This text is for the internal use of the Customer and n.runs AG only. No part of this publication...

39
This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language in any form by any means without the written permission of the Customer or n.runs AG. This document is under the copy write protection of n.runs AG 1 Security Development Lifecycles MS TechDays Bern, 9. April 2009 Jan Münther, CTO Security, n.runs AG

Transcript of This text is for the internal use of the Customer and n.runs AG only. No part of this publication...

Page 1: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language in any form by any means without the written permission of the Customer or n.runs AG. This document is under the copy write protection of n.runs AG 1

Security Development LifecyclesMS TechDays Bern, 9. April 2009

Jan Münther, CTO Security, n.runs AG

Page 2: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Agenda

Roadmap Awareness und Training

Phasen der Entwicklung Requirements Design Implementierung Verifizierung Veröffentlichung Response

2© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles – TechDays

Page 3: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

SDL von Microsoft

heise Security Konferenz 2008, Jan Münther3

Security Training

Security Kickoff& Register with

SWI

Security DesignBest

Practices

Security Arch & Attack SurfaceReview

Use SecurityDevelopment

Tools &Security BestDev & Test Practices

Create Security

Docsand Tools

For Product

PrepareSecurity

ResponsePlan

Security Push

Pen Testing

FinalSecurity Review

Security Servicing &ResponseExecution

Feature ListsQuality Guidelines

Arch DocsSchedules

DesignSpecifications Testing and Verification

Development of New Code

Bug Fixes

Code Signing A Checkpoint

Express Signoff

RTM

Product SupportService Packs/QFEs Security

Updates

Requirements Design Implementation Verification ReleaseSupport

&Servicing

ThreatModeling

FunctionalSpecifications

Der herkömmliche Entwicklungszyklus bei Microsoft, inkl. Aufgaben und ProzesseDer herkömmliche Entwicklungszyklus bei Microsoft, inkl. Aufgaben und Prozesse

Page 4: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Training

Training bildet den Einstieg in einen Security Lifecycle Sicherheitsbewusstsein

Verschiedene Zielgruppen Management Teamleiter / Produktmanager Entwickler

Unterstützung der Bemühungen durch Top Level Management unumgängliche Voraussetzung für den Erfolg! Sicherheitsbewusstsein als Teil der Firmenkultur

4© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles – TechDays

Page 5: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

SDL von Microsoft

heise Security Konferenz 2008, Jan Münther5

Security Training

Security Kickoff& Register with

SWI

Security DesignBest

Practices

Security Arch & Attack SurfaceReview

Use SecurityDevelopment

Tools &Security BestDev & Test Practices

Create Security

Docsand Tools

For Product

PrepareSecurity

ResponsePlan

Security Push

Pen Testing

FinalSecurity Review

Security Servicing &ResponseExecution

Requirements Design Implementation Verification ReleaseSupport

&Servicing

ThreatModeling

Security Development Lifecycles – TechDays

Page 6: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Requirements

Sicherheitsthemen gehören ins Pflichtenheft! Auch und besonders bei Entwicklung durch Dritte

Schutzbedarfsanalyse Wie sicherheitskritisch wird die Anwendung?

Definiert letzlich durch den "Data Owner"

6© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles – TechDays

Page 7: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

SDL von Microsoft

heise Security Konferenz 2008, Jan Münther7

Security Training

Security Kickoff& Register with

SWI

Security DesignBest

Practices

Security Arch & Attack SurfaceReview

Use SecurityDevelopment

Tools &Security BestDev & Test Practices

Create Security

Docsand Tools

For Product

PrepareSecurity

ResponsePlan

Security Push

Pen Testing

FinalSecurity Review

Security Servicing &ResponseExecution

Requirements Design Implementation Verification ReleaseSupport

&Servicing

ThreatModeling

Security Development Lifecycles – TechDays

Page 8: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Phase Drei: Design ( 1 / 8 )

Entwurf der Sicherheitsmechanismen zur Umsetzung der Schutzbedürfnisse

Threat Modelling hilft beim Erkennen von Bedrohungen

Demonstration Threat Modeling Tool v3.0

Threat Modeling ist die zentrale Komponenten im SDL

Übersicht über die Bedrohungen

Grafische Unterstützung und Visualisierung der Zusammenhänge

Automatische Hilfe beim Auffinden von potentiellen Bedrohungen

8© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles – TechDays

Page 9: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Phase Drei: Design ( 2 / 8 )

Die Erfahrung zeigt: Das Erfordernis des Threat Modelings allein hebt das Sicherheitsniveau erheblich

Umfassende Auseinandersetzung mit dem Thema Sicherheit unumgänglich

9© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles – TechDays

Page 10: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Phase Drei: Design ( 3 / )

10© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 11: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Phase Drei: Design ( 4 / 8 )

Design-Fehler sabotieren die Sicherheit der Gesamtlösung von Anfang an Selbst bei sicherer Implementierung kann das Endprodukt nicht sicher

sein

Ein paar Beispiele für unsicheres Design!

11© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles – TechDays

Page 12: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Phase Drei: Design ( 5 / 8 )

Design-Problem: Hartkodiertes Passwort Zwei Varianten

"default password" Sollten vom Benutzer geändert werden Erfolgt oft nicht Zum Teil unbekannte Benutzer

Beispiel: Oracle OUTLN "hardcoded password"

"Wartungszugang" Zum Debugging

12© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles – TechDays

Page 13: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Phase Drei: Design ( 6 / 8 )

Hartkodierte Passwörter als Backdoors Z.B. Netgear WG602 Accesspoint

Problematisches Design wird zum Security-Bug Aruba Wireless Controller

13© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles – TechDays

Page 14: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Phase Drei: Design ( 7 / 8 )

Hartkodierte Passwörter als Backdoors Z.B. Netgear WG602 Accesspoint

Problematisches Design wird zum Security-Bug Aruba Wireless Controller

http://www.nruns.com/security_advisory_aruba_advisory_draft_unauth_access_ms.php http://www.nruns.com/security_advisory_aruba_advisory_draft_buffer_overflow_ms.php

14© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles – TechDays

Page 15: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Phase Drei: Design ( 8 / 8 )

Design-Problem: Schlechte Kryptographie Obfuskation von gespeicherten Passwörtern

Beispiel: CPIC-User für Synactive SAP GUI XT Passwort "verschlüsselt" in Registry abgelegt Algorithmus lässt sich disassemblieren Decoder

15© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles – TechDays

Page 16: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Phase Drei: Design ( 9 / )

Design-Problem: Schlechte Kryptographie Obfuskation von gespeicherten Passwörtern

Beispiel: CPIC-User für Synactive SAP GUI XT Passwort "verschlüsselt" in Registry abgelegt Algorithmus lässt sich disassemblieren Decoder

16© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 17: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Phase Drei: Design ( 9 / )

Design-Problem: Schlechte Kryptographie Obfuskation von gespeicherten Passwörtern

Beispiel: CPIC-User für Synactive SAP GUI XT Passwort "verschlüsselt" in Registry abgelegt Algorithmus lässt sich disassemblieren Decoder

17© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 18: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

SDL von Microsoft

heise Security Konferenz 2008, Jan Münther18

Security Training

Security Kickoff& Register with

SWI

Security DesignBest

Practices

Security Arch & Attack SurfaceReview

Use SecurityDevelopment

Tools &Security BestDev & Test Practices

Create Security

Docsand Tools

For Product

PrepareSecurity

ResponsePlan

Security Push

Pen Testing

FinalSecurity Review

Security Servicing &ResponseExecution

Requirements Design Implementation Verification ReleaseSupport

&Servicing

ThreatModeling

Security Development Lifecycles - TechDays

Page 19: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Implementierung ( 1 / 5 )

Klassisches Gebiet für Code-Defekte

Unmanaged Code (C/C++) Fehlende oder unzulängliche Längenüberprüfungen

Integer Overflows / Integer Underflows

Managed Code Code Access Security

Luring Attacks

Alle typischen Sicherheitsprobleme wie Injection Attacks

Häufig XML-Processing-Probleme

.NET Remoting

19© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 20: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Implementierung ( 2 / 5 )

Fehler können verhindert werden durch Austausch von riskanten APIs

Klassische Beispiele strcpy() und strcat() Einsatz von sicheren Bibliotheken (SafeInt, Anti XSS Libs etc.)

Festgelegt durch Secure Coding Policies

Überprüft durch Tools zur Statischen Analyse Überprüfung beim Check-In Überprüfung zur "Build Time" Für Managed Code: FXCop beinhaltet Security-Regeln Code Analyse mit Sec Rules in VS Team Edition CAT.NET

Einsatz von Tools zur Statischen Analyse kann und sollte Teil des Implementierungsprozesses werden! Kein Check-In bei kritischen Fehlern

20© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 21: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Implementierung ( 3 / 5 )

Klassischer Fehler: falsche Überprüfung von Zertifikaten

bool RemoteCertValidate(object sender, X509Certificate cert, X509Chain chain, System.Net.Security.SslPolicyErrors error)

{ certificateName = cert.Subject; if (cert.Subject.StartsWith(subjectName)) {

return true; } return false;

}

Gefunden durch Source Code Audit! Automatisierte Statische Analyse würde diesen Fehler nicht finden

21© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 22: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Implementierung ( 4 / 5 )

SQL Injection – einfach zu verhindern, aber doch noch oft zu finden!

