Maintaining & Reviewing a Web Application’s Security

29
Maintaining & Reviewing a Web Application’s Security By: Karen Baldacchino Date: 15 September 2012

description

Maintaining & Reviewing a Web Application’s Security. By: Karen Baldacchino Date: 15 September 2012. Agenda:. The Project Areas of Study Selecting the Right Resources Ideas for Further Studies. Agenda:. The Project Areas of Study Selecting the Right Resources - PowerPoint PPT Presentation

Transcript of Maintaining & Reviewing a Web Application’s Security

Page 1: Maintaining  &  Reviewing a Web  Application’s  Security

Maintaining & Reviewing

a Web Application’s Security

By: Karen BaldacchinoDate: 15 September 2012

Page 2: Maintaining  &  Reviewing a Web  Application’s  Security

Agenda:

The Project

Areas of Study

Selecting the Right Resources

Ideas for Further Studies

Page 3: Maintaining  &  Reviewing a Web  Application’s  Security

Agenda:

The Project

Areas of Study

Selecting the Right Resources

Ideas for Further Studies

Page 4: Maintaining  &  Reviewing a Web  Application’s  Security

The Project

Title: Auditing the Security of E-banking Applications:

An Analysis of the Standards, Guidelines and Best Practises Available

Objective: To highlight the most useful resources available to the information security manager and the information security auditor in securing and

reviewing the security of web applications.

Page 5: Maintaining  &  Reviewing a Web  Application’s  Security

Agenda:

The Project

Areas of Study

Selecting the Right Resources

Ideas for Further Studies

Page 6: Maintaining  &  Reviewing a Web  Application’s  Security

Areas of Study1.Information Security Governance2.Information Security Policies & User Awareness3.Security Incident Management4.Communication Channel Security5.Logical Access Controls6.Change Management7.Systems Development8.Systems Backup & Recovery Procedures9.Management of User Authentication10.Web-Application Specific Security Measures11.Monitoring of System Security12.Security Reviews and Penetration Testing13.Compliance with Laws, Regulations & Applicable Standards14.Outsourcing

Page 7: Maintaining  &  Reviewing a Web  Application’s  Security

Areas of Study1.Information Security Governance2.Information Security Policies & User Awareness3.Security Incident Management4.Communication Channel Security5.Logical Access Controls6.Change Management7.Systems Development8.Systems Backup & Recovery Procedures9.Management of User Authentication10.Web-Application Specific Security Measures11.Monitoring of System Security12.Security Reviews and Penetration Testing13.Compliance with Laws, Regulations & Applicable Standards14.Outsourcing

Page 8: Maintaining  &  Reviewing a Web  Application’s  Security

STRIDE Attacks -- Tampering and Eavesdropping

Message mis-routing or re-routing

Message interception

Covert channels

WEB

Communication Channel SecurityRisks

Page 9: Maintaining  &  Reviewing a Web  Application’s  Security

Use of MAC, HMAC and Digital Signatures

Use of public key certificate

Adequate service levels from network service provider

Use of SSL or IPSec

Close unnecessary ports

Disable unused protocols

Use secure flag on cookies

Harden the TCP/IP Stack

Communication Channel SecurityControls

Page 10: Maintaining  &  Reviewing a Web  Application’s  Security

Mis-use or compromise of security audit tools Insufficient notifications and alerts Failure to identify suspicious transactions Failure to respond to alerts Use of key loggers, form-grabbers and spyware Scanning, foot-printing and fingerprinting

Monitoring of System SecurityRisks

Page 11: Maintaining  &  Reviewing a Web  Application’s  Security

Intrustion detection and Intrusion prevention systems

Security incident handling

Alerting on unauthorized activities

Alerting on unusual activities

Use of network monitoring tools

Deploy software patches and anti-virus definitions in a timely manner

Monitoring of System SecurityControls

Page 12: Maintaining  &  Reviewing a Web  Application’s  Security

Agenda:

The Project

Areas of Study

Selecting the Right Resources

Ideas for Further Studies

Page 13: Maintaining  &  Reviewing a Web  Application’s  Security

Selecting the Right Resources

Over 80 different resources selected

Shortlisted to 40

Analysis

Selection of 11 Resources

Page 14: Maintaining  &  Reviewing a Web  Application’s  Security

Selecting the Right Resources

Over 80 different resources selected

Shortlisted to 40

Analysis

Selection of 11 Resources

Page 15: Maintaining  &  Reviewing a Web  Application’s  Security

Shortlisted Resources (40)

Page 16: Maintaining  &  Reviewing a Web  Application’s  Security

Selecting the Right Resources

Over 80 different resources selected

Shortlisted to 40

Analysis

Selection of 11 Resources

Page 17: Maintaining  &  Reviewing a Web  Application’s  Security

Selecting the Right Resources

Over 80 different resources selected

Shortlisted to 40

Analysis

Selection of 11 Resources

Page 18: Maintaining  &  Reviewing a Web  Application’s  Security

Selecting the Right Resources

Risks Register

Controls Register

Read the 40 resources

Page 19: Maintaining  &  Reviewing a Web  Application’s  Security

Selecting the Right Resources

Read the 40 resources

Risks Register

Controls Register

Page 20: Maintaining  &  Reviewing a Web  Application’s  Security

The Risks Register

Page 21: Maintaining  &  Reviewing a Web  Application’s  Security

Selecting the Right Resources

Controls Register

Risks Register

Read the 40 resources

Page 22: Maintaining  &  Reviewing a Web  Application’s  Security

Selecting the Right Resources

Controls Register

Risks Register

Read the 40 resources

Page 23: Maintaining  &  Reviewing a Web  Application’s  Security

The Controls Register

Page 24: Maintaining  &  Reviewing a Web  Application’s  Security

Selecting the Right Resources

Over 80 different resources selected

Shortlisted to 40

Analysis

Selection of 11 Resources

Page 25: Maintaining  &  Reviewing a Web  Application’s  Security

Selecting the Right Resources

Over 80 different resources selected

Shortlisted to 40

Analysis

Selection of 11 Resources

Page 26: Maintaining  &  Reviewing a Web  Application’s  Security

Resources SelectedResource Title: Focus:BS ISO/IEC 27002:2005 BS 7799-1:2005– Information technology — Security techniques — Code of practice for information security management

Generic

BS 10012:2009 Data protection – Specification for a personal information management system

Generic

“Pharming” Guidance on How Financial Institutions Can Protect Against Pharming Attacks

e-Banking

A Security Checklist for Web Application Design Web-Apps

A Taxonomy of Operational Cyber Security Risks (CERT Program) Web-Apps

Internet Banking and Technology Risk Management Guidelines e-Banking

Guidelines on Securing Public Web Servers, Recommendations of the National Institute of Standards and Technology

Web-Apps

OWASP Top 10 – 2010 The Ten Most Critical Web Application Security Risks Web-Apps

The Web Application Security Consortium: Threat classification Web-Apps

Electronic Authentication Guideline, Recommendations of the National Institute of Standards and Technology

Generic

WhiteHat Website Security Statistics Report, Measuring Website Security: Windows of Exposure

Web-Apps

Page 27: Maintaining  &  Reviewing a Web  Application’s  Security

Agenda:

The Project

Areas of Study

Selecting the Right Resources

Ideas for Further Studies

Page 28: Maintaining  &  Reviewing a Web  Application’s  Security

Further Study Ideas

• Focus the study on other web-application types, eg: e-shopping, social networking etc.

• Focus the study on mobile-banking applications

• Focus the study on cloud-based applications

• Apply the same methodology for supporting other areas such as Enterprise-wide Security Risk Management

Page 29: Maintaining  &  Reviewing a Web  Application’s  Security

Thank you for Listening

Any Questions?

Contact Information:

Karen Baldacchino

Email: [email protected]: +356 2563 1263Mob: +356 7904 6528Skype:karenbaldacchino