SlideShare a Scribd company logo
Application Security
Last Line of Defense
Narudom Roongsiriwong, CISSP
ASEAN IT Security Conference 2016
Critical C-Suite Security Knowledge Conference
July 27, 2016
The Westin Grande Sukhumvit, Bangkok, Thailand
About Me
• Head of IT Security and
Solution Architecture,
Kiatnakin Bank PLC (KKP)
• Consulting Team Member
for National e-Payment
project
• Consultant for OWASP
Thailand Chapter
• Committee Member of
Cloud Security Alliance
(CSA), Thailand Chapter.
narudom.roongsiriwong@owasp.org
Internet Lines of Defense
Source: IBM Software Group, Rational Software
Does Firewall Really Prevent the Intrusion?
Source: Jeremiah Grossman, BlackHat 2001
Does SSL/TLS Really Prevent the Intrusion?
Source: Jeremiah Grossman, BlackHat 2001
Attackers have shifted their focus to target
applications.
Improving user
accessibility and
ease of use also
increases ease of
access for
attackers.
Application
exploit toolkits
are increasingly
available on the
attack
marketplace.
Many major
breaches in 2015
targeted
applications.
Source: Cyber Risk Report 2016 highlights, Hewlett Packard Enterprise
Most Web And Mobile Apps Contain Security
Weaknesses that Can Open the Door to
Attackers.
Source: Cyber Risk Report 2016 highlights, Hewlett Packard Enterprise
Key Takeaways for Application Security
Source: Cyber Risk Report 2016 highlights, Hewlett Packard Enterprise
What Are Application Security Risks?
Source: OWASP: Open Web Application Security Project
www.owasp.org
OWASP Top 10 2013 Risk
Source: OWASP: Open Web Application Security Project
Security controls
cannot deal with
broken business logic
such as A2, A4 and A7
Software
weaknesses
reduction down to
zero is possible
Reduce Security Weaknesses vs Increase
Security Controls
So Where Do You Go from Here?
OWASP Top 10 Proactive Controls
C1: Verify for Security Early and Often
C2: Parameterize Queries
C3: Encode Data
C4: Validate All Inputs
C5: Implement Identity and
Authentication Controls
C6: Implement Appropriate Access
Controls
C7: Protect Data
C8: Implement Logging and Intrusion
Detection
C9: Leverage Security Frameworks and
Libraries
C10: Error and Exception Handling
https://www.owasp.org/index.php/OWASP_Proactive_Controls
Microsoft Security Development Lifecycle
https://www.microsoft.com/en-us/sdl
Software Assurance Maturity Model
Source: OWASP’s Software Assurance Maturity Model (OpenSAMM)
https://www.owasp.org/index.php/OpenSamm
Application Security: Last Line of Defense
Application Security: Last Line of Defense

More Related Content

PDF
Secure Software Development Adoption Strategy
PDF
Securing the Internet from Cyber Criminals
PDF
Top 10 Bad Coding Practices Lead to Security Problems
PDF
Application Security Verification Standard Project
PDF
Secure Code Review 101
PDF
OWASP Top 10 Proactive Control 2016 (C5-C10)
PDF
Coding Security: Code Mania 101
PDF
OWASP Top 10 A4 – Insecure Direct Object Reference
Secure Software Development Adoption Strategy
Securing the Internet from Cyber Criminals
Top 10 Bad Coding Practices Lead to Security Problems
Application Security Verification Standard Project
Secure Code Review 101
OWASP Top 10 Proactive Control 2016 (C5-C10)
Coding Security: Code Mania 101
OWASP Top 10 A4 – Insecure Direct Object Reference

What's hot (20)

