SlideShare a Scribd company logo
SDLC(Software Development Lifecycle)
• Security
Frameworks
• Standards &
Guidelines
• Threat Modeling
• Vulnerability
Management
• Risk rating
• Statis analysis
• Dynamic Analysis
Definition: Security
Security is anything we do to protect an asset that is
vulnerable to some threats.
Definition: Security terms
1. Assets:
• Holds value
• Produces value
• Provides access to value
2. Vulnerable:Weakness in an asset that makes it susceptible to attack or failure
attack or failure
3. Threats: Reduce value of an asset
• Intentional: Attacks => DDOS, Injection, RCE
• Non-intentional: Errors or bugs
• Confidentiality: Information is only available
to those who have access.
• Integrity: Data is known to be correct and
trusted.
• Availability: Information is available to
legitimate users when it is needed.
Security Goals
Security Principles
• Complete mediation: all accesses to objects be
checked to ensure they are
allowed(Authorization)
• Open design : Security through security. For
example, hiding house keys underneath the
rock is not secure.
• Least CM: Make the component common for
which security is major concern so that if
required can be maintained quickly.
• Least CM: Make security easier, approachable.
If it’s difficult, users tries to find alternatives.
• Work factor: Effort required in breaking security
should be higher than the asset trying to get.
• Compromise recording: Record everything logs,
OWASP Top 10
OWASP Top 10: Injection
Types:
• Queries
• OS commands
• HTTP Redirects
How does it happen?
• Trust of user input
• No sanitization of data
• No separation of untrusted data
Potential Impact
• Steal data from database
• Access PII/PHI/PCI data
• Remove data for DB
Definition: Allowing attackers to manipulate the inputs due to inadequate
validation and sanitization,
foo’ OR ‘A’=‘A’#
1: SQL Injection example
Username:
Password:
Login
SQL Statement: (“SELECT first, last, admin DROM users WHERE
uname=‘$uname’ AND pword=‘$pword’ AND state=1”)
Do I need a password?
1: SQL Injection prevention
• Parameterized Queries/Prepared statements
• Parameter sanitization (white lists) in conjunction with
parameterized queries
• Using accounts with least privileged possible
preparedStatement stmt = connection.preparedStatement(
“SELECT * FROM users WHERE userid = ? And password=?”
);
stmt.setString(1, userid);
stmt.setString(test, password);
ResultSet rs= stmt.executeQuery();
2: Broken authentication
Application functions related to authentication and session
management are often not implemented correctly, allowing attackers
to compromise passwords, keys, or session tokens, or to exploit other
implementation flaws to assume other users’ identities. – OWASP
2: Broken authentication
How can authentication be broken?
• Missing authentication
• Shared/bookmarkedURL
• Poor credential strength
• Well known credentials
• Poor credential handling/management/storage
• Username/password as query param or stored in plain text
• Poor account recovery practices
• Secret questions with answers that can be easily socially engineered
• Unlimited attempts & attacks
• Dictionary attacks, Brute force attack, Phishing
2: Broken authentication prevention
How can broken authentication be prevented?
• Don’t build your authentication mechanism on your own.
• Encryption at rest and SSL transit.
• Implement captcha,API rate limits for DDOS and brute-force attacks.
• Rotate you keys is used in sessions or cookies
• Implement MFAs
3: Sensitive data exposure
Breach in confidentiality. Breach of data which should’ve been, otherwise protected.
• PHI (Protected Health Information)
Names, Dates, SSN, Biometric
• PII (Personally Identifiable Information)
Name, Address, Vehicle information, Drivers license, DOB
• Sensitive Financial Information
Credit/Debit card numbers, Account numbers, loans agreements
3: Sensitive data exposure
Causes
• Sensitive data logs in files
• Plain data storage in database
• Memory leaks in the code itself
• Insecure object access
Preventions
• Data masking & Anonymization
• Encryption and Hashing
• Access controls
• Protecting data in motion(PGP & SSL)
• Protecting data at rest
5: Broken access control
Broken access control means the broken authorization.
• Authentication: Validates the identity. Who are you?
• Authorization: Validates the access for an identity? What can you access?
• Access control enforces policy such that users cannot act outside of their intended
permissions.
• Failures typically lead to unauthorized information disclosure, modification or destruction
of all data, elevated access.
Causes: Lack of functional testing, CORS mis-configuration.
