SlideShare a Scribd company logo
we45‘s Web Application Security Solutions
Web Application Vulnerability
Assessment and Penetration
Testing
Secure Software Development
Lifecycle Implementation and
Consulting
Application Security - Code
Review and Walkthroughs
Web - Product Security Consulting
and Design
Security Code Review - Case Study
Fortune 100 Bank and Card
Payment Brand engaged with
we45
They were pursuing PCI
Compliance for operations in
the APAC region
Key Challenges - Application
Security Requirements -
Compliance with PCI-DSS
Requirement 6
Key Objectives
Increase Developer Awareness
with Web Application Security
Training
Perform Comprehensive Security
Code Reviews for Custom
Applications developed and
deployed on various platforms
Create Detailed Security Code
Review Reports and Design
Remediation Strategies and
Action Plans
The we45 Approach
Training - we45 Certified Web App
Security Professional
we45’s Acclaimed Certified Web
Application Security Professional
Program
Two-Day Hands-on, Intensive Web
Security Training Program for
Developers, Architects, Project
Managers and Security Managers
Replete with Case Studies, Hands-
on Exercise, Vulnerable Web
Application Exercises and other
material
Assessment Exam at the end of the
Training - with Certification
Application Security Risk Assessment &
Threat Modeling
we45’s Security Experts performed
Application Security Risk Assessment
for the client’s in-scope applications.
Risk Assessments are critical in
identifying security requirements and
providing for prioritization of security
implementation
we45’s Methodology - Created by
CTO Abhay Bhargav, detailed in his
book Secure Java for Web
Application Development
Derivative of the world-class OCTAVE
and NIST Risk Assessment
Methodologies - Focused on Web
Apps
Application Security Risk Assessment &
Threat Modeling - 2
Application Security Threat
Modeling - Critical in identifying
potential attack scenarios
Identified Trust Boundaries for the
in-scope Web Apps
Extremely useful for Code Reviews,
Security Testing and Application
Security Documentation
we45’s Security Experts perform
Threat Modeling based on
Microsoft’s renowned STRIDE
Methodology
we45 Security Code Review
Hybrid Methodology - Automated
and Manual Code Review for 30 in-
scope web applications
we45’s Security Experts developed
special scripts and tools to identify
Security Flaws
Security Flaws assessed - OWASP
Top 10, WASC Security Flaws, SANS
Top 25, CERT-US Secure Coding
Guidelines
Security Flaws from a PCI perspective
were also evaluated
Review & Presentation
Findings presented to
Developers, Project Managers
and CTO
Findings were explained in
detail by we45’s Security
Experts
Findings were prioritized and
agreements on remediation
were reached
Analysis & Reporting
we45 prepared a detailed Security Risk
Assessment and Code Review Report
Report was ranked by severity of
findings.
Findings were referenced with Industry
metrics like CWE, CVE and so on.
Examples were provided as code-
snippets with line number information
Multiple Recommendations and
Remediation Strategies were provided
Executive Summary and Action Plan
prepared for Management Action
Results & View into the Future
Results:
Client achieved PCI Compliance and
Certification
we45 Approach of Risk Assessment and
Code Review - Lauded by the PCI-QSA
Developer Security Training - A Model for
other Development teams in the company
The Future:
we45 is the trusted Application Security
Partner for this client
Extension of we45’s services to PCI
Continuing Compliance Consulting
we45‘s Web Application Security Solutions
Web Application Vulnerability
Assessment and Penetration
Testing
Secure Software Development
Lifecycle Implementation and
Consulting
Application Security - Code
Review and Walkthroughs
Web - Product Security Consulting
and Design
Security Code Review Case Study - we45

More Related Content

What's hot

NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResume
Nadia Pryadko
 
Friedman 2015
Friedman 2015Friedman 2015
Friedman 2015
Michael Friedman
 
Agile software development process
Agile software development processAgile software development process
Agile software development process
Mir karam khan
 
