SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
®




               IBM Software Group



Nebezpečný internet
nezapomínejte na aplikace




Jan Valdman, BP IBM




                                    © 2007 IBM Corporation
IBM Software Group | Rational software



Agenda
 W eb Application Security Issues
 W eb Application Security Model
 Application Security and Software development
 Application Security Maturity Model
IBM Software Group | Rational software


Application Security Today
 “Web application vulnerabilities accounted for 69% of vulnerabilities
 disclosed between July 2005 and June 2006”
 Gartner


 “64% of developers are not confident in their ability to write secure
 applications”
 Microsoft Developer Research


 “70% of companies today are NOT applying secure application
 development techniques in their software development practices”
 Aberdeen Group, May 2007


 “90% of applications, when tested are vulnerable”
 Watchfire
IBM Software Group | Rational software


The Reality: Security and Spending Are Unbalanced
                              Security                          Spending

                               % of Attacks                     % of Dollars

                                                 Web               10%
                                                 Applications


                                   75%                             90%



                                                  Network
                                   25%            Server



                              75% of All Attacksto the Web Application Layer
                                  Are Directed
                                                 on Information Security


                                2/3 of All Web Applications Are Vulnerable
Sources: Gartner, Watchfire
IBM Software Group | Rational software



Why Application Security is a High Priority
  Web applications are the #1 focus of hackers:
    75% of attacks at Application layer (Gartner)
    XSS and SQL Injection are #1 and #2 reported vulnerabilities (Mitre)

  Most sites are vulnerable:
    90% of sites are vulnerable to application attacks (Watchfire)
    78% percent of easily exploitable vulnerabilities affected Web applications (Symantec)
    80% of organizations will experience an application security incident by 2010 (Gartner)

  Web applications are high value targets for hackers:
    Customer data, credit cards, ID theft, fraud, site defacement, etc

  Compliance requirements:
    Payment Card Industry (PCI) Standards, GLBA, HIPPA, FISMA,
IBM Software Group | Rational software


The Myth: “Our Site Is Safe”

  We Have Firewalls
  in Place                                     We Audit It Once a
                                               Quarter with Pen Testers




                               We Use Network
                               Vulnerability Scanners
IBM Software Group | Rational software



           Network Defenses for Web Applications
Security




            Perimeter               IDS                 IPS       App Firewall

              Firewall          Intrusion            Intrusion    Application
                                Detection            Prevention   Firewall
                                System               System




                   System Incident Event Management (SIEM)


                                                                                 7
IBM Software Group | Rational software
IBM Software Group | Rational software



12 Most Frequent Hacker Attacks

 Cookie Poisoning
 Hidden Field Manipulation
 Parameter Tampering
 Buffer Overflow
 Cross-site Scripting
 Backup and Debug Options
 Forceful Browsing
 HTTP Response Splitting
 Stealth commanding
 3rd Party Misconfiguration
 Known vulnerabilities
 XML & Web service vulnerabilities
IBM Software Group | Rational software


Going Beyond Pointing out Security Problems
IBM Software Group | Rational software



               Web Application Environment
Security


                                                          Web Application Scanners




                                       Web Application              Web Services

           Network
           Scanners                    Web Server



                      Database         Operating System




                  Database Scanners                         Host Scanners

                                                                                     11
IBM Software Group | Rational software

Network vs. Application Security - Complimentary
                            Info Security Landscape
  Desktop             Transport           Network             Web Applications

Antivirus             Encryption         Firewalls /
Protection            (SSL)              Advanced
                                         Routers




                                                                Application            Backend
                                             Firewall
                                                                Servers                Server


                                                                               Databases
                                                        Web Servers

Network & Application Security
solutions address different problems
                                          ISS               Rational AppScan
                                                                                                 12
IBM Software Group | Rational software



High Level Web App. Architecture Review
                                                                                           Sensitive
                                                          Customer                         data is
                                                          App is deployed                  stored here
                                                          here




                    Internet


                                           Firewall
 Client Tier
 (Browser)                                                                            Database
                           SSL                                           App Server
                                                        (Presentation)
                                                                         (Business
                                                                          Logic)
     Protects
     Transport          Protects Network                                              Data Tier
                                                              Middle Tier
IBM Software Group | Rational software



