SlideShare a Scribd company logo
SECURITY GUIDELINES
ARE WE RIGHTLY SAFEGUARDING OUR CUSTOMER ENVIRONMENTS ?
Karthik Sagar P
Technology Evangelist
Karthiksagar.p@outlook.com
“Every program has at least two purposes: the one for which it was written, and another for
which it wasn't.”
-Alan J. Perlis
SAMPLE
Let see an example
EVAL ()
• eval() like functions takes string argument and
• evaluate those as source code
• var x = req.body.x;
• var y = req.body.y;
• var sum = eval(a + "+" +
b);what if attacker fills 'x' with:
some.super.class.wipe.the.database('now’);
LOL :)
WHY APPLICATION VULNERABILITIES
OCCUR
SECURITY GAP
Security Professionals Don’t
Know The Applications
Application Developers and QA
Professionals Don’t Know Security
The Web Application
Security Gap
“As a Network Security
Professional, I don’t know how
my companies web applications
are supposed to work so I deploy
a protective solution…but don’t
know if it’s protecting what it’s
supposed to.”
“As an Application Developer, I can build
great features and functions while
meeting deadlines, but I don’t know how
to develop my web application with
security as a feature.”
VULNERABILITIES
Platform
Administration
Application
Known Vulnerabilities
Extension Checking
Common File Checks
Data Extension Checking
Backup Checking
Directory Enumeration
Path Truncation
Hidden Web Paths
Forceful Browsing
Application Mapping
Cookie Manipulation
Custom Application Scripting
Parameter Manipulation
Reverse Directory Transversal
Brute Force
Application Mapping
Cookie Poisoning/Theft
Buffer Overflow scripting
Application vulnerabilities occur in multiple areas.
HOW TO SECURE APPLICATIONS
WHAT I SAY !
The best way to secure anything is to learn how someone can break it
HOW?
• Incorporating security into lifecycle
• Integrate security into application requirements
• Including information security professionals in software
architecture/design review
• Security APIs & libraries (e.g. ESAPI, Validator, etc.) when
possible
• Threat modeling
• Web application vulnerability assessment tools (VAPT)
SECURE YOUR DB
DB SECURITY
• User Access Management –Authentication
• User Rights Management – Authorization
• Auditing
• Environmental and Process Control
• Encryption
• Network Encryption
• Network Filter
• Binding IP Addresses
• Running in VPNs
• Dedicated OS User Account.
• File System Permissions
• Query Injection
• Physical Access Controls
Environment & Processes
SSL Encryption for DB
communication
ENVIRONMENT &
PROCESSES
•Network Filter Binding IP
Addresses
Running in
VPNs
Dedicated OS
User Account.
File System
Permissions
Query Injection
Physical Access
Controls
MY ARCHITECTURE
SSL
Web
Application
Mobile
Application
Firewall
Port No’s:
83 & 2011
Public IP
App
Server
Port :83
Port :88
Public IP – Static
IP
Web
Server
Port :2011
Public IP – Static
IP
Port :2016
Static IP 1
Static IP 3
DB Server
DB
Node
Web Server
Port:271
8
SSL
Bind IP :Static IP
1
Traffic Log
Customer Environment
EDUCATE
Developers
• Software
security best
practices
Security
Professionals
• Software
development
• Software coding
best practices
Testers
• Methods for
identifying
vulnerabilitie
s
Executives, System
Owners, etc
Understanding the
risk and why they
should be concerned
Who is your Security
Owner ?
CREATING THE RISK ASSESSMENT
RESIDUAL RISK TABLES
PRACTISE
• Update your DB and application versions
• Always ensure to move your traffic through firewall
• Identify security owner for your applications
• Test for what it has not been developed for
• Create rules in the firewall
• Educate your network administrator
• Prepare Risk Assessment blog
QUESTION AND ANSWERS ?
THANK YOU
REFERENCES
• https://www.slideshare.net/LiranTal1/nodejs-security-done-right-tips-and-tricks-they-wont-teach-
you-in-
school?utm_source=slideshow&utm_medium=ssemail&utm_campaign=download_notification
• https://docs.mongodb.com/manual/security/
BACKUP SLIDES
Platform
Known
Vulnerabilities
PLATFORM
• Known vulnerabilities can be exploited
immediately with a minimum amount of
skill or experience – “script kiddies”
• Most easily defendable of all web
vulnerabilities
• MUST have streamlined patching
procedures
Administration
Extension Checking
Common File Checks
Data Extension Checking
Backup Checking
Directory Enumeration
Path Truncation
Hidden Web Paths
Forceful Browsing
• Less easily corrected than known issues
• Require increased awareness
• More than just configuration, must be aware
of security flaws in actual content
• Remnant files can reveal applications and
versions in use
• Backup files can reveal source code and
database connection strings
ADMINISTRATION
• Common coding techniques do not necessarily include
security
• Input is assumed to be valid, but not tested
• Unexamined input from a browser can inject scripts into page
for replay against later visitors
• Unhandled error messages reveal application and database
structures
• Unchecked database calls can be ‘piggybacked’ with a
hacker’s own database call, giving direct access to business
data through a web browser
Application
Application Mapping
Cookie Manipulation
Custom Application Scripting
Parameter Manipulation
Reverse Directory Transversal
Brute Force
Application Mapping
Cookie Poisoning/Theft
Buffer Overflow
SQL Injection
Cross-site scripting
APPLICATION

