Introduction to Appsec Combined Keynote PDF
Introduction to Appsec Combined Keynote PDF
Security (AppSec)
By Christophe Limpalair
Popular PHP Frameworks
Course Pre-Requisites
Course Pre-Requisites
‣ Web
‣ Mobile
‣ Cloud
Let’s answer questions you have
Let’s answer questions you have
NICE Framework
NICE Framework
Developed in partnership with:
‣ NICE
Concerns processes
Focuses on processes Focuses on processes
and activities related Focused on processes
and activities for how and activities related
to how an organization and activities related Encompasses
an organization to how an organization
defines goals and to how an organization activities necessary to
manages software checks and tests
creates software builds and deploys ensure confidentiality,
development. Includes artifacts produced
within development software components integrity, and
cross-functional through software
projects. Usually and its related defects. availability are
groups involved in development. Typically
includes requirements The goal is to ship maintained through
development and includes QA work
gathering, high-level reliably working the lifetime of an app
business processes such as testing, but
architecture software with and its data.
established at the can also include other
specification and minimum defects
organization level review activities
detailed design
OWASP SAMM
Governance Design Implementation Verification Operations
Architecture
Strategy & Metrics Threat Assessment Secure Build Incident Management
Assessment
Requirements-driven Environment
Policy & Compliance Security Requirements Secure Deployment
Testing Management
Operational
Education & Guidance Security Architecture Defect Management Security Testing
Management
Governance -> Strategy & Metrics
Stream A Stream B
Maturity Level
Create and Promote Measure and Improve
Publish a unified strategy for application Set targets and KPIs for measuring the program
Level 2
security effectiveness
Align the application security program to Influence the strategy based on the metrics and
Level 3
support the organization’s growth organizational needs
OWASP Proactive Controls
http://example.com/app/accountView?
id=' or ‘1’='1
U:
P:
U:
P:
U:
P:
U:
P:
Organizations who experienced a cloud
security incident in the last 12 months
Yes No
28%
72%
Source: https://www.isc2.org/-/media/ISC2/Landing-Pages/2019-Cloud-Security-Report-
ISC2.ashx?la=en
Organizations who experienced a cloud
security incident in the last 12 months
Source: https://www.isc2.org/-/media/ISC2/Landing-Pages/2019-Cloud-Security-Report-
ISC2.ashx?la=en
DoS Attack Website Customer
DDoS Attack Website Customer
Victim Command & Control Botnet
‣ Spamming
‣ Credential Stuffing
‣ Brute force attacks
‣ DDoS
‣ Etc…
OSI Model
Application
Layer 7
Network process to application
Presentation
Layer 6
Data representation and encryption
Session
Layer 5
Maintains connections & controls ports/sessions
Transport
Layer 4
End-to-end connections and reliability
Network
Layer 3
Path determination and IP
Data Link
Layer 2
Defines format of data on network
Physical
Layer 1
Media, signal, and binary transmission
OSI Model -> Infrastructure Layer Attacks
Application
Layer 7
Network process to application
Presentation
Layer 6
Data representation and encryption ‣ Include attack vectors like SYN
Session
and UDP floods
Layer 5
Maintains connections & controls ports/sessions
‣ Usually larger in volume
Transport
Layer 4
End-to-end connections and reliability ‣ Aim to overload capacity of
Network
network or app servers
Layer 3
Path determination and IP
‣ Usually easier to detect &
Layer 2
Data Link defend
Defines format of data on network
Physical
Layer 1
Media, signal, and binary transmission
OSI Model -> Application Layer Attacks
Application
Layer 7
Network process to application
Presentation
Layer 6
Data representation and encryption
Session
Layer 5
Maintains connections & controls ports/sessions ‣ Typically smaller in volume, and
can do more damage with
Layer 4
Transport fewer resources
End-to-end connections and reliability
Network
‣ Can be harder to prevent since
Layer 3
Path determination and IP it looks like legitimate traffic
Data Link
Layer 2
Defines format of data on network
Physical
Layer 1
Media, signal, and binary transmission
Veracode State of Software Vol. 10
Apps with at least 1 flaw Apps with no found flaws Apps with at least 1 flaw Apps with no found flaws
9% 5%
iOS Android
91% 95%
Source: https://www.veracode.com/state-of-software-security-report
% Tested Mobile Apps with >= 1 Critical/High Severity Issue