Why Application Security Problems Exist
  Root Cause
    Developers are not trained to write or test for secure code
    Firewalls and IPS’s don’t block application attacks.
      Port 80 is wide open for attack.
    Network scanners won’t find application vulnerabilities.
      Nessus, ISS, Qualys, Nmap, etc.
    Network security (firewall, IDS, etc) do nothing once an organization web enables an
     application.
  Current State
    Organizations test tactically at a late & costly stage in the development process
    A communication gap exists between security and development as such vulnerabilities
     are not fixed
    Testing coverage is incomplete




                                                                                            14
IBM Software Group | Rational software



Application Security Threats
IBM Software Group | Rational software

Building Security & Compliance into the SDLC

                                     SDLC
   Coding                  Build                QA         Security         Production

                                                         Enable Security
        Developers                                       to effectively
                                                         drive
                                                         remediation into
                                                         development




        Developers

                                                                            Ensure
                                                                            vulnerabilities
                                                                            are addressed
                                                                            before
        Developers     Provides Developers and Testers                      applications
                       with expertise on detection and                      are put into
                       remediation ability                                  production
IBM Software Group | Rational software



Application Security Maturity Model
            BLISSFUL      AWARENESS              CORRECTIVE      OPERATIONS
           IGNORANCE        PHASE                  PHASE      EXCELLENCE PHASE


                                                                  10 %

                                                    30 %
Maturity




                             30 %

            30 %


                       Duration 2-3 Years                              Time
IBM Software Group | Rational software

Reduced Costs, Increased Coverage


                    External Security

                                     Internal Tactical
Cost
Per
Application
Tested
                                                                  Strategic
                                                                  Operationalized




              0%               25%                50%       75%     100%


                                     Application Coverage
IBM Software Group | Rational software



IBM Rational Application Security Testing Products

                             AppScan Enterprise
              Web Application Security Testing Across the SDLC


           Application        Quality              Security     Production
           Development        Assurance            Audit        Monitoring




          Test               Test                Test           Monitor or
          Applications       Applications        Applications   Re-Audit
          As Developed       As Part of          Before         Deployed
                             QA Process          Deployment     Application
                                                                s
®




         IBM Software Group



Backup Slides




                              © 2007 IBM Corporation
IBM Software Group | Rational software



IBM Rational in the IBM Security Portfolio
4 – Monitor and fix !
  Centrally manage security                               Assess
   events, report on security                                       1 – Where are you ?
   posture, remediate                                                 Understand customer security needs and
  Watchfire Solutions           Monitor                               security exposures




                          Access

3 – Let the good guys IN !
   Manage and control user identities and
    access privileges                                                   Defend
                                                             2 – Keep the bad guys OUT !
                                                               Preemptively protect the enterprise against threats
                                                                to the infrastructure, confidential data and services
                                                               Watchfire Solutions


                                                                                                                  21
IBM Software Group | Rational software



Bad Press Decreases Shareholder Value
                                                   One-day market cap
                                                    drop of $200M
IBM Software Group | Rational software



Build Better and More Secure Applications/Websites

 Improve business integrity before you go live
   Address the security issues during the development cycle before applications go live, where
    business risk is magnified, and costs to remediate are high.
 Reduce application costs by automating manual processes
   Automate accurate vulnerability and compliance issues detection and their remediation
    throughout the entire web application lifecycle, from the development cycle into operations.
 Comply to the Government Regulations and Industry Security Requirements
   Incorporates most comprehensive compliance reporting solution, which generates 41out-of-
    the-box regulatory compliance templates and reports
 Provide ‘core to perimeter’ view into enterprise security
   Add web-application security and compliance testing to network-level offerings


                          IBM Rational AppScan® automates web
                          application security audits to help ensure the
                          security and compliance of web applications
                                                                                                   23
IBM Software Group | Rational software