Impact: Provides the elevated access as admin and can modify the records.
Prevention:
Fail safe defaults, Proper CORS configuration, disable web server directory listing, Rate limit
API, Invalidate JWT after use.
Session management
Http is stateless protocol.
A web session is a sequence of network HTTP request and response transactions associated
to the same user. Basically, done through cookies.
Session fixation
Session management
Poor session management
• Guessable session IDs
• Not destroying when the session is over
• Reusing the sessions
• Exposing the sessions
Session management best practices
• Automatically end/expire session after
inactivity
• Don’t allow long lived sessions
• Generate non-guessable session IDs
• Don’t re-use session IDs
Cookies setting:
• Mark session cookie as Secure (prevents
sniffing)
• Mark session cookie as HttpOnly (prevent
XSS)
• Avoid setting values for Max-Age and
expires.
JSON Web Token(JWT)
JWT is an open standard that defines a compact and self-contained way for securely
transmitting information between parties as a JOSN object.
Use Cases:
1) Authorization: This is the most common scenario for using JWT. Once the user is logged
in, each subsequent request will include the JWT, allowing the user to access routes,
services and resources that are permitted with that token.
2) Information Exchange: Good way of securely transmitting information between parties.
Signed tokens: Confirm the senders are who they say they are
Hashed: Verified that the content hasn’t been tampered with.
How JWT works?
OAuth & OpenID
OAuth:
Open standard for access delegation, commonly used as a way for internet users to grant
websites or applications access to their information on the other websites but without
giving them the passwords.
OpenID:
OpenID allows us to use an existing account to sign into multiple websites, without needing
to create new passwords.
Example: Google SSO.
OAuth & OpenID
https://accounts.google.com/o/oauth2/v2/auth?
response_type=code&
client_id=424911365001.apps.googleusercontent.com&
scope=openid%20email&
redirect_uri=https%3A//oauth2.example.com/code&
state=security_token%3D138r5719ru3e1%26url%3Dhttps%3A%2F%2Foauth2-login-
demo.example.com%2FmyHome& login_hint=jsmith@example.com& nonce=0394852-3190485-2490358&
hd=example.com
Risk rating & Threat modeling
Risk Rating
Process of assessing the risks involved in the daily activities of a business and classifying
them (low, medium, high risk) on the basis of the impact on the business.
Risk = Likelihood * Impact
Steps in Risk rating
Identify the Risk
Factors for Estimating likelihood
Factors for Estimating Impact
Determine severity of the Risk
Deciding what to fix
Factors: Risk rating
Factors
Threat agents Vulnerability
• Skill level
• Motive
• Opportunity
• Size
• Ease of discovery
• Ease of exploit
• Awareness
• Intrusion detection
Impacts: Risk rating
Impacts
Technical Impacts Business Impacts
• Loss of
confidentiality
• Loss of integrity
• Loss of availability
• Loss of
accountability
• Financial damage
• Reputation damage
• Non-compliance
• Privacy violation
Severity: Risk rating
Severity
Informal Repeatable
Seat round the table and
decide the severity.
• Rate the each factors
• Calculate the severity
Example: Risk rating
Threat modeling
Definition
Threat modeling is an investigative technique for identifying an application security
risks/hazards that are technical.
Threats:
Everything from hackers and malware, natural disasters and so on.
Types: Threat modeling(STRIDE)
1. Spoofing: One person masquerades as another.
Eg: using others username and password.
Prevention: MFA
2. Tampering: Alteration of data in transit.
Prevention: using hashing, signature, checksum for verification
3. Repudiation: Denying the source of truth
Prevention: Encryption and digital signature
4. Information disclosure: CIA
Prevention: Encryption at rest and TLS at transit
5. Denial of service: Make service temporarily unavailable.
Prevention: Make available, rate limits
6. Elevation and privileges: Access with high roles, gain elevated access
Prevention: Authorization
You shouldn’t & Benefits: Threat modeling
You shouldn’t assume you have a secure environment.
You shouldn’t assume that compute, network, or storage resources are reliable.
You shouldn’t assume your environment is correctly configured.
You shouldn’t consider your gut feelings.
Benefits
• Better understanding of the architecture
• Create reusable architecture models
• Inputs to other components like risk mangement, code reviews, penetration testing.
Tools: Wiki, PPT,Visio,TM tool
Quantifying & Addressing: Threats modeling
Which of these is a bigger risk?

