Application Security in a cyber security program

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
The Most Analytical and Comprehensive Defense Network in a Box.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
Security Controls – What Works
Controls for Information Security
Stephen S. Yau CSE , Fall Security Strategies.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
SiteLock Internet Security: Big Threats for Small Business.
Security Guidelines and Management
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Security– SNO International Zanzibar, Tanzania Joe Beaulac, Sr. Manager – Cyber Defense Center & Risk/Vulnerability Management 23 September.
SEC835 Database and Web application security Information Security Architecture.
The Most Analytical and Comprehensive Defense Network in a Box.
Dell Connected Security Solutions Simplify & unify.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
IS Network and Telecommunications Risks Chapter Six.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Security fundamentals Topic 10 Securing the network perimeter.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 4 Network Security Tools and Techniques.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security tools for records managers Frank Rankin.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Security fundamentals
Your Partner for Superior Cybersecurity
OIT Security Operations
Chapter 7. Identifying Assets and Activities to Be Protected
CompTIA Security+ Study Guide (SY0-401)
Cybersecurity - What’s Next? June 2017
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Capabilities Matrix Access and Authentication
Securing the Network Perimeter with ISA 2004
CompTIA Security+ Study Guide (SY0-401)
IS4550 Security Policies and Implementation
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Contact Center Security Strategies
How to Mitigate the Consequences What are the Countermeasures?
IBM GTS Storage Security and Compliance overview.
6. Application Software Security
LM 5. Wireless Network Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Application Security in a cyber security program Tony Clarke tony.clarke@owasp.org

Cyber Security Programs Current Application Security Contents Cyber Security Programs Current Application Security Future Application Security Considerations Assurance & Metrics

Existing Cyber Security Programs Application Security Small but important portion of a cyber security program

ISO-27001:2013 ISMS ISO27001 - 14 Domains & 114 controls 9 controls relate to “Security in development and support processes” (A.14.2) Information Security Policies Asset Management Operations Security System Acquisition, Development & Maintenance Access Control Supplier Relationships Organisation of Information Security Communications Security Security Incident Management Cryptography Human Resources Security Physical & Environmental Security Information Security Aspects of Business Continuity Management Compliance

CoBIT 5

Vtech Data Breach (28th November 2015) 4.8 million records lost; Data Breaches - Vtech Vtech Data Breach (28th November 2015) 4.8 million records lost; Data breach was due to SQL injection vulnerability; Children and parental information; Passwords were a straight MD5 hash;

The following files were provided to journalist Lorenzo Bicchierai. Data Breaches - Vtech The following files were provided to journalist Lorenzo Bicchierai.

Data Breaches - Vtech Records include: id email encrypted_password first_name last_name password_hint secret_question secret_answer email_promotion active first_login last_login login_count free_order_count pay_order_count client_ip client_location

Hmmm So Application Security is part of many Cyber Security Programs but clearly something isn’t working. Why?

Application Layer Vulnerabilities Application Layer Vulnerabilities typically not protected by a firewall. Network Layer Exposed Host   Operating System Vulnerabilities Web Server Web Application Code and Content Web Application Attacks Known Web Server Exploits OS Attacks Networks Attacks

Organisation Structure

IT Security and Controls Extended Perimeter Perimeter Business Partners VPN Wireless AP Toolsets Remote Users Access Control Firewall Identity & Access Management Resources IDS Customers Data VLAN Policy Management Branch Offices Applications Managed Security Service Devices Vulnerability Management Operating Systems SSO Mobile Users VDI Email Security Malware Wireless LAN Proxy DMZ SaaS

IT Operations CIO IT Operations Infrastructure Servers Networks Database Storage Development Developers Partners Operations Service Desk IT operations Applications Business IT Applications PMO SMO Architecture Innovation Security Networks Team Applications Team Database Team Windows Team Unix Team Storage Team Security Team Service Owners Business Owners ….

Existing Security Models Current Application Security Models relies on (maybe): Security Policies & Standards; Network Controls (firewall, IDS, etc); Quarterly Patching; Annual Penetration Testing;

Application Life Cycle Typical Application Life cycle. Annual(ish) Penetration Testing.

