Security As A Process in Software Development Lifecycle v2.0
Security As A Process in Software Development Lifecycle v2.0
Presented By:
Ahmed Saafan
Agenda
Security layers
Software lifecycle evolution
Security in modern software lifecycle
Threat Modeling
A final word
Security Layers
Physical Security
Network Security
Host (OS) Security
Application Security
Security Layers
DoS
Packet inspection , password sniffing
Identity theft (Spoofing)
Firewalls
IDSs, IPSs & IDPs
Logs Analysis
Security Layers
Security Layers
SQL injection
Application DoS
Session Hijacking
Security Layers
SQL injection
Application DoS
Session Hijacking
Cross site scripting (XSS)
XSS
Type-0 attack
Type-1 attack
Type-2 attack
Security Layers
SQL injection
Application DoS
Session Hijacking
Cross site scripting (XSS)
Buffer Overflow exploits
Unhandled exceptions' exploits
Security Layers
SQL injection
Application DoS
Session Hijacking
Cross site scripting (XSS)
Buffer Overflow exploits
Unhandled exceptions' exploits
Confidentiality
Integrity
Availability
Possession
Authenticity
Utility
Input/Output validation
Input/Output validation
Principle of least privilege / default deny
Compartmentalization (Separation of Privileges)
Threat Modeling
Threat Modeling
1.
2.
Network Diagram
Functionality diagram
Threat Modeling
3.
Trust Boundaries
Data Classification
Threat Modeling
STRIDE
Model
Threat Modeling
Network Threats
Host Threats
Application Threats
Threat Modeling
Attack Trees
Threat Modeling
5.
DREAD Model
Project Risk Analysis on threat trees
Threat Modeling
6.
Mitigate
Threat Modeling
Important Notes:
1.
2.
Network Diagram
Functionality diagram
3.
Trust boundaries
Data classification
Identify threats
4.
5.
Risk = PO X BI
DREAD model to calculate PO & BI
Project risks on attack trees
Mitigate
6.
Input/Output validation
Threat Modeling
Threat Trees
Logging
IT infrastructure availability
Hardware requirements are met
Remove Trapdoors (Maintenance hooks)
External team to ensure risk mitigation
If possible, Get a black hat!
Stress testing
Regression testing
Disaster recovery/system continuity
A Final word
Thank you
References:
Thank you
References:
http://www.securityfocus.com/columnists/445 , Security
Analogies by Scott Granneman.
http://www.securityfocus.com/columnists/420, Surprises
Inside Microsoft Vista's EULA by Scott Granneman.
http://www.microsoft.com/technet/technetmag/issues/2005/01/
SessionHijacking/?topics=/technet/technetmag/issues/2005/01
/SessionHijacking
Newsletter