More Related Content

PPTX
CSS 17: NYC - Stories from the SOC
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PPTX
CSS 17: NYC - Protecting your Web Applications
PDF
Automated Security Testing
PPTX
Security testautomation
PPTX
CSS 17: NYC - Building Secure Solutions in AWS
PDF
Security in practice with Java EE 6 and GlassFish
PPTX
Alfredo Reino - Monitoring aws and azure
CSS 17: NYC - Stories from the SOC
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Protecting your Web Applications
Automated Security Testing
Security testautomation
CSS 17: NYC - Building Secure Solutions in AWS
Security in practice with Java EE 6 and GlassFish
Alfredo Reino - Monitoring aws and azure

What's hot (20)

PPTX
Hacker Proof web app using Functional tests
PDF
The Joy of Proactive Security
PPTX
OpenSourceSecurityTools - UPDATED
PDF
Proactive Security AppSec Case Study
PDF
Stories from the Security Operations Center (S.O.C.)
PPTX
Essential security measures in ASP.NET MVC
PDF
Realities of Security in the Cloud - CSS ATX 2017
PDF
IglooConf 2019 Secure your Azure applications like a pro
PDF
CSS17: Houston - Protecting Web Apps
PDF
Managed Threat Detection & Response for AWS Applications
PDF
How to Harden the Security of Your .NET Website
 
PPTX
Web Application Security 101
PDF
Security DevOps - Free pentesters' time to focus on high-hanging fruits // Ha...
PDF
Protecting Against Web App Attacks
PDF
5 step plan to securing your APIs
PPTX
AllDayDevOps 2019 AppSensor
PDF
DevSecOps: Minimizing Risk, Improving Security
PPTX
SecDevOps 2.0 - Managing Your Robot Army
PDF
Managed Threat Detection and Response
PDF
Stories from the Security Operations Center
Hacker Proof web app using Functional tests
The Joy of Proactive Security
OpenSourceSecurityTools - UPDATED
Proactive Security AppSec Case Study
Stories from the Security Operations Center (S.O.C.)
Essential security measures in ASP.NET MVC
Realities of Security in the Cloud - CSS ATX 2017
IglooConf 2019 Secure your Azure applications like a pro
CSS17: Houston - Protecting Web Apps
Managed Threat Detection & Response for AWS Applications
How to Harden the Security of Your .NET Website
 
Web Application Security 101
Security DevOps - Free pentesters' time to focus on high-hanging fruits // Ha...
Protecting Against Web App Attacks
5 step plan to securing your APIs
AllDayDevOps 2019 AppSensor
DevSecOps: Minimizing Risk, Improving Security
SecDevOps 2.0 - Managing Your Robot Army
Managed Threat Detection and Response
Stories from the Security Operations Center
Ad

Similar to Security guidelines (20)

PPTX
00. introduction to app sec v3
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PDF
C01461422
PPTX
Application security
PDF
OWASP Top 10 List Overview for Web Developers
PDF
Designing Secure APIs
PDF
Application Security - Your Success Depends on it
PDF
PDF
Web App Security: Top Threats and How to Protect Your App.pdf
PPT
Web Application Testing for Today’s Biggest and Emerging Threats
PPT
Bank One App Sec Training
PPTX
Presentation on Top 10 Vulnerabilities in Web Application
PDF
Best Practices for Secure Web Application Development by Site Invention.pdf
PPTX
Application Security: What do we need to know?
PDF
GitHub: Secure Software Development for Financial Services
PPT
Web Application Security
PDF
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
PDF
Secure Coding principles by example: Build Security In from the start - Carlo...
PDF
Web application security (eng)
PPTX
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
00. introduction to app sec v3
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
C01461422
Application security
OWASP Top 10 List Overview for Web Developers
Designing Secure APIs
Application Security - Your Success Depends on it
Web App Security: Top Threats and How to Protect Your App.pdf
Web Application Testing for Today’s Biggest and Emerging Threats
Bank One App Sec Training
Presentation on Top 10 Vulnerabilities in Web Application
Best Practices for Secure Web Application Development by Site Invention.pdf
Application Security: What do we need to know?
GitHub: Secure Software Development for Financial Services
Web Application Security
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Secure Coding principles by example: Build Security In from the start - Carlo...
Web application security (eng)
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Ad

