Top Strategies to Capture Security
            Intelligence for Applications
            John B. Dickson, CISSP
            Denim Group, Ltd.




© Copyright 2012 Denim Group - All Rights Reserved
John Dickson
  • Principal of Denim Group
  • 15-year information security consultant
    background
  • Ex-Air Force security analyst at AFCERT
  • Trident Data Systems, KPMG, SecureLogix,
    and Denim Group information security
    consultant
  • Works with CIO’ s and CSO’s to build
    successful software security initiatives
  • Educates non-developer security professionals
    how to manage application risk




© Copyright 2012 Denim Group - All Rights Reserved   1
Denim Group Background
 • Professional services firm that builds & secures enterprise applications
         – External application assessments
                  • Web, mobile, and cloud
         – Software development lifecycle development (SDLC) consulting
 • Classroom and e-Learning for PCI compliance
 • Secure development services:
         – Secure .NET and Java application development
         – Post-assessment remediation
 • Deep penetration in Financial Services, Banking, Insurance,
   Healthcare and Defense market sectors
 • Customer base spans Fortune 500
 • Contributes to industry best practices through the Open Web
   Application Security Project (OWASP)

© Copyright 2012 Denim Group - All Rights Reserved                            2
Overview

 •     Today’s network security intelligence
 •     The target of choice – applications
 •     In application defenses
 •     Application logging blocking and tackling
 •     WAF’s and application IDS
 •     Virtual patching for web applications
 •     Conclusion




© Copyright 2012 Denim Group - All Rights Reserved   3
Today’s Network Security Intelligence
  • Key information from security-related events in the organization can
    be collected
           – The broader range the better
           – A variety of key security events on a multitude of devices
                   • Firewalls
                   • Remote access servers
                   • Critical servers (e.g., active directory)
  • Correlation and analysis capabilities are also mature
           – Context important to analysis
  • Network and server logging market maturing
           – Marketplace includes Security Event Managers (SEM), Security Information and
             Event Managers (SIEM), and Advanced Logging Products
           – May address certain compliance requirements like Sarbanes-Oxley




© Copyright 2012 Denim Group - All Rights Reserved                                          4
Today’s Network Security Intelligence



                                                     The very crowded
                                                     SIEM market




                                                     Source: Gartner Group, Magic Quadrant for
                                                     Security Information and Management, May 2012




© Copyright 2012 Denim Group - All Rights Reserved                                                   5
Today’s Network Security Intelligence
  • What do network defenders really need?
           – What, when, where, and how an event occurred
           – In a format that is external to the system or the application that created it
           – In a predictable format that is straightforward to import to SIEMs




© Copyright 2012 Denim Group - All Rights Reserved                                           6
The target of choice – applications

  • App level breaches accounted for 10% of breaches overall, but 54%
    for large organizations
  • Only 20% of all organizations were in compliance with PCI DSS
    Requirement 6
           – Develop and maintain secure systems and applications
  • Only 57% of large organizations were compliant with the PCI DSS
    Requirement 6
  • The average number of days a website was exposed to at least one
    serious vulnerability is 231 days
  • XSS was found in 55% of websites in 2011
                                                     Sources: Verizon Business System, 2012 Breach
                                                     Report and WhiteHat Security Report




© Copyright 2012 Denim Group - All Rights Reserved                                                   7
Application Vulnerability – Injection
                                   #1 in OWASP Top 10

 • “Getting into” a file system or database used to imply establishing a
   root session or a direct SQL connection

 • By exploiting applications, attackers can accomplish their goals
   without such direct access
         – The whole system trusts the application
         – Attackers will try to leverage that trust




© Copyright 2012 Denim Group - All Rights Reserved                         8
With normal input
 User Name:                  johndoe
 Password:                   myBirthday

 SELECT * FROM USERS WHERE USERNAME='johndoe' AND
 PASSWORD='myBirthday'




© Copyright 2012 Denim Group - All Rights Reserved   9
With malicious input
 User Name: johndoe
 Password:   '; DROP DATABASE; --

 SELECT * FROM USERS WHERE USERNAME='johndoe' AND PASSWORD=' ';
 DROP DATABASE; -- '




© Copyright 2012 Denim Group - All Rights Reserved                10
What Is It?

