SlideShare a Scribd company logo
An Introduction to Drupal Security
Security by Design:
Intros
Chris Teitzel
@technerdteitzel
/in/christeitzel
Chris has been working in Drupal for almost 8 years. During that time
he has worked on projects spanning the globe in front-end design,
e-commerce and security. His passion is for making technology
accessible to all skillsets.
Founder / CEO Lockr
2
Intros
Luke Probasco
Presenter Photo
@geetarluke
/in/lukeprobasco/
Manages Drupal business for Townsend Security. DrupalCon, Camp,
and Summit speaker. Security professional. Music enthusiast.
Drupal GM/Townsend Security
3
Intros
Mark Shropshire (shrop)
@shrop
/in/markshropshire
drupal.org
Mark brings 20 years of experience leading technical teams to his role
as Mediacurrent’s Open Source Security Lead. He is a leader in tech
community organizing, blogging, podcasting, and public speaking
within the Drupal community. Mark is passionate about architecting
systems to solve workflow problems and improve efficiencies using
open source software. He is also the maintainer of the Guardr Drupal
security module suite.
Mediacurrent Open Source Security Lead
4
Style Guide
Contents
Security by design in Drupal
Encrypting sensitive data
Key management (encryption & API)4
3
2
1
5
Site audit and security best practices
Resources to improve security5
Style Guide6 Takeaways
Security by design in Drupal1
7
Security by Design
8
Compliance, Security, and You
● Data discovery
● PCI DSS, HIPAA, GDPR, etc.
● Hosting and compliance
● See your security team for internal policies and controls
Security by Design
9
Keep Drupal Secure
● Keep Core and contrib modules up to date
● Use Drupal API
● Use version control
● Use social and enterprise login
● Use secure passwords
● Two factor authentication
● Log and review logs (watchdog and additional contrib)
● Don’t forget about infrastructure security
Security by Design
10
Security in Custom Modules
● Never trust user input
○ Filter plain text with check_plain() or t()
○ Filter HTML with filter_xss()
● Query properly
○ Do not concatenate values into db_query()
○ Instead use parameterized values %s %d %f %b
● Do not output db values directly (don’t trust user input)
● Protect user input - think before you save
Security by Design
Site audit and security best practices2
12
What is an audit?
● Review by someone not on the team
○ (internal or external)
● Review of software systems
● Review of supporting infrastructure
● Review of other related systems
Site audit and security best practices
13
Performing an audit
● Collect data manually and with tools
○ Analyze the data
○ Prioritize findings
● Eliminate false positives
● Complete usable report(s)
Site audit and security best practices
14
OWASP Top 10 Most Critical Web Application Security Risks
● Injection
● Weak authentication and session management
● XSS
● Insecure Direct Object References
● Security Misconfiguration
● Sensitive Data Exposure
● Missing Function Level Access Control
● Cross Site Request Forgery
● Using Components with Known Vulnerabilities
● Unvalidated Redirects and Forwards
Site audit and security best practices
15
Drupal audit tools
● Drupal Core reports
● Site Audit
● Security Review
● Sensitive Data
● Hacked!
● Coder
● Review of site config, users, permissions, and roles
● Manual code review
Site audit and security best practices
Encrypting sensitive data3
17
Encrypting Data in Drupal
● There is no native way to encrypt data in Drupal
● Compliance and risk management drive encryption
● Use encryption based on industry standards
● Use cryptographically strong keys - no passwords!
● See NIST Special Publication 800-57 for more info
Encrypting Sensitive Data
18
What Encryption Should I Use?
● Use AES, RSA, Triple DES, or other standard methods
● Beware of non-standard encryption
● Example: Homomorphic Encryption
○ Has not received wide review and acceptance
○ Cannot be certified by a standards body
○ Cannot achieve FIPS 140-2 validation
○ Compliance regulations prohibit its use
Encrypting Sensitive Data
Key management (encryption & API)4
20
McDonald's has acknowledged that a leaky API
exposed personal information for users of its
McDelivery mobile app in India. The flaw exposed
names, email addresses, phone numbers, home
addresses and sometimes the coordinates of
those homes, as well as links to social media profiles.
BankInfoSecurity.com
Key Management
21
Our review has shown that a threat actor obtained
access to a set of AWS keys and used them to access
the AWS API from an intermediate host with another,
smaller service provider in the US... Through the AWS
API, the actor created several instances in our
infrastructure to do reconnaissance.
OneLogin.com
Key Management
22
Payment
Gateways
Email
Marketing
SMTP Relays Authentication
Shipping Cloud Providers Encryption APIs
Key Management
Resources to improve security5
24
Encryption Modules
● Encrypt
● FieldEncrypt
● Real AES
● Encrypt User
● Encrypted Files
● Webform Encrypt
Resources to Improve Security
25
Key Management Modules
● Key
● Townsend Security Key Connection
● Lockr
Resources to Improve Security
26
Guardr
Guardr is a Drupal distribution with a combination of
modules and settings to enhance a Drupal application's
security and availability to meet enterprise security
requirements.
https://drupal.org/project/guardr
Resources to Improve Security
Takeaways6
Questions?
Thank you!
@Mediacurrent