Outsourcing: Risk or Possibility?
Outsourcing: Risk or Possibility?Outsourcing: Risk or Possibility?
Outsourcing: Risk or Possibility?
Thomas Peters
 
Ethical hacking course task 8
Ethical hacking course task 8Ethical hacking course task 8
Ethical hacking course task 8
GURUPRASANTH33
 
Software testing training course ( Advanced ) : Tonex Training
Software testing training course ( Advanced ) : Tonex TrainingSoftware testing training course ( Advanced ) : Tonex Training
Software testing training course ( Advanced ) : Tonex Training
Bryan Len
 
Unit testing : what are you missing for security
Unit testing : what are you missing for securityUnit testing : what are you missing for security
Unit testing : what are you missing for security
Suman Sourav
 
HOW TO BECOME A RELEASE MANAGER IN 2021
HOW TO BECOME A RELEASE MANAGER IN 2021HOW TO BECOME A RELEASE MANAGER IN 2021
HOW TO BECOME A RELEASE MANAGER IN 2021
Sprintzeal
 
It Project Manager - opportunity based in Cheshire
It Project Manager - opportunity based in CheshireIt Project Manager - opportunity based in Cheshire
It Project Manager - opportunity based in Cheshire
Alex Fletcher
 
F4 it basic presentation draft
F4 it basic presentation   draftF4 it basic presentation   draft
F4 it basic presentation draft
jwkratz
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
Rogue Wave Software
 
Understand Reliability Engineering, Scope, Use case, Methods, Training
Understand Reliability Engineering, Scope, Use case, Methods, TrainingUnderstand Reliability Engineering, Scope, Use case, Methods, Training
Understand Reliability Engineering, Scope, Use case, Methods, Training
Bryan Len
 
Security's DevOps Transformation
Security's DevOps TransformationSecurity's DevOps Transformation
Security's DevOps Transformation
Michele Chubirka
 
Security Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSecurity Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar Tymoshyk
SoftServe
 
CCCAB - Making CABs life easy
CCCAB -  Making CABs life easyCCCAB -  Making CABs life easy
CCCAB - Making CABs life easy
Javier Tallón
 
N Egan Resume
N Egan ResumeN Egan Resume
N Egan Resume
Nancy Egan
 
Most effective QA & testing types
Most effective QA & testing typesMost effective QA & testing types
Most effective QA & testing types
BairesDev
 

What's hot (17)

NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResume
 
Friedman 2015
Friedman 2015Friedman 2015
Friedman 2015
 
Agile software development process
Agile software development processAgile software development process
Agile software development process
 
Outsourcing: Risk or Possibility?
Outsourcing: Risk or Possibility?Outsourcing: Risk or Possibility?
Outsourcing: Risk or Possibility?
 
Ethical hacking course task 8
Ethical hacking course task 8Ethical hacking course task 8
Ethical hacking course task 8
 
Software testing training course ( Advanced ) : Tonex Training
Software testing training course ( Advanced ) : Tonex TrainingSoftware testing training course ( Advanced ) : Tonex Training
Software testing training course ( Advanced ) : Tonex Training
 
Unit testing : what are you missing for security
Unit testing : what are you missing for securityUnit testing : what are you missing for security
Unit testing : what are you missing for security
 
HOW TO BECOME A RELEASE MANAGER IN 2021
HOW TO BECOME A RELEASE MANAGER IN 2021HOW TO BECOME A RELEASE MANAGER IN 2021
HOW TO BECOME A RELEASE MANAGER IN 2021
 
It Project Manager - opportunity based in Cheshire
It Project Manager - opportunity based in CheshireIt Project Manager - opportunity based in Cheshire
It Project Manager - opportunity based in Cheshire
 
F4 it basic presentation draft
F4 it basic presentation   draftF4 it basic presentation   draft
F4 it basic presentation draft
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
 
Understand Reliability Engineering, Scope, Use case, Methods, Training
Understand Reliability Engineering, Scope, Use case, Methods, TrainingUnderstand Reliability Engineering, Scope, Use case, Methods, Training
Understand Reliability Engineering, Scope, Use case, Methods, Training
 
