SlideShare a Scribd company logo
Full-stack Vulnerability Management at Scale &
The Future of Security Assessment
Eoin Keary
CTO edgescan™
Eoin Keary
CTO/Founder edgescan.com
OWASP Leader/Member/Ireland Founder
OWASP Global Board Member (2009-2015)
Web Risk
• Application Security
• Host Security
• Both / Either / Or
• It’s all software right.
Full-Stack!
Web Applications
App Server
SSL/TLS
Databases
Services
Operating Systems
Networks
Full Stack Security
Appsec VA
Threat
Intel
ENdPoint
One Problem – “silos of solutions”
2015 - Year in Review
2016 – First 100 days
• 83,000 impacted by breach at Gyft Inc
• 7,000,000 Minecraft
• 55,000,000 Records - COMELEC
• Hyatt data beach 250 hotels in 50 countries
• Neiman Marcus – 5,200 accounts
• TaxSlayer – 8,800 customers
Old Vulnerabilities
99.9% of the exploited vulnerabilities in had been
compromised more than a year after the associated CVE
was published. - “Zero day’s” are overrated.
Segregated Industry
• Developers Vs Security
• Admin Vs Developers
• Security Vs Admin
Divergence
Application Security Vs Vulnerability Analysis
Market Driven Separation Vs Risk
Convergence
Developer ←→ Security ←→ Admin
DevSecOps
AppSec + HostSec -> Fullstack
Agile Risk Model
Fail Early – Fail Often
“Push Left”
Continuous Security
“Keeping up” with development.
Assisting secure deployment.
Catching bugs early – Push Left.
Help ensure “change” is secure
Host/Server/Framework
> 30 billion Open source downloads 2015
90% of application code is framework
63%* don’t monitor component security
43%* don’t have open source policy
* http://www.sonatype.com/about/2014-open-source-software-development-survey
AppSec/Component Sec
• “If you're not doing component vulnerability
management you’re not doing appsec…”
– 90% of application code is framework
• “If you’re not doing full-stack you are not doing
security…”
– Hackers don’t give a S*#t
Security by Numbers
Likelihood of a vulnerability being discovered – Web Applications
Security by Numbers
Likelihood of a vulnerability being discovered (root cause) – Hosting Layer
Security by Numbers
edgescan Vulnerability Statistics Report 2015
Thoughts – Patching & Component
Management
“Of all the vulnerabilities discovered in 2015, 63% could
have been mitigated via patch, configuration and
component management combined.”
edgescan Vulnerability Statistics Report 2015
Problems?
Security in a constant state of flux.
“We Can” scale..
Automation of assessment
Depth
Coverage / Breadth
Rigour
SCALE!
Automation
Event Driven
Frequent/Scheduled
Build Build Build
Levelling the Playing Field
Automation!!
• Jenkins, Hudson, Bamboo
– Event driven
– Scheduled
– Incremental
• CHEF, Puppet, Cloud(immutable)
Sounds great…. but
Automation and Integration
• Automation can detect technical
vulnerabilities
– Misuse of code
– Coding Bugs
– Implementation Mistakes
Automation and Integration
• Automation can NOT detect Logical
vulnerabilities
– Business Logic
– Backdoors (E.g. Juniper, Fortinet)
– Provide Risk measurement
– Business Context
Accuracy/Information/Context
The “Anti-Scale”
Risk/ Business Context
Information Vs Data
Human Decisions and Intel
Technical constraints
-> Chokepoints
The “Anti-Scale”
New languages and programming methods
Growth of interpreted languages with no strong typing
(Javascript, Ruby,…) – “hurts” SAST
Few automated tools to test APIs / RESTful APIs
Testing Window is squeezed, manual testing is
doomed!?
Fighting The “Anti-Scale”
Accuracy
“Rule Tuning” – DAST & SAST
Build Fails!
White Noise Suppression
Real Security Vs “Best Practice”
Updates to Rules
Scale
“Delta Analysis”
Previous Vs Current
Changes
FP’s / FN’s
SAST Integration
• Analysis without Runtime - SAST
• More than just tooling
• Management Lifecycle
– Rule Management & Tuning / False Positives
• Cant cover Vuln Taxonomy –Blindspots
SAST Blindspots
• Storage and transmission of confidential
information
• Logic: Authentication, brute force attacks,
effectiveness of password reset etc.
• Logic: Privilege escalation and insufficient
authorization. Business Logic
• Data privacy: data retention and other compliance
(e.g. ensuring credit card numbers are masked
when displayed) - context
DAST Tool/Runtime Vulnerability
Management - Pitfalls
• Coverage Depth – can be shallow
• App Complexity - enemy
• Logical vulns – poor
• “Trial and error” testing
Vulnerability Assessment (Host)
• Easy to perform, Harder to manage
• First assessment
– higher work effort
– establish coverage (Reduce FN’s)
– Weed out FP’s
• Delta Analysis – Previous Vs Current
Component Security
Don’t forget….
• Unpredictable (Like Host Security).
• Requires frequent/continuous vigilance.
• Fix can be difficult and not backward
friendly
Delta-Metrics
• Vuln type - (CVE, OWASP, WASC,
SANS..)
• Tech Stack - (Code, F-work, Host etc)
• Layer - (App/Host)
• Root Cause - (Code, Patch, Config /
Deploy)
– Technical, Logical/Behavioural Vuln
Continuous Asset Profiling
• Detect Global Estate Changes
– New / Dead active IP’s
– Service Changes (Ports open / enabled).
– Perimeter Change – Firewall/ACL changes
– Rogue deployments
Fighting The “AntiScale” - Delta Analysis
Measure of change in a target environment.
Focusing on change in risk posture compared to last assess
-> Closed, New, False Positives
Fighting The “Anti-Scale”-
Testing like a Developer
Break testing into little pieces
Smoke / Incremental Vs full regression
testing
“Early and Often”
– Continuous, on demand
– Testing duration drives testing frequency
Business & Behavioural Testing
At scale:
Can be Difficult …..
Technical Security is covered by “tuned”
Automation…..
More Time to “Deep Dive”
“Future of Pentesting”
• Push towards Technical Vulnerabilities rooted
out using technical methods/services …..
• Push from time chasing Top 10 (SQLI, XSS,
etc) -To- Behavioural, Logical, Business flow
assessment.
• Constant flux requires constant assessment.
• Point-in-time is dead?
FIN
• We can scale but not everything is [easily]
scalable
• Discover Tech Vulns using Tech
• Consider full-stack, don’t let marketing dictate risk.
• Lets test to mirror DevOps
• Convergence is necessary to address issue.
@eoinkeary
eoin@bccriskadvisory.com