PDF
How Good Security Architecture Saves Corporate Workers from COVID-19
PDF
Embedded System Security: Learning from Banking and Payment Industry
PPT
Risky project Enterprise
PDF
Threat Intelligence Is Like Three Day Potty Training
PPT
3.Secure Design Principles And Process
PDF
How To Avoid The Top Ten Software Security Flaws
PDF
Secure Code Reviews
PPTX
OWASP Mobile TOP 10 2014
PDF
Making Threat Intelligence Actionable Final
PPTX
Career In Information security
PDF
Implementing An Automated Incident Response Architecture
PPTX
Secure coding practices
PPTX
The Making of a simple Cyber Threat Intelligence Gathering System
PDF
Cyber intelligence for corporate security
PDF
Web Application Penetration Testing
PDF
Application Security - Your Success Depends on it
PDF
Achieving Defendable Architectures Via Threat Driven Methodologies
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PDF
Westjets Security Architecture Made Simple We Finally Got It Right
PPTX
Understanding Application Threat Modelling & Architecture
How Good Security Architecture Saves Corporate Workers from COVID-19
Embedded System Security: Learning from Banking and Payment Industry
Risky project Enterprise
Threat Intelligence Is Like Three Day Potty Training
3.Secure Design Principles And Process
How To Avoid The Top Ten Software Security Flaws
Secure Code Reviews
OWASP Mobile TOP 10 2014
Making Threat Intelligence Actionable Final
Career In Information security
Implementing An Automated Incident Response Architecture
Secure coding practices
The Making of a simple Cyber Threat Intelligence Gathering System
Cyber intelligence for corporate security
Web Application Penetration Testing
Application Security - Your Success Depends on it
Achieving Defendable Architectures Via Threat Driven Methodologies
Wfh security risks - Ed Adams, President, Security Innovation
Westjets Security Architecture Made Simple We Finally Got It Right
Understanding Application Threat Modelling & Architecture
Ad

Viewers also liked (20)

PDF
AnyID: Security Point of View
PPTX
Payment Card System Overview
PDF
Secure PHP Coding
ODP
Unlock Security Insight from Machine Data
PPT
Risk Management in Project Management
PDF
AnyID and Privacy
PDF
Database Firewall with Snort
PDF
Docker London: Container Security
PPTX
Docker and Microsoft - Windows Server 2016 Technical Deep Dive
PPTX
Business continuity & disaster recovery planning (BCP & DRP)
PPTX
Docker 101 - Nov 2016
PDF
Web Security attacks and defense
PDF
My AWS production stack with Docker, ECS, CloudFormation and other services
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
PPTX
Handling Non Functional Requirements on an Agile Project
PDF
Non-Functional Requirements
PPTX
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
PDF
DWS16 - Smart city forum - Niels De Schutter, Atos
PPTX
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
PPTX
Web application security: how to start?
AnyID: Security Point of View
Payment Card System Overview
Secure PHP Coding
Unlock Security Insight from Machine Data
Risk Management in Project Management
AnyID and Privacy
Database Firewall with Snort
Docker London: Container Security
Docker and Microsoft - Windows Server 2016 Technical Deep Dive
Business continuity & disaster recovery planning (BCP & DRP)
Docker 101 - Nov 2016
Web Security attacks and defense
My AWS production stack with Docker, ECS, CloudFormation and other services
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Handling Non Functional Requirements on an Agile Project
Non-Functional Requirements
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
DWS16 - Smart city forum - Niels De Schutter, Atos
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Web application security: how to start?
Ad

Similar to Application Security: Last Line of Defense (20)

PPTX
Application Security-Understanding The Horizon
PDF
Top 10 Web App Security Risks
PPT
六合彩香港-六合彩
PPTX
Web Application Security
PDF
Web App Security: Top Threats and How to Protect Your App.pdf
PPTX
Walls of Steel, Doors of Wood - Relevance of Application Security
PDF
DataMindsConnect2018_SECDEVOPS
PPTX
FireHost Webinar: Protect Your Application With Intelligent Security
PDF
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
PPTX
Intelligence on the Intractable Problem of Software Security
PPTX
Andrew Useckas Csa presentation hacking custom webapps 4 3
PPTX
Web Security Overview
PDF
Application security testing an integrated approach
PDF
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
PDF
Security Implications of the Cloud
PPTX
Web_Appication_Security_Training_For_Developers.pptx
PDF
Review Paper ( Research Articles )
PDF
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
PDF
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
PPTX
For Business's Sake, Let's focus on AppSec
Application Security-Understanding The Horizon
Top 10 Web App Security Risks
六合彩香港-六合彩
Web Application Security
Web App Security: Top Threats and How to Protect Your App.pdf
Walls of Steel, Doors of Wood - Relevance of Application Security
DataMindsConnect2018_SECDEVOPS
FireHost Webinar: Protect Your Application With Intelligent Security
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
Intelligence on the Intractable Problem of Software Security
Andrew Useckas Csa presentation hacking custom webapps 4 3
Web Security Overview
Application security testing an integrated approach
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Security Implications of the Cloud
Web_Appication_Security_Training_For_Developers.pptx
Review Paper ( Research Articles )
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
For Business's Sake, Let's focus on AppSec

