SlideShare a Scribd company logo
Vulnerability Management and
Threat Detection by the numbers
Daggercon 2015
Eoin Keary
CTO/Founder edgescan.com & BCC Risk Advisory
OWASP Leader/Member/Ireland Founder
OWASP Global Board Member (2009-2014)
One problem, Many solutions
DAST – Peoples front of Judea
RASP – Judean peoples front
IAST - Judean Popular People's Front
SAST - Popular Front of Judea
Web Risk
• Application Security
• Host Security
• Both / Either / Or
• It’s all software right?
“We gotta cover all the bases, an attacker only needs to
find one…..”
Bits between the Bits
• A developer Introduces bugs in code..
• A Security assessment may deliver false
positives/negatives..
Potential vulnerabilities in code & Potential vulnerabilities in assessment
techniques.
Market Driven Approaches to a Market
Driven Problem.
Agile Risk Model
Fail Early – Fail Often
“Push Left”
Continuous what?
CI -> Continuous Integration
CD -> Continuous Deployment
TDD -> Test Driven Development
Continuous Maintenance
Continuous Security
Continuous Security
“Keeping up” with development
Assisting secure deployment
Catching bugs early – Push Left
Help ensure “change” is secure
Host/Server/Framework
Building bricks – Frameworks / Components
Spring, Jquery, Jade, Angular, Hibernate
13 billion Open source downloads 2014
90% of application code is framework
63%* don’t monitor component security
43%* don’t have open source policy
* http://www.sonatype.com/about/2014-open-source-software-development-survey
Components
Spring (3.0-3.05) – CVE-2011-2894 – Code exe
7,000,000 downloads since vuln discovered
CVSS: 6.8
Apache Xerces2 – CVE-2009-2625 – DoS
4,000,000 downloads since vuln discovered
CVSS: 5
Apache Commons HttpClient 3.x - CVE-2012-5783 – MiTM
4,000,000 downloads since vuln discovered
CVSS: 4.9
Struts2 (2.0-2.3.5) – CVE-2013-2251-Remote Cmd Injection
179,050 downloads since vuln discovered
CVSS: 10
“65% of vulnerabilities discovered in 2015 by
edgescan were outside of software developer
control – Operating System CVE, Component CVE,
Misconfiguration etc ..”
- edgescan Vulnerability Statistics Report 2015
AppSec/Component Sec
• “If you're not doing component vulnerability
management you’re not doing appsec…”
– 90% of application code is framework
• “If you’re not doing full-stack you are not doing
security…”
– Hackers don’t give a S*#t
Problems?
“We Can” scale..
Automation of assessment
Depth
Coverage / Breadth
Rigour
SCALE!
Automation
Event Driven
Frequent/Scheduled
Build Build Build
Automation!!
• Jenkins, Hudson, Bamboo
– Event driven
– Scheduled
– Incremental
• CHEF, Puppet, Phoenix (immutable)
Sounds great…. but
Accuracy/Information/Context
The “Anti-Scale”
Risk Context
Business Context
Accuracy
Information Vs Data
Human Decisions and Intel
Technical constraints
-> Chokepoints
The “Anti-Scale”
New languages and programming methods
Growth of interpreted languages with no strong typing hurts
SAST (Javascript, Ruby,…)
Few automated tools to test APIs / RESTful APIs
Testing Window is squeezed, manual testing is doomed!?#
Fighting The “Anti-Scale”
Accuracy
“Rule Tuning” – DAST & SAST
Build Fails!
White Noise / Supression
Real Security Vs “Best Practice”
Updates to Rules
Scale
“Delta Analysis”
Previous Vs Current
Changes
FP’s
CI Integration
Fighting The “AntiScale” - Delta Analysis
Measure of change in a target environment.
Focusing on change in risk posture compared to last assessment.
-> Closed, New, False Positives
Fighting The “Anti-Scale”-
Testing like a Developer
Break testing into little pieces
Smoke / Incremental Vs full regression testing
“Early and Often”
– Continuous, on demand
– Testing duration drives testing frequency
Business & Behavioural Testing
At scale:
Can be Difficult …..
Technical Security is covered….Automation
More Time to “Deep Dive”
“Future of Pentesting”
Technical Vulnerabilities rooted out using
technical methods/services …..
Move from chasing Top 10 (SQLI, XSS, etc)
-To-
Behavioural, Logical, Business flow assessment
FIN
• We can scale but not everything is [easily] scalable
• Discover Tech Vulns using Tech
• No “Fire and forget” Security
• Lets test to mirror development methodologies
@eoinkeary
eoin@bccriskadvisory.com

