SlideShare a Scribd company logo
An Introduction to Drupal Security
Security by Design:
Intros
Chris Teitzel
@technerdteitzel
/in/christeitzel
Chris has been working in Drupal for almost 8 years. During that time
he has worked on projects spanning the globe in front-end design,
e-commerce and security. His passion is for making technology
accessible to all skillsets.
Founder / CEO Lockr
2
Intros
Luke Probasco
Presenter Photo
@geetarluke
/in/lukeprobasco/
Manages Drupal business for Townsend Security. DrupalCon, Camp,
and Summit speaker. Security professional. Music enthusiast.
Drupal GM/Townsend Security
3
Intros
Mark Shropshire (shrop)
@shrop
/in/markshropshire
drupal.org
Mark brings 20 years of experience leading technical teams to his role
as Mediacurrent’s Open Source Security Lead. He is a leader in tech
community organizing, blogging, podcasting, and public speaking
within the Drupal community. Mark is passionate about architecting
systems to solve workflow problems and improve efficiencies using
open source software. He is also the maintainer of the Guardr Drupal
security module suite.
Mediacurrent Open Source Security Lead
4
Style Guide
Contents
Security by design in Drupal
Encrypting sensitive data
Key management (encryption & API)4
3
2
1
5
Site audit and security best practices
Resources to improve security5
Style Guide6 Takeaways
Security by design in Drupal1
7
Security by Design
8
Compliance, Security, and You
● Data discovery
● PCI DSS, HIPAA, GDPR, etc.
● Hosting and compliance
● See your security team for internal policies and controls
Security by Design
9
Keep Drupal Secure
● Keep Core and contrib modules up to date
● Use Drupal API
● Use version control
● Use social and enterprise login
● Use secure passwords
● Two factor authentication
● Log and review logs (watchdog and additional contrib)
● Don’t forget about infrastructure security
Security by Design
10
Security in Custom Modules
● Never trust user input
○ Filter plain text with check_plain() or t()
○ Filter HTML with filter_xss()
● Query properly
○ Do not concatenate values into db_query()
○ Instead use parameterized values %s %d %f %b
● Do not output db values directly (don’t trust user input)
● Protect user input - think before you save
Security by Design
Site audit and security best practices2
12
What is an audit?
● Review by someone not on the team
○ (internal or external)
● Review of software systems
● Review of supporting infrastructure
● Review of other related systems
Site audit and security best practices
13
Performing an audit
● Collect data manually and with tools
○ Analyze the data
○ Prioritize findings
● Eliminate false positives
● Complete usable report(s)
Site audit and security best practices
14
OWASP Top 10 Most Critical Web Application Security Risks
● Injection
● Weak authentication and session management
● XSS
● Insecure Direct Object References
● Security Misconfiguration
● Sensitive Data Exposure
● Missing Function Level Access Control
● Cross Site Request Forgery
● Using Components with Known Vulnerabilities
● Unvalidated Redirects and Forwards
Site audit and security best practices
15
Drupal audit tools
● Drupal Core reports
● Site Audit
● Security Review
● Sensitive Data
● Hacked!
● Coder
● Review of site config, users, permissions, and roles
● Manual code review
Site audit and security best practices
Encrypting sensitive data3
17
Encrypting Data in Drupal
● There is no native way to encrypt data in Drupal
● Compliance and risk management drive encryption
● Use encryption based on industry standards
● Use cryptographically strong keys - no passwords!
● See NIST Special Publication 800-57 for more info
Encrypting Sensitive Data
18
What Encryption Should I Use?
● Use AES, RSA, Triple DES, or other standard methods
● Beware of non-standard encryption
● Example: Homomorphic Encryption
○ Has not received wide review and acceptance
○ Cannot be certified by a standards body
○ Cannot achieve FIPS 140-2 validation
○ Compliance regulations prohibit its use
Encrypting Sensitive Data
Key management (encryption & API)4
20
McDonald's has acknowledged that a leaky API
exposed personal information for users of its
McDelivery mobile app in India. The flaw exposed
names, email addresses, phone numbers, home
addresses and sometimes the coordinates of
those homes, as well as links to social media profiles.
BankInfoSecurity.com
Key Management
21
Our review has shown that a threat actor obtained
access to a set of AWS keys and used them to access
the AWS API from an intermediate host with another,
smaller service provider in the US... Through the AWS
API, the actor created several instances in our
infrastructure to do reconnaissance.
OneLogin.com
Key Management
22
Payment
Gateways
Email
Marketing
SMTP Relays Authentication
Shipping Cloud Providers Encryption APIs
Key Management
Resources to improve security5
24
Encryption Modules
● Encrypt
● FieldEncrypt
● Real AES
● Encrypt User
● Encrypted Files
● Webform Encrypt
Resources to Improve Security
25
Key Management Modules
● Key
● Townsend Security Key Connection
● Lockr
Resources to Improve Security
26
Guardr
Guardr is a Drupal distribution with a combination of
modules and settings to enhance a Drupal application's
security and availability to meet enterprise security
requirements.
https://drupal.org/project/guardr
Resources to Improve Security
Takeaways6
Questions?
Thank you!
@Mediacurrent