Security's DevOps Transformation
Security's DevOps TransformationSecurity's DevOps Transformation
Security's DevOps Transformation
 
Security Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSecurity Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar Tymoshyk
 
CCCAB - Making CABs life easy
CCCAB -  Making CABs life easyCCCAB -  Making CABs life easy
CCCAB - Making CABs life easy
 
N Egan Resume
N Egan ResumeN Egan Resume
N Egan Resume
 
Most effective QA & testing types
Most effective QA & testing typesMost effective QA & testing types
Most effective QA & testing types
 

Similar to Security Code Review Case Study - we45

we45 - Web Application Security Testing Case Study
we45 - Web Application Security Testing Case Studywe45 - Web Application Security Testing Case Study
we45 - Web Application Security Testing Case Study
we45
 
we45 - Infrastructure Penetration Testing with LeanBeast Case Study
we45 - Infrastructure Penetration Testing with LeanBeast Case Studywe45 - Infrastructure Penetration Testing with LeanBeast Case Study
we45 - Infrastructure Penetration Testing with LeanBeast Case Study
Abhay Bhargav
 
SQA V And V Intro & History
SQA V And V Intro & HistorySQA V And V Intro & History
SQA V And V Intro & History
Douglas Gabel
 
Sqa V And V Share
Sqa V And V ShareSqa V And V Share
Sqa V And V Share
guest0b67e9
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentation
Abhay Bhargav
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
SoftServe
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Sigma Software
 
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennai
Abhay Bhargav
 
SE - Lecture 7 - Software Quality Reliability Mgmt - in lecture.pptx
SE - Lecture 7 - Software Quality  Reliability Mgmt - in lecture.pptxSE - Lecture 7 - Software Quality  Reliability Mgmt - in lecture.pptx
SE - Lecture 7 - Software Quality Reliability Mgmt - in lecture.pptx
TangZhiSiang
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
lior mazor
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
Rishi Kant
 
Realizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and GainsRealizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and Gains
Priyanka Aash
 
Aginext 2021: Built-in Quality - How agile coaches can contribute
Aginext 2021: Built-in Quality - How agile coaches can contributeAginext 2021: Built-in Quality - How agile coaches can contribute
Aginext 2021: Built-in Quality - How agile coaches can contribute
Derk-Jan de Grood
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
Er. Nancy
 
SQA-Lecture-4.pptx
SQA-Lecture-4.pptxSQA-Lecture-4.pptx
SQA-Lecture-4.pptx
SaritaAgrahari2
 
Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...
Symptai Consulting Limited
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development Lifecycle
Rishi Kant
 
Web Application Security.pdf
Web Application Security.pdfWeb Application Security.pdf
Web Application Security.pdf
Briskinfosec Technology and Consulting
 
Venkatesh M S - Security Audit and Compliance
Venkatesh M S - Security Audit and ComplianceVenkatesh M S - Security Audit and Compliance
Venkatesh M S - Security Audit and Compliance
Venkatesh M S
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
Marco Morana
 

Similar to Security Code Review Case Study - we45 (20)

we45 - Web Application Security Testing Case Study
we45 - Web Application Security Testing Case Studywe45 - Web Application Security Testing Case Study
we45 - Web Application Security Testing Case Study
 
we45 - Infrastructure Penetration Testing with LeanBeast Case Study
we45 - Infrastructure Penetration Testing with LeanBeast Case Studywe45 - Infrastructure Penetration Testing with LeanBeast Case Study
we45 - Infrastructure Penetration Testing with LeanBeast Case Study
 
SQA V And V Intro & History
SQA V And V Intro & HistorySQA V And V Intro & History
SQA V And V Intro & History
 
Sqa V And V Share
Sqa V And V ShareSqa V And V Share
Sqa V And V Share
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentation
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennai
 
