Web Application Security Reviews
According to the National Vulnerability Database and nCircle VERT (Vulnerability and Exposure Research Team), Web application vulnerabilities have increased from 1.9% of all published vulnerabilities in 2006 to over 52% in 2009. Meanwhile, even seemingly “benign sites” like our marketing sites, often maintained by non-technical personnel, now utilize forms, search engines, even connections into databases that all offer vulnerabilities to the bad guys.
According to the Federal Financial Institutions Examination Council (FFIEC), “financial institutions should establish appropriate systems and application development methodologies.” This process should include “Quality assurance, risk management, and testing standards and procedures.” Testing standards provide the best means to manage project risks and ensure software includes expected functionality, security, and operability.
Web Application Security Review
infotex conducts our Web Application Security Review using a phased approach. Not only do we look at technical controls, but also non-technical controls that your organization has in place. We test control processes, user interfaces, encryption, authentication, and infrastructure, as well as review code.
During the process, we confirm and document results of findings, perform a risk analysis, and create a vulnerability matrix. In addition, we provide a report that includes an Executive Summary, a Vulnerability Matrix, and a CD with supporting documentation. Beyond that, we review the Executive Summary and Vulnerability Matrix with the appropriate members of your team.
A phased testing process
- Phase I: Infrastructure Vulnerability Assessment – We perform a technical vulnerability assessment in two phases (blind and internal) on your web application infrastructure (servers and network devices) using standard techniques for assessing networks with application security in mind.
- Phase II: Infrastructure Configuration Audit – infotex performs an assessment of your current network configuration including client and server applications and IT practices based on comparison to vendor and industry published best practices.
- Phase III: Application Review – We will scan all source code looking for vulnerabilities. This review will use as a standard the framework presented at owasp.org. In particular, each application will be checked for all vulnerabilities listed in the most current OWASP Top 10 list.
- Phase IV: Development Controls Review – Our process includes interviews with various personnel to test for appropriate knowledge of policies and procedures pertaining to development controls. In addition, we review the policies and procedures in place as they pertain to the Systems Development Lifecycle.
Top 10 “Current” Web Application Vulnerabilities (OWASP)
- Cross Site Scripting (XSS)
- Injection Flaws
- Malicious File Execution
- Insecure Direct Object Reference
- Cross Site Request Forgery (CSRF)
- Information Leakage and Improper Error Handling
- Broken Authentication and Session Management
- Insecure Cryptographic Storage
- Insecure Communications
- Failure to Restrict URL Access
We can conduct a full audit, black-box review, or a risk-based audit (using OWASP’s Top 10 for 2010 as a framework).
Leave a comment
Another awareness poster for YOUR customers (and users). Now that we have our own em Read more
Data from the devices could be tied to insurance and healthcare costs in the future… Read more
The technology that makes up the foundation of new currencies such as Bitcoin is capa Read more
Steps One and Two . . . How to Substantially Decrease (and Streamline) Response Time Read more