15
SESSION ID: #RSAC Gyan Prakash EFFICACY OF LAYERED APPLICATION SECURITY THROUGH THE LENS OF HACKER ASEC-T07 Chief Security Architect VISA Inc. Bill Yue Chen Chief Security Architect VISA Inc. 1

EFFICACY OF LAYERED APPLICATION SECURITY THROUGH THE LENS OF HACKER · SESSION ID: #RSAC Gyan Prakash EFFICACY OF LAYERED APPLICATION SECURITY THROUGH THE LENS OF HACKER ASEC-T07

Embed Size (px)

Citation preview

SESSION ID:

#RSAC

Gyan Prakash

EFFICACY OF LAYERED APPLICATION SECURITYTHROUGH THE LENS OF HACKER

ASEC-T07

Chief Security Architect VISA Inc.

Bill Yue Chen

Chief Security Architect VISA Inc.

1

#RSAC

Threat Model

Observations

Optimizing App Security Life-Cycle Controls

Agility with Security

What Pen Test Should Focus on

Recommendations

2

Agenda

#RSAC

Data

Brut forceMalware

Phishing

“Know yourself, also know your rival.”

-Sun Tzu, 545-470 B.C.

3

A Tight Race

#RSAC

Recon.

Automated CAPTCHA

Reader

Advanced PW Guessing

(e.g. PassGAN)

Advanced Spearphishing(e.g. SNAP_R)

ML AssistedSocial

Engineering

Delivery

Weaponizing Exploit

Installation

C & C

Act. & Obj.

Scans, DNS, Asset discovery, Social Eng., etc.

Malware, Open Source

Poisoning, Faked Web, etc.

Passive Traps & Proactive Attacks

Network, Infra,

OWASP Vuln

IAM Issues, etc.

Camouflaged Actions, APT,

Outbound control exploit

4

Threat Model Over The Kill Chain

#RSAC

Just Overwhelming!Web Vul.Scanner

WAF

RASP

Binary Composition

SAST

Pen Test

DAST IAST

App Vul.Monitoring

5

#RSAC

6

Observations

Thousands

Hundreds

#RSAC

Flawed Authentication

Security Misconfigurations

Sensitive Data Exposure

Insecure TLS/SSL usage

Cross-Site scripting

Injection

Using vulnerable components

Inappropriate error handling

CSRF

7

Observations: Application Vulnerabilities

#RSAC

SAST DASTIAST

o Injectionso Sensitive Data Exposureo XML External Entities (XXE)o Cross-Site Scriptingo Insecure Deserialization

More Than One Third

o Injectionso Sensitive Data Exposureo XML External Entities (XXE)o Cross-Site Scriptingo Insecure Deserializationo Security Misconfigurationso 3rd Party Vulnerable Lib

Around Two Third

o Injectionso Sensitive Data Exposureo XML External Entities (XXE)o Cross-Site Scriptingo Security Misconfigurations

Around One Third

8

Optimizing App Security Coverage

#RSAC

Product Backlog Sprint Backlog Iteration Product Shipping

Developer Workspace

Daily Builds

SPRINT1 - 3 weeks

SAST IAST

DAST

SASTIAST

SAST

CI Automation

9

Security Embedded with Agile

#RSAC

Product Backlog Sprint Backlog Iteration Product Shipping

Developer Workspace

Daily Builds

SPRINT1 - 3 weeks

SAST IAST

DAST

SASTIAST

SAST

CI Automation

> 80 % with <<

10

Security Embedded with Agile

#RSAC

11

#RSAC

Authentication & Authorization

Authentication flow and design, Passwords, 2FA, Security questions, Access Control

Session management

Business Logic

All possible bypassing issues

Data flows that are not covered by scanners, such as email, SSH, SAML etc.

Examine Attack surface

Sampling test Injection, XSS, to validate SAST/IAST/DAST controls

Last but not the least, Infrastructure

12

What Pen Test should focus on?

#RSAC

Product Backlog Sprint Backlog Iteration Product Shipping

Developer Workspace

Daily Builds

SPRINT1 - 3 weeks

SAST IAST

DAST

SASTIAST

SAST

PenTest

CI Automation

13

Completing the Puzzle

#RSAC

Shift Left – Train and Empower Developers to Security Champions

Automation - Empower engineers with SAST, IAST, OSS, and WVS

Pen test smartly – Focus on the limitation area of tools

Implement multi-factor authentication

Check password blacklist

Phishing/social engineering awareness training

14

Recommendations

#RSACQuestions & Answers

Sprint Backlog Iteration Product Shipping

Developer Workspace

Daily Builds

SPRINT1 - 3 weeks

SAST IAST

DAST

SASTIAST

SAST

PenTest

CI AutomationWAF

Web Vul.Scanner

Real timeAnalytics

PRODUCTION