More Related Content

PDF
Vulnerability Management Program
PDF
Enterprise Vulnerability Management: Back to Basics
PDF
Open-Source Security Management and Vulnerability Impact Assessment
PDF
Is Your Vulnerability Management Program Irrelevant?
PPTX
Effective Vulnerability Management
PDF
Vulnerability Management V0.1
PDF
Is Your Vulnerability Management Program Keeping Pace With Risks?
PDF
Presentation on vulnerability analysis
Vulnerability Management Program
Enterprise Vulnerability Management: Back to Basics
Open-Source Security Management and Vulnerability Impact Assessment
Is Your Vulnerability Management Program Irrelevant?
Effective Vulnerability Management
Vulnerability Management V0.1
Is Your Vulnerability Management Program Keeping Pace With Risks?
Presentation on vulnerability analysis

What's hot (19)

PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
PDF
OSB130 Patch Management Best Practices
PPT
Secure by design and secure software development
PDF
Threat Modeling to Reduce Software Security Risk
PPTX
PHDays 9: new methods of Vulnerability Prioritization in Vulnerability Manage...
PPTX
Six Steps to SIEM Success
PPT
Software safety in embedded systems & software safety why, what, and how
PDF
Beyond the Scan: The Value Proposition of Vulnerability Assessment
PPTX
Secure Software Development Lifecycle
 
PPT
Concepts in Software Safety
PPT
Software Security Frameworks
PPTX
PPTX
Agile and Secure SDLC
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PDF
Secure Coding and Threat Modeling
PDF
SANS 2013 Critical Security Controls Survey
ODP
Basic of SSDLC
PPTX
SecPod Saner
PDF
Vulnerability and Patch Management
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
OSB130 Patch Management Best Practices
Secure by design and secure software development
Threat Modeling to Reduce Software Security Risk
PHDays 9: new methods of Vulnerability Prioritization in Vulnerability Manage...
Six Steps to SIEM Success
Software safety in embedded systems & software safety why, what, and how
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Secure Software Development Lifecycle
 
Concepts in Software Safety
Software Security Frameworks
Agile and Secure SDLC
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
Secure Coding and Threat Modeling
SANS 2013 Critical Security Controls Survey
Basic of SSDLC
SecPod Saner
Vulnerability and Patch Management
Ad