    •     Occurs when unfiltered user inputs are combined
          with static text and then sent to an interpreter.
    •     The interpreter then executes commands of the
          attackers choosing rather than the commands
          specified in the application.
    •     Very common application security flaw with potentially
          disastrous security implications.
    • We will focus on SQL injection because it is the
      most common.
    •     Other common injection flaws include OS Command,
          XML, and LDAP.



© Copyright 2012 Denim Group - All Rights Reserved                 11
In application defenses

  • A chasm exists between the development and operations/security
    communities
           – DevOps and Rugged Software Development changing that gap
  • Most software developers don’t build enterprise software with
    security in mind
           – Outside the largest banks and financial institutions, the security of software is
             less important (vs. features and functionality)
  • Most defensive coding focused on filtering malicious inputs
           – Very little focus on the fidelity of application logging to enhance security response
  • Most logging done to capture software debugging info
           – Developers want to understand how an application failed
           – Enhanced security information rarely a requirement for logging




© Copyright 2012 Denim Group - All Rights Reserved                                                   12
The very real state of in application defenses


  • Example application log #1




  logger.warn("Caught exception " + e);
  e.printStackTrace();




© Copyright 2012 Denim Group - All Rights Reserved   13
The very real state of in application defenses
  • Example application log #2



  logger.info("Failed login for user " + username + "
  with password '" + password + "'");




© Copyright 2012 Denim Group - All Rights Reserved      14
The very real state of in application defenses
  • Example application log #3



  logger.info("Order placed with credit card number "
  + creditCardNumber);




© Copyright 2012 Denim Group - All Rights Reserved      15
The very real state of in application defenses
  • What did we learn from these examples?
           – Developers might log information that actually creates more security
             headaches
           – Developers might not log information that is needed to analyze an attack
           – Developers might not log key security events in a human readable format
           – Developers might log information that is not in a format that is easily
             consumable by a SIEM (i.e., structured data)
           – Developers rarely ask security operations analysts
             for input on the types of logging needed
           – Developers rarely worry about the need to conduct
             trusted logging




© Copyright 2012 Denim Group - All Rights Reserved                                      16
Application logging blocking and tackling

 • Security operators must inject themselves into the design phase of
   development projects to articulate security event logging
   requirement.
 • Security operators need to better understand application-layer
   information and how it can help them better identify security events.
 • Developers need to increase the fidelity of the security event
   information the do send to logs.




© Copyright 2012 Denim Group - All Rights Reserved                         17
Application logging blocking and tackling

 • Increasing the fidelity of security event logging – HOW?
 • Need to focus on:
         –     What
         –     When
         –     Where
         –     How
 • Key events to log:
         – Authentication
         – Authorization
         – Access
                                                     Source: “How to Do Application Logging Right,”
                                                     Chuvakin, Anton, and Peterson, Gunnar.




© Copyright 2012 Denim Group - All Rights Reserved                                                    18
Which events to log
 •     Input validation failures
 •     Output validation failures
 •     Authentication successes and failures
 •     Authorization failures
 •     Session management failures
 •     Application errors and system events
 •     Application and related systems start-ups and shut-downs
 •     Use of higher-risk functionality
 •     Legal and other opt-ins

                                                     Source: OWASP Application Logging Cheat Sheet


© Copyright 2012 Denim Group - All Rights Reserved                                                   19
Which events attributes to log
 •     Log date and time
 •     Event date and time
 •     Interaction identifier
 •     Application address
 •     Service
 •     Window/form/page
 •     Code location
 •     Source
 •     User ID
 •     Type of event
                                                     Source: OWASP Application Logging Cheat Sheet


© Copyright 2012 Denim Group - All Rights Reserved                                                   20
Which events never to log
 •     Passwords
 •     Sensitive system attributes
 •     Source code
 •     Session identification values
 •     Sensitive business information
 •     Patient information (EPI)
 •     Bank account or payment card holder data
 •     HR, Payroll, M&A data or anything generally more sensitive than logs



                                                     Source: OWASP Application Logging Cheat Sheet


© Copyright 2012 Denim Group - All Rights Reserved                                                   21
Application logging blocking and tackling
  • Example application log #4



  logger.debug("Failed login for user: " +
  logEscape(username));




© Copyright 2012 Denim Group - All Rights Reserved   22
Application logging blocking and tackling
  • Example application log #5



  logger.warn("User " + logEscape(username) + "
  attempted to access document id " +
  logEscape(documentId) + " without sufficient
  permissions");
  ;



