SlideShare a Scribd company logo
1 of 32
AppSec, the untrustable dev
timur @ owasp
■ Timur ‘x’ Khrotko, PhD
■ x@azd.se
■ timur@owasp.org
■ linkedin.com/in/timurx
@timurxyz
■ Open Web Application Security Project[s]
o owasp.org, open-source, non-profit
o AppSec evangelism
■ OWASP ≠ Top 10 (which is an educational project imo)
■ some projects
o ASVS (Application Security Verification Standard)
o (T10) Proactive Controls
o Testing Guide (TG)
o ZAP (Zed Attack Proxy)
o dependency-check …
O.W.A.S.P.
untrustable dev
image: deviantart.com, by sefesoft
■ coders will never care about security
○ it can only be a by-product of their gut/tacit practice
■ don’t rely on appsec, detect and handle incidents
■ applications are vulnerable anyway - why?:
○ complexity, culture of devs, complicity (yours also,
see culture of audits), mismanagement,
immature methodologies and robots
■ for the dev teams who aren't lost:
○ secure coding course +dev coaching
+ review of audit findings
abstract / goo.gl/mbrPYO
■ AppSec = QA (security QA, SeQA)
o product + production/dev + support + etc practices
■ don’t buy it w/o threat modeling (risk assessment)
■ AS policy, S-SDLC
o design, code, configuration, controls, testing
o patch management, support agreement, sec SLA
■ countermeasures: filter, isolate, monitor, respond
o waf, sandboxing, dmz, log audit, id(p)s
■ audit/test
o va, sast, dast, iast, code review, bl tests, pentest, ci …
appsec concepts
appsec, the short story
■ application security is created by the developers to meet
the set requirements
untrustable quality
image: deviantart.com, by sefesoft
The task of the software development team is
to engineer the illusion of simplicity.why #1: complexity
image: Bobbi J. Young et al. 2007. Software complexity: how do we bring order to chaos?
why #2: dev culture
image: en.wikipedia, by Klean Denmark
why #3: complicity
image: Thomas van de Weerd
CEO, business, legal
CIO, CISO, CRO, etc.
why #4: appsec mgmt
image: microsoft
why #5: methodologies
image: flickr.com/photos/bagogames/16153704398
trusted devs
image: en.wikipedia
trusted security
image: en.wikipedia, by AlephGamma
tno (trust no one)
image: wikimedia.org, cover art / trust no one / Dave Navarro (c) capitol/emi
threats
image: deviantart.com, by Christopher-Dombres
trust as soc construct
image: (c) playmobil
open sw production culture
■ HB -- a failure of the opensource QA myth
o “OpenSSL is written by monkeys”
/ Marco Peereboom, 2009
o “… is a patchwork nightmare”
/ Matthew Green, 2013
o “I told you so, la la la, I told you so!”
/ Marco Peereboom, 2014 image: XOX
enterprise sw culture
■ “Threats in custom app development: enterprises' lack of
security”
o Veracode Inc. blog, 2014 Sep
still untrustable devs
image: en.wikipedia, by Klean Denmark
OWASP Proactive Controls
C1: Parameterize Queries
C2: Encode Data
C3: Validate All Inputs
C4: Implement Appropriate Access Controls
C5: Establish Identity and Authentication Controls
C6: Protect Data and Privacy
C7: Implement Logging, Error Handling and Intrusion Detection
C8: Leverage Security Features of Frameworks and Security Libraries
C9: Include Security-Specific Requirements
OWASP ASVS
■ AppSec Verification Standard
o “security engineering checklist”
o levels (eg. L2): risk --> requirements --> verification
40-20-40
+design
+testing
did you threat-model?!
secure coding course?!
+ coaching + re:findings
dev
training
audit/va
dev
coaching
+ do incident response!
resource: cut eh bdgt
■ eh (ethical hacking incl webapp assessments) is just
another expensive social construct you subscribed to
o eh culture is just as bad as that of the dev’s
■ relocate and spend more on:
o trainings
o S-SDLC, AppSec policy enforcement
o threat modeling and IR
■ use appsec specialists with whom your devs can work
constructively (eg. coaching)
resource for the smb-s
■ involve a visiting appsec specialist in critical moments
■ have a visiting ciso, at least rarely visiting
■ make one resident member of the dev team security
champion (see MS SDL)
■ secure coding courses
appsec synchronized
image: en.wikipedia, by Klean Denmark
next meetup: TBD
meetup.com/owasp-hu
twitter.com/owasp_hu
this prezo: goo.gl/mbrPYO

