SlideShare a Scribd company logo
© 2019 Denim Group – All Rights Reserved
Building a world where technology is trusted.
Enumerating Enterprise
Attack Surface
Dan Cornell | CTO
© 2019 Denim Group – All Rights Reserved
Dan Cornell
• Founder and CTO of Denim
Group
• Software developer by
background
• OWASP San Antonio co-leader
• 20 years experience in software
architecture, development, and
security
© 2019 Denim Group – All Rights Reserved
2
Advisory
Services
Assessment
Services
Remediation
Services
Vulnerability Resolution
Platform
Building a world where technology is trusted
How we can help:
Denim Group is solely focused on helping build resilient
software that will withstand attacks.
• Since 2001, helping secure software
• Development background
• Tools + services model
© 2019 Denim Group – All Rights Reserved
So You Want To Roll Out a
Software Security Program?
• Great!
• What a software security program ISN’T
• Question: “What are you doing to address software
security concerns?”
• Answer: “We bought scanner XYZ”
• What a software security program IS
• People, process, tools (naturally)
• Set of activities intended to repeatedly produce
appropriately-secure software
3
© 2019 Denim Group – All Rights Reserved
Challenges Rolling Out
Software Security Programs
• Resources
• Raw budget and cost issues
• Level of effort issues
• Resistance: requires organizational change
• Apparently people hate this
• Open source tools
• Can help with raw budget issues
• May exacerbate problems with level of effort
• View the rollout as a multi-stage process
• Not one magical effort
• Use short-term successes and gains to fuel further change
4
© 2019 Denim Group – All Rights Reserved 5
You can’t defend unknown
attack surface
If everything is important
then nothing is important
© 2019 Denim Group – All Rights Reserved
[Translation]
Find out what applications you
have in your organization
Decide the relative importance of
applications and treat them
differently based on this
6
© 2019 Denim Group – All Rights Reserved
What Is Your Software
Attack Surface?
7
Software You
Currently Know
About
Why?
• Lots of value flows through it
• Auditors hassle you about it
• Formal SLAs with customers mention it
• Bad guys found it and caused an
incident (oops)
What?
• Critical legacy systems
• Notable web applications
© 2019 Denim Group – All Rights Reserved
What Is Your Software
Attack Surface?
8
Add In the Rest
of the Web
Applications You
Actually Develop
and Maintain
Why Did You Miss Them?
• Forgot it was there
• Line of business procured through non-
standard channels
• Picked it up through a merger /
acquisition
What?
• Line of business applications
• Event-specific applications
© 2019 Denim Group – All Rights Reserved
What Is Your Software
Attack Surface?
9
Add In the
Software You
Bought from
Somewhere
Why Did You Miss Them?
• Most scanner only really work on web
applications so no vendors pester you
about your non-web applications
• Assume the application vendor is
handling security
What?
• More line of business applications
• Support applications
• Infrastructure applications
© 2019 Denim Group – All Rights Reserved
What Is Your Software
Attack Surface?
10
MOBILE!
THE CLOUD!
Why Did You Miss Them?
• Any jerk with a credit card and the ability
to submit an expense report is now runs
their own private procurement office
What?
• Support for line of business functions
• Marketing and promotion
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• Two Dimensions:
• Perception of Software Attack Surface
• Insight into Exposed Assets
11
Perception
Insight
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• As perception of the problem of attack
surface widens the scope of the problem
increases
12
Perception
Insight
Web
Applications
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• As perception of the problem of attack
surface widens the scope of the problem
increases
13
Perception
Insight
Web
Applications
Client-Server
Applications
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• As perception of the problem of attack
surface widens the scope of the problem
increases
14
Perception
Insight
Web
Applications
Client-Server
Applications
Desktop
Applications
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• As perception of the problem of attack
surface widens the scope of the problem
increases
15
Perception
Insight
Web
Applications
Client-Server
Applications
Desktop
Applications
Cloud
Applications
and Services
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• As perception of the problem of attack
surface widens the scope of the problem
increases
16
Perception
Insight
Web
Applications
Client-Server
Applications
Desktop
Applications
Cloud
Applications
and Services
Mobile
Applications
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• Discovery activities increase insight
17
Perception
Insight
Web
Applications
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• Discovery activities increase insight
18
Perception
Insight
Web
Applications
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• Discovery activities increase insight
19
Perception
Insight
Web
Applications
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• Over time you end up with a progression
20
Perception
Insight
Web
Applications
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• Over time you end up with a progression
