SlideShare a Scribd company logo
1 of 48
Download to read offline
7 Ways to Scale Web Security
Jeremiah Grossman
Founder & Chief Technology Officer

SANS AppSec Summit
04.30.2012




                                     © 2012 WhiteHat Security, Inc.   1
Jeremiah Grossman
ØFounder & CTO of WhiteHat Security
Ø6-Continent Public Speaker
ØTED Alumni
ØAn InfoWorld Top 25 CTO
ØCo-founder of the Web Application Security Consortium
ØCo-author: Cross-Site Scripting Attacks
ØFormer Yahoo! information security officer
ØBrazilian Jiu-Jitsu Black Belt




                                               © 2012 WhiteHat Security, Inc.   2
WhiteHat Security : Company Overview
ØHeadquartered in Santa Clara, CA
ØWhiteHat Sentinel – SaaS end-to-end website risk
  management platform
ØEmployees: 170+
ØCustomers: 500+


     Cool Vendor




                   The FutureNow List




                                            © 2012 WhiteHat Security, Inc.
We shop, bank, pay bills, file taxes,
       share photos, keep in touch with
       friends & family, watch movies, play
       games, and more.


    Cyber-war        Cyber-crime        Hacktivism

PwC Survey:
“Cybercrime is now the second biggest cause of economic
crime experienced by the Financial Services sector.”
                                       © 2012 WhiteHat Security, Inc.   4
Website Hacked




           © 2012 WhiteHat Security, Inc.   5
Verizon Data Breach Investigations Report:

 2010 DBIR:
 “The majority of breaches and almost all of the data stolen
 in 2009 (95%) were perpetrated by remote organized
 criminal groups hacking "servers and applications."

 2011 DBIR:
 “The number of Web application breaches increased last year
 and made up nearly 40% of the overall attacks.“

 2012 DBIR:
 “Web applications abound in many larger companies, and
 remain a popular (54% of breaches) and successful (39% of
 records) attack vector.”


                                               © 2012 WhiteHat Security, Inc.   6
855 incidents, 174 million compromised records




                                        © 2012 WhiteHat Security, Inc.   7
© 2012 WhiteHat Security, Inc.   8
(Name of the Game)



SCALABILITY
  “An algorithm, design, networking protocol,
  program, or other system is said to scale, if it is
  suitably efficient and practical when applied to
  large situations (e.g. a large input data set, a
  large number of outputs or users, or a large
  number of participating nodes in the case of a
  distributed system). If the design or system fails
  when a quantity increases, it does not scale.”




                                   © 2012 WhiteHat Security, Inc.   9
© 2012 WhiteHat Security, Inc.   10
People     Process
                      SCALE

                         Technology

• People: Cognitive ability, operate and interpret technology results
• Process: Organize and make efficient use of resources
• Technology: To scale the people and the process
                                                      © 2012 WhiteHat Security, Inc.   11
3 Hard Facts About Technology
1) Technology is incapable of eliminating the need for
   people in any aspect of application security. This includes
   source code reviews, penetration testing, threat
   modeling, architectural review, development, etc.

2) Without technology there is far too much work than could
   ever be completed manually by the number of people
   available, even if monetary costs were not an issue.

3) The best technology can offer is increasing efficiency and
   reducing the quantity and skill level of the people
   necessary to complete a given process.




                                                  © 2012 WhiteHat Security, Inc.   12
WhiteHat Sentinel – Assessment Platform
• Software-as-a-Service
• Annual Per Website Subscription
• Unlimited Assessments / Users
                            500+
          enterprises from start-ups to fortune 500
                            1,000,000
               vulnerabilities processed per day
                          6 Terabytes
                     data stored per day
                           7,000+
          websites receiving ~weekly assessments
                        940,000,000
                  HTTP(s) requests per month


                                             © 2012 WhiteHat Security, Inc.
© 2012 WhiteHat Security, Inc.   14
7,000+ Customer Websites



https://blog.whitehatsec.com/our-process-how-we-do-what-we-do-and-why/

                                                                                         © 2012 WhiteHat Security, Inc.   15
1   Game-ification


             © 2012 WhiteHat Security, Inc.   16
Elevation of Privilege (EoP)
Card Game
Elevation of Privilege (EoP) is the easy way to get started
threat modeling, which is a core component of the design
phase in the Microsoft Security Development Lifecycle (SDL).

The EoP card game helps clarify the details of threat
modeling and examines possible threats to software and
computer systems.