SE - Lecture 7 - Software Quality Reliability Mgmt - in lecture.pptx
SE - Lecture 7 - Software Quality  Reliability Mgmt - in lecture.pptxSE - Lecture 7 - Software Quality  Reliability Mgmt - in lecture.pptx
SE - Lecture 7 - Software Quality Reliability Mgmt - in lecture.pptx
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Realizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and GainsRealizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and Gains
 
Aginext 2021: Built-in Quality - How agile coaches can contribute
Aginext 2021: Built-in Quality - How agile coaches can contributeAginext 2021: Built-in Quality - How agile coaches can contribute
Aginext 2021: Built-in Quality - How agile coaches can contribute
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
SQA-Lecture-4.pptx
SQA-Lecture-4.pptxSQA-Lecture-4.pptx
SQA-Lecture-4.pptx
 
Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development Lifecycle
 
Web Application Security.pdf
Web Application Security.pdfWeb Application Security.pdf
Web Application Security.pdf
 
Venkatesh M S - Security Audit and Compliance
Venkatesh M S - Security Audit and ComplianceVenkatesh M S - Security Audit and Compliance
Venkatesh M S - Security Audit and Compliance
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
 

Recently uploaded

3 Examples of new capital gains taxes in Canada
3 Examples of new capital gains taxes in Canada3 Examples of new capital gains taxes in Canada
3 Examples of new capital gains taxes in Canada
Lakshay Gandhi
 
Generate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model StrategyGenerate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model Strategy
RNayak3
 
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdfThe best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
tonytkelly6
 
Understanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It MattersUnderstanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It Matters
AstroForYou
 
Siddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TXSiddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TX
gaurisiddhivinayakte
 
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptxTop Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Merchantech - Payment Processing Services
 
Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024
growthgrids
 
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
Traditional Healer, Love Spells Caster and Money Spells That Work Fast
 
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptxBiomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
ECOSTAN Biofuel Pvt Ltd
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
eBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company ProfileeBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company Profile
ChimaOrjiOkpi
 
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptxTop 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
e-Definers Technology
 
Expert Tips for Pruning Your Plants.pdf.
Expert Tips for Pruning Your Plants.pdf.Expert Tips for Pruning Your Plants.pdf.
Expert Tips for Pruning Your Plants.pdf.
Local Gardeners
 
Best Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA StudiesBest Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA Studies
SAGA Studies
 
Exceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in MelbourneExceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in Melbourne
Outdoor Home Decor Company
 
Electrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptxElectrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptx
sandeepmetsuae
 
antivirus and security software | basics
antivirus and security software | basicsantivirus and security software | basics
antivirus and security software | basics
basicsprotection
 
DOJO Training room | Training DOJO PPT
DOJO Training room | Training DOJO   PPTDOJO Training room | Training DOJO   PPT
DOJO Training room | Training DOJO PPT
Himanshu
 
How Live-In Care Benefits Chronic Disease Management.pdf
How Live-In Care Benefits Chronic Disease Management.pdfHow Live-In Care Benefits Chronic Disease Management.pdf
How Live-In Care Benefits Chronic Disease Management.pdf
KenWaterhouse
 
Material Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdfMaterial Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdf
sandeepmetsuae
 

Recently uploaded (20)

3 Examples of new capital gains taxes in Canada
3 Examples of new capital gains taxes in Canada3 Examples of new capital gains taxes in Canada
3 Examples of new capital gains taxes in Canada
 
Generate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model StrategyGenerate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model Strategy
 
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdfThe best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
 
Understanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It MattersUnderstanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It Matters
 
Siddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TXSiddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TX
 
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptxTop Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
 
Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024
 
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
 
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptxBiomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
 
eBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company ProfileeBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company Profile
 
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptxTop 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
 
Expert Tips for Pruning Your Plants.pdf.
Expert Tips for Pruning Your Plants.pdf.Expert Tips for Pruning Your Plants.pdf.
Expert Tips for Pruning Your Plants.pdf.
 