21
Perception
Insight
Web
Applications
Client-Server
Applications
© 2019 Denim Group – All Rights Reserved
Desktop
Applications
Client-Server
Applications
Attack Surface: The
Security Officer’s Journey
• Over time you end up with a progression
22
Perception
Insight
Web
Applications
© 2019 Denim Group – All Rights Reserved
Desktop
Applications
Client-Server
Applications
Attack Surface: The
Security Officer’s Journey
• Over time you end up with a progression
23
Perception
Insight
Web
Applications
Cloud
Applications
and Services
© 2019 Denim Group – All Rights Reserved
Desktop
Applications
Client-Server
Applications
Attack Surface: The
Security Officer’s Journey
• Over time you end up with a progression
24
Perception
Insight
Web
Applications
Cloud
Applications
and Services
Mobile
Applications
© 2019 Denim Group – All Rights Reserved
Attack Surface: The
Security Officer’s Journey
• When you reach this point it is called
“enlightenment”
• You won’t reach this point
25
Perception
Insight
Web
Applications
Client-Server
Applications
Desktop
Applications
Cloud
Applications
and Services
Mobile
Applications
© 2019 Denim Group – All Rights Reserved
First Decision
• What is considered to be in scope?
• Depends on how you want to manage
vulnerabilities and manage risk
26
© 2019 Denim Group – All Rights Reserved
Process
• Identify Application “Homes”
• Enumerate Applications
• Collect Metadata
• Repeat as Needed
27
© 2019 Denim Group – All Rights Reserved
So Where Are These Applications?
• Your Datacenters
• 3rd Party Datacenters
• Cloud Providers
28
© 2019 Denim Group – All Rights Reserved
Enumerating Applications
• Technical
• Network inspection
• DNS and other registry inspection
• Non-technical
• Interviews
• Other research
29
© 2019 Denim Group – All Rights Reserved
IP Range Detection
• IPOsint: https://github.com/j3ssie/IPOsint
• ip-osint.py –t CompanyName
• Data sources:
• Whois
• Ripe
• Arin
• Hurricane
• Censys
• securitytrails
30
© 2019 Denim Group – All Rights Reserved
Network Inspection
• nmap: https://nmap.org/
• Look for common web server ports:
• 80, 443, 8000, 8008, 8080, 8443
• Others depending on your environment
• nmap -sS -p 80,443,8000,8008,8080,8443 x.y.z.0/24
• Great for dense environments you control
• Largely datacenters
https://www.denimgroup.com/resources/blog/2016/03/threadfix-in-action-discovering-your-organizations-software-attack-surface-web-app-edition/
31
© 2019 Denim Group – All Rights Reserved
DNS Inspection
• SubFinder: https://github.com/subfinder/subfinder
• docker run -it subfinder -d target.org
• Can get even more data with service-specific
API keys
• OWASP Amass: https://github.com/OWASP/Amass
• sudo docker run amass --passive -d target.org
32
© 2019 Denim Group – All Rights Reserved
Mobile Application Identification
• Scumbler: https://github.com/Netflix-Skunkworks/Scumblr
• Purpose of tool evolved over time
• Not currently maintained – looking for
maintainers
33
© 2019 Denim Group – All Rights Reserved
Interviews
• Line-of-business representatives
• Will need to translate their definition of
“application” to your definition
• Think in terms of business processes and
these can map to multiple applications and
microservices
• Tech leads
• More familiar with the deployed infrastructure
and other assets
34
© 2019 Denim Group – All Rights Reserved
Other Research
• Disaster recover plans
• Accounting
• Find cloud providers
35
© 2019 Denim Group – All Rights Reserved
What is an ”Application”
• What assets do we have?
• IP addresses
• Host names
• Mobile apps
• Business view of “applications”
• Challenge: Create a consolidated view
• Challenge: Correlate applications and the
supporting infrastructure
36
© 2019 Denim Group – All Rights Reserved
Collect Metadata
• Technical: Language, Scale
• Architectural: Web, Mobile
• Exposure: Public, Partner, Internal
• Regulatory: PCI, HIPAA, GDPR
37
© 2019 Denim Group – All Rights Reserved
Value and Risk Are Not
Equally Distributed
• Some Applications Matter More Than Others
• Value and character of data being managed
• Value of the transactions being processed
• Cost of downtime and breaches
• Therefore All Applications Should Not Be
Treated the Same
• Allocate different levels of resources to assurance
• Select different assurance activities
• Also must often address compliance and
regulatory requirements
38
© 2019 Denim Group – All Rights Reserved
Do Not Treat All Applications
the Same
• Allocate Different Levels of Resources to
Assurance
• Select Different Assurance Activities
• Also Must Often Address Compliance and
Regulatory Requirements
39
© 2019 Denim Group – All Rights Reserved
Rinse and Repeat
• This list will change over time
• Metadata will change
• This is especially true in a world of
microservices
40
© 2019 Denim Group – All Rights Reserved 41
You can’t defend unknown
attack surface
If everything is important
then nothing is important
© 2019 Denim Group – All Rights Reserved
[Translation]
Find out what applications you
have in your organization
Decide the relative importance of
applications and treat them
differently based on this
42
© 2019 Denim Group – All Rights Reserved
Questions
43
© 2019 Denim Group – All Rights Reserved
Building a world where technology is trusted.
@denimgroup
www.denimgroup.com
44
dan@denimgroup.com