The EoP game focuses on the following threats:
• Spoofing
• Tampering
• Repudiation
• Information Disclosure
• Denial of Service
• Elevation of Privilege

EoP uses a simple point system that allows you to challenge
other developers and become your opponent's biggest threat.    http://www.microsoft.com/security/sdl/adopt/eop.aspx

                                                               © 2012 WhiteHat Security, Inc.                  17
Capture	
  the	
  Flag

               © 2012 WhiteHat Security, Inc.   18
2
    (Security Scorecards)


    Peer Pressure

                            © 2012 WhiteHat Security, Inc.   19
Publish Scorecards Internally &
Regularly -- For All To See
                                                      Avg.	
  
                            High	
  Severity	
                           Remedia5on	
       Window	
  of	
  Exposure	
  
          Group                                    Time-­‐to-­‐Fix	
  
                            Vulnerabili5es                                  Rate                 (Days)
                                                     (Days)

2012	
  Corporate	
  Goal           20                    30                 75%                         100

Industry	
  Average                 55                    32                 63%                         223

Business	
  Unit	
  1               17                    45                 74%                         195

Business	
  Unit	
  2               53                    30                 46%                         161

Business	
  Unit	
  3               67                    66                 63%                         237

Business	
  Unit	
  4               48                    35                 69%                         232

                                                                                    © 2012 WhiteHat Security, Inc.         20
Computer-Based
3   Training (CBT)


             © 2012 WhiteHat Security, Inc.   21
The biggest problem in
application security today:
The huge shortage of qualified
application security people.




                       © 2012 WhiteHat Security, Inc.   22
Gary McGraw (CTO, Cigital) says roughly
             2% of all programmers should be software
             security pros, or “Builders” in our case.
             Gary, through a project called BSIMM,
             arrived at 2% by surveying dozens of
             software security programs among large
             companies and measuring what they do.


Programmer Population (Worldwide): 17 million


  We’ll need 340,000 “Builders”

                                      © 2012 WhiteHat Security, Inc.   23
We’ll use a ratio of 1 “breaker” per to 100
               websites. This ratio comes from internal
               metrics at WhiteHat Security generated
               from assessment conducted over the last 8
               years and encompassing more than 7,000
               websites.



“Important” (SSL) website population: 1.2 million


   We’ll need 12,000 “Breakers”

                                         © 2012 WhiteHat Security, Inc.   24
No idea how to begin to estimate the
Defender need, but it’ll be in the tens of
thousands at least. Considering the vast
number of website assets that must be
protected, the 1 billion online users who
someone needs to ensure are playing
nice, and monitoring the serious volume
of Web traffic they generate.




       ?                   © 2012 WhiteHat Security, Inc.   25
OWASP Appsec Tutorial Series




The OWASP AppSec Tutorial Series project provides a video based means of
conveying complex application security concepts in an easily accessible and
understandable way. Each video is approximately 5-10 minutes long and highlights one
or more specific application security concepts, tools, or methodologies. The goal of the
project is quite simple and yet quite audacious - provide top notch application security
video based training... for free!
                                                         https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series

                                                                       © 2012 WhiteHat Security, Inc.              26
Centralized
4   Security Controls


               © 2012 WhiteHat Security, Inc.   27
Development Frameworks




  ESAPI is a free, open source, web application security control library that
  makes it easier for programmers to write lower-risk applications. The
  ESAPI libraries are designed to make it easier for programmers to retrofit
  security into existing applications. The ESAPI libraries also serve as a
  solid foundation for new development.
                                           https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API

                                                                       © 2012 WhiteHat Security, Inc.               28
5   Work Flow


                © 2012 WhiteHat Security, Inc.   29
Model an Application




                                              http://sdelements.com/

                       © 2012 WhiteHat Security, Inc.              30
Check against
library of
security tasks
with rules




  © 2012 WhiteHat Security, Inc.   31
Produce tailored security tasks




•   Distills application security personnel expertise to developers.
•   Fits cleanly into development processes.
•   Tasks are continuously updated to keep up with new technologies & threats.
•   In retroactive analysis of years of penetration-testing data, following SDE would
    have prevented approximately 85% of secure coding weaknesses.


                                                                  © 2012 WhiteHat Security, Inc.   32
6   Virtual-Patching


               © 2012 WhiteHat Security, Inc.   33
8 out of 10 websites have
               serious* vulnerabilities
              (10 out of 10 if you are willing to wait long enough.)