More Related Content

PDF
Just4Meeting 2012 - How to protect your web applications
PDF
BHack 2012 - How to protect your web applications
PDF
Silver Lining for Miles: DevOps for Building Security Solutions
PDF
Ops Happen: Improve Security Without Getting in the Way
PPTX
Amy DeMartine - 7 Habits of Rugged DevOps
PPTX
The R.O.A.D to DevOps
PPTX
The sooner the better but never too late
PDF
QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...
Just4Meeting 2012 - How to protect your web applications
BHack 2012 - How to protect your web applications
Silver Lining for Miles: DevOps for Building Security Solutions
Ops Happen: Improve Security Without Getting in the Way
Amy DeMartine - 7 Habits of Rugged DevOps
The R.O.A.D to DevOps
The sooner the better but never too late
QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...

What's hot (20)

PPTX
DevSecCon Asia 2017 Arun N: Securing chatops
PPTX
Automation and open source turning the tide on the attackers
PDF
Ensuring Security through Continuous Testing
PPTX
В чому різниця між тестами на проникнення, аудитами, та іншими послугами з кі...
PPTX
2016 virus bulletin
PDF
Texto de Ayuda Un2_Taller de ingles
PDF
CSA Raleigh application security and deception in the cloud
PDF
Continuous Delivery to Continuous Operations, DevOps & SRE = Continuous Culture
PDF
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
PPTX
Failure is inevitable but it isn't permanent
PDF
Shifting Security Left - The Innovation of DevSecOps - AgileDC
PDF
Evolution of The Application
PDF
Long-term Impact of Log4J
PDF
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
PPTX
Safely Removing the Last Roadblock to Continuous Delivery
PDF
Deception in Cyber Security (League of Women in Cyber Security)
PDF
Security at Scale - Lessons from Six Months at Yahoo
PDF
How to run a kick ass bug bounty program - Node Summit 2013
PDF
Security as a part of quality assurance
PDF
OWASP Bricks presentation from OWASP-Null combined meet at Delhi, August 2014
DevSecCon Asia 2017 Arun N: Securing chatops
Automation and open source turning the tide on the attackers
Ensuring Security through Continuous Testing
В чому різниця між тестами на проникнення, аудитами, та іншими послугами з кі...
2016 virus bulletin
Texto de Ayuda Un2_Taller de ingles
CSA Raleigh application security and deception in the cloud
Continuous Delivery to Continuous Operations, DevOps & SRE = Continuous Culture
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Failure is inevitable but it isn't permanent
Shifting Security Left - The Innovation of DevSecOps - AgileDC
Evolution of The Application
Long-term Impact of Log4J
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
Safely Removing the Last Roadblock to Continuous Delivery
Deception in Cyber Security (League of Women in Cyber Security)
Security at Scale - Lessons from Six Months at Yahoo
How to run a kick ass bug bounty program - Node Summit 2013
Security as a part of quality assurance
OWASP Bricks presentation from OWASP-Null combined meet at Delhi, August 2014
Ad

Viewers also liked (19)