IBM Rational AppScan Vulnerability Detection
  AppScan runs following simulated hacker attacks

     cross-site scripting                    known vulnerabilities
     HTTP response splitting                 HTTP attacks
     parameter tampering                     SQL injections
     hidden field manipulation               suspicious content
     backdoor/debug options                  XML/SOAP tests
     stealth commanding                      content spoofing
     forceful browsing                       Lightweight Directory Access Protocol
     application buffer overflow              (LDAP) injection
                                              XPath injection
     cookie poisoning
                                              session fixation
     third-party misconfiguration



                                                                                       24

Contenu connexe

Tendances

PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 
BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingCloudPassage
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Application security vision - John b
Application security vision - John bApplication security vision - John b
Application security vision - John bRoopa Nadkarni
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixLuigi Delgrosso
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Designing your applications with a security twist 2007
Designing your applications with a security twist 2007Designing your applications with a security twist 2007
Designing your applications with a security twist 2007Blue Slate Solutions
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 

Tendances (19)

PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes Everything
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Application security vision - John b
Application security vision - John bApplication security vision - John b
Application security vision - John b
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Designing your applications with a security twist 2007
Designing your applications with a security twist 2007Designing your applications with a security twist 2007
Designing your applications with a security twist 2007
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 

En vedette

CCA 2008 vítěz poroty - Na hory - 3. místo
CCA 2008 vítěz poroty - Na hory - 3. místoCCA 2008 vítěz poroty - Na hory - 3. místo
CCA 2008 vítěz poroty - Na hory - 3. místoTUESDAY Business Network
 
Trendy elektronické fakturace v České republice v roce 2009 - Petr Hojný, Čes...
Trendy elektronické fakturace v České republice v roce 2009 - Petr Hojný, Čes...Trendy elektronické fakturace v České republice v roce 2009 - Petr Hojný, Čes...
Trendy elektronické fakturace v České republice v roce 2009 - Petr Hojný, Čes...TUESDAY Business Network
 
Microsoft Power Point M Artin Sebesta Final
Microsoft Power Point   M Artin Sebesta FinalMicrosoft Power Point   M Artin Sebesta Final
Microsoft Power Point M Artin Sebesta FinalTUESDAY Business Network
 
Společnost ve virtuálním světě - Václav Jirovský (VŠ učitel, vedoucí Ústavu ...
Společnost ve virtuálním světě -  Václav Jirovský (VŠ učitel, vedoucí Ústavu ...Společnost ve virtuálním světě -  Václav Jirovský (VŠ učitel, vedoucí Ústavu ...
Společnost ve virtuálním světě - Václav Jirovský (VŠ učitel, vedoucí Ústavu ...TUESDAY Business Network
 
Dopad e-governmentu na občany a podnikatele - Petr Polák, Logica
Dopad e-governmentu na občany a podnikatele - Petr Polák, LogicaDopad e-governmentu na občany a podnikatele - Petr Polák, Logica
Dopad e-governmentu na občany a podnikatele - Petr Polák, LogicaTUESDAY Business Network
 

En vedette (8)

CCA 2008 vítěz poroty - Na hory - 3. místo
CCA 2008 vítěz poroty - Na hory - 3. místoCCA 2008 vítěz poroty - Na hory - 3. místo
CCA 2008 vítěz poroty - Na hory - 3. místo
 
Kefer
KeferKefer
Kefer
 
Trendy elektronické fakturace v České republice v roce 2009 - Petr Hojný, Čes...
Trendy elektronické fakturace v České republice v roce 2009 - Petr Hojný, Čes...Trendy elektronické fakturace v České republice v roce 2009 - Petr Hojný, Čes...
Trendy elektronické fakturace v České republice v roce 2009 - Petr Hojný, Čes...
 
Microsoft Power Point M Artin Sebesta Final
Microsoft Power Point   M Artin Sebesta FinalMicrosoft Power Point   M Artin Sebesta Final
Microsoft Power Point M Artin Sebesta Final
 
Filova
FilovaFilova
Filova
 
Společnost ve virtuálním světě - Václav Jirovský (VŠ učitel, vedoucí Ústavu ...
Společnost ve virtuálním světě -  Václav Jirovský (VŠ učitel, vedoucí Ústavu ...Společnost ve virtuálním světě -  Václav Jirovský (VŠ učitel, vedoucí Ústavu ...
Společnost ve virtuálním světě - Václav Jirovský (VŠ učitel, vedoucí Ústavu ...
 