*	
  Serious	
  Vulnerability:	
  A	
  security	
  weakness	
  that	
  if	
  exploited	
  may	
  lead	
  to	
  breach	
  or	
  data	
  loss	
  of	
  a	
  
system,	
  its	
  data,	
  or	
  users.	
  (PCI-­‐DSS	
  severity	
  HIGH,	
  CRITICAL,	
  or	
  URGENT)
                                                                            http://news.netcraft.com/archives/2012/04/04/april-2012-web-server-survey.html

                                                                                                               © 2012 WhiteHat Security, Inc.                34
Average annual amount of new
serious* vulnerabilities introduced per
           website per year


    1111                            795                           480                            230                             79

     2007                          2008                           2009                          2010                          2011



VulnerabiliQes	
  are	
  counted	
  by	
  unique	
  Web	
  applicaQon	
  and	
  vulnerability	
  class.	
  If	
  three	
  of	
  the	
  five	
  
parameters	
  of	
  a	
  single	
  Web	
  applicaQon	
  (/foo/webapp.cgi)	
  are	
  vulnerable	
  to	
  SQL	
  InjecQon,	
  this	
  is	
  
counted	
  as	
  3	
  individual	
  vulnerabiliQes	
  (e.g.	
  aZack	
  vectors).
                                                                                                        © 2012 WhiteHat Security, Inc.           35
Websites

  676,919,707
               +32.6 million since March
(Producing more code / websites than the industry is able to review.)




                                  http://news.netcraft.com/archives/2012/04/04/april-2012-web-server-survey.html

                                                                    © 2012 WhiteHat Security, Inc.            36
SSL Websites

1,200,000
                 © 2012 WhiteHat Security, Inc.   37
1.2 million x 79 vulns per year =

94,800,000
 Undiscovered serious* vulnerabilities
      on just the SSL websites.




                             © 2012 WhiteHat Security, Inc.   38
Overall Vulnerability Population (2011)
      Percentage breakdown of all the serious* vulnerabilities discovered




Web Application Firewalls are best
at mitigating vulnerabilities such as
Cross-Site Scripting, Content
Spoofing, SQL Injection, Response
Splitting, etc. By summing all these
percentages up we might safely say:

A WAF could feasible help mitigate
the risk of at least 71% of all custom
Web application vulnerabilities.




                                                         © 2012 WhiteHat Security, Inc.   39
7
    (Crowd-Sourcing Vulnerability Assessment)


    Bug Bounties

                               © 2012 WhiteHat Security, Inc.   40
Websites Accepting
“Security Research”                                             $
1) Paypal                 12)   GitHub
2) Facebook               13)   Constant Contact
3) 37 Signals             14)   Zeggio
4) Salesforce             15)   Simplify, LLC
5) Microsoft              16)   Team Unify
6) Google                 17)   Skoodat
7) Twitter                18)   Relaso
8) Mozilla                19)   Modus CSR
9) eBay                   20)   CloudNetz
10) Adobe                 21)   EMPTrust
11) Reddit                22)   Apriva

Millions of dollars to hundreds of researchers.
Closed hundreds, if not thousands, of vulnerabilities.
Protected hundreds of millions of users.
                                                         http://dankaminsky.com/2012/02/26/review/

                                                         © 2012 WhiteHat Security, Inc.              41
How to develop
secure-(enough) software?




                  © 2012 WhiteHat Security, Inc.   42
Little-to-No
Supporting Data.


            © 2012 WhiteHat Security, Inc.   43
Connect the Dots...


  (SDL)
                Production        Attack
 Security                                                   Breaches
               Vulnerabilities    Traffic
 Controls



  BSIMM       WhiteHat Security   Akamai                   Verizon DBIR
                                  IBM                      Trustwave



Then we’ll start getting some real answers
about how to product secure-enough.

                                            © 2012 WhiteHat Security, Inc.   44
Thank You!
Blog: http://blog.whitehatsec.com/
Twitter: http://twitter.com/jeremiahg
Email: jeremiah@whitehatsec.com




                                        © 2012 WhiteHat Security, Inc.   45
Why do vulnerabilities go unfixed?
• No one at the organization understands or is responsible for
 maintaining the code.
• Development group does not understand or respect the vulnerability.
• Lack of budget to fix the issues.
• Affected code is owned by an unresponsive third-party vendor.
• Website will be decommissioned or replaced “soon.”
• Risk of exploitation is accepted.
• Solution conflicts with business use case.
• Compliance does not require fixing the issue.
• Feature enhancements are prioritized ahead of security fixes.