© Copyright 2012 Denim Group - All Rights Reserved   23
WAF’s and application IDS
 • Broad set of technologies that enable enhanced application-layer
   logging
 • Provide insight into Port 90/443 where most firewall don’t have info
 • Can block certain attack patterns at the application layer
 • Most WAF’s in production are not set in blocking mode
 • Block obvious web application vulnerabilities like XSS & SQL Injection
         – Less effective on business logic or authorization rules




© Copyright 2012 Denim Group - All Rights Reserved                          24
AppSensor
 • A conceptual framework that offers guidance to implement intrusion
   detection capabilities into existing application
 • Utilizes standard security controls and recommendations for
   automated response policies based upon detected behavior.
 • Identifies malicious users within the application and eliminate the
   threat by taking response actions.




© Copyright 2012 Denim Group - All Rights Reserved                       25
AppSensor

 • An attacker often requires numerous probes and attack attempts in
   order to locate an exploitable vulnerability within the application.
 • By using AppSensor, it is possible to identify and eliminate the threat
   of an attacker before they are able to successfully identify an
   exploitable flaw.




© Copyright 2012 Denim Group - All Rights Reserved                           26
AppSensor

 • Behavior examples (~50)

         –     2 Detection Points 2.1 RequestException
         –     2.1.1 RE1: Unexpected HTTP Command
         –     2.1.2 RE2: Attempt to Invoke Unsupported HTTP Method
         –     2.1.3 RE3: GET When Expecting POST
         –     2.1.4 RE4: POST When Expecting GET
         –     2.1.5 RE5: Additional/Duplicated Data in Request
         –     2.1.6 RE6: Data Missing from Request
         –     2.1.7 RE7: Unexpected Quantity of Characters in Parameter
         –     2.1.8 RE8: Unexpected Type of Characters in Parameter



© Copyright 2012 Denim Group - All Rights Reserved                         27
Virtual patching for web applications

  • Receives vulnerabilities from application vulnerability scanners
           – Dynamic or static analysis (source code) reviews
  • Creates “virtual patches” that are sent to WAFs and block a URL
           – Mod Security
           – F5
           – Imperva
  • Ecosystems being created to facilitate this process via certain open
    source tools
           – ThreadFix – Application vulnerability aggregation and management system
  • Enable defenders to block a vulnerable web page/application while
    developers are remediating source code




© Copyright 2012 Denim Group - All Rights Reserved                                     28
References

  • “How to Do Application Logging Right,” Chuvakin, Anton, and
    Peterson, Gunnar
           –    http://arctecgroup.net/pdf/howtoapplogging.pdf
  • From White Hat Website Security Statistics Report
           –    https://www.whitehatsec.com/assets/WPstats_summer12_12th.pdf
  • “Magic Quadrant for Security Information and Event Management,”
    Garter Group, May 2012
           –    http://www.gartner.com/technology/reprints.do?id=1-
                1AOG9W9&ct=120529&st=sb&elq=51f9879c322f4bc8b964591857bdafa1
  • 2012 Verizon Breach Report
  • App Sensor Project, Open Web Application Security Project
           –    https://www.owasp.org/index.php/OWASP_AppSensor_Project




© Copyright 2012 Denim Group - All Rights Reserved                             29
Contact Info
 John Dickson, CISSP & Principal
 (210) 572-4400
 john@denimgroup.com

 Twitter: @johnbdickson




© Copyright 2012 Denim Group - All Rights Reserved   30

More Related Content

PDF
Vulnerability Management In An Application Security World: AppSecDC
PPTX
How iOS and Android Handle Security Webinar
PDF
Vulnerability Management In An Application Security World
PDF
Smart Phones Dumb Apps
PDF
The Permanent Campaign
PDF
The Magic of Symbiotic Security
PDF
Benchmarking Web Application Scanners for YOUR Organization
PDF
Software Security for Project Managers: What Do You Need To Know?
Vulnerability Management In An Application Security World: AppSecDC
How iOS and Android Handle Security Webinar
Vulnerability Management In An Application Security World
Smart Phones Dumb Apps
The Permanent Campaign
The Magic of Symbiotic Security
Benchmarking Web Application Scanners for YOUR Organization
Software Security for Project Managers: What Do You Need To Know?