More Related Content

What's hot (20)

PDF
How to Integrate AppSec Testing into your DevOps Program
Denim Group
 
PDF
Securing Voting Infrastructure before the Mid-Term Elections
Denim Group
 
PDF
The Magic of Symbiotic Security
Denim Group
 
PDF
SecDevOps: Development Tools for Security Pros
Denim Group
 
PDF
Monitoring Attack Surface to Secure DevOps Pipelines
Denim Group
 
PDF
OWASP San Antonio Meeting 10/2/20
Denim Group
 
PDF
Do You Have a Scanner or Do You Have a Scanning Program? (AppSecEU 2013)
Denim Group
 
PDF
An Updated Take: Threat Modeling for IoT Systems
Denim Group
 
PDF
The ThreadFix Ecosystem: Vendors, Volunteers, and Versions
Denim Group
 
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
PDF
Mobile Application Assessment By the Numbers: a Whole-istic View
Denim Group
 
PPTX
Building an AppSec Pipeline: Keeping your program, and your life, sane
weaveraaaron
 
PDF
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Denim Group
 
PDF
2018 NAMIC - Practical Applications for Web Services
Phil Reynolds
 
PDF
How-To-Guide for Software Security Vulnerability Remediation
Denim Group
 
PDF
Secure DevOps with ThreadFix 2.3
Denim Group
 
PDF
2018 NAMIC Farm Forum
Phil Reynolds
 
PPTX
The Coming OSS Sustainability Crisis
Aaron Stannard
 
PDF
Real Cost of Software Remediation
Denim Group
 
PPTX
5 strategies for enterprise cloud infrastructure success
Rogue Wave Software
 
