SlideShare a Scribd company logo
1 of 41
Download to read offline
Thomas Vitale | thomasvitale.com | @vitalethomas
WordCamp Torino 2018 | #wctrn
SECURITY IS A PROCESS,
NOT A PLUGIN
THE ENEMY
INTRODUCTION TO SECURITY
WHO IS ATTACKING YOUR WEBSITE?
PERSON BOT BOTNET
“I have just a small blog.
Who cares?”
STEAL DATA STEAL RESOURCES SEND SPAM
ATTACK OTHER WEBSITES EARN MONEY
WHY ARE THEY ATTACKING YOUR WEBSITE?
THE IMPACT
INTRODUCTION TO SECURITY
WHY SECURITY MATTERS?
TIME REPUTATION LEGAL ISSUES
SEARCH POSITIONING MONEY
BUILD A BETTER WEB
OUR GOALS
INTRODUCTION TO SECURITY
CORE SECURITY GOALS
AVAILABILITYINTEGRITY
CONFIDENTIALITY CIA Triad
“I have installed a plugin
for security. I’m good.”
SECURITY IS A PROCESS,
NOT A PRODUCT.
Bruce Schneier
The Process of Security, April 2000
1. MANAGE SECURITY
RISKS
SECURITY PRINCIPLES
RISK MANAGEMENT
VULNERABILITY THREAT RISK
“WordPress is not
secure.”
2. BE RELUCTANT
TO TRUST
SECURITY PRINCIPLES
THEMES AND PLUGINS
Trusted
Source
TRUST BOUNDARY
YOUR
WORDPRESS
APPLICATION
3rd PARTY
SERVICES
USER
INPUT
HTTP/S
REQUEST
DATA
More on Secure Coding Patterns by Andreas Hallberg
DATA VALIDATION
isset()
empty()
in_array()
is_email()
username_exists()
validate_file()
SECURING INPUT:
SANITIZING
sanitize_email()
esc_url_raw()
wp_filter_post_kses()
SECURING OUTPUT:
ESCAPING
esc_html()
esc_url()
esc_attr()
SECURING HTTP/S REQUESTS:
NONCES
wp_create_nonce()
wp_verify_nonce()
wp_nonce_field()
USER ROLES AND CAPABILITIES
SUPER ADMINISTRATOR ADMINISTRATOR EDITOR
AUTHOR CONTRIBUTOR SUBSCRIBER
3. PRACTICE DEFENCE
IN DEPTH
SECURITY PRINCIPLES
PRACTICE DEFENCE IN DEPTH
CLIENT
NETWORK
HOST WORDPRESS
WEB SERVER
CORE
THEMES PLUGINS
DATABASE
4. STAY UP TO DATE
SECURITY PRINCIPLES
UPDATE
PRESERVE
BACKUP
IS
WORDPRESS
SECURE?
SECURITY
TECHNOLOGY
PROCESS
PEOPLE
5. SECURE THE
WEAKEST LINK
SECURITY PRINCIPLES
PEOPLE ARE
THE WEAKEST LINK
SECURITY IS A
SHARED RESPONSIBILITY
BUILD A BETTER WEB
“Every day, every hour, this very minute perhaps…
Dark forces attempt to penetrate our castle’s walls.
But in the end, their greatest weapon… is you!
Just something to think about.”
Albus Dumbledore
NEXT?
RESOURCES
RESOURCES
SECURITY & SOFTWARE
▸ The Process of Security (Bruce Schneier)
▸ The Basics of Web Application Security (Cade Cairns, Daniel Somerfield)
▸ Secure Coding Patterns (Andreas Hallberg)
▸ OWASP Top 10 Most Critical Web Application Security Risks - 2017
▸ Software Security: Building Security In, Gary McGraw
▸ Building Secure Software: How to Avoid Security Problems the Right Way,
John Viega and Gary McGraw
RESOURCES
SECURITY & WORDPRESS
▸ WordPress Security (WordPress.org)
▸ Hardening WordPress (Codex)
▸ Plugin Security (WordPress Plugin Handbook)
▸ Theme Security (WordPress Theme Handbook)
▸ An Introduction to WordPress Security (Sucuri)
▸ WordPress Security Fundamentals (WordFence)
SECURITY IS A
PROCESS,
NOT A PLUGIN
Thomas Vitale |@vitalethomas | #wctrn
This work is licensed under a Creative Commons Attribution 4.0 International License.
Images source: Pexels

