T6 August 22, 2003 2:00PM R EDUCE R ISK U SING S ECURITY QA A - - PDF document

t6
SMART_READER_LITE
LIVE PREVIEW

T6 August 22, 2003 2:00PM R EDUCE R ISK U SING S ECURITY QA A - - PDF document

BIO PRESENTATION T6 August 22, 2003 2:00PM R EDUCE R ISK U SING S ECURITY QA A UTOMATION T ECHNIQUES Alexander Mouldovan Cenzic Inc International Conference On Software Test Automation August 19-22, 2003 Boston, MA USA Alexander Mouldovan


slide-1
SLIDE 1

BIO PRESENTATION

International Conference On Software Test Automation August 19-22, 2003 Boston, MA USA

T6

August 22, 2003 2:00PM

REDUCE RISK USING SECURITY QA AUTOMATION TECHNIQUES

Alexander Mouldovan Cenzic Inc

slide-2
SLIDE 2

Alexander Mouldovan

As Director of Product Marketing for Cenzic, Alexander Mouldovan is responsible for the definition of Cenzic’s award-winning security QA platform, Hailstorm. He has developed and tested innovative software and hardware for trusted email, digital rights management, security, scanner, and pen computing applications.

slide-3
SLIDE 3

Reduce Risk Using Security QA Automation

Alexander Mouldovan Cenzic Inc. Presented to Test Automation March, 2003 Update Available at: http://www.cenzic.com/CenzicTASlides.ppt

slide-4
SLIDE 4
  • 12+ years in software

– 4 years product management – 5 years as developer – 4 years testing and evaluating software and hardware products

slide-5
SLIDE 5
  • Security Background
  • The Problem
  • Vulnerabilities (some examples)
  • Some solutions
  • Security QA
  • Opportunities

Outline

slide-6
SLIDE 6

Introduction

slide-7
SLIDE 7

The Problem

  • Evolution of security

–Security by obscurity

  • Obscurity doesn’t last

–Hardened perimeters

  • “Crunchy on the outside, chewy on the

inside”

slide-8
SLIDE 8

Evolution

–Perimeter security – firewall, IDS, …

  • Have to let data through

–Web services

  • Built to tunnel through firewalls!
  • Functionality over security

– Security is the #1 reason for not adopting WS

–Applications: the final frontier

  • WIDE OPEN!!!
slide-9
SLIDE 9

Security Technology

  • Firewall, IDS, Intrusion Prevention
  • Access management, encryption
  • Scanners (Nessus)
  • Anti-Virus (Symantec)
  • Integrated frameworks (Symantec, CA)
slide-10
SLIDE 10

The Weakest Link

  • A system is only as secure as the least

secure link

  • Now that perimeter security has matured,

Application logic is the weakest link

  • Gartner Group, 2002

– "However, close to 75% of today's attacks are tunneling through applications.” – John Pescatore, Security Analyst, Gartner Group

slide-11
SLIDE 11

Vulnerabilities

slide-12
SLIDE 12

Common Vulnerabilities

  • Buffer Overflow
  • Buffer Underflow
  • SQL Parser
  • SQL Disclosure
  • Command Insertion
  • Path traversal
  • Format String Tests
  • Data Input Validation
  • Random input
  • Session ID Hijacking
  • Parameter tampering
  • Cross site scripting
  • Privilege escalation
  • Alternate Encodings
slide-13
SLIDE 13

SQL Parser Attack

slide-14
SLIDE 14

SQL Disclosure Attack

slide-15
SLIDE 15

Where are these Vulnerabilities Found?

  • Vendors’ platforms

– Databases – Appservers – Network equipment – Messaging platforms – Operating systems

  • Your custom code

– ASP – JSP – Java beans – CGI, PHP – ISAPI – .Net – Java – C/C++

slide-16
SLIDE 16

Severity of a Defect

  • Not all bugs are created equal
  • Compare:

– Cosmetic bug – Bug that prevents access to functionality – Bug that crashes the server – Bug that reveals customer data

  • Credit cards numbers
  • Passwords
slide-17
SLIDE 17
  • Unmanned carts on a track
  • Bad failure recovery/detection

– Piles of fallen bags would not stop the unloaders

  • Carts got out of sync

– Full carts continue to get loaded – Empty carts get unloaded

  • Delayed airport opening for 11 months

– $1 million dollars a day in cost due to interest bond issues

Denver Airport Baggage

slide-18
SLIDE 18

What are Companies Doing?

