About Us | Contact Us
View Cart

Web Application Security Reviews

By Vigilize | Sunday, January 1, 2012 - Leave a Comment

According to the National Vulnerability Database and nCircle VERT (Vulnerability and Exposure Research Team), Web application vulnerabilities have increased from 1.9% of all published vulnerabilities in 2006 to over 52% in 2009. Meanwhile, even seemingly “benign sites” like our marketing sites, often maintained by non-technical personnel, now utilize forms, search engines, even connections into databases that all offer vulnerabilities to the bad guys.

According to the Federal Financial Institutions Examination Council (FFIEC), “financial institutions should establish appropriate systems and application development methodologies.” This process should include “Quality assurance, risk management, and testing standards and procedures.” Testing standards provide the best means to manage project risks and ensure software includes expected functionality, security, and operability.


Web Application Security Review


infotex conducts our Web Application Security Review using a phased approach. Not only do we look at technical controls, but also non-technical controls that your organization has in place. We test control processes, user interfaces, encryption, authentication, and infrastructure, as well as review code.


Web Application Security Review

Our Reporting
During the process, we confirm and document results of findings, perform a risk analysis, and create a vulnerability matrix. In addition, we provide a report that includes an Executive Summary, a Vulnerability Matrix, and a CD with supporting documentation. Beyond that, we review the Executive Summary and Vulnerability Matrix with the appropriate members of your team.

A phased testing process

  • Phase I: Infrastructure Vulnerability Assessment – We perform a technical vulnerability assessment in two phases (blind and internal) on your web application infrastructure (servers and network devices) using standard techniques for assessing networks with application security in mind.
  • Phase II: Infrastructure Configuration Audit – infotex performs an assessment of your current network configuration including client and server applications and IT practices based on comparison to vendor and industry published best practices.
  • Phase III: Application Review – We will scan all source code looking for vulnerabilities. This review will use as a standard the framework presented at owasp.org. In particular, each application will be checked for all vulnerabilities listed in the most current OWASP Top 10 list.
  • Phase IV: Development Controls Review – Our process includes interviews with various personnel to test for appropriate knowledge of policies and procedures pertaining to development controls. In addition, we review the policies and procedures in place as they pertain to the Systems Development Lifecycle.

Top 10 “Current” Web Application Vulnerabilities (OWASP)

  1. Cross Site Scripting (XSS)
  2. Injection Flaws
  3. Malicious File Execution
  4. Insecure Direct Object Reference
  5. Cross Site Request Forgery (CSRF)
  6. Information Leakage and Improper Error Handling
  7. Broken Authentication and Session Management
  8. Insecure Cryptographic Storage
  9. Insecure Communications
  10. Failure to Restrict URL Access

We can conduct a full audit, black-box review, or a risk-based audit (using OWASP’s Top 10 for 2010 as a framework).


Contact infotex for assistance with your Assessment needs!

Latest News
      Alternatives From 2020 Conferences The 2020 Update Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Each year as we go to various conferences throughout the Midwest ranging in scope; from small banker conferences that Dan himself moderates, to hacker conferences like Defcon.  We […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.  
    The IBA Presents an infotex Workshop: Tech-Shop (A Virtual Workshop for Banks IT Geeks) Live Workshop Time for a workshop for the technical side of the community-bank. Time for a workshop full of command lines and configurations, acronyms we are forbidden to use around management, and even dark-web jokes. Time for a workshop where we […]
    An Analogy… …About Taking Better Notes Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . An interesting set of metaphors arose out of our efforts to improve our time management practices at infotex.  In the spirit of sound strategic planning, we as a team decided […]
    A Webinar-Movie In our current world of uncertainty there is at least one thing that is certain. Business needs to continue, and that means that it is important for managers to be able to meet with their team even if everyone is working remotely at this point. In this Webinar-Movie, Dan will compare virtual meeting […]