More Related Content

Viewers also liked

PLNOG 13: Maciej Grabowski: HP Moonshot
PLNOG 13: Maciej Grabowski: HP MoonshotPLNOG 13: Maciej Grabowski: HP Moonshot
PLNOG 13: Maciej Grabowski: HP MoonshotPROIDEA
 
PLNOG15: Exascale future of today - Rob Bird
PLNOG15: Exascale future of today - Rob BirdPLNOG15: Exascale future of today - Rob Bird
PLNOG15: Exascale future of today - Rob BirdPROIDEA
 
PLNOG 13: Julian Lucek: Centralized Traffic Enginnering
PLNOG 13: Julian Lucek: Centralized Traffic EnginneringPLNOG 13: Julian Lucek: Centralized Traffic Enginnering
PLNOG 13: Julian Lucek: Centralized Traffic EnginneringPROIDEA
 
CONFidence 2015: when something overflowing... - Peter Hlavaty
CONFidence 2015: when something overflowing... - Peter HlavatyCONFidence 2015: when something overflowing... - Peter Hlavaty
CONFidence 2015: when something overflowing... - Peter HlavatyPROIDEA
 
JDD2014: Introducing groovy into JAVA project - Yuriy Chulovskyy
JDD2014: Introducing groovy into JAVA project - Yuriy ChulovskyyJDD2014: Introducing groovy into JAVA project - Yuriy Chulovskyy
JDD2014: Introducing groovy into JAVA project - Yuriy ChulovskyyPROIDEA
 
CONFidence 2015: Analiza przypadku: Carbanak - jak uniknąć powtórki - Przemys...
CONFidence 2015: Analiza przypadku: Carbanak - jak uniknąć powtórki - Przemys...CONFidence 2015: Analiza przypadku: Carbanak - jak uniknąć powtórki - Przemys...
CONFidence 2015: Analiza przypadku: Carbanak - jak uniknąć powtórki - Przemys...PROIDEA
 
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...PROIDEA
 
PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof Mazepa
PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof MazepaPLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof Mazepa
PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof MazepaPROIDEA
 
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak   CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak PROIDEA
 
PLNOG 13: Piotr Jabłoński: First Steps in Autonomic Networking
PLNOG 13: Piotr Jabłoński: First Steps in Autonomic NetworkingPLNOG 13: Piotr Jabłoński: First Steps in Autonomic Networking
PLNOG 13: Piotr Jabłoński: First Steps in Autonomic NetworkingPROIDEA
 
PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...
PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...
PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...PROIDEA
 
PLNOG15: Automation of deployment and management of network devices - Oskar J...
PLNOG15: Automation of deployment and management of network devices - Oskar J...PLNOG15: Automation of deployment and management of network devices - Oskar J...
PLNOG15: Automation of deployment and management of network devices - Oskar J...PROIDEA
 
4Developers 2015: Wnioski wyciągnięte z powiększania zespołu - Bartek Nowa...
4Developers 2015: Wnioski wyciągnięte z powiększania zespołu - Bartek Nowa...4Developers 2015: Wnioski wyciągnięte z powiększania zespołu - Bartek Nowa...
4Developers 2015: Wnioski wyciągnięte z powiększania zespołu - Bartek Nowa...PROIDEA
 
Jdd2014: High performance logging - Peter Lawrey
Jdd2014: High performance logging - Peter LawreyJdd2014: High performance logging - Peter Lawrey
Jdd2014: High performance logging - Peter LawreyPROIDEA
 
Global Forest and Community Tenure Challenges by Jenny Springer
 Global Forest and Community Tenure Challenges by Jenny Springer Global Forest and Community Tenure Challenges by Jenny Springer
Global Forest and Community Tenure Challenges by Jenny SpringerSIANI
 
CONFidence 2014: Davi Ottenheimer Protecting big data at scale
CONFidence 2014: Davi Ottenheimer Protecting big data at scaleCONFidence 2014: Davi Ottenheimer Protecting big data at scale
CONFidence 2014: Davi Ottenheimer Protecting big data at scalePROIDEA
 

Viewers also liked (16)

PLNOG 13: Maciej Grabowski: HP Moonshot
PLNOG 13: Maciej Grabowski: HP MoonshotPLNOG 13: Maciej Grabowski: HP Moonshot
PLNOG 13: Maciej Grabowski: HP Moonshot
 
