OWASP Top-10 2013 Dave Wichers OWASP Top 10 Project Lead OWASP Board Member Cofounder, Aspect Security & Contrast Security.

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP Web Vulnerabilities and Auditing
Don’t get Stung (An introduction to the OWASP Top Ten Project) Barry Dorrans Microsoft Information Security Tools NEW AND IMPROVED!
SEC835 OWASP Top Ten Project.
Communications & knowledge sharing Global Impact Study Impact Indicators Workshop Montpellier, France March 2010 Christine Prefontaine.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The Web Hacking Incident Database (WHID) Report for 2010 Ryan Barnett WASC WHID Project Leader Senior Security Researcher.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Solving Real-World Problems with an Enterprise Security API (ESAPI) Chris Schmidt ESAPI Project Manager ESAPI4JS Project Owner Application Security Engineer.
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
Software Documentation Written By: Ian Sommerville Presentation By: Stephen Lopez-Couto.
Incident Response Updated 03/20/2015
OWASP Mobile Top 10 Why They Matter and What We Can Do
OWASP Zed Attack Proxy Project Lead
The OWASP Way Understanding the OWASP Vision and the Top Ten.
A Framework for Automated Web Application Security Evaluation
Security testing of study information system Security team: Matis Alliksoo Alo Konno Urmo Lihten Taavi Podzuks Sander Saarm.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Ryan Dewhurst - 20th March 2012 Web Application (PHP) Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Chapter 14 Part II: Architectural Adaptation BY: AARON MCKAY.
OWASP Cambridge 2 nd December Agenda Networking, food and refreshments Welcome Colin Watson Global Application Security Survey & Benchmarking John.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP Dependency-Check
The OWASP Foundation Where we are Where we are going Seba DeleersnyderEoin Keary OWASP Foundation Board.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Microsoft ® Windows ® Small Business Server 2003 R2 Sales Cycle.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Applications Testing By Jamie Rougvie Supported by.
Building Secure Web Applications With ASP.Net MVC.
OWASP OWASP top 10 - Agenda  Background  Risk based  Top 10 items 1 – 6  Live demo  Top 10 items 7 – 10  OWASP resources.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Securing Java Applications
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Getting Started with OWASP The Top 10, ASVS, and the Guides Dave Wichers COO, Aspect Security OWASP Board Member OWASP Top 10 and ASVS Projects Lead.
//ALPHA.1 OWASP Knoxville Application Security Then and Now. Make a Difference Now 2015 June 11 Phil Agcaoili.
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Version Control and SVN ECE 297. Why Do We Need Version Control?
The OWASP Foundation OWASP Global Update Seba Deleersnyder OWASP Foundation Board Member.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Planning for Application Recovery
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Finding and Fighting the Causes of Insecure Applications
Software Documentation
Relevance of the OWASP Top 10
OWASP in favor of a more secure world
Information Security Awareness
Finding and Fighting the Causes of Insecure Applications
6. Application Software Security
Presentation transcript:

OWASP Top Dave Wichers OWASP Top 10 Project Lead OWASP Board Member Cofounder, Aspect Security & Contrast Security

Dave Wichers OWASP –OWASP Top 10 Project Lead –OWASP Board Member –Conferences Chair for 2005 thru 2008 Cofounder Aspect Security –Application Security Consulting Cofounder Contrast Security –IAST Vulnerability Detection Product Hosted by OWASP & the NYC Chapter

About the OWASP Top 10 3 Not a standard… OWASP Top 10 is an Awareness Document Was probably 3 rd or 4 th OWASP project, after Developers Guide WebGoat Maybe WebScarab ?? First developed in , 2004, 2007, 2010, 2013 Released

OWASP Top Ten (2013 Edition) 4

What Didn’t Change 5 Title is: “The Top 10 Most Critical Web Application Security Risks” It’s About Risks, Not Just Vulnerabilities Based on the OWASP Risk Rating Methodology, used to prioritize Top 10 OWASP Top 10 Risk Rating Methodology

6 Threat Agent Attack Vector Weakness PrevalenceWeakness DetectabilityTechnical ImpactBusiness Impact ? EasyWidespreadEasySevere ? AverageCommonAverageModerate DifficultUncommonDifficultMinor * weighted risk rating Injection Example

What’s Changed? 7 Reordered: 7 Added: 1 Merged: 2 merged into 1 Broadened: 1 Risks Added, Risks Merged, Risks Reordered Same as 2010, but Used more sources of vulnerability data All vulnerability data made public by each provider Development Methodology For 2013 More transparency Requested vulnerability data format Earlier community involvement Development Methodology for Next Version?