More Related Content

What's hot (20)

PDF
Secure Software Design for Data Privacy
Narudom Roongsiriwong, CISSP
 
PPTX
IOT Security FUN-damental
Satria Ady Pradana
 
PDF
How To Avoid The Top Ten Software Security Flaws
Priyanka Aash
 
PPTX
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
 
PPTX
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
PPTX
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
grecsl
 
PDF
Threat Intelligence Is Like Three Day Potty Training
Priyanka Aash
 
PPTX
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
 
PPTX
Berkarir di Cyber Security
Satria Ady Pradana
 
PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
OWASP Delhi
 
PDF
TTPs for Threat hunting In Oil Refineries
Dragos, Inc.
 
PPTX
How to assign a CVE to yourself?
Ramin Farajpour Cami
 
PDF
Cyber intelligence for corporate security
G3 intelligence Ltd
 
PDF
TiC
Cory Kennedy
 
PPTX
Threat hunting - Every day is hunting season
Ben Boyd
 
PPTX
2016 ISSA Conference Threat Intelligence Keynote philA
Phil Agcaoili
 
PPTX
Cyber threat intelligence: maturity and metrics
Mark Arena
 
PPTX
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Puneet Kukreja
 
PDF
The Rise of the Purple Team
Priyanka Aash
 
PDF
Enfilade: Tool to Detect Infections in MongoDB Instances
Aditya K Sood
 
Secure Software Design for Data Privacy
Narudom Roongsiriwong, CISSP
 
IOT Security FUN-damental
Satria Ady Pradana
 
How To Avoid The Top Ten Software Security Flaws
Priyanka Aash
 
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
 
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
grecsl
 
Threat Intelligence Is Like Three Day Potty Training
Priyanka Aash
 
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
 
Berkarir di Cyber Security
Satria Ady Pradana
 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
OWASP Delhi
 
TTPs for Threat hunting In Oil Refineries
Dragos, Inc.
 
How to assign a CVE to yourself?
Ramin Farajpour Cami
 
Cyber intelligence for corporate security
G3 intelligence Ltd
 
Threat hunting - Every day is hunting season
Ben Boyd
 
2016 ISSA Conference Threat Intelligence Keynote philA
Phil Agcaoili
 
Cyber threat intelligence: maturity and metrics
Mark Arena
 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Puneet Kukreja
 
The Rise of the Purple Team
Priyanka Aash
 
Enfilade: Tool to Detect Infections in MongoDB Instances
Aditya K Sood
 

Similar to Security by Design: An Introduction to Drupal Security (20)

PDF
" onclick="alert(1)
slideshareperson2
 
PDF
<marquee>html title testfsdjk34254</marquee>
slideshareperson2
 
PDF
Secure codingguide
David Kwak
 
PDF
Security Fundamentals and Threat Modelling
Knoldus Inc.
 