Existing Models - Assessment Is an annual pen test effective if you have: multiple applications; multiple releases per applications; network equipment and OS’s aren't patched; administrative interfaces are available; architecture doesn’t use ‘defence in depth’; policies and processes aren't in place; no detection capabilities;

Existing Models - Architecture Many organisations: still rely only on a firewall to provide security from the outside; Perform annual auditing/assurance; Don’t subscribe to ‘defence in depth’ model; Rely on detection and have limited prevention capabilities; Many terminate SSL behind the firewall which means encrypted (HTTPS) traffic cannot be inspected;

Existing Models - Assessment Annual Auditing usually based on compliance: ISO-27001; CoBIT; SOX; “best practice”; Depends on auditors, skills, experience, etc

Existing Models - Compliance Being secure can help with achieving compliance, and compliance can be a by-product of security but being secure is not automatically a by-product of compliance

Existing Models - Detection Detection mostly relying on SIEM or SIM type products. Which consist of: Logs Analytics Engine Logs Logs Logs SIEM Logs Logs

Existing Models - Prevention Preventions mostly relying on network appliance

Existing Models - Response Response usually is an afterthought and rarely in place or practiced.

There are numerous issues in relation to: Reality Check Current approaches to Application Security aren’t working and don’t integrate well with operational or development models; There are numerous issues in relation to: support; architecture; prevention and detection capabilities; assurance and compliance;

Its not always going to be possible to: Reality Check Its not always going to be possible to: Find every vulnerability; Patch every server or network device at every layer; Harden every servers; Have adequate operational resources; Pen test every release; Review every log entry; …

Future Detection Capabilities Detection capabilities will need to include: Continuous Monitoring, including availability, compliance, patching; Move to ‘real-time’ compliance; Continuous vulnerability scans (internal & external); Analysis of all logs e.g. servers, clients, applications, databases, webservers, firewalls, switches, routers, etc; Threat intelligence specific to organisational context and vertical;

Future Detection will need to leverage: Automation and monitoring; Scale; Global threat intelligence; 24x7x365 monitoring; Context Aware;

Future Prevention Capabilities Prevention capabilities will need to include: Defence in depth; Micro-segmentation; Web Application Firewalls; 2-Factor authentication; Hardening; Intrusion Detection and Prevention; Security Awareness training; Cyber Insurance;

Future Prevention Prevention model incudes: WAF IDS Micro-segmentation

Future Prevention Micro-segmentation

Future Development DevSecOps

Future Development DevSecOps

Future Auditing Capabilities Many standards have requirements for continuous improvement: ISO-27001:2013 COBIT 5 (C5I) – COBIT 5 for Information Security Auditing will be continuous and use real-time compliance; Compliance not bad – its enforces a reasonably consistent level e.g. like doing your leaving certificate but I don’t think that anyone would suggest that the leaving certificate prepares you for every role or aspect of life. Interesting quote I saw the other day.

Future model - IT Security Operations Security Devices Alerting & Reporting Investigations Malware Analytics Visualization Data Leakage   Compliance & Business Context Threat Intelligence Servers & Clients Network Activity Database Activity Application Activity Configuration Information Vulnerability Information Users & Identities Event Correlation Logs Flows IP reputation Geo-Location Activity Baselining & Anomaly Detection User Activity Incident Management Response & Workflow Active Defence & Remediation Security Processes Security Policies (ISMS)

Future Model - Architecture

Metrics require organizational context and threat assessment Information Gathering Threat Assessment Metrics Definition & Approval Implement Metrics Communicate Metrics

Senior IT management view Security management view Metrics – ISO-27001:2013 A18   Senior IT management view Security management view Operations view KPI’s KRI’s Leadership View A17 A16 A15 A14 A13 80% A12 A11 A10 A9 A8 A7 A6 A5 A RI1 RI2 RI3 RI4 PI1 PI2 PI3 PI4 M1 M2 M3 M4 A.13.1 A.13.2 A.13.2.1 A.13.2.2 A.13.2.3 A.13.2.4 A.13.1.1 A.13.1.2 A.13.1.3 KRI KPI Communications security

Application Metrics Dashboard Internet Attacks Authorized Scans High Risks Missing Patching Security Policy Compliance Authorized Changes 200 113 79 523 20% 112 Attacks Authorized Scans 270 port scans 3 active attacks 112 out of 200 Monthly Internal Vulnerability Scans 17 out of 20 Monthly External Vulnerability Scans Risks Attack Attack Origin Status 8 SEVERE Open 12 HIGH 33 MEDIUM 43 LOW 130 INSIGNIFICANT Patching 523 patches missing across 100 servers Security Standard Compliance Authorized Changes Database layer compliant Webserver and OS not compliant to security standards 270 changes approved (200 reviewed by security) 3 Changes rejected

Continuous Improvement “The organization shall continually improve the suitability, adequacy and effectiveness of the information security management system.” “Top management shall establish an information security policy that includes a commitment to continual improvement of the information security management system.”

Cyber security program like Health & Well being; App Security is similar to preventing a disease, virus or illness; Healthy Life Style Continuous Prevention Detection Metrics