Web Application Security Reviews
According to the National Vulnerability Database and nCircle VERT (Vulnerability and Exposure Research Team), Web application vulnerabilities have increased from 1.9% of all published vulnerabilities in 2006 to over 52% in 2009. Meanwhile, even seemingly “benign sites” like our marketing sites, often maintained by non-technical personnel, now utilize forms, search engines, even connections into databases that all offer vulnerabilities to the bad guys.
According to the Federal Financial Institutions Examination Council (FFIEC), “financial institutions should establish appropriate systems and application development methodologies.” This process should include “Quality assurance, risk management, and testing standards and procedures.” Testing standards provide the best means to manage project risks and ensure software includes expected functionality, security, and operability.
Web Application Security Review
infotex conducts our Web Application Security Review using a phased approach. Not only do we look at technical controls, but also non-technical controls that your organization has in place. We test control processes, user interfaces, encryption, authentication, and infrastructure, as well as review code.
During the process, we confirm and document results of findings, perform a risk analysis, and create a vulnerability matrix. In addition, we provide a report that includes an Executive Summary, a Vulnerability Matrix, and a CD with supporting documentation. Beyond that, we review the Executive Summary and Vulnerability Matrix with the appropriate members of your team.
A phased testing process
- Phase I: Infrastructure Vulnerability Assessment – We perform a technical vulnerability assessment in two phases (blind and internal) on your web application infrastructure (servers and network devices) using standard techniques for assessing networks with application security in mind.
- Phase II: Infrastructure Configuration Audit – infotex performs an assessment of your current network configuration including client and server applications and IT practices based on comparison to vendor and industry published best practices.
- Phase III: Application Review – We will scan all source code looking for vulnerabilities. This review will use as a standard the framework presented at owasp.org. In particular, each application will be checked for all vulnerabilities listed in the most current OWASP Top 10 list.
- Phase IV: Development Controls Review – Our process includes interviews with various personnel to test for appropriate knowledge of policies and procedures pertaining to development controls. In addition, we review the policies and procedures in place as they pertain to the Systems Development Lifecycle.
Top 10 “Current” Web Application Vulnerabilities (OWASP)
- Cross Site Scripting (XSS)
- Injection Flaws
- Malicious File Execution
- Insecure Direct Object Reference
- Cross Site Request Forgery (CSRF)
- Information Leakage and Improper Error Handling
- Broken Authentication and Session Management
- Insecure Cryptographic Storage
- Insecure Communications
- Failure to Restrict URL Access
We can conduct a full audit, black-box review, or a risk-based audit (using OWASP’s Top 10 for 2010 as a framework).
Leave a comment
Previously thought to be designed to deliver a DDoS attack, VPNFilter can alter data Read more
Getting a message to the user is one thing, having them see it is another… An article Read more
US Cyber Command joins with the FS-ISAC to share threat intelligence… An article revi Read more
Some businesses are attempting to capitalize on confusion over just who the GDPR appl Read more