software security: is ok good enough? owasp appsec usa 2011

45
© Copyright 2011 Denim Group - All Rights Reserved Software Security: Is OK Good Enough? Appsec USA 2011 September 22, 2011 John B. Dickson, CISSP Denim Group, Ltd. @johnbdickson

Upload: denim-group

Post on 21-Jan-2015

1.342 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Software Security: Is OK Good

Enough?

Appsec USA 2011

September 22, 2011

John B. Dickson, CISSP

Denim Group, Ltd.

@johnbdickson

Page 2: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

OWASP AppSec 2011

1

Page 3: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

OWASP AppSec 2011

2

Page 4: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

OWASP AppSec 2011

3

Page 5: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Personal Background

4

Page 6: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Personal Background

5

Page 7: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

OWASP AppSec 2011

6

Page 8: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Software Security: Is OK Good Enough?

• Current State of Affairs in Software Security

• What we can Learn from Other Justification Models

• Potential Software Security Justification Models

• Questions and Answers

7

Page 9: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Current State of Affairs in Software Security

• Testing approaches differ wildly

• Incredible amount of energy focused on technical merits and demerits

of testing activities

– Existing application security scanners identify a subset of vulnerabilities in

applications

– 30-40% Coverage level is accepted norm

– SQL injection/XSS – yes

– Authorization & business logic – not so much

8

Page 10: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Firewall?

1996 Network Security Question?

Page 11: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

I’ve run my Automated SQL

Injection & XSS Application

Scanner?

2011 Application Security Question?

Page 12: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Page 13: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Checkbox Culture

• Compliance culture and resource constraints have limited software

security coverage

• This cuts to the heart of “OK”

• Heartland Payments Systems breach and PCI test coverage

– Organizations try to limit PCI audit by design, even if many view PCI DSS as the

most rigorous application security compliance framework

12

Page 14: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 13

Page 15: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 14

(drawn to scale)

Page 16: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 15

Page 17: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 16

Page 18: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 17

Going Concern: In accounting,

"going concern" refers to a

company's ability to continue

functioning as a business entity.

Page 19: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 18

Page 20: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 19

What do Street Vendor food and iTunes applications have in

common?

Page 21: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 20

Introduction of malware into iTunes & Droid Apps stores

• Applications submitted to the Apple iTunes AppStore and the Google

Android store do not undergo rigorous security testing

• Both application stores do not do "white listing” per se

Page 22: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 21

New York City

• 24,000 restaurants inspected/year

• Point-based rating scale

• 3 Categories of violations

• Public health hazard (7 points)

• Critical violation (5 points)

• General violation (2 points)

Page 23: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 22

Venture a Guess?

• 3 Categories of violations

• Public health hazard (7 points)

• Critical violation (5 points)

• General violation (2 points)

Page 24: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 23

Venture a Guess?

• 3 Categories of violations

• Public health hazard (7 points)

• Critical violation (5 points)

• General violation (2 points)

Page 25: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 24

What we can Learn from Other Justification Models

– Earthquake Building Codes

Haiti vs. Chile

Page 26: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 25

What we can Learn from Other Justification Models

• What we can learn from these two models?

• No model is based purely on industry-driven compliance

– Have no regulation is bad

• Starting point is a generally accepted need for regulation

– Buyers need to demand software “seatbelts”

– Political consensus in Chile & California to enforce more stringent building codes

• Must have Rule of Law present to enforce regulation

– Building codes were in place in both Chile & Haiti

• Misguided regulation may be more destructive than no regulation at all

– e.g., Sarbanes Oxley

Page 27: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 26

So where do you go from here?

Page 28: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Software Security Justification Models in an “OK” World

What can be Done Globally?

27

Page 29: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

We need more Earthquakes

28

Page 30: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

We Need Better Mainstream Scary Stories

29

Page 31: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

We Need Better Mainstream Scary Stories

30

Page 32: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

We Need Smarter buyers

31

Page 33: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 32

There’s an App for That!

Page 34: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Software Security Justification Models in an “OK” World

- In the World you Influence

33

Page 35: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Tailor Responses for Limited Resources

- ASVS “Applied” Case Study

34

• Financial Services firm services 2,000 + banks

• Before

• Reactive testing

• No repeatable or predictable

• Poor coverage

• After

• Acceptable level of security testing

• Applied 80/20 rule to clients

• Predictable results

• Mutually understood results

Page 36: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Tailor Responses for Limited Resources

- Open Software Security Maturity Model (OpenSAMM)

35

Page 37: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Tailor Responses for Limited Resources

36

Measure, Measure, Measure

Page 38: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

Realize that Sales & Marketing is our #1 Job

37

Page 39: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

We Need Better Developers

• Is it enough to say you are “Rugged”

• We need software developers to elevate their coding practices to

lower the number of obvious security vulnerabilities

• These developers need better tools

– Modern frameworks

– Static analysis baked into build

• Starting point – software engineers need to be further along out of

college

• Industry responses

– Carrot & stick models

38

Page 40: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

The New Negligence:

Eliminate SQL Injections and XSS

39

Page 41: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

The Negligence:

SQL Injections and XSS

40

XSS &

SQL Injections

Page 42: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

We need better coverage of attack space

41

Page 43: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

We need better coverage of attack space

42

Page 44: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved

We need better coverage of attack space

43

Page 45: Software Security: Is OK Good Enough? OWASP AppSec USA 2011

© Copyright 2011 Denim Group - All Rights Reserved 44

Questions, Answers, & Contact

John B. Dickson, CISSP

[email protected]

(210) 572-4400

www.denimgroup.com

blog.denimgroup.com

Twitter: @johnbdickson