More from Narudom Roongsiriwong, CISSP (11)

PDF
Biometric Authentication.pdf
PDF
Security Shift Leftmost - Secure Architecture.pdf
PDF
Secure Design: Threat Modeling
PDF
Security Patterns for Software Development
PDF
Secure Software Design for Data Privacy
PDF
Blockchain and Cryptocurrency for Dummies
PPTX
National Digital ID Platform Technical Forum
PDF
Secure Your Encryption with HSM
PDF
Biometric Authentication.pdf
Security Shift Leftmost - Secure Architecture.pdf
Secure Design: Threat Modeling
Security Patterns for Software Development
Secure Software Design for Data Privacy
Blockchain and Cryptocurrency for Dummies
National Digital ID Platform Technical Forum
Secure Your Encryption with HSM

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Big Data Technologies - Introduction.pptx
PPT
Teaching material agriculture food technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced Soft Computing BINUS July 2025.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Spectral efficient network and resource selection model in 5G networks
The AUB Centre for AI in Media Proposal.docx
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Big Data Technologies - Introduction.pptx
Teaching material agriculture food technology
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Per capita expenditure prediction using model stacking based on satellite ima...
“AI and Expert System Decision Support & Business Intelligence Systems”
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Application Security: Last Line of Defense

  • 1. Application Security Last Line of Defense Narudom Roongsiriwong, CISSP ASEAN IT Security Conference 2016 Critical C-Suite Security Knowledge Conference July 27, 2016 The Westin Grande Sukhumvit, Bangkok, Thailand
  • 2. About Me • Head of IT Security and Solution Architecture, Kiatnakin Bank PLC (KKP) • Consulting Team Member for National e-Payment project • Consultant for OWASP Thailand Chapter • Committee Member of Cloud Security Alliance (CSA), Thailand Chapter. narudom.roongsiriwong@owasp.org
  • 3. Internet Lines of Defense Source: IBM Software Group, Rational Software
  • 4. Does Firewall Really Prevent the Intrusion? Source: Jeremiah Grossman, BlackHat 2001
  • 5. Does SSL/TLS Really Prevent the Intrusion? Source: Jeremiah Grossman, BlackHat 2001
  • 6. Attackers have shifted their focus to target applications. Improving user accessibility and ease of use also increases ease of access for attackers. Application exploit toolkits are increasingly available on the attack marketplace. Many major breaches in 2015 targeted applications. Source: Cyber Risk Report 2016 highlights, Hewlett Packard Enterprise
  • 7. Most Web And Mobile Apps Contain Security Weaknesses that Can Open the Door to Attackers. Source: Cyber Risk Report 2016 highlights, Hewlett Packard Enterprise
  • 8. Key Takeaways for Application Security Source: Cyber Risk Report 2016 highlights, Hewlett Packard Enterprise
  • 9. What Are Application Security Risks? Source: OWASP: Open Web Application Security Project
  • 11. OWASP Top 10 2013 Risk Source: OWASP: Open Web Application Security Project
  • 12. Security controls cannot deal with broken business logic such as A2, A4 and A7 Software weaknesses reduction down to zero is possible Reduce Security Weaknesses vs Increase Security Controls
  • 13. So Where Do You Go from Here?
  • 14. OWASP Top 10 Proactive Controls C1: Verify for Security Early and Often C2: Parameterize Queries C3: Encode Data C4: Validate All Inputs C5: Implement Identity and Authentication Controls C6: Implement Appropriate Access Controls C7: Protect Data C8: Implement Logging and Intrusion Detection C9: Leverage Security Frameworks and Libraries C10: Error and Exception Handling https://www.owasp.org/index.php/OWASP_Proactive_Controls
  • 15. Microsoft Security Development Lifecycle https://www.microsoft.com/en-us/sdl
  • 16. Software Assurance Maturity Model Source: OWASP’s Software Assurance Maturity Model (OpenSAMM) https://www.owasp.org/index.php/OpenSamm