More Related Content

What's hot

[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...
[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...
[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...
Nur Shiqim Chok
 
Internet Security
Internet SecurityInternet Security
Internet Security
LUQMAN P
 

What's hot (19)

Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and Security
 
9 LinkedIn Marketing Hacks to Use RIGHT NOW
9 LinkedIn Marketing Hacks to Use RIGHT NOW9 LinkedIn Marketing Hacks to Use RIGHT NOW
9 LinkedIn Marketing Hacks to Use RIGHT NOW
 
TOP10 Security Stories Of 2009
TOP10 Security Stories Of 2009TOP10 Security Stories Of 2009
TOP10 Security Stories Of 2009
 
Securing the Web with the Crowd
Securing the Web with the CrowdSecuring the Web with the Crowd
Securing the Web with the Crowd
 
The dark side of cybersecurity: International Awareness Cybersecurity Month
The dark side of cybersecurity: International Awareness Cybersecurity MonthThe dark side of cybersecurity: International Awareness Cybersecurity Month
The dark side of cybersecurity: International Awareness Cybersecurity Month
 
Security is a process not a magic
Security is a process not a magicSecurity is a process not a magic
Security is a process not a magic
 
[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...
[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...
[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...
 
Fantastic Beasts and where to hide from them
Fantastic Beasts and where to hide from themFantastic Beasts and where to hide from them
Fantastic Beasts and where to hide from them
 
Microservices - enough with theory, let's do some code @Geecon Prague 2015
Microservices - enough with theory, let's do some code @Geecon Prague 2015Microservices - enough with theory, let's do some code @Geecon Prague 2015
Microservices - enough with theory, let's do some code @Geecon Prague 2015
 
[THEC Talk] The Secure Network
[THEC Talk] The Secure Network[THEC Talk] The Secure Network
[THEC Talk] The Secure Network
 
Practical Encryption Tips and Tools
Practical Encryption Tips and ToolsPractical Encryption Tips and Tools
Practical Encryption Tips and Tools
 
The Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecThe Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSec
 
Personal Cloud Application Architectures
Personal Cloud Application ArchitecturesPersonal Cloud Application Architectures
Personal Cloud Application Architectures
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the Curve
 
10 Step Guide to Cloud Security - 10th Magnitude - CSS Dallas Azure
10 Step Guide to Cloud Security - 10th Magnitude - CSS Dallas Azure10 Step Guide to Cloud Security - 10th Magnitude - CSS Dallas Azure
10 Step Guide to Cloud Security - 10th Magnitude - CSS Dallas Azure
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Similar to Security is a process, not a plugin (WordCamp Torino 2018)

Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentation
delmount
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
NTEN
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
Karina Elise
 
2013 michael coates-javaone
2013 michael coates-javaone2013 michael coates-javaone
2013 michael coates-javaone
Michael Coates
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source tools
terriert
 

Similar to Security is a process, not a plugin (WordCamp Torino 2018) (20)

Security is a process, not a plugin (WordCamp London 2018)
Security is a process, not a plugin  (WordCamp London 2018)Security is a process, not a plugin  (WordCamp London 2018)
Security is a process, not a plugin (WordCamp London 2018)
 
Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
 
Security for Thinkers
Security for ThinkersSecurity for Thinkers
Security for Thinkers
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008
 
How to Secure America
How to Secure AmericaHow to Secure America
How to Secure America
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
 
WordPress Security: Beyond The Plugin
WordPress Security:  Beyond The PluginWordPress Security:  Beyond The Plugin
WordPress Security: Beyond The Plugin
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentation
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
 
Hacking_SharePoint_FINAL
Hacking_SharePoint_FINALHacking_SharePoint_FINAL
Hacking_SharePoint_FINAL
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
2013 michael coates-javaone
2013 michael coates-javaone2013 michael coates-javaone
2013 michael coates-javaone
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source tools
 

Recently uploaded

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 

Recently uploaded (20)

WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid Environments
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in Uganda
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
WSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration ToolingWSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration Tooling
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 

Security is a process, not a plugin (WordCamp Torino 2018)