PLNOG15: Exascale future of today - Rob Bird
PLNOG15: Exascale future of today - Rob BirdPLNOG15: Exascale future of today - Rob Bird
PLNOG15: Exascale future of today - Rob Bird
 
PLNOG 13: Julian Lucek: Centralized Traffic Enginnering
PLNOG 13: Julian Lucek: Centralized Traffic EnginneringPLNOG 13: Julian Lucek: Centralized Traffic Enginnering
PLNOG 13: Julian Lucek: Centralized Traffic Enginnering
 
CONFidence 2015: when something overflowing... - Peter Hlavaty
CONFidence 2015: when something overflowing... - Peter HlavatyCONFidence 2015: when something overflowing... - Peter Hlavaty
CONFidence 2015: when something overflowing... - Peter Hlavaty
 
JDD2014: Introducing groovy into JAVA project - Yuriy Chulovskyy
JDD2014: Introducing groovy into JAVA project - Yuriy ChulovskyyJDD2014: Introducing groovy into JAVA project - Yuriy Chulovskyy
JDD2014: Introducing groovy into JAVA project - Yuriy Chulovskyy
 
CONFidence 2015: Analiza przypadku: Carbanak - jak uniknąć powtórki - Przemys...
CONFidence 2015: Analiza przypadku: Carbanak - jak uniknąć powtórki - Przemys...CONFidence 2015: Analiza przypadku: Carbanak - jak uniknąć powtórki - Przemys...
CONFidence 2015: Analiza przypadku: Carbanak - jak uniknąć powtórki - Przemys...
 
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...
 
PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof Mazepa
PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof MazepaPLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof Mazepa
PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof Mazepa
 
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak   CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
 
PLNOG 13: Piotr Jabłoński: First Steps in Autonomic Networking
PLNOG 13: Piotr Jabłoński: First Steps in Autonomic NetworkingPLNOG 13: Piotr Jabłoński: First Steps in Autonomic Networking
PLNOG 13: Piotr Jabłoński: First Steps in Autonomic Networking
 
PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...
PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...
PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...
 
PLNOG15: Automation of deployment and management of network devices - Oskar J...
PLNOG15: Automation of deployment and management of network devices - Oskar J...PLNOG15: Automation of deployment and management of network devices - Oskar J...
PLNOG15: Automation of deployment and management of network devices - Oskar J...
 
4Developers 2015: Wnioski wyciągnięte z powiększania zespołu - Bartek Nowa...
4Developers 2015: Wnioski wyciągnięte z powiększania zespołu - Bartek Nowa...4Developers 2015: Wnioski wyciągnięte z powiększania zespołu - Bartek Nowa...
4Developers 2015: Wnioski wyciągnięte z powiększania zespołu - Bartek Nowa...
 
Jdd2014: High performance logging - Peter Lawrey
Jdd2014: High performance logging - Peter LawreyJdd2014: High performance logging - Peter Lawrey
Jdd2014: High performance logging - Peter Lawrey
 
Global Forest and Community Tenure Challenges by Jenny Springer
 Global Forest and Community Tenure Challenges by Jenny Springer Global Forest and Community Tenure Challenges by Jenny Springer
Global Forest and Community Tenure Challenges by Jenny Springer
 
CONFidence 2014: Davi Ottenheimer Protecting big data at scale
CONFidence 2014: Davi Ottenheimer Protecting big data at scaleCONFidence 2014: Davi Ottenheimer Protecting big data at scale
CONFidence 2014: Davi Ottenheimer Protecting big data at scale
 

Similar to CONFidence 2015: AppSec, the untrustable dev - Timur Khrotko

OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust TheoremOWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust TheoremOWASP
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0Dinis Cruz
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019 Elizabeth Ayer
 
Securing your web apps before they hurt the organization
Securing your web apps before they hurt the organizationSecuring your web apps before they hurt the organization
Securing your web apps before they hurt the organizationAntonio Fontes
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?Izar Tarandach
 
New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)Dinis Cruz
 
CiNPA Security SIG - AppSec Presentation
CiNPA Security SIG - AppSec PresentationCiNPA Security SIG - AppSec Presentation
CiNPA Security SIG - AppSec PresentationThreatReel Podcast
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009Security Ninja
 
Ieee S&P 2020 - Software Security: from Research to Industry.
Ieee S&P 2020 - Software Security: from Research to Industry.Ieee S&P 2020 - Software Security: from Research to Industry.
Ieee S&P 2020 - Software Security: from Research to Industry.Minded Security
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityCihan Özhan
 