PDF
Application Security - Your Success Depends on it
WSO2
 
PDF
Mobile App Security - Best Practices
RedBlackTree
 
PPTX
Chapter 7 -Network Security Concept.pptx
Fasika Tegegn
 
PPTX
For Business's Sake, Let's focus on AppSec
Lalit Kale
 
PPTX
Security Best Practices
Clint Edmonson
 
PDF
Security overview 2
CMR WORLD TECH
 
PPTX
12 Crucial Windows Security Skills for 2018
Paula Januszkiewicz
 
PDF
Drupal Security Basics for the DrupalJax January Meetup
Chris Hales
 
PPTX
7 Steps to Threat Modeling
Danny Wong
 
PPTX
Security Incident machnism Security Incident machnismSecurity Incident machni...
karthikvcyber
 
PDF
iotsecurity-171108154118.pdf
KerimBozkanli
 
PDF
Secure coding presentation Oct 3 2020
Moataz Kamel
 
PPTX
Disruptionware-TRustedCISO103020v0.7.pptx
Debra Baker, CISSP CSSP
 
PDF
Web Security
Randy Connolly
 
PDF
19BCP072_Presentation_Final.pdf
KunjJoshi14
 
" onclick="alert(1)
slideshareperson2
 
<marquee>html title testfsdjk34254</marquee>
slideshareperson2
 
Secure codingguide
David Kwak
 
Security Fundamentals and Threat Modelling
Knoldus Inc.
 
Application Security - Your Success Depends on it
WSO2
 
Mobile App Security - Best Practices
RedBlackTree
 
Chapter 7 -Network Security Concept.pptx
Fasika Tegegn
 
For Business's Sake, Let's focus on AppSec
Lalit Kale
 
Security Best Practices
Clint Edmonson
 
Security overview 2
CMR WORLD TECH
 
12 Crucial Windows Security Skills for 2018
Paula Januszkiewicz
 
Drupal Security Basics for the DrupalJax January Meetup
Chris Hales
 
7 Steps to Threat Modeling
Danny Wong
 
Security Incident machnism Security Incident machnismSecurity Incident machni...
karthikvcyber
 
iotsecurity-171108154118.pdf
KerimBozkanli
 
Secure coding presentation Oct 3 2020
Moataz Kamel
 
Disruptionware-TRustedCISO103020v0.7.pptx
Debra Baker, CISSP CSSP
 
Web Security
Randy Connolly
 
19BCP072_Presentation_Final.pdf
KunjJoshi14
 
Ad

Recently uploaded (20)

PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PDF
SIZING YOUR AIR CONDITIONER---A PRACTICAL GUIDE.pdf
Muhammad Rizwan Akram
 
PDF
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
PDF
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
PPTX
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
PDF
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
PPTX
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
PPTX
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PDF
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
PDF
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PDF
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
SIZING YOUR AIR CONDITIONER---A PRACTICAL GUIDE.pdf
Muhammad Rizwan Akram
 