What's hot (20)

PDF
What Permissions Does Your Database User REALLY Need?
PDF
Social Networks and Security: What Your Teenager Likely Won't Tell You
PDF
The Need For Open Software Security Standards In A Mobile And Cloudy World
PDF
Software Security: Is OK Good Enough? OWASP AppSec USA 2011
PDF
Monitoring Attack Surface to Secure DevOps Pipelines
PPTX
Building a Mobile Security Program
PDF
Building Your Application Security Data Hub - OWASP AppSecUSA
PDF
ThreadFix 2.4: Maximizing the Impact of Your Application Security Resources
PDF
Do You Have a Scanner or Do You Have a Scanning Program? (AppSecEU 2013)
PDF
ThreadFix 2.2 Preview Webinar with Dan Cornell
PDF
The ThreadFix Ecosystem: Vendors, Volunteers, and Versions
PDF
SecDevOps: Development Tools for Security Pros
PDF
Managing Your Application Security Program with the ThreadFix Ecosystem
PPTX
Thread Fix Tour Presentation Final Final
PDF
Running a Software Security Program with Open Source Tools
PDF
Developing Secure Mobile Applications
PDF
ThreadFix 2.1 and Your Application Security Program
PDF
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
PDF
Using ThreadFix to Manage Application Vulnerabilities
PDF
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
What Permissions Does Your Database User REALLY Need?
Social Networks and Security: What Your Teenager Likely Won't Tell You
The Need For Open Software Security Standards In A Mobile And Cloudy World
Software Security: Is OK Good Enough? OWASP AppSec USA 2011
Monitoring Attack Surface to Secure DevOps Pipelines
Building a Mobile Security Program
Building Your Application Security Data Hub - OWASP AppSecUSA
ThreadFix 2.4: Maximizing the Impact of Your Application Security Resources
Do You Have a Scanner or Do You Have a Scanning Program? (AppSecEU 2013)
ThreadFix 2.2 Preview Webinar with Dan Cornell
The ThreadFix Ecosystem: Vendors, Volunteers, and Versions
SecDevOps: Development Tools for Security Pros
Managing Your Application Security Program with the ThreadFix Ecosystem
Thread Fix Tour Presentation Final Final
Running a Software Security Program with Open Source Tools
Developing Secure Mobile Applications
ThreadFix 2.1 and Your Application Security Program
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
Using ThreadFix to Manage Application Vulnerabilities
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Ad

Similar to Top Strategies to Capture Security Intelligence for Applications (20)

PDF
Skeletons in the Closet: Securing Inherited Applications
PDF
Jump Start Your Application Security Knowledge
PDF
The Permanent Campaign
PDF
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
PDF
Reducing Attack Surface in Budget Constrained Environments
PPTX
ISACA New York Metro April 30 2012
PDF
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
PPTX
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
PPTX
Phi 235 social media security users guide presentation
PDF
The Future of Software Security Assurance
PPTX
Forget cyber, it's all about AppSec
PPTX
Ulf mattsson webinar jun 7 2012 slideshare version
PDF
Preventing The Next Data Breach Through Log Management
PDF
Enumerating Enterprise Attack Surface
PDF
OWASP Top Ten in Practice
PDF
Cyber security series Application Security
PDF
Enumerating Enterprise Attack Surface
PDF
Structuring and Scaling an Application Security Program
PDF
Emerging Trends in Information Privacy and Security
PDF
Emerging Trends in Information Privacy and Security
Skeletons in the Closet: Securing Inherited Applications
Jump Start Your Application Security Knowledge
The Permanent Campaign
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
Reducing Attack Surface in Budget Constrained Environments
ISACA New York Metro April 30 2012
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Phi 235 social media security users guide presentation
The Future of Software Security Assurance
Forget cyber, it's all about AppSec
Ulf mattsson webinar jun 7 2012 slideshare version
Preventing The Next Data Breach Through Log Management
Enumerating Enterprise Attack Surface
OWASP Top Ten in Practice
Cyber security series Application Security
Enumerating Enterprise Attack Surface
Structuring and Scaling an Application Security Program
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Ad

More from Denim Group (20)