How to Integrate AppSec Testing into your DevOps Program
Denim Group
 
Securing Voting Infrastructure before the Mid-Term Elections
Denim Group
 
The Magic of Symbiotic Security
Denim Group
 
SecDevOps: Development Tools for Security Pros
Denim Group
 
Monitoring Attack Surface to Secure DevOps Pipelines
Denim Group
 
OWASP San Antonio Meeting 10/2/20
Denim Group
 
Do You Have a Scanner or Do You Have a Scanning Program? (AppSecEU 2013)
Denim Group
 
An Updated Take: Threat Modeling for IoT Systems
Denim Group
 
The ThreadFix Ecosystem: Vendors, Volunteers, and Versions
Denim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
Mobile Application Assessment By the Numbers: a Whole-istic View
Denim Group
 
Building an AppSec Pipeline: Keeping your program, and your life, sane
weaveraaaron
 
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Denim Group
 
2018 NAMIC - Practical Applications for Web Services
Phil Reynolds
 
How-To-Guide for Software Security Vulnerability Remediation
Denim Group
 
Secure DevOps with ThreadFix 2.3
Denim Group
 
2018 NAMIC Farm Forum
Phil Reynolds
 
The Coming OSS Sustainability Crisis
Aaron Stannard
 
Real Cost of Software Remediation
Denim Group
 
5 strategies for enterprise cloud infrastructure success
Rogue Wave Software
 

Similar to Enumerating Enterprise Attack Surface (20)

PDF
Structuring and Scaling an Application Security Program
Denim Group
 
PDF
Reducing Attack Surface in Budget Constrained Environments
Denim Group
 
PDF
Application Asset Management with ThreadFix
Denim Group
 
PDF
The Permanent Campaign
Denim Group
 
PDF
Skeletons in the Closet: Securing Inherited Applications
Denim Group
 
PDF
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
Denim Group
 
PDF
Software Security for Project Managers: What Do You Need To Know?
Denim Group
 
PDF
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Denim Group
 
PDF
Top Strategies to Capture Security Intelligence for Applications
Denim Group
 
PDF
Application Security Program Management with Vulnerability Manager
Denim Group
 
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
Cenzic
 
PDF
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Denim Group
 
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
PDF
AppSec in a World of Digital Transformation
Denim Group
 
PPTX
Forget cyber, it's all about AppSec
Adrien de Beaupre
 
PDF
Developing Secure Mobile Applications
Denim Group
 
PPT
Software Security in the Real World
Mark Curphey
 
PPTX
Top Cybersecurity Challenges Facing Your Business
Nicholas Davis
 
PPTX
Does Anyone Remember Enterprise Security Architecture?
rbrockway
 
PPTX
Turning security into code by Jeff Williams
DevSecCon
 
Structuring and Scaling an Application Security Program
Denim Group
 
Reducing Attack Surface in Budget Constrained Environments
Denim Group
 
Application Asset Management with ThreadFix
Denim Group
 
The Permanent Campaign
Denim Group
 
Skeletons in the Closet: Securing Inherited Applications
Denim Group
 
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
Denim Group
 
Software Security for Project Managers: What Do You Need To Know?
Denim Group
 
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Denim Group
 
Top Strategies to Capture Security Intelligence for Applications
Denim Group
 
Application Security Program Management with Vulnerability Manager
Denim Group
 
Essentials of Web Application Security: what it is, why it matters and how to...
Cenzic
 
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Denim Group
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
AppSec in a World of Digital Transformation
Denim Group
 
Forget cyber, it's all about AppSec
Adrien de Beaupre
 
Developing Secure Mobile Applications
Denim Group
 
Software Security in the Real World
Mark Curphey
 
Top Cybersecurity Challenges Facing Your Business
Nicholas Davis
 
Does Anyone Remember Enterprise Security Architecture?
rbrockway
 
Turning security into code by Jeff Williams
DevSecCon
 
Ad

More from Denim Group (16)

PDF
Long-term Impact of Log4J
Denim Group
 
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Denim Group
 
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
PDF
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Denim Group
 
