Setting up a cost effective Application Security program from scratch by Tusnin Das

Security Researcher at Adobe, Chapter Leader at OWASP & null
Dec. 5, 2015
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
Setting up a cost effective Application Security program from scratch by Tusnin Das
1 of 14

More Related Content

Slideshows for you

8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris WysopalThreat Stack
Owasp and friendsOwasp and friends
Owasp and friendsMažvydas Skuodas
Kaseya Connect 2012 - Kaseya Security Solutions UpdateKaseya Connect 2012 - Kaseya Security Solutions Update
Kaseya Connect 2012 - Kaseya Security Solutions UpdateKaseya
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityStephen de Vries
Application Security at DevOps Speed and Portfolio ScaleApplication Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleJeff Williams

Viewers also liked

Ống kính và cảm biến trong hệ thống CCTVỐng kính và cảm biến trong hệ thống CCTV
Ống kính và cảm biến trong hệ thống CCTVPhuongVietCamera
Lt+preschool+program+designLt+preschool+program+design
Lt+preschool+program+designkaylabfarley
All consuming newsAll consuming news
All consuming newsJack740
Roca bathroomRoca bathroom
Roca bathroomfountaindirect
Lifestyle Holidays Vacation Club Announces Whale Season In The Dominican Repu...Lifestyle Holidays Vacation Club Announces Whale Season In The Dominican Repu...
Lifestyle Holidays Vacation Club Announces Whale Season In The Dominican Repu...Lifestyle Holidays Vacation Club
Pop-Up the Ladder and Own a BarPop-Up the Ladder and Own a Bar
Pop-Up the Ladder and Own a BarTales of the Cocktail

Similar to Setting up a cost effective Application Security program from scratch by Tusnin Das

Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyBlack Duck by Synopsys
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityAnne Oikarinen
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...Achim D. Brucker
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOpsCYBRIC
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Jeff Williams
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityLarry Ball

Similar to Setting up a cost effective Application Security program from scratch by Tusnin Das(20)

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi

Recently uploaded

AI and ML Series - Leveraging Generative AI and LLMs Using the UiPath Platfor...AI and ML Series - Leveraging Generative AI and LLMs Using the UiPath Platfor...
AI and ML Series - Leveraging Generative AI and LLMs Using the UiPath Platfor...DianaGray10
INASLA_AI and Landscape Architecture.pptxINASLA_AI and Landscape Architecture.pptx
INASLA_AI and Landscape Architecture.pptxJonathon Geels
GDSC SRMCEM Info Session 2023GDSC SRMCEM Info Session 2023
GDSC SRMCEM Info Session 2023HariOM Dwivedi
OpenFOAM benchmark for EPYC server -Influence of coarsestLevelCorr in GAMG so...OpenFOAM benchmark for EPYC server -Influence of coarsestLevelCorr in GAMG so...
OpenFOAM benchmark for EPYC server -Influence of coarsestLevelCorr in GAMG so...takuyayamamoto1800
Generative AI PotentialGenerative AI Potential
Generative AI PotentialKapil Khandelwal (KK)
An Introduction To Using ChatGPT For BusinessAn Introduction To Using ChatGPT For Business
An Introduction To Using ChatGPT For BusinessPaul Nguyen

Setting up a cost effective Application Security program from scratch by Tusnin Das

  1. Enterprise Application Security Program : A cost-effective hack! Tusnin Das Ram Awasthi

  2. Ingredients of an Enterprise Application Security Program •SAST •DAST •Security Analyst •Reporting & Aggregation tools Application Vulnerability Management Security Operation (Application Level) •WAF •Log Monitoring

  3. Have you thought about the cost? SAST ,DAST & WAF COST YOU

  4. What do you do when you have nothing?

  5. What options do we have? SAST DAST Security Vulnerability Remediation Testing & Deployment Traditional Approach Our Approach Doing the right thing Across the application

  6. What does it mean? • Fix codes that result in security vulnerability (How do I identify that?) • Address it across the application with 100% coverage (Is it possible?) • Make it an iterative process

  7. how do we do it? Threat Modeling Address each category one by one Checklist • XSS • XSRF • SQL Injection • Privacy violation • Open redirects • Header Injection

  8. how to do it…continues Checklist Action SQL Injection Get rid of dynamic queries XSS Output encoding across the application XSRF •Identify forms •Implement page token Header Injection •Input validation •Output encoding Privacy violation Analyze DAR & DIM for sensitive data Open Redirects •Input validation •Output encoding Configuration & Deployment •Get rid of default configurations • Run dependency checker to identify vulnerable packages/ libraries

  9. how to do it…continues • The IDE is not just editor. It is a powerful search tool • Use the search and replace function for coverage • Use regex to optimize your search

  10. how to do it…almost there • Make it a part of your SDLC • Make it iterative • People dependent ..however can be scaled • Does it mean the applications do not have any more vulnerabilities after this exercise?

  11. In scope v/s out of scope In Scope Out of scope Code level flaws Session related flaws Business validation flaws

  12. Security Operations • Web Application Firewall (WAF) • Log Analysis

  13. Poor man’s arsenal • Mod Security WAF • ZAP Proxy / Burp Proxy • OWASP Dependency checker • ThreadFix • Bugzilla • Jenkins

  14. Wake up. It’s Over! Questions ?