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Cloud computing and distributed systems.
PDF
KodekX | Application Modernization Development
PDF
cuic standard and advanced reporting.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Advanced methodologies resolving dimensionality complications for autism neur...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Cloud computing and distributed systems.
KodekX | Application Modernization Development
cuic standard and advanced reporting.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Security guidelines

  • 1. SECURITY GUIDELINES ARE WE RIGHTLY SAFEGUARDING OUR CUSTOMER ENVIRONMENTS ? Karthik Sagar P Technology Evangelist Karthiksagar.p@outlook.com
  • 2. “Every program has at least two purposes: the one for which it was written, and another for which it wasn't.” -Alan J. Perlis
  • 4. EVAL () • eval() like functions takes string argument and • evaluate those as source code • var x = req.body.x; • var y = req.body.y; • var sum = eval(a + "+" + b);what if attacker fills 'x' with: some.super.class.wipe.the.database('now’); LOL :)
  • 6. SECURITY GAP Security Professionals Don’t Know The Applications Application Developers and QA Professionals Don’t Know Security The Web Application Security Gap “As a Network Security Professional, I don’t know how my companies web applications are supposed to work so I deploy a protective solution…but don’t know if it’s protecting what it’s supposed to.” “As an Application Developer, I can build great features and functions while meeting deadlines, but I don’t know how to develop my web application with security as a feature.”
  • 7. VULNERABILITIES Platform Administration Application Known Vulnerabilities Extension Checking Common File Checks Data Extension Checking Backup Checking Directory Enumeration Path Truncation Hidden Web Paths Forceful Browsing Application Mapping Cookie Manipulation Custom Application Scripting Parameter Manipulation Reverse Directory Transversal Brute Force Application Mapping Cookie Poisoning/Theft Buffer Overflow scripting Application vulnerabilities occur in multiple areas.
  • 8. HOW TO SECURE APPLICATIONS
  • 9. WHAT I SAY ! The best way to secure anything is to learn how someone can break it
  • 10. HOW? • Incorporating security into lifecycle • Integrate security into application requirements • Including information security professionals in software architecture/design review • Security APIs & libraries (e.g. ESAPI, Validator, etc.) when possible • Threat modeling • Web application vulnerability assessment tools (VAPT)
  • 12. DB SECURITY • User Access Management –Authentication • User Rights Management – Authorization • Auditing • Environmental and Process Control • Encryption • Network Encryption • Network Filter • Binding IP Addresses • Running in VPNs • Dedicated OS User Account. • File System Permissions • Query Injection • Physical Access Controls Environment & Processes SSL Encryption for DB communication
  • 13. ENVIRONMENT & PROCESSES •Network Filter Binding IP Addresses Running in VPNs Dedicated OS User Account. File System Permissions Query Injection Physical Access Controls
  • 14. MY ARCHITECTURE SSL Web Application Mobile Application Firewall Port No’s: 83 & 2011 Public IP App Server Port :83 Port :88 Public IP – Static IP Web Server Port :2011 Public IP – Static IP Port :2016 Static IP 1 Static IP 3 DB Server DB Node Web Server Port:271 8 SSL Bind IP :Static IP 1 Traffic Log Customer Environment
  • 15. EDUCATE Developers • Software security best practices Security Professionals • Software development • Software coding best practices Testers • Methods for identifying vulnerabilitie s Executives, System Owners, etc Understanding the risk and why they should be concerned Who is your Security Owner ?
  • 16. CREATING THE RISK ASSESSMENT
  • 18. PRACTISE • Update your DB and application versions • Always ensure to move your traffic through firewall • Identify security owner for your applications • Test for what it has not been developed for • Create rules in the firewall • Educate your network administrator • Prepare Risk Assessment blog
  • 23. Platform Known Vulnerabilities PLATFORM • Known vulnerabilities can be exploited immediately with a minimum amount of skill or experience – “script kiddies” • Most easily defendable of all web vulnerabilities • MUST have streamlined patching procedures
  • 24. Administration Extension Checking Common File Checks Data Extension Checking Backup Checking Directory Enumeration Path Truncation Hidden Web Paths Forceful Browsing • Less easily corrected than known issues • Require increased awareness • More than just configuration, must be aware of security flaws in actual content • Remnant files can reveal applications and versions in use • Backup files can reveal source code and database connection strings ADMINISTRATION
  • 25. • Common coding techniques do not necessarily include security • Input is assumed to be valid, but not tested • Unexamined input from a browser can inject scripts into page for replay against later visitors • Unhandled error messages reveal application and database structures • Unchecked database calls can be ‘piggybacked’ with a hacker’s own database call, giving direct access to business data through a web browser Application Application Mapping Cookie Manipulation Custom Application Scripting Parameter Manipulation Reverse Directory Transversal Brute Force Application Mapping Cookie Poisoning/Theft Buffer Overflow SQL Injection Cross-site scripting APPLICATION