PDF
Long-term Impact of Log4J
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
PDF
Application Asset Management with ThreadFix
PDF
OWASP San Antonio Meeting 10/2/20
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
PDF
Using Collaboration to Make Application Vulnerability Management a Team Sport
PDF
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
PDF
Security Champions: Pushing Security Expertise to the Edges of Your Organization
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
PDF
An Updated Take: Threat Modeling for IoT Systems
PPTX
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
PDF
A New View of Your Application Security Program with Snyk and ThreadFix
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
PDF
AppSec in a World of Digital Transformation
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
PDF
AppSec in a World of Digital Transformation
PDF
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Long-term Impact of Log4J
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Application Asset Management with ThreadFix
OWASP San Antonio Meeting 10/2/20
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Using Collaboration to Make Application Vulnerability Management a Team Sport
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Security Champions: Pushing Security Expertise to the Edges of Your Organization
The As, Bs, and Four Cs of Testing Cloud-Native Applications
An Updated Take: Threat Modeling for IoT Systems
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
A New View of Your Application Security Program with Snyk and ThreadFix
Enabling Developers in Your Application Security Program With Coverity and Th...
AppSec in a World of Digital Transformation
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Enabling Developers in Your Application Security Program With Coverity and Th...
AppSec in a World of Digital Transformation
Assessing Business Operations Risk With Unified Vulnerability Management in T...

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
DOCX
search engine optimization ppt fir known well about this
PPTX
The various Industrial Revolutions .pptx
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
Configure Apache Mutual Authentication
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Zenith AI: Advanced Artificial Intelligence
1 - Historical Antecedents, Social Consideration.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Developing a website for English-speaking practice to English as a foreign la...
OpenACC and Open Hackathons Monthly Highlights July 2025
CloudStack 4.21: First Look Webinar slides
Final SEM Unit 1 for mit wpu at pune .pptx
Module 1.ppt Iot fundamentals and Architecture
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Convolutional neural network based encoder-decoder for efficient real-time ob...
Custom Battery Pack Design Considerations for Performance and Safety
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
search engine optimization ppt fir known well about this
The various Industrial Revolutions .pptx
Enhancing plagiarism detection using data pre-processing and machine learning...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Configure Apache Mutual Authentication
A contest of sentiment analysis: k-nearest neighbor versus neural network
sbt 2.0: go big (Scala Days 2025 edition)
How ambidextrous entrepreneurial leaders react to the artificial intelligence...