PPTX
Allianz Global CISO october-2015-draft
PPTX
02. input validation module v5
PPTX
Html hacking - when javascript is just not good enough
PPTX
Skillful scalefull fullstack security in a state of constant flux
PPTX
00. introduction to app sec v3
PPTX
01. http basics v27
PPTX
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
PPTX
14. html 5 security considerations
PPTX
Vulnerability management and threat detection by the numbers
PPTX
XSS Defence with @manicode and @eoinkeary
PDF
10 jdbc
PPTX
HTTP basics in relation to Applicaiton Security - OWASP
PPTX
03. sql and other injection module v17
PPTX
We cant hack ourselves secure
PPTX
04. xss and encoding
PPTX
Web security – application security roads to software security nirvana iisf...
PPTX
Media-web_application_security_and_vulnerabilities
PDF
06 response-headers
PPTX
OWASP Free Training - SF2014 - Keary and Manico
Allianz Global CISO october-2015-draft
02. input validation module v5
Html hacking - when javascript is just not good enough
Skillful scalefull fullstack security in a state of constant flux
00. introduction to app sec v3
01. http basics v27
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
14. html 5 security considerations
Vulnerability management and threat detection by the numbers
XSS Defence with @manicode and @eoinkeary
10 jdbc
HTTP basics in relation to Applicaiton Security - OWASP
03. sql and other injection module v17
We cant hack ourselves secure
04. xss and encoding
Web security – application security roads to software security nirvana iisf...
Media-web_application_security_and_vulnerabilities
06 response-headers
OWASP Free Training - SF2014 - Keary and Manico
Ad

Similar to Vulnerability management and threat detection by the numbers (20)

PPTX
Full stack vulnerability management at scale
PDF
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
PPTX
Web security – everything we know is wrong cloud version
PPTX
One login enemy at the gates
PDF
Building Your Application Security Data Hub - OWASP AppSecUSA
PDF
Application Security Guide for Beginners
PDF
Innovating Faster with Continuous Application Security
PPTX
Web security-–-everything-we-know-is-wrong-eoin-keary
PDF
Practical appsec lessons learned in the age of agile and DevOps
PDF
New Era of Software with modern Application Security v1.0
PDF
edgescan vulnerability stats report (2019)
PDF
The Future of DevSecOps
PPTX
Security by the numbers
PPTX
Software Security by Glenn Wilson
PPTX
PDF
edgescan vulnerability stats report (2018)
PDF
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
PPTX
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
PPTX
CISSP - Security Assessment
PDF
Application Security Program Management with Vulnerability Manager
Full stack vulnerability management at scale
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Web security – everything we know is wrong cloud version
One login enemy at the gates
Building Your Application Security Data Hub - OWASP AppSecUSA
Application Security Guide for Beginners
Innovating Faster with Continuous Application Security
Web security-–-everything-we-know-is-wrong-eoin-keary
Practical appsec lessons learned in the age of agile and DevOps
New Era of Software with modern Application Security v1.0
edgescan vulnerability stats report (2019)
The Future of DevSecOps
Security by the numbers
Software Security by Glenn Wilson
edgescan vulnerability stats report (2018)
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
CISSP - Security Assessment
Application Security Program Management with Vulnerability Manager

More from Eoin Keary (12)

PPTX
IISF-March2023.pptx
PDF
Validation of vulnerabilities.pdf
PDF
Does a Hybrid model for vulnerability Management Make Sense.pdf
PDF
Edgescan 2022 Vulnerability Statistics Report
PPTX
Edgescan 2021 Vulnerability Stats Report
PDF
Edgescan vulnerability stats report 2020
PPTX
Vulnerability Intelligence - Standing Still in a world full of change
PPTX
Hide and seek - Attack Surface Management and continuous assessment.
PPTX
Online Gaming Cyber security and Threat Model
PPTX
Keeping the wolf from 1000 doors.
PPTX
Cybersecurity by the numbers
PPTX
Ebu class edgescan-2017
IISF-March2023.pptx
Validation of vulnerabilities.pdf
Does a Hybrid model for vulnerability Management Make Sense.pdf
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2021 Vulnerability Stats Report
Edgescan vulnerability stats report 2020
Vulnerability Intelligence - Standing Still in a world full of change
Hide and seek - Attack Surface Management and continuous assessment.
Online Gaming Cyber security and Threat Model
Keeping the wolf from 1000 doors.
Cybersecurity by the numbers
Ebu class edgescan-2017

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
Programs and apps: productivity, graphics, security and other tools
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
20250228 LYD VKU AI Blended-Learning.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx

Vulnerability management and threat detection by the numbers

  • 1. Vulnerability Management and Threat Detection by the numbers Daggercon 2015
  • 2. Eoin Keary CTO/Founder edgescan.com & BCC Risk Advisory OWASP Leader/Member/Ireland Founder OWASP Global Board Member (2009-2014)
  • 3. One problem, Many solutions DAST – Peoples front of Judea RASP – Judean peoples front IAST - Judean Popular People's Front SAST - Popular Front of Judea
  • 4. Web Risk • Application Security • Host Security • Both / Either / Or • It’s all software right? “We gotta cover all the bases, an attacker only needs to find one…..”
  • 5. Bits between the Bits • A developer Introduces bugs in code.. • A Security assessment may deliver false positives/negatives.. Potential vulnerabilities in code & Potential vulnerabilities in assessment techniques.
  • 6. Market Driven Approaches to a Market Driven Problem.
  • 7. Agile Risk Model Fail Early – Fail Often “Push Left”
  • 8. Continuous what? CI -> Continuous Integration CD -> Continuous Deployment TDD -> Test Driven Development Continuous Maintenance Continuous Security
  • 9. Continuous Security “Keeping up” with development Assisting secure deployment Catching bugs early – Push Left Help ensure “change” is secure
  • 10. Host/Server/Framework Building bricks – Frameworks / Components Spring, Jquery, Jade, Angular, Hibernate 13 billion Open source downloads 2014 90% of application code is framework 63%* don’t monitor component security 43%* don’t have open source policy * http://www.sonatype.com/about/2014-open-source-software-development-survey
  • 11. Components Spring (3.0-3.05) – CVE-2011-2894 – Code exe 7,000,000 downloads since vuln discovered CVSS: 6.8 Apache Xerces2 – CVE-2009-2625 – DoS 4,000,000 downloads since vuln discovered CVSS: 5 Apache Commons HttpClient 3.x - CVE-2012-5783 – MiTM 4,000,000 downloads since vuln discovered CVSS: 4.9 Struts2 (2.0-2.3.5) – CVE-2013-2251-Remote Cmd Injection 179,050 downloads since vuln discovered CVSS: 10
  • 12. “65% of vulnerabilities discovered in 2015 by edgescan were outside of software developer control – Operating System CVE, Component CVE, Misconfiguration etc ..” - edgescan Vulnerability Statistics Report 2015
  • 13. AppSec/Component Sec • “If you're not doing component vulnerability management you’re not doing appsec…” – 90% of application code is framework • “If you’re not doing full-stack you are not doing security…” – Hackers don’t give a S*#t
  • 15. “We Can” scale.. Automation of assessment Depth Coverage / Breadth Rigour
  • 17. Automation!! • Jenkins, Hudson, Bamboo – Event driven – Scheduled – Incremental • CHEF, Puppet, Phoenix (immutable) Sounds great…. but
  • 18. Accuracy/Information/Context The “Anti-Scale” Risk Context Business Context Accuracy Information Vs Data Human Decisions and Intel Technical constraints -> Chokepoints
  • 19. The “Anti-Scale” New languages and programming methods Growth of interpreted languages with no strong typing hurts SAST (Javascript, Ruby,…) Few automated tools to test APIs / RESTful APIs Testing Window is squeezed, manual testing is doomed!?#
  • 20. Fighting The “Anti-Scale” Accuracy “Rule Tuning” – DAST & SAST Build Fails! White Noise / Supression Real Security Vs “Best Practice” Updates to Rules Scale “Delta Analysis” Previous Vs Current Changes FP’s
  • 22. Fighting The “AntiScale” - Delta Analysis Measure of change in a target environment. Focusing on change in risk posture compared to last assessment. -> Closed, New, False Positives
  • 23. Fighting The “Anti-Scale”- Testing like a Developer Break testing into little pieces Smoke / Incremental Vs full regression testing “Early and Often” – Continuous, on demand – Testing duration drives testing frequency
  • 24. Business & Behavioural Testing At scale: Can be Difficult ….. Technical Security is covered….Automation More Time to “Deep Dive”
  • 25. “Future of Pentesting” Technical Vulnerabilities rooted out using technical methods/services ….. Move from chasing Top 10 (SQLI, XSS, etc) -To- Behavioural, Logical, Business flow assessment
  • 26. FIN • We can scale but not everything is [easily] scalable • Discover Tech Vulns using Tech • No “Fire and forget” Security • Lets test to mirror development methodologies @eoinkeary eoin@bccriskadvisory.com