Dopad e-governmentu na občany a podnikatele - Petr Polák, Logica
Dopad e-governmentu na občany a podnikatele - Petr Polák, LogicaDopad e-governmentu na občany a podnikatele - Petr Polák, Logica
Dopad e-governmentu na občany a podnikatele - Petr Polák, Logica
 
Drbz
DrbzDrbz
Drbz
 

Similaire à Nebezpecny Internet Novejsi Verze

F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSebastien Deleersnyder
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud appsCenzic
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecurityAmazon Web Services
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Amazon Web Services
 
Rational App Scan&Policy Tester
Rational App Scan&Policy TesterRational App Scan&Policy Tester
Rational App Scan&Policy TesterKristina O'Regan
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 

Similaire à Nebezpecny Internet Novejsi Verze (20)

F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
S series presentation
S series presentationS series presentation
S series presentation
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - EcuadorIBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
 
Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
 
Rational App Scan&Policy Tester
Rational App Scan&Policy TesterRational App Scan&Policy Tester
Rational App Scan&Policy Tester
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 

Plus de TUESDAY Business Network

2011 0330 czech open coffee info for developers
2011 0330 czech open coffee info for developers2011 0330 czech open coffee info for developers
2011 0330 czech open coffee info for developersTUESDAY Business Network
 
Belbinův dotazník odpovědní formulář
Belbinův dotazník odpovědní formulářBelbinův dotazník odpovědní formulář
Belbinův dotazník odpovědní formulářTUESDAY Business Network
 
Case study: Z malé firmy do velké - Ondřej Tomek
Case study: Z malé firmy do velké - Ondřej TomekCase study: Z malé firmy do velké - Ondřej Tomek
Case study: Z malé firmy do velké - Ondřej TomekTUESDAY Business Network
 
A nejlepší jsou fanoušci - Josef Havelka
A nejlepší jsou fanoušci - Josef HavelkaA nejlepší jsou fanoušci - Josef Havelka
A nejlepší jsou fanoušci - Josef HavelkaTUESDAY Business Network
 
Kompetence a rozvoj podnikatelů - Monika Barton
Kompetence a rozvoj podnikatelů - Monika BartonKompetence a rozvoj podnikatelů - Monika Barton
Kompetence a rozvoj podnikatelů - Monika BartonTUESDAY Business Network
 
Pmd project value_management_sent [režim kompatibility]
Pmd project value_management_sent [režim kompatibility]Pmd project value_management_sent [režim kompatibility]
Pmd project value_management_sent [režim kompatibility]TUESDAY Business Network
 
Výsledky soutěže Best Project Management 2010
Výsledky soutěže Best Project Management 2010Výsledky soutěže Best Project Management 2010
Výsledky soutěže Best Project Management 2010TUESDAY Business Network
 
Projekt v krizi - konkrétní příklady projektů v krizi - Viktor Seige (Raiffei...
Projekt v krizi - konkrétní příklady projektů v krizi - Viktor Seige (Raiffei...Projekt v krizi - konkrétní příklady projektů v krizi - Viktor Seige (Raiffei...
Projekt v krizi - konkrétní příklady projektů v krizi - Viktor Seige (Raiffei...TUESDAY Business Network
 
Co to je krize projektu aneb jak vytáhnout projekt z bryndy - Petr Maňas (Kla...
Co to je krize projektu aneb jak vytáhnout projekt z bryndy - Petr Maňas (Kla...Co to je krize projektu aneb jak vytáhnout projekt z bryndy - Petr Maňas (Kla...
Co to je krize projektu aneb jak vytáhnout projekt z bryndy - Petr Maňas (Kla...TUESDAY Business Network
 