Top Strategies to Capture Security Intelligence for Applications

  • 1. Top Strategies to Capture Security Intelligence for Applications John B. Dickson, CISSP Denim Group, Ltd. © Copyright 2012 Denim Group - All Rights Reserved
  • 2. John Dickson • Principal of Denim Group • 15-year information security consultant background • Ex-Air Force security analyst at AFCERT • Trident Data Systems, KPMG, SecureLogix, and Denim Group information security consultant • Works with CIO’ s and CSO’s to build successful software security initiatives • Educates non-developer security professionals how to manage application risk © Copyright 2012 Denim Group - All Rights Reserved 1
  • 3. Denim Group Background • Professional services firm that builds & secures enterprise applications – External application assessments • Web, mobile, and cloud – Software development lifecycle development (SDLC) consulting • Classroom and e-Learning for PCI compliance • Secure development services: – Secure .NET and Java application development – Post-assessment remediation • Deep penetration in Financial Services, Banking, Insurance, Healthcare and Defense market sectors • Customer base spans Fortune 500 • Contributes to industry best practices through the Open Web Application Security Project (OWASP) © Copyright 2012 Denim Group - All Rights Reserved 2
  • 4. Overview • Today’s network security intelligence • The target of choice – applications • In application defenses • Application logging blocking and tackling • WAF’s and application IDS • Virtual patching for web applications • Conclusion © Copyright 2012 Denim Group - All Rights Reserved 3
  • 5. Today’s Network Security Intelligence • Key information from security-related events in the organization can be collected – The broader range the better – A variety of key security events on a multitude of devices • Firewalls • Remote access servers • Critical servers (e.g., active directory) • Correlation and analysis capabilities are also mature – Context important to analysis • Network and server logging market maturing – Marketplace includes Security Event Managers (SEM), Security Information and Event Managers (SIEM), and Advanced Logging Products – May address certain compliance requirements like Sarbanes-Oxley © Copyright 2012 Denim Group - All Rights Reserved 4
  • 6. Today’s Network Security Intelligence The very crowded SIEM market Source: Gartner Group, Magic Quadrant for Security Information and Management, May 2012 © Copyright 2012 Denim Group - All Rights Reserved 5
  • 7. Today’s Network Security Intelligence • What do network defenders really need? – What, when, where, and how an event occurred – In a format that is external to the system or the application that created it – In a predictable format that is straightforward to import to SIEMs © Copyright 2012 Denim Group - All Rights Reserved 6
  • 8. The target of choice – applications • App level breaches accounted for 10% of breaches overall, but 54% for large organizations • Only 20% of all organizations were in compliance with PCI DSS Requirement 6 – Develop and maintain secure systems and applications • Only 57% of large organizations were compliant with the PCI DSS Requirement 6 • The average number of days a website was exposed to at least one serious vulnerability is 231 days • XSS was found in 55% of websites in 2011 Sources: Verizon Business System, 2012 Breach Report and WhiteHat Security Report © Copyright 2012 Denim Group - All Rights Reserved 7
  • 9. Application Vulnerability – Injection #1 in OWASP Top 10 • “Getting into” a file system or database used to imply establishing a root session or a direct SQL connection • By exploiting applications, attackers can accomplish their goals without such direct access – The whole system trusts the application – Attackers will try to leverage that trust © Copyright 2012 Denim Group - All Rights Reserved 8
  • 10. With normal input User Name: johndoe Password: myBirthday SELECT * FROM USERS WHERE USERNAME='johndoe' AND PASSWORD='myBirthday' © Copyright 2012 Denim Group - All Rights Reserved 9
  • 11. With malicious input User Name: johndoe Password: '; DROP DATABASE; -- SELECT * FROM USERS WHERE USERNAME='johndoe' AND PASSWORD=' '; DROP DATABASE; -- ' © Copyright 2012 Denim Group - All Rights Reserved 10
  • 12. What Is It? • Occurs when unfiltered user inputs are combined with static text and then sent to an interpreter. • The interpreter then executes commands of the attackers choosing rather than the commands specified in the application. • Very common application security flaw with potentially disastrous security implications. • We will focus on SQL injection because it is the most common. • Other common injection flaws include OS Command, XML, and LDAP. © Copyright 2012 Denim Group - All Rights Reserved 11
  • 13. In application defenses • A chasm exists between the development and operations/security communities – DevOps and Rugged Software Development changing that gap • Most software developers don’t build enterprise software with security in mind – Outside the largest banks and financial institutions, the security of software is less important (vs. features and functionality) • Most defensive coding focused on filtering malicious inputs – Very little focus on the fidelity of application logging to enhance security response • Most logging done to capture software debugging info – Developers want to understand how an application failed – Enhanced security information rarely a requirement for logging © Copyright 2012 Denim Group - All Rights Reserved 12
  • 14. The very real state of in application defenses • Example application log #1 logger.warn("Caught exception " + e); e.printStackTrace(); © Copyright 2012 Denim Group - All Rights Reserved 13
  • 15. The very real state of in application defenses • Example application log #2 logger.info("Failed login for user " + username + " with password '" + password + "'"); © Copyright 2012 Denim Group - All Rights Reserved 14
  • 16. The very real state of in application defenses • Example application log #3 logger.info("Order placed with credit card number " + creditCardNumber); © Copyright 2012 Denim Group - All Rights Reserved 15