                                                        © 2012 WhiteHat Security, Inc.   46
Testing Speed & Frequency Matters




                        © 2012 WhiteHat Security, Inc.   47
Remediation Rates by Industry (Trend)




 A steady improvement in the percentage of reported vulnerabilities
that have been resolved during each of the last four years, which now
                      resides at 63%. Progress!
                                                       © 2012 WhiteHat Security, Inc.   48

More Related Content

More from Jeremiah Grossman

All these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterAll these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterJeremiah Grossman
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorJeremiah Grossman
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryJeremiah Grossman
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareJeremiah Grossman
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareJeremiah Grossman
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideJeremiah Grossman
 
Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Jeremiah Grossman
 
Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowJeremiah Grossman
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Jeremiah Grossman
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015Jeremiah Grossman
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
 
WhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedWhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedJeremiah Grossman
 
WhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportWhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportJeremiah Grossman
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)Jeremiah Grossman
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Jeremiah Grossman
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]Jeremiah Grossman
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Jeremiah Grossman
 

More from Jeremiah Grossman (20)

All these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterAll these vulnerabilities, rarely matter
All these vulnerabilities, rarely matter
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare Sector
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare Industry
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?
 
Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to Know
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security Guarantees
 
WhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedWhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report Explained
 
WhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportWhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics Report
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