More Related Content

Similar to OWASP_Training.pptx

Ledingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersLedingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for Developers
Mukesh Singh
 
Security
SecuritySecurity
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
Security Innovation
 
STRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat ModellingSTRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat Modelling
Mohammad Febri
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
Ethical hacking
Ethical hacking Ethical hacking
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
missionsk81
 
Null bachav
Null bachavNull bachav
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
Richard Diver
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
Kebocoran Data_  Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...Kebocoran Data_  Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
Equnix Business Solutions
 
3-UnitV_security.pptx
3-UnitV_security.pptx3-UnitV_security.pptx
3-UnitV_security.pptx
SubhadipDutta36
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
lapao2014
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Chris Gates
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a Database
John Ashmead
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
Zakaria SMAHI
 
2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptx2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptx
MiteshVyas16
 

Similar to OWASP_Training.pptx (20)

Ledingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersLedingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for Developers
 
Security
SecuritySecurity
Security
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
STRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat ModellingSTRIDE: Digging Vulnerability by Threat Modelling
STRIDE: Digging Vulnerability by Threat Modelling
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
Null bachav
Null bachavNull bachav
Null bachav
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
Kebocoran Data_  Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...Kebocoran Data_  Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
 
3-UnitV_security.pptx
3-UnitV_security.pptx3-UnitV_security.pptx
3-UnitV_security.pptx
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a Database
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
 
2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptx2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptx
 

Recently uploaded

manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 

Recently uploaded (20)

manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 

OWASP_Training.pptx

  • 1. SDLC(Software Development Lifecycle) • Security Frameworks • Standards & Guidelines • Threat Modeling • Vulnerability Management • Risk rating • Statis analysis • Dynamic Analysis
  • 2. Definition: Security Security is anything we do to protect an asset that is vulnerable to some threats.
  • 3. Definition: Security terms 1. Assets: • Holds value • Produces value • Provides access to value 2. Vulnerable:Weakness in an asset that makes it susceptible to attack or failure attack or failure 3. Threats: Reduce value of an asset • Intentional: Attacks => DDOS, Injection, RCE • Non-intentional: Errors or bugs
  • 4. • Confidentiality: Information is only available to those who have access. • Integrity: Data is known to be correct and trusted. • Availability: Information is available to legitimate users when it is needed. Security Goals
  • 5. Security Principles • Complete mediation: all accesses to objects be checked to ensure they are allowed(Authorization) • Open design : Security through security. For example, hiding house keys underneath the rock is not secure. • Least CM: Make the component common for which security is major concern so that if required can be maintained quickly. • Least CM: Make security easier, approachable. If it’s difficult, users tries to find alternatives. • Work factor: Effort required in breaking security should be higher than the asset trying to get. • Compromise recording: Record everything logs,
  • 7. OWASP Top 10: Injection Types: • Queries • OS commands • HTTP Redirects How does it happen? • Trust of user input • No sanitization of data • No separation of untrusted data Potential Impact • Steal data from database • Access PII/PHI/PCI data • Remove data for DB Definition: Allowing attackers to manipulate the inputs due to inadequate validation and sanitization,
  • 8. foo’ OR ‘A’=‘A’# 1: SQL Injection example Username: Password: Login SQL Statement: (“SELECT first, last, admin DROM users WHERE uname=‘$uname’ AND pword=‘$pword’ AND state=1”) Do I need a password?
  • 9. 1: SQL Injection prevention • Parameterized Queries/Prepared statements • Parameter sanitization (white lists) in conjunction with parameterized queries • Using accounts with least privileged possible preparedStatement stmt = connection.preparedStatement( “SELECT * FROM users WHERE userid = ? And password=?” ); stmt.setString(1, userid); stmt.setString(test, password); ResultSet rs= stmt.executeQuery();
  • 10. 2: Broken authentication Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities. – OWASP
  • 11. 2: Broken authentication How can authentication be broken? • Missing authentication • Shared/bookmarkedURL • Poor credential strength • Well known credentials • Poor credential handling/management/storage • Username/password as query param or stored in plain text • Poor account recovery practices • Secret questions with answers that can be easily socially engineered • Unlimited attempts & attacks • Dictionary attacks, Brute force attack, Phishing
  • 12. 2: Broken authentication prevention How can broken authentication be prevented? • Don’t build your authentication mechanism on your own. • Encryption at rest and SSL transit. • Implement captcha,API rate limits for DDOS and brute-force attacks. • Rotate you keys is used in sessions or cookies • Implement MFAs
  • 13. 3: Sensitive data exposure Breach in confidentiality. Breach of data which should’ve been, otherwise protected. • PHI (Protected Health Information) Names, Dates, SSN, Biometric • PII (Personally Identifiable Information) Name, Address, Vehicle information, Drivers license, DOB • Sensitive Financial Information Credit/Debit card numbers, Account numbers, loans agreements
  • 14. 3: Sensitive data exposure Causes • Sensitive data logs in files • Plain data storage in database • Memory leaks in the code itself • Insecure object access Preventions • Data masking & Anonymization • Encryption and Hashing • Access controls • Protecting data in motion(PGP & SSL) • Protecting data at rest
  • 15. 5: Broken access control Broken access control means the broken authorization. • Authentication: Validates the identity. Who are you? • Authorization: Validates the access for an identity? What can you access? • Access control enforces policy such that users cannot act outside of their intended permissions. • Failures typically lead to unauthorized information disclosure, modification or destruction of all data, elevated access. Causes: Lack of functional testing, CORS mis-configuration. Impact: Provides the elevated access as admin and can modify the records. Prevention: Fail safe defaults, Proper CORS configuration, disable web server directory listing, Rate limit API, Invalidate JWT after use.
  • 16. Session management Http is stateless protocol. A web session is a sequence of network HTTP request and response transactions associated to the same user. Basically, done through cookies.
  • 18. Session management Poor session management • Guessable session IDs • Not destroying when the session is over • Reusing the sessions • Exposing the sessions Session management best practices • Automatically end/expire session after inactivity • Don’t allow long lived sessions • Generate non-guessable session IDs • Don’t re-use session IDs Cookies setting: • Mark session cookie as Secure (prevents sniffing) • Mark session cookie as HttpOnly (prevent XSS) • Avoid setting values for Max-Age and expires.
  • 19. JSON Web Token(JWT) JWT is an open standard that defines a compact and self-contained way for securely transmitting information between parties as a JOSN object. Use Cases: 1) Authorization: This is the most common scenario for using JWT. Once the user is logged in, each subsequent request will include the JWT, allowing the user to access routes, services and resources that are permitted with that token. 2) Information Exchange: Good way of securely transmitting information between parties. Signed tokens: Confirm the senders are who they say they are Hashed: Verified that the content hasn’t been tampered with.
  • 21. OAuth & OpenID OAuth: Open standard for access delegation, commonly used as a way for internet users to grant websites or applications access to their information on the other websites but without giving them the passwords. OpenID: OpenID allows us to use an existing account to sign into multiple websites, without needing to create new passwords. Example: Google SSO.
  • 22.
  • 24. Risk rating & Threat modeling Risk Rating Process of assessing the risks involved in the daily activities of a business and classifying them (low, medium, high risk) on the basis of the impact on the business. Risk = Likelihood * Impact
  • 25. Steps in Risk rating Identify the Risk Factors for Estimating likelihood Factors for Estimating Impact Determine severity of the Risk Deciding what to fix
  • 26. Factors: Risk rating Factors Threat agents Vulnerability • Skill level • Motive • Opportunity • Size • Ease of discovery • Ease of exploit • Awareness • Intrusion detection
  • 27. Impacts: Risk rating Impacts Technical Impacts Business Impacts • Loss of confidentiality • Loss of integrity • Loss of availability • Loss of accountability • Financial damage • Reputation damage • Non-compliance • Privacy violation
  • 28. Severity: Risk rating Severity Informal Repeatable Seat round the table and decide the severity. • Rate the each factors • Calculate the severity
  • 30. Threat modeling Definition Threat modeling is an investigative technique for identifying an application security risks/hazards that are technical. Threats: Everything from hackers and malware, natural disasters and so on.
  • 31. Types: Threat modeling(STRIDE) 1. Spoofing: One person masquerades as another. Eg: using others username and password. Prevention: MFA 2. Tampering: Alteration of data in transit. Prevention: using hashing, signature, checksum for verification 3. Repudiation: Denying the source of truth Prevention: Encryption and digital signature 4. Information disclosure: CIA Prevention: Encryption at rest and TLS at transit 5. Denial of service: Make service temporarily unavailable. Prevention: Make available, rate limits 6. Elevation and privileges: Access with high roles, gain elevated access Prevention: Authorization
  • 32. You shouldn’t & Benefits: Threat modeling You shouldn’t assume you have a secure environment. You shouldn’t assume that compute, network, or storage resources are reliable. You shouldn’t assume your environment is correctly configured. You shouldn’t consider your gut feelings. Benefits • Better understanding of the architecture • Create reusable architecture models • Inputs to other components like risk mangement, code reviews, penetration testing. Tools: Wiki, PPT,Visio,TM tool
  • 33. Quantifying & Addressing: Threats modeling Which of these is a bigger risk?

Editor's Notes

  1. When we are protecting CIA, we are also protecting availability.
  2. Work factor: For a system of 500$ will not buy tools of worth 1500$.
  3. Not allow user to run queries directly in the host
  4. Enabling securing allows cookies only to be access through https. Enabling HttpOnly allows cookie to be accessed via http request but not the script. Don’t set max age and expires so that browser removes the cookie when the browser is closed otherwise cookie is assumed to be persistent.
  5. Hazards are potential harms whereas risks are hazards in harmful state.
  6. Hazards are potential harms whereas risks are hazards in harmful state.
  7. Hazards are potential harms whereas risks are hazards in harmful state.
  8. Hazards are potential harms whereas risks are hazards in harmful state. Stair kills 1000 people/year whereas bear kills just a single person/year.