16
Cyber-Proofing your Data from Application Attacks Irene Abezgauz Product Manager © 2005-2011. All Rights Reserved to Seeker Security Ltd. © 2005-2012. All Rights Reserved to Seeker Security Ltd.

Cyber proofing your data from application attacks

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Cyber proofing your data from application attacks

Cyber-Proofing your Data from Application Attacks

Irene AbezgauzProduct Manager

© 2005-2011. All Rights Reserved to Seeker Security Ltd.© 2005-2012. All Rights Reserved to Seeker Security Ltd.

Page 2: Cyber proofing your data from application attacks

Introduction

• Cyber-Proofing – Application Security vs.

Data Security

• Current Application Security Approach

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

• Vulnerability vs. Risk

• Technique vs. Goal

• Adaptive Approach for Application Security

Page 3: Cyber proofing your data from application attacks

About Myself

• Over 8 Years in Information Security

• Application Threats Expert

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

• Hands-on Penetration Testing, Research and

Vulnerability Disclosure

• Speaker at Security Conferences

Page 4: Cyber proofing your data from application attacks

The Problem

• Cyber Threats – Focused, Persistent Attacks

• Evolution of Information Security – YOU are

being Targeted

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

being Targeted

• Find as Many Vulnerabilities as Possible – is

that really the Goal?

Page 5: Cyber proofing your data from application attacks

The Problem

• Influence of Application Vulnerabilities on

Information Security

• Dealing with Security Information Overload

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

• Dealing with Security Information Overload

• Remediation Prioritization - “Critical”, “Very

High”, “The Rest”

• The Need for Manageable Results

Page 6: Cyber proofing your data from application attacks

Current Approach

• Approach is Too Technical

• Focus on Technical Aspects

• Examine it from the Vulnerability Perspective

• Focus on Injections & Technical Problems

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

• Focus on Injections & Technical Problems

• Analysis of Code rather than Application

• Ignoring Application Data

• Focus on Technology instead of Risk

Page 7: Cyber proofing your data from application attacks

Too Many Vulnerabilities…

SQL Injection

Cross Site Request Forgery

Session Riding

LDAP Injection

Directory TraversalOS Commanding

Session Hijacking

Flow Bypassing

Director Listing

File Inclusion

Buffer Overflow

No SSL

Session Fixation

URL Encoding

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

Cross Site Scripting

Parameter Tampering

Forceful Browsing

Hidden Field Manipulation

Cookie PoisoningCRLF Injection

HTTP Response Splitting

XPath Injection

Directory TraversalOS Commanding

Insecure Redirect

Insecure Password Storage

File Inclusion

No User Lockout

Unauthenticated Access

Detailed Error Messages

Misconfiguration

Information Leakage

Page 8: Cyber proofing your data from application attacks

Example – Unauthorized Data Modification

• The Attack is Data Modification

• Can be Performed in Various Ways

• Parameter Tampering

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

• Parameter Tampering

• Flow Bypassing

• SQL Injection

• Cross Site Scripting

• Cross Site Request Forgery

Page 9: Cyber proofing your data from application attacks

The Problem – Take II

• Low Security ROI

• Spending on solutions not focused on risk

• Spending on professional services trying

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

• Spending on professional services trying

to simplify hay-stacks that resemble

needles

• Spending on R&D hours of fixing

unnecessary issues

Page 10: Cyber proofing your data from application attacks

Going back to the Roots

• Risk Based Approach

• CIA

• Confidentiality

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

• Confidentiality

• Integrity

• Availability

• Assess Application Vulnerabilities Based on

Data Risk

Page 11: Cyber proofing your data from application attacks

Data Oriented Approach

• Taking a Data Oriented Approach to

Application Security Testing

• Logical vs. Technical

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

• Logical vs. Technical

• Business Impact

• Level of Exploitability

• Risk, Risk, Risk

Page 12: Cyber proofing your data from application attacks

The Solution – Data Centric Application

Security

• Analysis of Actual Data Handling

• Automatic Data Classification

• Sensitivity

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

• Ownership

• Accessibility

• Identifying Vulnerabilities that Pose a Real

Threat

• Verification of Actual Risk Level

Page 13: Cyber proofing your data from application attacks

Automatic Classification of Risk

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

Page 14: Cyber proofing your data from application attacks

Visualization of Risk

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

Page 15: Cyber proofing your data from application attacks

Summary

• Cyber-Proofing!

• Identify More Vulnerabilities

• Focus on Real Threats

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

• Focus on Real Threats

• Holistic Approach

• Integrate into SDLC

• Efficient, Practical, Focused, Better ROI

Page 16: Cyber proofing your data from application attacks

Thank You!

© 2005-2011. All Rights Reserved to Seeker Security Ltd.

Thank You!