7 Ways to Scale Web Security (SANS AppSec Summit 2012)

  • 1. 7 Ways to Scale Web Security Jeremiah Grossman Founder & Chief Technology Officer SANS AppSec Summit 04.30.2012 © 2012 WhiteHat Security, Inc. 1
  • 2. Jeremiah Grossman ØFounder & CTO of WhiteHat Security Ø6-Continent Public Speaker ØTED Alumni ØAn InfoWorld Top 25 CTO ØCo-founder of the Web Application Security Consortium ØCo-author: Cross-Site Scripting Attacks ØFormer Yahoo! information security officer ØBrazilian Jiu-Jitsu Black Belt © 2012 WhiteHat Security, Inc. 2
  • 3. WhiteHat Security : Company Overview ØHeadquartered in Santa Clara, CA ØWhiteHat Sentinel – SaaS end-to-end website risk management platform ØEmployees: 170+ ØCustomers: 500+ Cool Vendor The FutureNow List © 2012 WhiteHat Security, Inc.
  • 4. We shop, bank, pay bills, file taxes, share photos, keep in touch with friends & family, watch movies, play games, and more. Cyber-war Cyber-crime Hacktivism PwC Survey: “Cybercrime is now the second biggest cause of economic crime experienced by the Financial Services sector.” © 2012 WhiteHat Security, Inc. 4
  • 5. Website Hacked © 2012 WhiteHat Security, Inc. 5
  • 6. Verizon Data Breach Investigations Report: 2010 DBIR: “The majority of breaches and almost all of the data stolen in 2009 (95%) were perpetrated by remote organized criminal groups hacking "servers and applications." 2011 DBIR: “The number of Web application breaches increased last year and made up nearly 40% of the overall attacks.“ 2012 DBIR: “Web applications abound in many larger companies, and remain a popular (54% of breaches) and successful (39% of records) attack vector.” © 2012 WhiteHat Security, Inc. 6
  • 7. 855 incidents, 174 million compromised records © 2012 WhiteHat Security, Inc. 7
  • 8. © 2012 WhiteHat Security, Inc. 8
  • 9. (Name of the Game) SCALABILITY “An algorithm, design, networking protocol, program, or other system is said to scale, if it is suitably efficient and practical when applied to large situations (e.g. a large input data set, a large number of outputs or users, or a large number of participating nodes in the case of a distributed system). If the design or system fails when a quantity increases, it does not scale.” © 2012 WhiteHat Security, Inc. 9
  • 10. © 2012 WhiteHat Security, Inc. 10
  • 11. People Process SCALE Technology • People: Cognitive ability, operate and interpret technology results • Process: Organize and make efficient use of resources • Technology: To scale the people and the process © 2012 WhiteHat Security, Inc. 11
  • 12. 3 Hard Facts About Technology 1) Technology is incapable of eliminating the need for people in any aspect of application security. This includes source code reviews, penetration testing, threat modeling, architectural review, development, etc. 2) Without technology there is far too much work than could ever be completed manually by the number of people available, even if monetary costs were not an issue. 3) The best technology can offer is increasing efficiency and reducing the quantity and skill level of the people necessary to complete a given process. © 2012 WhiteHat Security, Inc. 12
  • 13. WhiteHat Sentinel – Assessment Platform • Software-as-a-Service • Annual Per Website Subscription • Unlimited Assessments / Users 500+ enterprises from start-ups to fortune 500 1,000,000 vulnerabilities processed per day 6 Terabytes data stored per day 7,000+ websites receiving ~weekly assessments 940,000,000 HTTP(s) requests per month © 2012 WhiteHat Security, Inc.
  • 14. © 2012 WhiteHat Security, Inc. 14
  • 16. 1 Game-ification © 2012 WhiteHat Security, Inc. 16
  • 17. Elevation of Privilege (EoP) Card Game Elevation of Privilege (EoP) is the easy way to get started threat modeling, which is a core component of the design phase in the Microsoft Security Development Lifecycle (SDL). The EoP card game helps clarify the details of threat modeling and examines possible threats to software and computer systems. The EoP game focuses on the following threats: • Spoofing • Tampering • Repudiation • Information Disclosure • Denial of Service • Elevation of Privilege EoP uses a simple point system that allows you to challenge other developers and become your opponent's biggest threat. http://www.microsoft.com/security/sdl/adopt/eop.aspx © 2012 WhiteHat Security, Inc. 17
  • 18. Capture  the  Flag © 2012 WhiteHat Security, Inc. 18
  • 19. 2 (Security Scorecards) Peer Pressure © 2012 WhiteHat Security, Inc. 19
  • 20. Publish Scorecards Internally & Regularly -- For All To See Avg.   High  Severity   Remedia5on   Window  of  Exposure   Group Time-­‐to-­‐Fix   Vulnerabili5es Rate (Days) (Days) 2012  Corporate  Goal 20 30 75% 100 Industry  Average 55 32 63% 223 Business  Unit  1 17 45 74% 195 Business  Unit  2 53 30 46% 161 Business  Unit  3 67 66 63% 237 Business  Unit  4 48 35 69% 232 © 2012 WhiteHat Security, Inc. 20
  • 21. Computer-Based 3 Training (CBT) © 2012 WhiteHat Security, Inc. 21
  • 22. The biggest problem in application security today: The huge shortage of qualified application security people. © 2012 WhiteHat Security, Inc. 22
  • 23. Gary McGraw (CTO, Cigital) says roughly 2% of all programmers should be software security pros, or “Builders” in our case. Gary, through a project called BSIMM, arrived at 2% by surveying dozens of software security programs among large companies and measuring what they do. Programmer Population (Worldwide): 17 million We’ll need 340,000 “Builders” © 2012 WhiteHat Security, Inc. 23
  • 24. We’ll use a ratio of 1 “breaker” per to 100 websites. This ratio comes from internal metrics at WhiteHat Security generated from assessment conducted over the last 8 years and encompassing more than 7,000 websites. “Important” (SSL) website population: 1.2 million We’ll need 12,000 “Breakers” © 2012 WhiteHat Security, Inc. 24