More Related Content

PDF
20171106 - Privacy Design Lab - LINDDUN
PPTX
Down The Rabbit Hole, From Networker to Security Professional
PPTX
Python-Assisted Red-Teaming Operation
PPTX
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
PPTX
Maltego Webinar Slides
PPTX
Malware Analysis
PPTX
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
PDF
Hacking Cracking 2008
20171106 - Privacy Design Lab - LINDDUN
Down The Rabbit Hole, From Networker to Security Professional
Python-Assisted Red-Teaming Operation
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
Maltego Webinar Slides
Malware Analysis
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Hacking Cracking 2008

What's hot (20)

PDF
Secure Software Design for Data Privacy
PPTX
IOT Security FUN-damental
PDF
How To Avoid The Top Ten Software Security Flaws
PPTX
The Making of a simple Cyber Threat Intelligence Gathering System
PPTX
Bsides 2019 - Intelligent Threat Hunting
PPTX
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
PDF
Threat Intelligence Is Like Three Day Potty Training
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PPTX
Berkarir di Cyber Security
PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
PDF
TTPs for Threat hunting In Oil Refineries
PPTX
How to assign a CVE to yourself?
PDF
Cyber intelligence for corporate security
PDF
PPTX
Threat hunting - Every day is hunting season
PPTX
2016 ISSA Conference Threat Intelligence Keynote philA
PPTX
Cyber threat intelligence: maturity and metrics
PPTX
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
PDF
The Rise of the Purple Team
PDF
Enfilade: Tool to Detect Infections in MongoDB Instances
Secure Software Design for Data Privacy
IOT Security FUN-damental
How To Avoid The Top Ten Software Security Flaws
The Making of a simple Cyber Threat Intelligence Gathering System
Bsides 2019 - Intelligent Threat Hunting
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Threat Intelligence Is Like Three Day Potty Training
Threat Hunting - Moving from the ad hoc to the formal
Berkarir di Cyber Security
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
TTPs for Threat hunting In Oil Refineries
How to assign a CVE to yourself?
Cyber intelligence for corporate security
Threat hunting - Every day is hunting season
2016 ISSA Conference Threat Intelligence Keynote philA
Cyber threat intelligence: maturity and metrics
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
The Rise of the Purple Team
Enfilade: Tool to Detect Infections in MongoDB Instances
Ad

Similar to Security by Design: An Introduction to Drupal Security (20)

KEY
Drupal Security Intro
PPTX
Drupal Security: What You Need to Know
PDF
Doing Drupal security right
PPTX
Security is not a feature
PDF
Doing Drupal security right from Drupalcon London
KEY
개발자가 알아야 할 보안
PDF
Drupal Security from Drupalcamp Bratislava
PPTX
Web-Security-Protecting-Your-Digital-Assets.pptx
PPTX
Building a Security culture at Skyscanner 2016
PDF
Stop expecting magic fairy dust: Make apps secure by design
PPTX
Presentation 10.pptx
PPTX
So Your Company Hired A Pentester
PDF
Ab cs of software security
PDF
Basic Security for Digital Companies - #MarketersUnbound (2014)
PDF
Attacking Drupal
PPT
Security in Mind
PDF
2013 - Mark story - Avoiding the Owasp
PDF
Drupal Security Seminar
PDF
Web Security
PDF
How to secure web applications
Drupal Security Intro
Drupal Security: What You Need to Know
Doing Drupal security right
Security is not a feature
Doing Drupal security right from Drupalcon London
개발자가 알아야 할 보안
Drupal Security from Drupalcamp Bratislava
Web-Security-Protecting-Your-Digital-Assets.pptx
Building a Security culture at Skyscanner 2016
Stop expecting magic fairy dust: Make apps secure by design
Presentation 10.pptx
So Your Company Hired A Pentester
Ab cs of software security
Basic Security for Digital Companies - #MarketersUnbound (2014)
Attacking Drupal
Security in Mind
2013 - Mark story - Avoiding the Owasp
Drupal Security Seminar
Web Security
How to secure web applications
Ad

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Machine Learning_overview_presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPT
Teaching material agriculture food technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
Spectroscopy.pptx food analysis technology
Assigned Numbers - 2025 - Bluetooth® Document
A comparative analysis of optical character recognition models for extracting...
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Digital-Transformation-Roadmap-for-Companies.pptx
Programs and apps: productivity, graphics, security and other tools
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine Learning_overview_presentation.pptx
MYSQL Presentation for SQL database connectivity
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Teaching material agriculture food technology
Unlocking AI with Model Context Protocol (MCP)
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation

Security by Design: An Introduction to Drupal Security

  • 1. An Introduction to Drupal Security Security by Design:
  • 2. Intros Chris Teitzel @technerdteitzel /in/christeitzel Chris has been working in Drupal for almost 8 years. During that time he has worked on projects spanning the globe in front-end design, e-commerce and security. His passion is for making technology accessible to all skillsets. Founder / CEO Lockr 2
  • 3. Intros Luke Probasco Presenter Photo @geetarluke /in/lukeprobasco/ Manages Drupal business for Townsend Security. DrupalCon, Camp, and Summit speaker. Security professional. Music enthusiast. Drupal GM/Townsend Security 3
  • 4. Intros Mark Shropshire (shrop) @shrop /in/markshropshire drupal.org Mark brings 20 years of experience leading technical teams to his role as Mediacurrent’s Open Source Security Lead. He is a leader in tech community organizing, blogging, podcasting, and public speaking within the Drupal community. Mark is passionate about architecting systems to solve workflow problems and improve efficiencies using open source software. He is also the maintainer of the Guardr Drupal security module suite. Mediacurrent Open Source Security Lead 4
  • 5. Style Guide Contents Security by design in Drupal Encrypting sensitive data Key management (encryption & API)4 3 2 1 5 Site audit and security best practices Resources to improve security5 Style Guide6 Takeaways
  • 6. Security by design in Drupal1
  • 8. 8 Compliance, Security, and You ● Data discovery ● PCI DSS, HIPAA, GDPR, etc. ● Hosting and compliance ● See your security team for internal policies and controls Security by Design
  • 9. 9 Keep Drupal Secure ● Keep Core and contrib modules up to date ● Use Drupal API ● Use version control ● Use social and enterprise login ● Use secure passwords ● Two factor authentication ● Log and review logs (watchdog and additional contrib) ● Don’t forget about infrastructure security Security by Design
  • 10. 10 Security in Custom Modules ● Never trust user input ○ Filter plain text with check_plain() or t() ○ Filter HTML with filter_xss() ● Query properly ○ Do not concatenate values into db_query() ○ Instead use parameterized values %s %d %f %b ● Do not output db values directly (don’t trust user input) ● Protect user input - think before you save Security by Design
  • 11. Site audit and security best practices2
  • 12. 12 What is an audit? ● Review by someone not on the team ○ (internal or external) ● Review of software systems ● Review of supporting infrastructure ● Review of other related systems Site audit and security best practices
  • 13. 13 Performing an audit ● Collect data manually and with tools ○ Analyze the data ○ Prioritize findings ● Eliminate false positives ● Complete usable report(s) Site audit and security best practices
  • 14. 14 OWASP Top 10 Most Critical Web Application Security Risks ● Injection ● Weak authentication and session management ● XSS ● Insecure Direct Object References ● Security Misconfiguration ● Sensitive Data Exposure ● Missing Function Level Access Control ● Cross Site Request Forgery ● Using Components with Known Vulnerabilities ● Unvalidated Redirects and Forwards Site audit and security best practices
  • 15. 15 Drupal audit tools ● Drupal Core reports ● Site Audit ● Security Review ● Sensitive Data ● Hacked! ● Coder ● Review of site config, users, permissions, and roles ● Manual code review Site audit and security best practices
  • 17. 17 Encrypting Data in Drupal ● There is no native way to encrypt data in Drupal ● Compliance and risk management drive encryption ● Use encryption based on industry standards ● Use cryptographically strong keys - no passwords! ● See NIST Special Publication 800-57 for more info Encrypting Sensitive Data
  • 18. 18 What Encryption Should I Use? ● Use AES, RSA, Triple DES, or other standard methods ● Beware of non-standard encryption ● Example: Homomorphic Encryption ○ Has not received wide review and acceptance ○ Cannot be certified by a standards body ○ Cannot achieve FIPS 140-2 validation ○ Compliance regulations prohibit its use Encrypting Sensitive Data
  • 20. 20 McDonald's has acknowledged that a leaky API exposed personal information for users of its McDelivery mobile app in India. The flaw exposed names, email addresses, phone numbers, home addresses and sometimes the coordinates of those homes, as well as links to social media profiles. BankInfoSecurity.com Key Management
  • 21. 21 Our review has shown that a threat actor obtained access to a set of AWS keys and used them to access the AWS API from an intermediate host with another, smaller service provider in the US... Through the AWS API, the actor created several instances in our infrastructure to do reconnaissance. OneLogin.com Key Management
  • 22. 22 Payment Gateways Email Marketing SMTP Relays Authentication Shipping Cloud Providers Encryption APIs Key Management
  • 23. Resources to improve security5
  • 24. 24 Encryption Modules ● Encrypt ● FieldEncrypt ● Real AES ● Encrypt User ● Encrypted Files ● Webform Encrypt Resources to Improve Security
  • 25. 25 Key Management Modules ● Key ● Townsend Security Key Connection ● Lockr Resources to Improve Security
  • 26. 26 Guardr Guardr is a Drupal distribution with a combination of modules and settings to enhance a Drupal application's security and availability to meet enterprise security requirements. https://drupal.org/project/guardr Resources to Improve Security