SoftwareSecurity.ppt
SoftwareSecurity.pptSoftwareSecurity.ppt
SoftwareSecurity.pptssuserfb92ae
 
Threat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star WarsThreat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star WarsAdam Shostack
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft
 
The Principles of Secure Development - David Rook
The Principles of Secure Development - David RookThe Principles of Secure Development - David Rook
The Principles of Secure Development - David RookSecurity B-Sides
 
App sec and quality london - may 2016 - v0.5
App sec and quality   london -  may 2016 - v0.5App sec and quality   london -  may 2016 - v0.5
App sec and quality london - may 2016 - v0.5Dinis Cruz
 
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр АнтухOWASP Russia
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draftEoin Keary
 

Similar to CONFidence 2015: AppSec, the untrustable dev - Timur Khrotko (20)

OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust TheoremOWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019
 
Securing your web apps before they hurt the organization
Securing your web apps before they hurt the organizationSecuring your web apps before they hurt the organization
Securing your web apps before they hurt the organization
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
 
New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)
 
CiNPA Security SIG - AppSec Presentation
CiNPA Security SIG - AppSec PresentationCiNPA Security SIG - AppSec Presentation
CiNPA Security SIG - AppSec Presentation
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009
 
Ieee S&P 2020 - Software Security: from Research to Industry.
Ieee S&P 2020 - Software Security: from Research to Industry.Ieee S&P 2020 - Software Security: from Research to Industry.
Ieee S&P 2020 - Software Security: from Research to Industry.
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision Security
 
SoftwareSecurity.ppt
SoftwareSecurity.pptSoftwareSecurity.ppt
SoftwareSecurity.ppt
 
Threat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star WarsThreat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star Wars
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
 
The Principles of Secure Development - David Rook
The Principles of Secure Development - David RookThe Principles of Secure Development - David Rook
The Principles of Secure Development - David Rook
 
Attack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition SystemsAttack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition Systems
 
2014 09-04-pj
2014 09-04-pj2014 09-04-pj
2014 09-04-pj
 
App sec and quality london - may 2016 - v0.5
App sec and quality   london -  may 2016 - v0.5App sec and quality   london -  may 2016 - v0.5
App sec and quality london - may 2016 - v0.5
 
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 

Recently uploaded

Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2WSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Eraconfluent
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 

Recently uploaded (20)

Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Era
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 