<%Dim id, password, q, rs, did = Request.Form("id")password = Request.Form("password")' ** Create your Queryq = "SELECT * FROM password WHERE id LIKE '" &_     id & "' AND password LIKE '" & password & "'"' ** Create a RecordSet to store the results of the QuerySet rs = Server.CreateObject("ADODB.RecordSet")rs.Open q, "DSN=xxxxxx;"' ** check for no records returned (id or password not found)if NOT rs.EOF then' ** Set cookies for user's convenience    d = Date    Response.Cookies("userid") = id    Response.Cookies("pword") = password    Response.Cookies("userid").Expires = DateAdd("yyyy",2,d)    Response.Cookies("pword").Expires = DateAdd("yyyy",2,d)end if%>

Page 23: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Implementierung ( 5 / 5 )

Visual C#, Schritt für Schritt, Microsoft Press (S. 587)

SqlCommand dataCommand = new SqlCommand();

dataCommand.Connection = dataConnection;

dataCommand.CommandText = "SELECT OrderID,OrderDate,ShippedDate,ShipName,ShipAddress,ShipCity,ShipCountry"

dataCommand.CommandText += "FROM Orders WHERE CustomerID='" + customerID+"'";

Page 24: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

SDL von Microsoft

heise Security Konferenz 2008, Jan Münther24

Security Training

Security Kickoff& Register with

SWI

Security DesignBest

Practices

Security Arch & Attack SurfaceReview

Use SecurityDevelopment

Tools &Security BestDev & Test Practices

Create Security

Docsand Tools

For Product

PrepareSecurity

ResponsePlan

Security Push

Pen Testing

FinalSecurity Review

Security Servicing &ResponseExecution

Requirements Design Implementation Verification ReleaseSupport

&Servicing

ThreatModeling

Security Development Lifecycles - TechDays

Page 25: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Verifizierung (1 / 4 )

Typische Maßnahme zur Verifizierung: Fuzzing Automatisiertes Testen zur Provokation von Fehlerfällen

Einsatz besonders sinnvoll bei externen Datenquellen Datei-Parsing Netzwerkprotokoll-Parsing

Vorgefertigte Tools für verschiedene Protokolle und Formate verfügbar Codenomicon (kommerziell) PROTOS (frei)

Frameworks zur Erstellung eigener Fuzzer Peach Sulley Etc.

25© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 26: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Verifizierung (2 / 4 )

Fuzzing ändert gültige Werte so ab, dass sie klassische Fehler auslösen

Typisches Beispiel: Strings in Dateiformaten oder Netzwerkprotokollen werden durch inkrementierende Länge auf Buffer Overflows getestet Z.B. erst 512 Byte, dann 1024, dann 4096 etc. Dann 513 Byte und 1025, 4097 etc.

Off by one, off by few

26© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 27: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Verifizierung (3 / 4 )

Problem beim Fuzzing oftmals die Fehleranalyse

Manche Exceptions werden abgefangen

Ist das Problem für Angreifer ausnutzbar?

Welche Funktion hat den Fehler ausgelöst Mitunter Call Stack nicht mehr lesbar

Weiteres Problem: Code-Pfade und Testfälle

"Code Coverage" nur teilweise messbar

Ansätze umfassen "Rückspulen"

27© n.runs AG, Jan Muenther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 28: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Verifizierung (4 / 4 )

Untersuchung der aus dem Threat Model ermittelten möglichen Bedrohungen Penetration Testing

Manipulationsmöglichkeiten Z.B. logische Fehler Privilegieneskalationen Race Conditions

Penetration Test sollte eine umfassende Untersuchung der möglichen Risiken sein Je nach Produkt und Entwicklungsplattform gezieltes Fuzzing Manuelles Testen nach Problemen

Z.B. Webapplikationen nach XSS und SQL Injection

28© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 29: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

SDL von Microsoft

heise Security Konferenz 2008, Jan Münther29

Security Training

Security Kickoff& Register with

SWI

Security DesignBest

Practices

Security Arch & Attack SurfaceReview

Use SecurityDevelopment

Tools &Security BestDev & Test Practices

Create Security

Docsand Tools

For Product

PrepareSecurity

ResponsePlan

Security Push

Pen Testing

FinalSecurity Review

Security Servicing &ResponseExecution

Requirements Design Implementation Verification ReleaseSupport

&Servicing

ThreatModeling

Security Development Lifecycles - TechDays

Page 30: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Release ( 1 / 2 )

Wichtig ist vor der Veröffentlichung: Planung für eventuelle Sicherheits-Vorfälle Rekonstruktion der Probleme

Geklärte Zuständigkeiten Wer nimmt Reports auf? Wer verifiziert Probleme? Wer behebt Probleme? Wer verifiziert die Behebung?

30© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 31: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Release ( 2 / 3 )

Beispiele für schlechtes Release Security Management WonderWare SCADA

2008-01-30: Initial contact email sent by to Wonderware setting the estimated publication date of the advisory to February 25th.2008-01-30: Contact email re-sent to Wonderware asking for a software security contact for Wonderware InTouch.2008-02-06: New email sent to Wonderware asking for a response and for a software security contact for Wonderware InTouch.2008-02-28: Core makes direct phone calls to Wonderware headquarters informing of the previous emails and requesting acknowledgment of the notification of a security vulnerability.2008-02-29: Vendor asks for a copy of the proof of concept code used to demonstrate the vulnerability.2008-03-03: Core sends proof-of-concept code written in Python.2008-03-05: Vendor asks for compiler tools required to use the PoC code.2008-03-05: Core sends a link to http://www.python.org

31© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 32: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Release ( 3 / 3 )

Beispiele für schlechtes Release Security Management

32© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Quelle: http://securityninja.co.uk/blog/?p=212

Page 33: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

SDL von Microsoft

heise Security Konferenz 2008, Jan Münther33

Security Training

Security Kickoff& Register with

SWI

Security DesignBest

Practices

Security Arch & Attack SurfaceReview

Use SecurityDevelopment

Tools &Security BestDev & Test Practices

Create Security

Docsand Tools

For Product

PrepareSecurity

ResponsePlan

Security Push

Pen Testing

FinalSecurity Review

Security Servicing &ResponseExecution

Requirements Design Implementation Verification ReleaseSupport

&Servicing

ThreatModeling

Security Development Lifecycles - TechDays

Page 34: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

Response

Baldige Antworten auf Meldungen zu Sicherheits-Problemen Kommunikation ist wichtig!

Researcher veröffentlichen eventuell ohne erfolgte Patches, wenn die Fehlerbehandlung vernachlässigt wird

Längere Antwort- und Patchzeiten sollten begründet werden können

Updates aktiv den Kunden zuführen Mails an Kunden

34© n.runs AG, Jan Münther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 35: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

35

Kontakt

Jan MuentherChief Technical Officer, Security

n.runs AG, Nassauer Straße 60, D-61440 Oberurselphone +49 6171 699-0, fax +49 6171699-199

[email protected], http://www.nruns.com

PGP-Fingerprint: 3291 81b8 8A59 6FB9 80F0 1120 2DD5 E13F F58D BAC0

... Offene Diskussion ... Fragen?

© n.runs AG, Jan Muenther, Apr 11, 2023

Security Development Lifecycles - TechDays

Page 36: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

PresentationsTechDays: www.techdays.chMSDN Events: http://www.microsoft.com/switzerland/msdn/de/presentationfinder.mspxMSDN Webcasts: http://www.microsoft.com/switzerland/msdn/de/finder/default.mspx

MSDN EventsMSDN Events: http://www.microsoft.com/switzerland/msdn/de/events/default.mspxSave the date: Tech•Ed 2009 Europe, 9-13 November 2009, Berlin

MSDN Flash (our by weekly newsletter)Subscribe: http://www.microsoft.com/switzerland/msdn/de/flash.mspx

MSDN Team BlogRSS: http://blogs.msdn.com/swiss_dpe_team/Default.aspx

Developer User Groups & CommunitiesMobile Devices: http://www.pocketpc.ch/Microsoft Solutions User Group Switzerland: www.msugs.ch.NET Managed User Group of Switzerland: www.dotmugs.chFoxPro User Group Switzerland: www.fugs.ch

Page 37: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

PresentationsTechDays: www.techdays.ch

TechNet EventsTechNet Events: http://technet.microsoft.com/de-ch/bb291010.aspx Save the date: Tech•Ed 2009 Europe, 9-13 November 2009, Berlin

TechNet Flash (our by weekly newsletter)Subscribe: http://technet.microsoft.com/de-ch/bb898852.aspx

Schweizer IT Professional und TechNet BlogRSS: http://blogs.technet.com/chitpro-de/

IT Professional User Groups & CommunitiesSwissITPro User Group: www.swissitpro.ch NT Anwendergruppe Schweiz: www.nt-ag.ch PASS (Professional Association for SQL Server): www.sqlpass.ch

Page 38: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language in any form by any means without the written permission of the Customer or n.runs AG. This document is under the copy write protection of n.runs AG

Save the date for tech·days next year!

7. – 8. April 2010Congress Center Basel

Page 39: This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in.

This text is for the internal use of the Customer and n.runs AG only. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language in any form by any means without the written permission of the Customer or n.runs AG. This document is under the copy write protection of n.runs AG

Classic Sponsoring Partners

Media Partner

Premium Sponsoring Partners