slide-19
SLIDE 19

Finding Security Vulnerability Early Saves Engineering Time and Money

Source: National Institute of Standards and Technology

2 4 6 8 10 12 14 16

Requirements Code/Unit Test Integration Beta Test Post Prod'n

Hours per bug fix

0% 10% 20% 30% 40% 50%

Requirements Code/Unit Test Integration Beta Test Post Prod'n

Where bugs are found

slide-20
SLIDE 20

Outsourced Testing

Penetration tests:

  • Costly (ex. small engagements run ~$500,000)
  • Time consuming
  • Black box
  • Human driven, not repeatable
  • Run against production applications
slide-21
SLIDE 21

Stretching Scarce Resources

  • Small internal security groups

– Don’t scale, skill levels vary widely – Delay shipment, pressure to ship with holes – Estimated cost to fix a security problem after deployment: $100,000

slide-22
SLIDE 22

Nothing

– Live with risk and hacks – Rely on “Damage Control” – Over 90% of companies surveyed detected security breaches with over 80% incurring financial losses as a result… * – 44% were willing/able to quantify their losses… averaging over $2M/yr per respondent*

*Computer Crime and Security Survey, Computer Security Institute 4/02

slide-23
SLIDE 23

Relative Costs

  • Hacked System

– $1,000,000/hour of downtime*

  • Fix bugs after deployment

– $100,000 per bug in finished product

  • Outsourced testing

– $10,000 per function point

  • Automated Security QA

– < $1,000 per defect

Cost per Incident Phase

Downtime Due to Hacks Scanning at Production Outsource Testing Automation Design Implement Integration Production

* Financial Services

slide-24
SLIDE 24

Can We Do Better?

slide-25
SLIDE 25

Testing Approaches

  • Black Box

– Deep coverage of possible vulnerabilities using broad input set

  • White Box

– Analyze source code, designs for flaws

  • Grey Box

– Use black box tools with monitoring technology

slide-26
SLIDE 26

Testing For Security

  • Destructive testing – QA with attitude!

– Try to find weaknesses to exploit

  • Need standardized methods, metrics

– Hunt and peck security testing doesn’t reduce risk reliably

  • Need to leverages security expertise

within organization

– Most QA teams do not have security backgrounds

slide-27
SLIDE 27

Fault Injection

  • Critical systems must not fail

– BART tested with fault injection

  • Create failures in a controlled environment

– Launching frozen chickens into jet engines to

  • bserve failure

– Crash test dummies for safety testing

  • Don’t trust your input

– UAL ticket scam for Europe airfares (unchecked text entry)

slide-28
SLIDE 28

Fault Injection (2)

  • Fault Injection is the ultimate black box

tool – use the most malicious input possible

  • Stress the system every way possible prior

to deployment

> This is how you reduce risk.

slide-29
SLIDE 29

Fault Detection

  • When input was perturbed, did the

application behave correctly?

– Did it give an error page?

  • How does the application fail?

– Did it reveal stored data or information about the infrastructure? – How long did it take to respond?

slide-30
SLIDE 30

Security QA

slide-31
SLIDE 31

Integrating Security and QA

  • Security expertise

– Precious resource – Knowledge of vulnerabilities – Can assess severity of vulnerabilities – Can teach secure coding

  • Quality Assurance

– Close to the developer – Use repeatable processes – Critical for reliability of applications – Automation skill – Track and manage defects

slide-32
SLIDE 32

Security Test Automation

  • Create a baseline
  • Insert inappropriate data, change timings,

alter state transitions, break assumptions

  • Watch for unexpected behavior
  • Identify, track, remove issues before

deployment

slide-33
SLIDE 33

How Security and QA Collaborate

  • Security designs

policies that define security testing

  • QA applies policies to

applications in development

– Manually run Fault Injection – Embed Fault Injection in build validation suite

slide-34
SLIDE 34

Security Personnel and QA collaboration is critical

  • Policy documentation is a

dead-end

– Policies must be codified and implemented

  • QA and Security experts

can define appropriate tests for application components

  • QA team learns about

Security, Security team gets visibility into compliance

slide-35
SLIDE 35

Benefits

slide-36
SLIDE 36

Visibility into Risk

slide-37
SLIDE 37

Vulnerability Breakdown

slide-38
SLIDE 38

Conclusions

slide-39
SLIDE 39

Reliability

  • Reliability requires:

– Functionality – Performance … and …

Security!

slide-40
SLIDE 40

Pain is High

  • Companies are ill prepared to deal with

Security Testing

– Spending lots of time on vulnerabilities – Wasting gobs of money

  • Chance to impact the bottom line

– Reduce the cost of fixing critical bugs – Get applications to market faster

slide-41
SLIDE 41

Hottest Sector in QA: Security!

  • Security: the fastest growing segment in

Quality Assurance

  • Great opportunity:

– Risk of being hacked is high

  • (probability of hack * loss due to hack)

– Not many experts in the field