacked….

Page 16: Security as a new metric for Business, Product and Development Lifecycle

PRODUCT

Page 17: Security as a new metric for Business, Product and Development Lifecycle

Simple ROI of Product security

Page 18: Security as a new metric for Business, Product and Development Lifecycle

Connected Cars are part of

smart houses

smart TVs

smart watches

smart phones

smart cars

smart fridges

????

Page 19: Security as a new metric for Business, Product and Development Lifecycle

Typical Security Report delivered by competitor

Page 20: Security as a new metric for Business, Product and Development Lifecycle

How security is linked to development

Than start process of re-Coding, re-Building, re-Testing, re-Auditing

3rd party or internal audit

Tone of security defects

BACK to re-Coding, re-Building, re-Testing, re-Auditing

Page 21: Security as a new metric for Business, Product and Development Lifecycle

Design Build Test Production

GENERIC APPROACH FOR SECURITY

security requirements / risk and threat analysis

coding guidelines /code reviews/ static

analysis

security testing / dynamic analysis

vulnerability scanning / WAF

Reactive ApproachProactive Approach

Secure SDLC

Page 22: Security as a new metric for Business, Product and Development Lifecycle

How it should look like

With proper Security Program number of security defects should decrease

from phase to phase

Automated security

Tests

CIintegrated

ManualSecurity/penetration

Testing

OWASP methodology

Secure

Codingtrainings

RegularVulnerability

Scans

Minimize the costs of the Security related issues

Avoid repetitive security issues

Avoid inconsistent level of the security

Determine activities that pay back faster during current state of the project

Page 23: Security as a new metric for Business, Product and Development Lifecycle
Page 24: Security as a new metric for Business, Product and Development Lifecycle

Remember I'm offering you the truth. Nothing More.

To do Security or not to Do

Page 25: Security as a new metric for Business, Product and Development Lifecycle

QA Engineer Security expert

In functional and performance testing, the expected results are

documented before the test begins, and the quality assurance team looks

at how well the expected results match the actual results

In security testing, security analysts team is concerned only with unexpected results and testing for the unknown and looking for weaknesses. They are EXPERTS.

VS.

Page 26: Security as a new metric for Business, Product and Development Lifecycle

Our app code need to be verified for

Security

PM and SoftServeDemonstrate excellenceCom

petitive advantage

Reporting for 2 security experts

Report with findings

Fix it! Non compliant?Good boys!

Security Center of Excellence

RequestApp

verification

PM

• Explain security defect and severity

• Fix identified security defects

• Train developers and QA• Transfer checklists and

guides

Great Achievement

Scenario 1. PM worried about security on project.Code micro-assessment.

Re-checkMonitor

Next page

How to present to client and earn more $$$ ?

• Scan sources with Tools• Filtering False Positive• Compile report• Review architecture• Dynamic test• Rate risks

Delivery Director/PM

Page 27: Security as a new metric for Business, Product and Development Lifecycle

Oh Rashid,

Who wrote it?

We have found some security issues with your legacy code

Indian team. Our security experts can perform comprehensive Security Assessment

And then our dev team will fix identified defects as it put other projects under risk

Ok, do it. How much should it cost?

Only $XX.XXXfor Security Assessment

Deal! Do it ASAP.

1 2

34

Page 28: Security as a new metric for Business, Product and Development Lifecycle

Report sample

Page 29: Security as a new metric for Business, Product and Development Lifecycle

DEVELOPMENT

Page 30: Security as a new metric for Business, Product and Development Lifecycle

Risks are for managers, not developers

Page 31: Security as a new metric for Business, Product and Development Lifecycle

PEOPLEalwaysbypass restrictionif possible

Keep in mind this when you design security

Page 32: Security as a new metric for Business, Product and Development Lifecycle

• Focus on functional requirements• Know about:

– OWASP Top 10– 1 threat (DEADLINE fail)

• Implement Requirements as they can• Testing it’s for QA job

«I know when I’m writing code I’m not thinking about evil, I’m just trying to think about functionality» (с)

Scott Hanselman

Developer & Security

Page 33: Security as a new metric for Business, Product and Development Lifecycle

Why code analysis do not resolve a problem?

Many of the CWE vulnerability types, are design issues, or business logic issues.

Application security testing tools are being sold as a solution to the

problem of insecure software.

Page 34: Security as a new metric for Business, Product and Development Lifecycle

Mobile banking app from Pakistan

Page 35: Security as a new metric for Business, Product and Development Lifecycle

What is wrong?

Page 36: Security as a new metric for Business, Product and Development Lifecycle

Recommended error messages by OWASPIncorrect Response Examples"Login for User foo: invalid password""Login failed, invalid user ID""Login failed; account disabled""Login failed; this user is not active"

Correct Response Example

"Login failed; Invalid userID or password"

https://www.owasp.org/index.php/Authentication_Cheat_Sheet

Page 37: Security as a new metric for Business, Product and Development Lifecycle

What is wrong on next stage of Login process?