Best Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA StudiesBest Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA Studies
 
Exceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in MelbourneExceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in Melbourne
 
Electrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptxElectrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptx
 
antivirus and security software | basics
antivirus and security software | basicsantivirus and security software | basics
antivirus and security software | basics
 
DOJO Training room | Training DOJO PPT
DOJO Training room | Training DOJO   PPTDOJO Training room | Training DOJO   PPT
DOJO Training room | Training DOJO PPT
 
How Live-In Care Benefits Chronic Disease Management.pdf
How Live-In Care Benefits Chronic Disease Management.pdfHow Live-In Care Benefits Chronic Disease Management.pdf
How Live-In Care Benefits Chronic Disease Management.pdf
 
Material Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdfMaterial Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdf
 

Security Code Review Case Study - we45

  • 1.
  • 2. we45‘s Web Application Security Solutions Web Application Vulnerability Assessment and Penetration Testing Secure Software Development Lifecycle Implementation and Consulting Application Security - Code Review and Walkthroughs Web - Product Security Consulting and Design
  • 3. Security Code Review - Case Study Fortune 100 Bank and Card Payment Brand engaged with we45 They were pursuing PCI Compliance for operations in the APAC region Key Challenges - Application Security Requirements - Compliance with PCI-DSS Requirement 6
  • 4. Key Objectives Increase Developer Awareness with Web Application Security Training Perform Comprehensive Security Code Reviews for Custom Applications developed and deployed on various platforms Create Detailed Security Code Review Reports and Design Remediation Strategies and Action Plans
  • 6. Training - we45 Certified Web App Security Professional we45’s Acclaimed Certified Web Application Security Professional Program Two-Day Hands-on, Intensive Web Security Training Program for Developers, Architects, Project Managers and Security Managers Replete with Case Studies, Hands- on Exercise, Vulnerable Web Application Exercises and other material Assessment Exam at the end of the Training - with Certification
  • 7. Application Security Risk Assessment & Threat Modeling we45’s Security Experts performed Application Security Risk Assessment for the client’s in-scope applications. Risk Assessments are critical in identifying security requirements and providing for prioritization of security implementation we45’s Methodology - Created by CTO Abhay Bhargav, detailed in his book Secure Java for Web Application Development Derivative of the world-class OCTAVE and NIST Risk Assessment Methodologies - Focused on Web Apps
  • 8. Application Security Risk Assessment & Threat Modeling - 2 Application Security Threat Modeling - Critical in identifying potential attack scenarios Identified Trust Boundaries for the in-scope Web Apps Extremely useful for Code Reviews, Security Testing and Application Security Documentation we45’s Security Experts perform Threat Modeling based on Microsoft’s renowned STRIDE Methodology
  • 9. we45 Security Code Review Hybrid Methodology - Automated and Manual Code Review for 30 in- scope web applications we45’s Security Experts developed special scripts and tools to identify Security Flaws Security Flaws assessed - OWASP Top 10, WASC Security Flaws, SANS Top 25, CERT-US Secure Coding Guidelines Security Flaws from a PCI perspective were also evaluated
  • 10. Review & Presentation Findings presented to Developers, Project Managers and CTO Findings were explained in detail by we45’s Security Experts Findings were prioritized and agreements on remediation were reached
  • 11. Analysis & Reporting we45 prepared a detailed Security Risk Assessment and Code Review Report Report was ranked by severity of findings. Findings were referenced with Industry metrics like CWE, CVE and so on. Examples were provided as code- snippets with line number information Multiple Recommendations and Remediation Strategies were provided Executive Summary and Action Plan prepared for Management Action
  • 12. Results & View into the Future Results: Client achieved PCI Compliance and Certification we45 Approach of Risk Assessment and Code Review - Lauded by the PCI-QSA Developer Security Training - A Model for other Development teams in the company The Future: we45 is the trusted Application Security Partner for this client Extension of we45’s services to PCI Continuing Compliance Consulting
  • 13. we45‘s Web Application Security Solutions Web Application Vulnerability Assessment and Penetration Testing Secure Software Development Lifecycle Implementation and Consulting Application Security - Code Review and Walkthroughs Web - Product Security Consulting and Design