  • 17. The very real state of in application defenses • What did we learn from these examples? – Developers might log information that actually creates more security headaches – Developers might not log information that is needed to analyze an attack – Developers might not log key security events in a human readable format – Developers might log information that is not in a format that is easily consumable by a SIEM (i.e., structured data) – Developers rarely ask security operations analysts for input on the types of logging needed – Developers rarely worry about the need to conduct trusted logging © Copyright 2012 Denim Group - All Rights Reserved 16
  • 18. Application logging blocking and tackling • Security operators must inject themselves into the design phase of development projects to articulate security event logging requirement. • Security operators need to better understand application-layer information and how it can help them better identify security events. • Developers need to increase the fidelity of the security event information the do send to logs. © Copyright 2012 Denim Group - All Rights Reserved 17
  • 19. Application logging blocking and tackling • Increasing the fidelity of security event logging – HOW? • Need to focus on: – What – When – Where – How • Key events to log: – Authentication – Authorization – Access Source: “How to Do Application Logging Right,” Chuvakin, Anton, and Peterson, Gunnar. © Copyright 2012 Denim Group - All Rights Reserved 18
  • 20. Which events to log • Input validation failures • Output validation failures • Authentication successes and failures • Authorization failures • Session management failures • Application errors and system events • Application and related systems start-ups and shut-downs • Use of higher-risk functionality • Legal and other opt-ins Source: OWASP Application Logging Cheat Sheet © Copyright 2012 Denim Group - All Rights Reserved 19
  • 21. Which events attributes to log • Log date and time • Event date and time • Interaction identifier • Application address • Service • Window/form/page • Code location • Source • User ID • Type of event Source: OWASP Application Logging Cheat Sheet © Copyright 2012 Denim Group - All Rights Reserved 20
  • 22. Which events never to log • Passwords • Sensitive system attributes • Source code • Session identification values • Sensitive business information • Patient information (EPI) • Bank account or payment card holder data • HR, Payroll, M&A data or anything generally more sensitive than logs Source: OWASP Application Logging Cheat Sheet © Copyright 2012 Denim Group - All Rights Reserved 21
  • 23. Application logging blocking and tackling • Example application log #4 logger.debug("Failed login for user: " + logEscape(username)); © Copyright 2012 Denim Group - All Rights Reserved 22
  • 24. Application logging blocking and tackling • Example application log #5 logger.warn("User " + logEscape(username) + " attempted to access document id " + logEscape(documentId) + " without sufficient permissions"); ; © Copyright 2012 Denim Group - All Rights Reserved 23
  • 25. WAF’s and application IDS • Broad set of technologies that enable enhanced application-layer logging • Provide insight into Port 90/443 where most firewall don’t have info • Can block certain attack patterns at the application layer • Most WAF’s in production are not set in blocking mode • Block obvious web application vulnerabilities like XSS & SQL Injection – Less effective on business logic or authorization rules © Copyright 2012 Denim Group - All Rights Reserved 24
  • 26. AppSensor • A conceptual framework that offers guidance to implement intrusion detection capabilities into existing application • Utilizes standard security controls and recommendations for automated response policies based upon detected behavior. • Identifies malicious users within the application and eliminate the threat by taking response actions. © Copyright 2012 Denim Group - All Rights Reserved 25
  • 27. AppSensor • An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. • By using AppSensor, it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw. © Copyright 2012 Denim Group - All Rights Reserved 26
  • 28. AppSensor • Behavior examples (~50) – 2 Detection Points 2.1 RequestException – 2.1.1 RE1: Unexpected HTTP Command – 2.1.2 RE2: Attempt to Invoke Unsupported HTTP Method – 2.1.3 RE3: GET When Expecting POST – 2.1.4 RE4: POST When Expecting GET – 2.1.5 RE5: Additional/Duplicated Data in Request – 2.1.6 RE6: Data Missing from Request – 2.1.7 RE7: Unexpected Quantity of Characters in Parameter – 2.1.8 RE8: Unexpected Type of Characters in Parameter © Copyright 2012 Denim Group - All Rights Reserved 27
  • 29. Virtual patching for web applications • Receives vulnerabilities from application vulnerability scanners – Dynamic or static analysis (source code) reviews • Creates “virtual patches” that are sent to WAFs and block a URL – Mod Security – F5 – Imperva • Ecosystems being created to facilitate this process via certain open source tools – ThreadFix – Application vulnerability aggregation and management system • Enable defenders to block a vulnerable web page/application while developers are remediating source code © Copyright 2012 Denim Group - All Rights Reserved 28
  • 30. References • “How to Do Application Logging Right,” Chuvakin, Anton, and Peterson, Gunnar – http://arctecgroup.net/pdf/howtoapplogging.pdf • From White Hat Website Security Statistics Report – https://www.whitehatsec.com/assets/WPstats_summer12_12th.pdf • “Magic Quadrant for Security Information and Event Management,” Garter Group, May 2012 – http://www.gartner.com/technology/reprints.do?id=1- 1AOG9W9&ct=120529&st=sb&elq=51f9879c322f4bc8b964591857bdafa1 • 2012 Verizon Breach Report • App Sensor Project, Open Web Application Security Project – https://www.owasp.org/index.php/OWASP_AppSensor_Project © Copyright 2012 Denim Group - All Rights Reserved 29
  • 31. Contact Info John Dickson, CISSP & Principal (210) 572-4400 john@denimgroup.com Twitter: @johnbdickson © Copyright 2012 Denim Group - All Rights Reserved 30