Page 38: Security as a new metric for Business, Product and Development Lifecycle

Critical Business Logic bypass

There was possibility to get personal info (promo code, email, password etc.) of subscription which is not related to currently logged User using

Page 39: Security as a new metric for Business, Product and Development Lifecycle

Critical Business Logic bypass

There was possibility to make changes to personal info of subscription (email, password, name e.g.) using User.updateSubscription method even in case appropriate user is not logged in

Page 40: Security as a new metric for Business, Product and Development Lifecycle

Critical Business Logic bypass

• There is possibility to convert any standalone subscriptions to managed no matter whether appropriate user is logged in or not using User.setSubscriptionToManaged function (you can make any user to pay for paid features of your subscriptions)

Page 41: Security as a new metric for Business, Product and Development Lifecycle

Critical Business Logic bypass

There was possibility to delete subscriptions/credit card which are not related to currently logged user using User.deleteSubscription/deleteCredit Card function

Page 42: Security as a new metric for Business, Product and Development Lifecycle

Browser exploitation framework

Page 43: Security as a new metric for Business, Product and Development Lifecycle

Social Engineering

Page 44: Security as a new metric for Business, Product and Development Lifecycle

SQL-Injections to win a TripDumped admin password hashes

Page 45: Security as a new metric for Business, Product and Development Lifecycle

Simple SOAP request fuzzing allow collecting information about existent system users, their emails, VIN, Last access time, user ID and other confidential, user/car related information

Broken Session management

Page 46: Security as a new metric for Business, Product and Development Lifecycle

Why so simple?

Page 47: Security as a new metric for Business, Product and Development Lifecycle

Story about Hybrid Mobile Development

in India

Page 48: Security as a new metric for Business, Product and Development Lifecycle

Reversing Java/iOS application this app feature

Reversing Java / iOS application this app feature

Page 49: Security as a new metric for Business, Product and Development Lifecycle

WEAK Cryptography

v

Was cleaned up by Vendor Team

Page 50: Security as a new metric for Business, Product and Development Lifecycle

REMOVED CODE APPEARS AGAIN IN APPSTORE APP

v

Appear Again in App from AppStore

Page 51: Security as a new metric for Business, Product and Development Lifecycle

HARDCODED CREDENTIALS

v

vv

Severity: Critical (C )/P1

Business impact: Medium (M)/P3

Page 52: Security as a new metric for Business, Product and Development Lifecycle

BACKEND SECURITY

v

v

Severity: Critical (C )/P1

Business impact: Critical (C )/P1

Page 53: Security as a new metric for Business, Product and Development Lifecycle

WEAK PASSWORDSSeverity: Critical (C )/P1

Business impact: Critical (C )/P1

Page 54: Security as a new metric for Business, Product and Development Lifecycle

DEVELOPER TEAM FACEPALM

v

Page 55: Security as a new metric for Business, Product and Development Lifecycle

ENCRYPTION PASSWORD AFTER APPSTORE RELEASE

vv

v

v

v

v

Page 56: Security as a new metric for Business, Product and Development Lifecycle

SENSITIVE FILE ARTIFACTS

v

Severity: Low (L)/P4.

Business impact: No business impact

v v

Page 57: Security as a new metric for Business, Product and Development Lifecycle

All Apps are considered safe until proven guilty by a security review

Financial Institution

Page 58: Security as a new metric for Business, Product and Development Lifecycle

SENSITIVE CLIENT INFORMATION

AS A CONSEQUENCE – CUSTOMERS TRUST COULD BE LOST.

Page 59: Security as a new metric for Business, Product and Development Lifecycle

Customers database dump

Page 60: Security as a new metric for Business, Product and Development Lifecycle

defaults and sample files

Page 61: Security as a new metric for Business, Product and Development Lifecycle

Forgotten Files on server

Page 62: Security as a new metric for Business, Product and Development Lifecycle

Upload Java shell and take server under control

Page 63: Security as a new metric for Business, Product and Development Lifecycle

Are your product Popular?

You are Next Target

Page 64: Security as a new metric for Business, Product and Development Lifecycle

How to PROTECT?

Security Frameworks

Right Security Requirements

Penetration Testing

Code Scan and Review

Security Trainings

Threat Modelling

Dedicated Security Expert

OWASP.org

Page 65: Security as a new metric for Business, Product and Development Lifecycle

Add Security into your PROCESS

Page 66: Security as a new metric for Business, Product and Development Lifecycle

Security

Page 67: Security as a new metric for Business, Product and Development Lifecycle

THANK YOU67

Contact me:skype: root_ntemail: [email protected]

Join OWASP:http://owasp-lviv.blogspot.com/

FEEDBACK &

QUESTIONS

Page 68: Security as a new metric for Business, Product and Development Lifecycle

Home Work