90%
60%
30%
0%
2016 2017 2018
Source: https://community.microfocus.com/t5/Security-Blog/2019-AppSec-Risk-
Report-Key-Takeaways/ba-p/2701724
Android
‣ iOS releases are pushed to all devices and users can apply those
updates faster
Considerations for mobile development
‣ Stored data
‣ Permissions
‣ Compiler options
‣ …
Web services MASVS Requirements Scope
ASVS Requirements Scope MASVS Requirements Scope
Web services
Organizations that experienced a cloud
security incident in the last 12 months
Yes No
28%
72%
Source: https://www.isc2.org/-/media/ISC2/Landing-Pages/2019-Cloud-Security-Report-
ISC2.ashx?la=en
Most experienced security incidents in
past 12 months
Exposed Data
Malware Infection
Account Compromises
Vulnerability Exploit
Source: https://www.isc2.org/-/media/ISC2/Landing-Pages/2019-Cloud-Security-Report-
ISC2.ashx?la=en
3 Biggest Cloud Security Threats
Misconfiguration of
Unauthorized Access Insecure interfaces & APIs
Cloud Platform
Source: https://www.isc2.org/-/media/ISC2/Landing-Pages/2019-Cloud-Security-Report-
ISC2.ashx?la=en
Top 3 barriers to cloud-based security
adoption
Source: https://www.isc2.org/-/media/ISC2/Landing-Pages/2019-Cloud-Security-Report-
ISC2.ashx?la=en
Top 2 barriers to cloud adoption
Source: https://www.isc2.org/-/media/ISC2/Landing-Pages/2019-Cloud-Security-Report-
ISC2.ashx?la=en
Organizations that agree their employees
would benefit from security training and certs
Yes No
39%
61%
Source: https://www.isc2.org/-/media/ISC2/Landing-Pages/2019-Cloud-Security-Report-
ISC2.ashx?la=en
Which topics would be most valuable for
ongoing training and education?
Cloud-enabled cybersecurity
Application Security
Incident Response
DevOps
Regulatory Compliance
Mobile Security
IoT
Source: https://www.isc2.org/-/media/ISC2/Landing-Pages/2019-Cloud-Security-Report-
ISC2.ashx?la=en
Security issues that caused major breaches
and incidents in cloud environments
1. Misconfiguration
4. DDoS Attacks
Source: https://www.hitachi-systems-security.com/blog/2019-cybersecurity-roundup-the-
state-of-cloud-security/
Misconfiguration
IAM in the Cloud
IAM in the Cloud
•Write access?
•Download access?
•Limit to 2 months?
•Corporate network only?
•Require MFA?
IAM in the Cloud
Poor Data Visibility
Poor Data Visibility
??? ???
DDoS Attacks
Shared Data Responsibility Confusion
Shared Data Responsibility Confusion
Organizations that have experienced security events due
to confusion over who is responsible for data security
Yes No
18%
82%
Source: https://www.oracle.com/a/ocom/docs/cloud/cloud-threat-report-2019-executive-
summary.pdf
AWS Shared Responsibility Model
IAM: Access Control and Permissions
IAM
IAM: Access Control and Permissions
Policy
Amazon EC2 Amazon S3
Role
Username
Password
IAM: Access Control and Permissions
Data B
Policy
Amazon EC2 Amazon S3
Role
Data A
Username
Password
IAM: Access Control and Permissions
Request Policy
API
GET
POST
… Role
Or
User
IAM: Best Practices
‣ Components w/ known
vulns
‣ Broken authentication
Data Logging & Monitoring
‣ Broken access control
‣ Broken authentication
‣ Broken access control
Securing our API: Identity & Access
+ API keys
Web Application Firewall
Request
Firewall Authorization API
GET
POST
…
Rules ‣ IAM
‣ Amazon Cognito
‣ Lambda authorizers
Data processing
4. API sends response back 3. API processes the data
Securing our API: Data
Data processing
4. API sends response back 3. API processes the data
Securing our API: Data
Data processing
4. API sends response back 3. API processes the data
Securing our API: Data
‣ Password: iamagreenbutterfly0298
‣ Salt: th3b1u3b0n3t
‣ Hash (SHA-256):
7528ed35c6ebf7e4661a02fd98ab88d92ccf4e48a4b27338f
cc194b90ae8855c
Securing our API: Infrastructure
Generic
SDLC
Deploy Design
Develop
Prioritization
‣ Unit
‣ Integration
‣ System
‣ Acceptance
Static Analysis
Code
!
Dynamic Analysis
Code
!
Manual Review
Code
!
Research by Veracode found that organizations
which scan their code more than
300/year
Had
5x
less security debt than organizations
which didn’t
Source: https://www.veracode.com/state-of-software-security-report
Pentesting
Maintain Define
Pentesting
Generic
SDLC
Deploy Design
Develop
Documentation and reports
Generic
SDLC
Deploy Design
Develop
Tools People
Processes
Where you
want to be
Where you
are now
Where you
want to be
Where you
are now
‣ NICE Framework
‣ SAMM
‣ ASVS
‣ Threat Modeling
‣ Proactive Controls
‣ …
Understand the top risks
‣ Static Analysis
‣ Dynamic Analysis
‣ Manual Review
‣ Pentesting
‣ and others
Thanks for taking the
course!