Top Banner
Application Security After An Incident Cory Scott Matasano Security
27

Improving Application Security After An Incident Cory Scott Matasano Security.

Dec 14, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Improving Application Security After An Incident Cory Scott Matasano Security.

Improving Application Security

AfterAn Incident

Cory ScottMatasano Security

Page 2: Improving Application Security After An Incident Cory Scott Matasano Security.

Where Do Application Security Programs

Come From?

Page 3: Improving Application Security After An Incident Cory Scott Matasano Security.

Unlikely.

Page 4: Improving Application Security After An Incident Cory Scott Matasano Security.

Maybe.

Page 5: Improving Application Security After An Incident Cory Scott Matasano Security.

Most likely.

Page 6: Improving Application Security After An Incident Cory Scott Matasano Security.

An incident, you say?

•Could be a near miss

•Or an unfortunate impact

•That’s fine, we’ll pull out our trusty dusty (network) response plan...

Page 7: Improving Application Security After An Incident Cory Scott Matasano Security.

FAIL

Page 8: Improving Application Security After An Incident Cory Scott Matasano Security.

Traditional NetworkIncident Response

•Root cause is one or more of the following: credentials, access control, patch, or configuration.

•There’s an app for that.

•And a process template.

•And an audit guideline.

•Whew... All Done!

•Usually one neck to choke.

Page 9: Improving Application Security After An Incident Cory Scott Matasano Security.

Application Anarchy!

• Could be one of many root causes.

• Could be the fault of the developer, the framework author, third-party plug-ins, application operations, poor requirement definition, client-side security, etc etc.

• There’s probably an app for some of that. But you’re going to need some process for it too...

• Quick - how do you audit a secure coding practice?

• How many necks can you choke?

Page 10: Improving Application Security After An Incident Cory Scott Matasano Security.

Queue Foreshadowing Music Here

Page 11: Improving Application Security After An Incident Cory Scott Matasano Security.

Oh, the people you’ll meet!

•Internal Auditors (grr!)

•External Auditors (eep!)

•Executives (*cringe*)

•Development Managers (hey, you!)

•Network Security People (...)

•Application Security Salesmen in your C[X]Os office (WTF!)

Page 12: Improving Application Security After An Incident Cory Scott Matasano Security.

The Opportunity & The Problem

Page 13: Improving Application Security After An Incident Cory Scott Matasano Security.

Taking the root causeto the bank

•You can prove that the Quick Fix is not the fix.

•You’ve just got some funding for an appsec program. Congratulations! OR

•You may be getting funding... IF you can show that you’re going to do something meaningful with it. OR

•You may have to go back into the trenches until the next one.

Page 14: Improving Application Security After An Incident Cory Scott Matasano Security.

AppSec Stallout!

• Management priority shift.

• Fatigue, fear, and loathing.

• Bought the $PRODUCT, the problem is solved. Right? Right?

• Got the Pentest, all clean! Right?

• X days without a workplace incident, all good!

• Analysis Paralysis

• Auditor Pile-On

• The LCD of Compliance

Page 15: Improving Application Security After An Incident Cory Scott Matasano Security.

READY... FIRE... AIM!

Assessment Strategies to Prevent Stallout

Page 16: Improving Application Security After An Incident Cory Scott Matasano Security.

Identify High-Risk Applications

•Emphasis on high-risk

•Enforce the two-sentence rule to identify loss potential

•Existing inventories are usually insufficient

•Don’t fight against intuition

•Get it over with

Page 17: Improving Application Security After An Incident Cory Scott Matasano Security.

Scoping is Critical

Get this wrong and you’ve just wasted thousands of dollars.

Page 18: Improving Application Security After An Incident Cory Scott Matasano Security.

Scoping is Collaborative

• Get everyone to the table, including:

• Application Owner

• Development Guy

• Information Security Guy

• The Tester

• Ambiguity at the beginning is okay, but not at the end. Respect the fact that this make some people uncomfortable.

Page 19: Improving Application Security After An Incident Cory Scott Matasano Security.

Best of both worlds

•Embrace Design Reviews in addition to implementation-oriented assessments

HOWEVER:

Questionnaires are to Design Reviews what Web Vulnerability Scanners are to Penetration Testing

Page 20: Improving Application Security After An Incident Cory Scott Matasano Security.

Flexible & Standardized at the same time?!

• Define a short-list of vulnerabilities and weaknesses.

• Choices are good!

• Design review

• Tools

• Code review

• Manual Penetration Testing

• Standardize approach and deliverable for each choice.

Page 21: Improving Application Security After An Incident Cory Scott Matasano Security.

Pick your battles andweapon of choice

• The first few engagements are the most important.

• Insert a QA checkpoint and a post-assessment feedback process.

• Pick “friendly” application teams to start.

• Bring in external teams at the beginning to crib off of their approach and delivery.

Page 22: Improving Application Security After An Incident Cory Scott Matasano Security.

Management Strategies to Prevent Stallout

Page 23: Improving Application Security After An Incident Cory Scott Matasano Security.

Get funding for remediation upfront

• Strike while the iron is hot. (and the wallet is open)

• Rule of thumb: remediation cost equals assessment cost.

• Consider a two-level approach for each app: a pre-approved “not-to-exceed” amount and a separate budget request for larger initiatives.

• You’ll make friends!

Page 24: Improving Application Security After An Incident Cory Scott Matasano Security.

Assign Specialists

•Understand the business unit

•Maintain a watchlist of applications

•Scope and schedule assessments

•Assist in Incident Response

Page 25: Improving Application Security After An Incident Cory Scott Matasano Security.

Process Change

•SDL improvements

•Small steps with pilot groups

•Leverage specialists

•Vendor management

•Give them a risk assessment that they can self-operate to start

•Encourage reusable assessments

Page 26: Improving Application Security After An Incident Cory Scott Matasano Security.

Detection & Response

•You worked so hard to get situational awareness, don’t lose it!

•First on your wish-list: logging and audit trails that you didn’t have pre-incident that would have helped you respond faster and with less legwork.

•Specialists can help in preparation and response.

Page 27: Improving Application Security After An Incident Cory Scott Matasano Security.

MetricsKRIs

•Vulnerabilities still open for each application

•Applications within open vulnerabilities that have suffered a successful attack within the last year

•Applications with open vulnerabilities with no clear path towards remediation or where the risk has been accepted by the business unit

KPIs

•# high-risk applications

•# of assessments performed

•Code/component coverage for each assessment

•Assessment coverage per business unit

•# of vulnerabilities opened for each application

•# of vulnerabilities addressed with a plan

•# of vulnerabilities closed or remediated