Mapping from 2010 to 2013 Top 10

OWASP Top Ten 2010-A6 Security Misconfiguration 9 How Do I Prevent This? The primary recommendations are to establish all of the following: … 2. A process for keeping abreast of and deploying all new software updates and patches in a timely manner to each deployed environment. This needs to include all code libraries as well, which are frequently overlooked.”

80% Libraries But library use is growing at a staggering rate The amount of custom code in an application hasn’t changed very much in the past 10 years. 10

Transformation 80% Libraries But library use is growing at a staggering rate 20% Custom Code

Everyone Uses Vulnerable Libraries 29 MILLION vulnerable downloads in 2011 Libraries31 Library Versions1,261 Organizations61,807 Downloads113,939,358

2013-A9 – Using Known Vulnerable Components 13 Some vulnerable components (e.g., framework libraries) can be identified and exploited with automated tools This expands the threat agent pool beyond targeted attackers to include chaotic actors Vulnerable Components Are Common Virtually every application has these issues because most development teams don’t focus on ensuring their components/libraries are up to date In many cases, the developers don’t even know all the components they are using, never mind their versions. Component dependencies make things even worse Widespread Full range of weaknesses is possible, including injection, broken access control, XSS... The impact could range from minimal to complete host takeover and data compromise Typical Impact

What Can You Do to Avoid This? 14 Automation checks periodically (e.g., nightly build) to see if your libraries are out of date Even better, automation also tells you about known vulnerabilities Ideal By hand, periodically check to see if your libraries are out of date and upgrade those that are If any are out of date, but you really don’t want to upgrade, check to see if there are any known security issues with these out of data libraries If so, upgrade those Minimum By hand, periodically check to see if any of your libraries have any known vulnerabilities at this time Check CVE, other vuln repositories If any do, update at least these Could also

Automation Example for Java-Maven Versions Plugin 15 Output from the Maven Versions Plugin – Automated Analysis of Libraries’ Status against Central repository Most out of Date!Details Developer Needs This can automatically be run EVERY TIME software is built!!

OWASP Dependency Check Run DependencyCheck during every build (and do a build once a month even if nothing changed)

The Merged 2013-A6 – Sensitive Data Exposure A7 – Insecure Cryptographic Storage 2010-A9 – Insufficient Transport Layer Protection To make room for New 2013-A9: Using Known Vulnerable Components Two Related Topics Merged Failure to identify all sensitive data Failure to identify all the places that this sensitive data gets stored Databases, files, directories, log files, backups, etc. Failure to identify all the places that this sensitive data is sent On the web, to backend databases, to business partners, internal communications Failure to properly protect this data in every location Storing and Transmitting Sensitive Data Insecurely

Expanded A7-Missing Function Level Access Control 18 URLs are one way to access functions But not the only way … Was: 2010-A8 – Failure to Restrict URL Access URL to function directly URL plus parameter value(s) which indicate which function is being accessed e.g., site/somedir/somepage?action=transferfunds Expand to Cover all Ways a Function Can Be Accessed Application simply doesn’t check to see if function invocation is authorized Application does check for authorization, but check is flawed. (This would be broken function level access control, but missing is far more common.) Typical Flaws

OWASP Top Development Methodology 19 Ask previous contributors, solicit new contributors well known to Top 10 team, include unsolicited volunteers 3 New Data Contributors Included: TrustWave, Veracode, Minded Security New: Each provider asked to make their data public. All Did. Gather Vulnerability Stats Draft Released to OWASP Community Feb 15, 2013 Public Comment Period Open for 90+ days (thru May 30, 2013) Analyze Stats, Produce Initial Draft, Release for Public Comment All Constructive Comments Considered Full documentation of Constructive Comments and how they were addressed documented _2013_Final_Release_-_Change_Log.docxhttps:// _2013_Final_Release_-_Change_Log.docx Released on June 12, 2013 Final Release Produced

Top 10 Future Development Methodology Ideas 20 Issue Open Call For Vulnerability Stats Providers Provide Desired Stats Format (for consistency) and Require Public Reporting Consider all Stats Provided by Requested Deadline Don’t Ignore Future Looking Threats Like we did with CSRF in 2007, and Vulnerable Components in 2013 Gather More Stats More Openly We only have Vulnerability Prevalence Stats What about Stats for Exploitability, Detectability, Impact? We tried to consider some Exploitability stats in 2013, but couldn’t find effective public stats Consider Other Stats if They Make Sense Solicit Additional Volunteers Expand Authoring Team

Video Presentation of Each Item in OWASP Top 10 – 2010 (which is very similar) – Dave Wichers at OWASP AppSec DC (2009) – OWASP Top 10 – 2013 Presentation which goes through each item one by one – Translations of OWASP Top – French, Portuguese, Spanish, Chinese, Korean, Japanese, Arabic Translations complete – Many others underway – OWASP Top 10 Resources 21

Thank you OWASP Top-10 Project