Praktický kontrolling při realizaci projektů ve stavebnictví - včasnost - Gyu...
Praktický kontrolling při realizaci projektů ve stavebnictví - včasnost - Gyu...Praktický kontrolling při realizaci projektů ve stavebnictví - včasnost - Gyu...
Praktický kontrolling při realizaci projektů ve stavebnictví - včasnost - Gyu...TUESDAY Business Network
 
Lessons Learned - od interim managera - Ján Dolejš (PP Partners)
Lessons Learned - od interim managera - Ján Dolejš (PP Partners)Lessons Learned - od interim managera - Ján Dolejš (PP Partners)
Lessons Learned - od interim managera - Ján Dolejš (PP Partners)TUESDAY Business Network
 

Plus de TUESDAY Business Network (20)

S Androidem do lesa
S Androidem do lesaS Androidem do lesa
S Androidem do lesa
 
2011 0330 czech open coffee info for developers
2011 0330 czech open coffee info for developers2011 0330 czech open coffee info for developers
2011 0330 czech open coffee info for developers
 
Tuesday manual firemniho_clena2011
Tuesday manual firemniho_clena2011Tuesday manual firemniho_clena2011
Tuesday manual firemniho_clena2011
 
Belbinův obrázek
Belbinův obrázekBelbinův obrázek
Belbinův obrázek
 
Belbinův popis rolí
Belbinův popis rolíBelbinův popis rolí
Belbinův popis rolí
 
Belbinův dotazník odpovědní formulář
Belbinův dotazník odpovědní formulářBelbinův dotazník odpovědní formulář
Belbinův dotazník odpovědní formulář
 
Radana Brábníková - myšlenkové mapy
Radana Brábníková - myšlenkové mapyRadana Brábníková - myšlenkové mapy
Radana Brábníková - myšlenkové mapy
 
Case study: Z malé firmy do velké - Ondřej Tomek
Case study: Z malé firmy do velké - Ondřej TomekCase study: Z malé firmy do velké - Ondřej Tomek
Case study: Z malé firmy do velké - Ondřej Tomek
 
Spousta energie - Miroslav Spousta
Spousta energie - Miroslav SpoustaSpousta energie - Miroslav Spousta
Spousta energie - Miroslav Spousta
 
Neuroekonomika - František Koukolík
Neuroekonomika - František KoukolíkNeuroekonomika - František Koukolík
Neuroekonomika - František Koukolík
 
Strategické řízení HR - Iva Bursová
Strategické řízení HR - Iva BursováStrategické řízení HR - Iva Bursová
Strategické řízení HR - Iva Bursová
 
A nejlepší jsou fanoušci - Josef Havelka
A nejlepší jsou fanoušci - Josef HavelkaA nejlepší jsou fanoušci - Josef Havelka
A nejlepší jsou fanoušci - Josef Havelka
 
Kompetence a rozvoj podnikatelů - Monika Barton
Kompetence a rozvoj podnikatelů - Monika BartonKompetence a rozvoj podnikatelů - Monika Barton
Kompetence a rozvoj podnikatelů - Monika Barton
 
Pmd project value_management_sent [režim kompatibility]
Pmd project value_management_sent [režim kompatibility]Pmd project value_management_sent [režim kompatibility]
Pmd project value_management_sent [režim kompatibility]
 
Výsledky soutěže Best Project Management 2010
Výsledky soutěže Best Project Management 2010Výsledky soutěže Best Project Management 2010
Výsledky soutěže Best Project Management 2010
 
Projekt v krizi - konkrétní příklady projektů v krizi - Viktor Seige (Raiffei...
Projekt v krizi - konkrétní příklady projektů v krizi - Viktor Seige (Raiffei...Projekt v krizi - konkrétní příklady projektů v krizi - Viktor Seige (Raiffei...
Projekt v krizi - konkrétní příklady projektů v krizi - Viktor Seige (Raiffei...
 
Co to je krize projektu aneb jak vytáhnout projekt z bryndy - Petr Maňas (Kla...
Co to je krize projektu aneb jak vytáhnout projekt z bryndy - Petr Maňas (Kla...Co to je krize projektu aneb jak vytáhnout projekt z bryndy - Petr Maňas (Kla...
Co to je krize projektu aneb jak vytáhnout projekt z bryndy - Petr Maňas (Kla...
 