PPTX
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Denim Group
 
PDF
A New View of Your Application Security Program with Snyk and ThreadFix
Denim Group
 
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
PDF
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Denim Group
 
PDF
Optimize Your Security Program with ThreadFix 2.7
Denim Group
 
PDF
Application Security Testing for a DevOps Mindset
Denim Group
 
PDF
Threat Modeling for IoT Systems
Denim Group
 
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
 
PDF
Elevate Your Application Security Program with Burp Suite and ThreadFix
Denim Group
 
Long-term Impact of Log4J
Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Denim Group
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Denim Group
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Denim Group
 
A New View of Your Application Security Program with Snyk and ThreadFix
Denim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Denim Group
 
Optimize Your Security Program with ThreadFix 2.7
Denim Group
 
Application Security Testing for a DevOps Mindset
Denim Group
 
Threat Modeling for IoT Systems
Denim Group
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
 
Elevate Your Application Security Program with Burp Suite and ThreadFix
Denim Group
 
Ad

Recently uploaded (20)

PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
PDF
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
PDF
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
PPTX
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
PDF
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
PPTX
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
PDF
Modern Decentralized Application Architectures.pdf
Kalema Edgar
 
PDF
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
PDF
Introducing and Operating FME Flow for Kubernetes in a Large Enterprise: Expe...
Safe Software
 
PDF
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PPTX
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
PPTX
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
 
PDF
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
PDF
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
PPTX
Securing Model Context Protocol with Keycloak: AuthN/AuthZ for MCP Servers
Hitachi, Ltd. OSS Solution Center.
 
PPTX
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
PPTX
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
PDF
Draugnet: Anonymous Threat Reporting for a World on Fire
treyka
 
PDF
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
Modern Decentralized Application Architectures.pdf
Kalema Edgar
 
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
Introducing and Operating FME Flow for Kubernetes in a Large Enterprise: Expe...
Safe Software
 
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
 
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
Securing Model Context Protocol with Keycloak: AuthN/AuthZ for MCP Servers
Hitachi, Ltd. OSS Solution Center.
 
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
Draugnet: Anonymous Threat Reporting for a World on Fire
treyka
 