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
Ad

Security by Design: An Introduction to Drupal Security

  • 1. An Introduction to Drupal Security Security by Design:
  • 2. Intros Chris Teitzel @technerdteitzel /in/christeitzel Chris has been working in Drupal for almost 8 years. During that time he has worked on projects spanning the globe in front-end design, e-commerce and security. His passion is for making technology accessible to all skillsets. Founder / CEO Lockr 2
  • 3. Intros Luke Probasco Presenter Photo @geetarluke /in/lukeprobasco/ Manages Drupal business for Townsend Security. DrupalCon, Camp, and Summit speaker. Security professional. Music enthusiast. Drupal GM/Townsend Security 3
  • 4. Intros Mark Shropshire (shrop) @shrop /in/markshropshire drupal.org Mark brings 20 years of experience leading technical teams to his role as Mediacurrent’s Open Source Security Lead. He is a leader in tech community organizing, blogging, podcasting, and public speaking within the Drupal community. Mark is passionate about architecting systems to solve workflow problems and improve efficiencies using open source software. He is also the maintainer of the Guardr Drupal security module suite. Mediacurrent Open Source Security Lead 4
  • 5. Style Guide Contents Security by design in Drupal Encrypting sensitive data Key management (encryption & API)4 3 2 1 5 Site audit and security best practices Resources to improve security5 Style Guide6 Takeaways
  • 6. Security by design in Drupal1
  • 8. 8 Compliance, Security, and You ● Data discovery ● PCI DSS, HIPAA, GDPR, etc. ● Hosting and compliance ● See your security team for internal policies and controls Security by Design
  • 9. 9 Keep Drupal Secure ● Keep Core and contrib modules up to date ● Use Drupal API ● Use version control ● Use social and enterprise login ● Use secure passwords ● Two factor authentication ● Log and review logs (watchdog and additional contrib) ● Don’t forget about infrastructure security Security by Design
  • 10. 10 Security in Custom Modules ● Never trust user input ○ Filter plain text with check_plain() or t() ○ Filter HTML with filter_xss() ● Query properly ○ Do not concatenate values into db_query() ○ Instead use parameterized values %s %d %f %b ● Do not output db values directly (don’t trust user input) ● Protect user input - think before you save Security by Design
  • 11. Site audit and security best practices2
  • 12. 12 What is an audit? ● Review by someone not on the team ○ (internal or external) ● Review of software systems ● Review of supporting infrastructure ● Review of other related systems Site audit and security best practices
  • 13. 13 Performing an audit ● Collect data manually and with tools ○ Analyze the data ○ Prioritize findings ● Eliminate false positives ● Complete usable report(s) Site audit and security best practices
  • 14. 14 OWASP Top 10 Most Critical Web Application Security Risks ● Injection ● Weak authentication and session management ● XSS ● Insecure Direct Object References ● Security Misconfiguration ● Sensitive Data Exposure ● Missing Function Level Access Control ● Cross Site Request Forgery ● Using Components with Known Vulnerabilities ● Unvalidated Redirects and Forwards Site audit and security best practices
  • 15. 15 Drupal audit tools ● Drupal Core reports ● Site Audit ● Security Review ● Sensitive Data ● Hacked! ● Coder ● Review of site config, users, permissions, and roles ● Manual code review Site audit and security best practices
  • 17. 17 Encrypting Data in Drupal ● There is no native way to encrypt data in Drupal ● Compliance and risk management drive encryption ● Use encryption based on industry standards ● Use cryptographically strong keys - no passwords! ● See NIST Special Publication 800-57 for more info Encrypting Sensitive Data
  • 18. 18 What Encryption Should I Use? ● Use AES, RSA, Triple DES, or other standard methods ● Beware of non-standard encryption ● Example: Homomorphic Encryption ○ Has not received wide review and acceptance ○ Cannot be certified by a standards body ○ Cannot achieve FIPS 140-2 validation ○ Compliance regulations prohibit its use Encrypting Sensitive Data
  • 20. 20 McDonald's has acknowledged that a leaky API exposed personal information for users of its McDelivery mobile app in India. The flaw exposed names, email addresses, phone numbers, home addresses and sometimes the coordinates of those homes, as well as links to social media profiles. BankInfoSecurity.com Key Management
  • 21. 21 Our review has shown that a threat actor obtained access to a set of AWS keys and used them to access the AWS API from an intermediate host with another, smaller service provider in the US... Through the AWS API, the actor created several instances in our infrastructure to do reconnaissance. OneLogin.com Key Management
  • 22. 22 Payment Gateways Email Marketing SMTP Relays Authentication Shipping Cloud Providers Encryption APIs Key Management
  • 23. Resources to improve security5
  • 24. 24 Encryption Modules ● Encrypt ● FieldEncrypt ● Real AES ● Encrypt User ● Encrypted Files ● Webform Encrypt Resources to Improve Security
  • 25. 25 Key Management Modules ● Key ● Townsend Security Key Connection ● Lockr Resources to Improve Security
  • 26. 26 Guardr Guardr is a Drupal distribution with a combination of modules and settings to enhance a Drupal application's security and availability to meet enterprise security requirements. https://drupal.org/project/guardr Resources to Improve Security