Praktický kontrolling při realizaci projektů ve stavebnictví - včasnost - Gyu...
Praktický kontrolling při realizaci projektů ve stavebnictví - včasnost - Gyu...Praktický kontrolling při realizaci projektů ve stavebnictví - včasnost - Gyu...
Praktický kontrolling při realizaci projektů ve stavebnictví - včasnost - Gyu...
 
Lessons Learned - od interim managera - Ján Dolejš (PP Partners)
Lessons Learned - od interim managera - Ján Dolejš (PP Partners)Lessons Learned - od interim managera - Ján Dolejš (PP Partners)
Lessons Learned - od interim managera - Ján Dolejš (PP Partners)
 
Cyrani2
Cyrani2Cyrani2
Cyrani2
 

Nebezpecny Internet Novejsi Verze

  • 1. ® IBM Software Group Nebezpečný internet nezapomínejte na aplikace Jan Valdman, BP IBM © 2007 IBM Corporation
  • 2. IBM Software Group | Rational software Agenda  W eb Application Security Issues  W eb Application Security Model  Application Security and Software development  Application Security Maturity Model
  • 3. IBM Software Group | Rational software Application Security Today “Web application vulnerabilities accounted for 69% of vulnerabilities disclosed between July 2005 and June 2006” Gartner “64% of developers are not confident in their ability to write secure applications” Microsoft Developer Research “70% of companies today are NOT applying secure application development techniques in their software development practices” Aberdeen Group, May 2007 “90% of applications, when tested are vulnerable” Watchfire
  • 4. IBM Software Group | Rational software The Reality: Security and Spending Are Unbalanced Security Spending % of Attacks % of Dollars Web 10% Applications 75% 90% Network 25% Server 75% of All Attacksto the Web Application Layer Are Directed on Information Security 2/3 of All Web Applications Are Vulnerable Sources: Gartner, Watchfire
  • 5. IBM Software Group | Rational software Why Application Security is a High Priority  Web applications are the #1 focus of hackers:  75% of attacks at Application layer (Gartner)  XSS and SQL Injection are #1 and #2 reported vulnerabilities (Mitre)  Most sites are vulnerable:  90% of sites are vulnerable to application attacks (Watchfire)  78% percent of easily exploitable vulnerabilities affected Web applications (Symantec)  80% of organizations will experience an application security incident by 2010 (Gartner)  Web applications are high value targets for hackers:  Customer data, credit cards, ID theft, fraud, site defacement, etc  Compliance requirements:  Payment Card Industry (PCI) Standards, GLBA, HIPPA, FISMA,
  • 6. IBM Software Group | Rational software The Myth: “Our Site Is Safe” We Have Firewalls in Place We Audit It Once a Quarter with Pen Testers We Use Network Vulnerability Scanners
  • 7. IBM Software Group | Rational software Network Defenses for Web Applications Security Perimeter IDS IPS App Firewall Firewall Intrusion Intrusion Application Detection Prevention Firewall System System System Incident Event Management (SIEM) 7
  • 8. IBM Software Group | Rational software
  • 9. IBM Software Group | Rational software 12 Most Frequent Hacker Attacks  Cookie Poisoning  Hidden Field Manipulation  Parameter Tampering  Buffer Overflow  Cross-site Scripting  Backup and Debug Options  Forceful Browsing  HTTP Response Splitting  Stealth commanding  3rd Party Misconfiguration  Known vulnerabilities  XML & Web service vulnerabilities
  • 10. IBM Software Group | Rational software Going Beyond Pointing out Security Problems
  • 11. IBM Software Group | Rational software Web Application Environment Security Web Application Scanners Web Application Web Services Network Scanners Web Server Database Operating System Database Scanners Host Scanners 11
  • 12. IBM Software Group | Rational software Network vs. Application Security - Complimentary Info Security Landscape Desktop Transport Network Web Applications Antivirus Encryption Firewalls / Protection (SSL) Advanced Routers Application Backend Firewall Servers Server Databases Web Servers Network & Application Security solutions address different problems ISS Rational AppScan 12
  • 13. IBM Software Group | Rational software High Level Web App. Architecture Review Sensitive Customer data is App is deployed stored here here Internet Firewall Client Tier (Browser) Database SSL App Server (Presentation) (Business Logic) Protects Transport Protects Network Data Tier Middle Tier