CONFidence 2015: AppSec, the untrustable dev - Timur Khrotko

  • 1. AppSec, the untrustable dev timur @ owasp
  • 2. ■ Timur ‘x’ Khrotko, PhD ■ x@azd.se ■ timur@owasp.org ■ linkedin.com/in/timurx @timurxyz
  • 3. ■ Open Web Application Security Project[s] o owasp.org, open-source, non-profit o AppSec evangelism ■ OWASP ≠ Top 10 (which is an educational project imo) ■ some projects o ASVS (Application Security Verification Standard) o (T10) Proactive Controls o Testing Guide (TG) o ZAP (Zed Attack Proxy) o dependency-check … O.W.A.S.P.
  • 5. ■ coders will never care about security ○ it can only be a by-product of their gut/tacit practice ■ don’t rely on appsec, detect and handle incidents ■ applications are vulnerable anyway - why?: ○ complexity, culture of devs, complicity (yours also, see culture of audits), mismanagement, immature methodologies and robots ■ for the dev teams who aren't lost: ○ secure coding course +dev coaching + review of audit findings abstract / goo.gl/mbrPYO
  • 6. ■ AppSec = QA (security QA, SeQA) o product + production/dev + support + etc practices ■ don’t buy it w/o threat modeling (risk assessment) ■ AS policy, S-SDLC o design, code, configuration, controls, testing o patch management, support agreement, sec SLA ■ countermeasures: filter, isolate, monitor, respond o waf, sandboxing, dmz, log audit, id(p)s ■ audit/test o va, sast, dast, iast, code review, bl tests, pentest, ci … appsec concepts
  • 7. appsec, the short story ■ application security is created by the developers to meet the set requirements
  • 9. The task of the software development team is to engineer the illusion of simplicity.why #1: complexity image: Bobbi J. Young et al. 2007. Software complexity: how do we bring order to chaos?
  • 10. why #2: dev culture image: en.wikipedia, by Klean Denmark
  • 11. why #3: complicity image: Thomas van de Weerd
  • 12. CEO, business, legal CIO, CISO, CRO, etc. why #4: appsec mgmt image: microsoft
  • 13. why #5: methodologies image: flickr.com/photos/bagogames/16153704398
  • 16. tno (trust no one) image: wikimedia.org, cover art / trust no one / Dave Navarro (c) capitol/emi
  • 17. threats image: deviantart.com, by Christopher-Dombres
  • 18. trust as soc construct image: (c) playmobil
  • 19. open sw production culture ■ HB -- a failure of the opensource QA myth o “OpenSSL is written by monkeys” / Marco Peereboom, 2009 o “… is a patchwork nightmare” / Matthew Green, 2013 o “I told you so, la la la, I told you so!” / Marco Peereboom, 2014 image: XOX
  • 20. enterprise sw culture ■ “Threats in custom app development: enterprises' lack of security” o Veracode Inc. blog, 2014 Sep
  • 21. still untrustable devs image: en.wikipedia, by Klean Denmark
  • 22. OWASP Proactive Controls C1: Parameterize Queries C2: Encode Data C3: Validate All Inputs C4: Implement Appropriate Access Controls C5: Establish Identity and Authentication Controls C6: Protect Data and Privacy C7: Implement Logging, Error Handling and Intrusion Detection C8: Leverage Security Features of Frameworks and Security Libraries C9: Include Security-Specific Requirements
  • 23. OWASP ASVS ■ AppSec Verification Standard o “security engineering checklist” o levels (eg. L2): risk --> requirements --> verification
  • 27. + coaching + re:findings dev training audit/va dev coaching
  • 28. + do incident response!
  • 29. resource: cut eh bdgt ■ eh (ethical hacking incl webapp assessments) is just another expensive social construct you subscribed to o eh culture is just as bad as that of the dev’s ■ relocate and spend more on: o trainings o S-SDLC, AppSec policy enforcement o threat modeling and IR ■ use appsec specialists with whom your devs can work constructively (eg. coaching)
  • 30. resource for the smb-s ■ involve a visiting appsec specialist in critical moments ■ have a visiting ciso, at least rarely visiting ■ make one resident member of the dev team security champion (see MS SDL) ■ secure coding courses

Editor's Notes

  1. https://goo.gl/mbrPYO http://confidence.org.pl/en/agenda/lecture/appsec-untrustable-dev/
  2. http://www.deviantart.com/art/Homeless-developer-64440862
  3. is it correct, how much a simplification is it?
  4. http://www.deviantart.com/art/Homeless-developer-64440862
  5. of codes, configs and networks
  6. http://upload.wikimedia.org/wikipedia/commons/4/4a/Daily_sprint_meeting.jpg http://en.wikipedia.org/wiki/Scrum_(software_development) "A daily scrum in the computing room. This centralized location helps the team start on time."
  7. implicit collusion in ent vuln audits (especially pentests) are, see pentest and va practice table
  8. (mis)management business mgmt, appsec manager, security champion
  9. https://www.flickr.com/photos/bagogames/16153704398 immature, missing both production and testing (robots vs automated tools) pentesting and va practice http://xkcd.com/1096/
  10. http://en.wikipedia.org/wiki/Ken_Thompson#mediaviewer/File:Ken_Thompson_(sitting)_and_Dennis_Ritchie_at_PDP-11_(2876612463).jpg
  11. http://commons.wikimedia.org/wiki/File:Orange-book-small.PNG http://www.trusted-components.org/documents/tc_original_paper.html
  12. http://christopher-dombres.deviantart.com/art/Anonymous-407576619
  13. http://3.bp.blogspot.com/-L2lxdMw5HJI/Ttoo7recCCI/AAAAAAAAAWU/Jwfdm0AYlEw/s1600/16playmobil.600.jpg airport security
  14. peereboom.us/assl/assl/html/openssl.html blog.cryptographyengineering.com/2013/09/on-nsa.html
  15. https://www.veracode.com/blog/2014/09/the-security-programs-disconnect-why-does-enterprise-wide-appsec-lag-behind
  16. brigade http://upload.wikimedia.org/wikipedia/commons/4/4a/Daily_sprint_meeting.jpg
  17. see the short story: input-output model
  18. standardization of the appsec audits
  19. Architecture and Design
  20. + OWASP Cornucopia
  21. http://upload.wikimedia.org/wikipedia/commons/4/4a/Daily_sprint_meeting.jpg
  22. XOX