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 

Enumerating Enterprise Attack Surface

  • 1. © 2019 Denim Group – All Rights Reserved Building a world where technology is trusted. Enumerating Enterprise Attack Surface Dan Cornell | CTO
  • 2. © 2019 Denim Group – All Rights Reserved Dan Cornell • Founder and CTO of Denim Group • Software developer by background • OWASP San Antonio co-leader • 20 years experience in software architecture, development, and security
  • 3. © 2019 Denim Group – All Rights Reserved 2 Advisory Services Assessment Services Remediation Services Vulnerability Resolution Platform Building a world where technology is trusted How we can help: Denim Group is solely focused on helping build resilient software that will withstand attacks. • Since 2001, helping secure software • Development background • Tools + services model
  • 4. © 2019 Denim Group – All Rights Reserved So You Want To Roll Out a Software Security Program? • Great! • What a software security program ISN’T • Question: “What are you doing to address software security concerns?” • Answer: “We bought scanner XYZ” • What a software security program IS • People, process, tools (naturally) • Set of activities intended to repeatedly produce appropriately-secure software 3
  • 5. © 2019 Denim Group – All Rights Reserved Challenges Rolling Out Software Security Programs • Resources • Raw budget and cost issues • Level of effort issues • Resistance: requires organizational change • Apparently people hate this • Open source tools • Can help with raw budget issues • May exacerbate problems with level of effort • View the rollout as a multi-stage process • Not one magical effort • Use short-term successes and gains to fuel further change 4
  • 6. © 2019 Denim Group – All Rights Reserved 5 You can’t defend unknown attack surface If everything is important then nothing is important
  • 7. © 2019 Denim Group – All Rights Reserved [Translation] Find out what applications you have in your organization Decide the relative importance of applications and treat them differently based on this 6
  • 8. © 2019 Denim Group – All Rights Reserved What Is Your Software Attack Surface? 7 Software You Currently Know About Why? • Lots of value flows through it • Auditors hassle you about it • Formal SLAs with customers mention it • Bad guys found it and caused an incident (oops) What? • Critical legacy systems • Notable web applications
  • 9. © 2019 Denim Group – All Rights Reserved What Is Your Software Attack Surface? 8 Add In the Rest of the Web Applications You Actually Develop and Maintain Why Did You Miss Them? • Forgot it was there • Line of business procured through non- standard channels • Picked it up through a merger / acquisition What? • Line of business applications • Event-specific applications
  • 10. © 2019 Denim Group – All Rights Reserved What Is Your Software Attack Surface? 9 Add In the Software You Bought from Somewhere Why Did You Miss Them? • Most scanner only really work on web applications so no vendors pester you about your non-web applications • Assume the application vendor is handling security What? • More line of business applications • Support applications • Infrastructure applications
  • 11. © 2019 Denim Group – All Rights Reserved What Is Your Software Attack Surface? 10 MOBILE! THE CLOUD! Why Did You Miss Them? • Any jerk with a credit card and the ability to submit an expense report is now runs their own private procurement office What? • Support for line of business functions • Marketing and promotion
  • 12. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • Two Dimensions: • Perception of Software Attack Surface • Insight into Exposed Assets 11 Perception Insight
  • 13. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • As perception of the problem of attack surface widens the scope of the problem increases 12 Perception Insight Web Applications
  • 14. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • As perception of the problem of attack surface widens the scope of the problem increases 13 Perception Insight Web Applications Client-Server Applications
  • 15. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • As perception of the problem of attack surface widens the scope of the problem increases 14 Perception Insight Web Applications Client-Server Applications Desktop Applications
  • 16. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • As perception of the problem of attack surface widens the scope of the problem increases 15 Perception Insight Web Applications Client-Server Applications Desktop Applications Cloud Applications and Services
  • 17. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • As perception of the problem of attack surface widens the scope of the problem increases 16 Perception Insight Web Applications Client-Server Applications Desktop Applications Cloud Applications and Services Mobile Applications
  • 18. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • Discovery activities increase insight 17 Perception Insight Web Applications
  • 19. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • Discovery activities increase insight 18 Perception Insight Web Applications
  • 20. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • Discovery activities increase insight 19 Perception Insight Web Applications
  • 21. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • Over time you end up with a progression 20 Perception Insight Web Applications