  • 14. IBM Software Group | Rational software Why Application Security Problems Exist  Root Cause  Developers are not trained to write or test for secure code  Firewalls and IPS’s don’t block application attacks.  Port 80 is wide open for attack.  Network scanners won’t find application vulnerabilities.  Nessus, ISS, Qualys, Nmap, etc.  Network security (firewall, IDS, etc) do nothing once an organization web enables an application.  Current State  Organizations test tactically at a late & costly stage in the development process  A communication gap exists between security and development as such vulnerabilities are not fixed  Testing coverage is incomplete 14
  • 15. IBM Software Group | Rational software Application Security Threats
  • 16. IBM Software Group | Rational software Building Security & Compliance into the SDLC SDLC Coding Build QA Security Production Enable Security Developers to effectively drive remediation into development Developers Ensure vulnerabilities are addressed before Developers Provides Developers and Testers applications with expertise on detection and are put into remediation ability production
  • 17. IBM Software Group | Rational software Application Security Maturity Model BLISSFUL AWARENESS CORRECTIVE OPERATIONS IGNORANCE PHASE PHASE EXCELLENCE PHASE 10 % 30 % Maturity 30 % 30 % Duration 2-3 Years Time
  • 18. IBM Software Group | Rational software Reduced Costs, Increased Coverage External Security Internal Tactical Cost Per Application Tested Strategic Operationalized 0% 25% 50% 75% 100% Application Coverage
  • 19. IBM Software Group | Rational software IBM Rational Application Security Testing Products AppScan Enterprise Web Application Security Testing Across the SDLC Application Quality Security Production Development Assurance Audit Monitoring Test Test Test Monitor or Applications Applications Applications Re-Audit As Developed As Part of Before Deployed QA Process Deployment Application s
  • 20. ® IBM Software Group Backup Slides © 2007 IBM Corporation
  • 21. IBM Software Group | Rational software IBM Rational in the IBM Security Portfolio 4 – Monitor and fix !  Centrally manage security Assess events, report on security 1 – Where are you ? posture, remediate  Understand customer security needs and  Watchfire Solutions Monitor security exposures Access 3 – Let the good guys IN !  Manage and control user identities and access privileges Defend 2 – Keep the bad guys OUT !  Preemptively protect the enterprise against threats to the infrastructure, confidential data and services  Watchfire Solutions 21
  • 22. IBM Software Group | Rational software Bad Press Decreases Shareholder Value  One-day market cap drop of $200M
  • 23. IBM Software Group | Rational software Build Better and More Secure Applications/Websites  Improve business integrity before you go live  Address the security issues during the development cycle before applications go live, where business risk is magnified, and costs to remediate are high.  Reduce application costs by automating manual processes  Automate accurate vulnerability and compliance issues detection and their remediation throughout the entire web application lifecycle, from the development cycle into operations.  Comply to the Government Regulations and Industry Security Requirements  Incorporates most comprehensive compliance reporting solution, which generates 41out-of- the-box regulatory compliance templates and reports  Provide ‘core to perimeter’ view into enterprise security  Add web-application security and compliance testing to network-level offerings IBM Rational AppScan® automates web application security audits to help ensure the security and compliance of web applications 23
  • 24. IBM Software Group | Rational software IBM Rational AppScan Vulnerability Detection  AppScan runs following simulated hacker attacks  cross-site scripting  known vulnerabilities  HTTP response splitting  HTTP attacks  parameter tampering  SQL injections  hidden field manipulation  suspicious content  backdoor/debug options  XML/SOAP tests  stealth commanding  content spoofing  forceful browsing  Lightweight Directory Access Protocol  application buffer overflow (LDAP) injection  XPath injection  cookie poisoning  session fixation  third-party misconfiguration 24