Similar to Full stack vulnerability management at scale (20)

PPTX
Skillful scalefull fullstack security in a state of constant flux
PPTX
Vulnerability management and threat detection by the numbers
PPTX
Vulnerability management and threat detection by the numbers
PPTX
Allianz Global CISO october-2015-draft
PPTX
Keeping the wolf from 1000 doors.
PPTX
Solnet dev secops meetup
PDF
Vulnerability Management: A Comprehensive Overview
PPTX
One login enemy at the gates
PDF
Re-Thinking BYOD Policy.pptx
PPTX
Online Gaming Cyber security and Threat Model
PPTX
Hide and seek - Attack Surface Management and continuous assessment.
PDF
What your scanner isn't telling you
PDF
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
Revolutionizing Advanced Threat Protection
KEY
Application Security Done Right
PPT
Qualys user group presentation - vulnerability management - November 2009 v1 3
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PPTX
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
PPTX
For Business's Sake, Let's focus on AppSec
Skillful scalefull fullstack security in a state of constant flux
Vulnerability management and threat detection by the numbers
Vulnerability management and threat detection by the numbers
Allianz Global CISO october-2015-draft
Keeping the wolf from 1000 doors.
Solnet dev secops meetup
Vulnerability Management: A Comprehensive Overview
One login enemy at the gates
Re-Thinking BYOD Policy.pptx
Online Gaming Cyber security and Threat Model
Hide and seek - Attack Surface Management and continuous assessment.
What your scanner isn't telling you
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Revolutionizing Advanced Threat Protection
Application Security Done Right
Qualys user group presentation - vulnerability management - November 2009 v1 3
Succeeding-Marriage-Cybersecurity-DevOps final
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
For Business's Sake, Let's focus on AppSec
Ad

More from Eoin Keary (20)

PPTX
IISF-March2023.pptx
PDF
Validation of vulnerabilities.pdf
PDF
Does a Hybrid model for vulnerability Management Make Sense.pdf
PDF
Edgescan 2022 Vulnerability Statistics Report
PPTX
Edgescan 2021 Vulnerability Stats Report
PDF
Edgescan vulnerability stats report 2020
PDF
edgescan vulnerability stats report (2018)
PDF
edgescan vulnerability stats report (2019)
PPTX
Vulnerability Intelligence - Standing Still in a world full of change
PPTX
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
PPTX
Security by the numbers
PPTX
Web security – everything we know is wrong cloud version
PPTX
Cybersecurity by the numbers
PPTX
Ebu class edgescan-2017
PPTX
14. html 5 security considerations
PPTX
04. xss and encoding
PPTX
03. sql and other injection module v17
PPTX
02. input validation module v5
PPTX
01. http basics v27
PPTX
00. introduction to app sec v3
IISF-March2023.pptx
Validation of vulnerabilities.pdf
Does a Hybrid model for vulnerability Management Make Sense.pdf
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2021 Vulnerability Stats Report
Edgescan vulnerability stats report 2020
edgescan vulnerability stats report (2018)
edgescan vulnerability stats report (2019)
Vulnerability Intelligence - Standing Still in a world full of change
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Security by the numbers
Web security – everything we know is wrong cloud version
Cybersecurity by the numbers
Ebu class edgescan-2017
14. html 5 security considerations
04. xss and encoding
03. sql and other injection module v17
02. input validation module v5
01. http basics v27
00. introduction to app sec v3

Recently uploaded (20)

PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
DOCX
Unit-3 cyber security network security of internet system
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
Internet___Basics___Styled_ presentation
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
international classification of diseases ICD-10 review PPT.pptx
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
SAP Ariba Sourcing PPT for learning material
Unit-3 cyber security network security of internet system
Design_with_Watersergyerge45hrbgre4top (1).ppt
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Job_Card_System_Styled_lorem_ipsum_.pptx
The Internet -By the Numbers, Sri Lanka Edition
Internet___Basics___Styled_ presentation
Slides PPTX World Game (s) Eco Economic Epochs.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
RPKI Status Update, presented by Makito Lay at IDNOG 10
An introduction to the IFRS (ISSB) Stndards.pdf
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Sims 4 Historia para lo sims 4 para jugar
WebRTC in SignalWire - troubleshooting media negotiation
INTERNET------BASICS-------UPDATED PPT PRESENTATION

Full stack vulnerability management at scale