  • 25. No idea how to begin to estimate the Defender need, but it’ll be in the tens of thousands at least. Considering the vast number of website assets that must be protected, the 1 billion online users who someone needs to ensure are playing nice, and monitoring the serious volume of Web traffic they generate. ? © 2012 WhiteHat Security, Inc. 25
  • 26. OWASP Appsec Tutorial Series The OWASP AppSec Tutorial Series project provides a video based means of conveying complex application security concepts in an easily accessible and understandable way. Each video is approximately 5-10 minutes long and highlights one or more specific application security concepts, tools, or methodologies. The goal of the project is quite simple and yet quite audacious - provide top notch application security video based training... for free! https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series © 2012 WhiteHat Security, Inc. 26
  • 27. Centralized 4 Security Controls © 2012 WhiteHat Security, Inc. 27
  • 28. Development Frameworks ESAPI is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development. https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API © 2012 WhiteHat Security, Inc. 28
  • 29. 5 Work Flow © 2012 WhiteHat Security, Inc. 29
  • 30. Model an Application http://sdelements.com/ © 2012 WhiteHat Security, Inc. 30
  • 31. Check against library of security tasks with rules © 2012 WhiteHat Security, Inc. 31
  • 32. Produce tailored security tasks • Distills application security personnel expertise to developers. • Fits cleanly into development processes. • Tasks are continuously updated to keep up with new technologies & threats. • In retroactive analysis of years of penetration-testing data, following SDE would have prevented approximately 85% of secure coding weaknesses. © 2012 WhiteHat Security, Inc. 32
  • 33. 6 Virtual-Patching © 2012 WhiteHat Security, Inc. 33
  • 34. 8 out of 10 websites have serious* vulnerabilities (10 out of 10 if you are willing to wait long enough.) *  Serious  Vulnerability:  A  security  weakness  that  if  exploited  may  lead  to  breach  or  data  loss  of  a   system,  its  data,  or  users.  (PCI-­‐DSS  severity  HIGH,  CRITICAL,  or  URGENT) http://news.netcraft.com/archives/2012/04/04/april-2012-web-server-survey.html © 2012 WhiteHat Security, Inc. 34
  • 35. Average annual amount of new serious* vulnerabilities introduced per website per year 1111 795 480 230 79 2007 2008 2009 2010 2011 VulnerabiliQes  are  counted  by  unique  Web  applicaQon  and  vulnerability  class.  If  three  of  the  five   parameters  of  a  single  Web  applicaQon  (/foo/webapp.cgi)  are  vulnerable  to  SQL  InjecQon,  this  is   counted  as  3  individual  vulnerabiliQes  (e.g.  aZack  vectors). © 2012 WhiteHat Security, Inc. 35
  • 36. Websites 676,919,707 +32.6 million since March (Producing more code / websites than the industry is able to review.) http://news.netcraft.com/archives/2012/04/04/april-2012-web-server-survey.html © 2012 WhiteHat Security, Inc. 36
  • 37. SSL Websites 1,200,000 © 2012 WhiteHat Security, Inc. 37
  • 38. 1.2 million x 79 vulns per year = 94,800,000 Undiscovered serious* vulnerabilities on just the SSL websites. © 2012 WhiteHat Security, Inc. 38
  • 39. Overall Vulnerability Population (2011) Percentage breakdown of all the serious* vulnerabilities discovered Web Application Firewalls are best at mitigating vulnerabilities such as Cross-Site Scripting, Content Spoofing, SQL Injection, Response Splitting, etc. By summing all these percentages up we might safely say: A WAF could feasible help mitigate the risk of at least 71% of all custom Web application vulnerabilities. © 2012 WhiteHat Security, Inc. 39
  • 40. 7 (Crowd-Sourcing Vulnerability Assessment) Bug Bounties © 2012 WhiteHat Security, Inc. 40
  • 41. Websites Accepting “Security Research” $ 1) Paypal 12) GitHub 2) Facebook 13) Constant Contact 3) 37 Signals 14) Zeggio 4) Salesforce 15) Simplify, LLC 5) Microsoft 16) Team Unify 6) Google 17) Skoodat 7) Twitter 18) Relaso 8) Mozilla 19) Modus CSR 9) eBay 20) CloudNetz 10) Adobe 21) EMPTrust 11) Reddit 22) Apriva Millions of dollars to hundreds of researchers. Closed hundreds, if not thousands, of vulnerabilities. Protected hundreds of millions of users. http://dankaminsky.com/2012/02/26/review/ © 2012 WhiteHat Security, Inc. 41
  • 42. How to develop secure-(enough) software? © 2012 WhiteHat Security, Inc. 42
  • 43. Little-to-No Supporting Data. © 2012 WhiteHat Security, Inc. 43
  • 44. Connect the Dots... (SDL) Production Attack Security Breaches Vulnerabilities Traffic Controls BSIMM WhiteHat Security Akamai Verizon DBIR IBM Trustwave Then we’ll start getting some real answers about how to product secure-enough. © 2012 WhiteHat Security, Inc. 44
  • 45. Thank You! Blog: http://blog.whitehatsec.com/ Twitter: http://twitter.com/jeremiahg Email: jeremiah@whitehatsec.com © 2012 WhiteHat Security, Inc. 45
  • 46. Why do vulnerabilities go unfixed? • No one at the organization understands or is responsible for maintaining the code. • Development group does not understand or respect the vulnerability. • Lack of budget to fix the issues. • Affected code is owned by an unresponsive third-party vendor. • Website will be decommissioned or replaced “soon.” • Risk of exploitation is accepted. • Solution conflicts with business use case. • Compliance does not require fixing the issue. • Feature enhancements are prioritized ahead of security fixes. © 2012 WhiteHat Security, Inc. 46
  • 47. Testing Speed & Frequency Matters © 2012 WhiteHat Security, Inc. 47
  • 48. Remediation Rates by Industry (Trend) A steady improvement in the percentage of reported vulnerabilities that have been resolved during each of the last four years, which now resides at 63%. Progress! © 2012 WhiteHat Security, Inc. 48