  • 22. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • Over time you end up with a progression 21 Perception Insight Web Applications Client-Server Applications
  • 23. © 2019 Denim Group – All Rights Reserved Desktop Applications Client-Server Applications Attack Surface: The Security Officer’s Journey • Over time you end up with a progression 22 Perception Insight Web Applications
  • 24. © 2019 Denim Group – All Rights Reserved Desktop Applications Client-Server Applications Attack Surface: The Security Officer’s Journey • Over time you end up with a progression 23 Perception Insight Web Applications Cloud Applications and Services
  • 25. © 2019 Denim Group – All Rights Reserved Desktop Applications Client-Server Applications Attack Surface: The Security Officer’s Journey • Over time you end up with a progression 24 Perception Insight Web Applications Cloud Applications and Services Mobile Applications
  • 26. © 2019 Denim Group – All Rights Reserved Attack Surface: The Security Officer’s Journey • When you reach this point it is called “enlightenment” • You won’t reach this point 25 Perception Insight Web Applications Client-Server Applications Desktop Applications Cloud Applications and Services Mobile Applications
  • 27. © 2019 Denim Group – All Rights Reserved First Decision • What is considered to be in scope? • Depends on how you want to manage vulnerabilities and manage risk 26
  • 28. © 2019 Denim Group – All Rights Reserved Process • Identify Application “Homes” • Enumerate Applications • Collect Metadata • Repeat as Needed 27
  • 29. © 2019 Denim Group – All Rights Reserved So Where Are These Applications? • Your Datacenters • 3rd Party Datacenters • Cloud Providers 28
  • 30. © 2019 Denim Group – All Rights Reserved Enumerating Applications • Technical • Network inspection • DNS and other registry inspection • Non-technical • Interviews • Other research 29
  • 31. © 2019 Denim Group – All Rights Reserved IP Range Detection • IPOsint: https://github.com/j3ssie/IPOsint • ip-osint.py –t CompanyName • Data sources: • Whois • Ripe • Arin • Hurricane • Censys • securitytrails 30
  • 32. © 2019 Denim Group – All Rights Reserved Network Inspection • nmap: https://nmap.org/ • Look for common web server ports: • 80, 443, 8000, 8008, 8080, 8443 • Others depending on your environment • nmap -sS -p 80,443,8000,8008,8080,8443 x.y.z.0/24 • Great for dense environments you control • Largely datacenters https://www.denimgroup.com/resources/blog/2016/03/threadfix-in-action-discovering-your-organizations-software-attack-surface-web-app-edition/ 31
  • 33. © 2019 Denim Group – All Rights Reserved DNS Inspection • SubFinder: https://github.com/subfinder/subfinder • docker run -it subfinder -d target.org • Can get even more data with service-specific API keys • OWASP Amass: https://github.com/OWASP/Amass • sudo docker run amass --passive -d target.org 32
  • 34. © 2019 Denim Group – All Rights Reserved Mobile Application Identification • Scumbler: https://github.com/Netflix-Skunkworks/Scumblr • Purpose of tool evolved over time • Not currently maintained – looking for maintainers 33
  • 35. © 2019 Denim Group – All Rights Reserved Interviews • Line-of-business representatives • Will need to translate their definition of “application” to your definition • Think in terms of business processes and these can map to multiple applications and microservices • Tech leads • More familiar with the deployed infrastructure and other assets 34
  • 36. © 2019 Denim Group – All Rights Reserved Other Research • Disaster recover plans • Accounting • Find cloud providers 35
  • 37. © 2019 Denim Group – All Rights Reserved What is an ”Application” • What assets do we have? • IP addresses • Host names • Mobile apps • Business view of “applications” • Challenge: Create a consolidated view • Challenge: Correlate applications and the supporting infrastructure 36
  • 38. © 2019 Denim Group – All Rights Reserved Collect Metadata • Technical: Language, Scale • Architectural: Web, Mobile • Exposure: Public, Partner, Internal • Regulatory: PCI, HIPAA, GDPR 37
  • 39. © 2019 Denim Group – All Rights Reserved Value and Risk Are Not Equally Distributed • Some Applications Matter More Than Others • Value and character of data being managed • Value of the transactions being processed • Cost of downtime and breaches • Therefore All Applications Should Not Be Treated the Same • Allocate different levels of resources to assurance • Select different assurance activities • Also must often address compliance and regulatory requirements 38
  • 40. © 2019 Denim Group – All Rights Reserved Do Not Treat All Applications the Same • Allocate Different Levels of Resources to Assurance • Select Different Assurance Activities • Also Must Often Address Compliance and Regulatory Requirements 39
  • 41. © 2019 Denim Group – All Rights Reserved Rinse and Repeat • This list will change over time • Metadata will change • This is especially true in a world of microservices 40
  • 42. © 2019 Denim Group – All Rights Reserved 41 You can’t defend unknown attack surface If everything is important then nothing is important
  • 43. © 2019 Denim Group – All Rights Reserved [Translation] Find out what applications you have in your organization Decide the relative importance of applications and treat them differently based on this 42
  • 44. © 2019 Denim Group – All Rights Reserved Questions 43
  • 45. © 2019 Denim Group – All Rights Reserved Building a world where technology is trusted. @denimgroup www.denimgroup.com 44 [email protected]