About Us | Contact Us
View Cart

Web Application Security Reviews

By Vigilize | Sunday, January 1, 2012 - Leave a Comment

According to the National Vulnerability Database and nCircle VERT (Vulnerability and Exposure Research Team), Web application vulnerabilities have increased from 1.9% of all published vulnerabilities in 2006 to over 52% in 2009. Meanwhile, even seemingly “benign sites” like our marketing sites, often maintained by non-technical personnel, now utilize forms, search engines, even connections into databases that all offer vulnerabilities to the bad guys.

According to the Federal Financial Institutions Examination Council (FFIEC), “financial institutions should establish appropriate systems and application development methodologies.” This process should include “Quality assurance, risk management, and testing standards and procedures.” Testing standards provide the best means to manage project risks and ensure software includes expected functionality, security, and operability.


Web Application Security Review


infotex conducts our Web Application Security Review using a phased approach. Not only do we look at technical controls, but also non-technical controls that your organization has in place. We test control processes, user interfaces, encryption, authentication, and infrastructure, as well as review code.


Web Application Security Review

Our Reporting
During the process, we confirm and document results of findings, perform a risk analysis, and create a vulnerability matrix. In addition, we provide a report that includes an Executive Summary, a Vulnerability Matrix, and a CD with supporting documentation. Beyond that, we review the Executive Summary and Vulnerability Matrix with the appropriate members of your team.

A phased testing process

  • Phase I: Infrastructure Vulnerability Assessment – We perform a technical vulnerability assessment in two phases (blind and internal) on your web application infrastructure (servers and network devices) using standard techniques for assessing networks with application security in mind.
  • Phase II: Infrastructure Configuration Audit – infotex performs an assessment of your current network configuration including client and server applications and IT practices based on comparison to vendor and industry published best practices.
  • Phase III: Application Review – We will scan all source code looking for vulnerabilities. This review will use as a standard the framework presented at owasp.org. In particular, each application will be checked for all vulnerabilities listed in the most current OWASP Top 10 list.
  • Phase IV: Development Controls Review – Our process includes interviews with various personnel to test for appropriate knowledge of policies and procedures pertaining to development controls. In addition, we review the policies and procedures in place as they pertain to the Systems Development Lifecycle.

Top 10 “Current” Web Application Vulnerabilities (OWASP)

  1. Cross Site Scripting (XSS)
  2. Injection Flaws
  3. Malicious File Execution
  4. Insecure Direct Object Reference
  5. Cross Site Request Forgery (CSRF)
  6. Information Leakage and Improper Error Handling
  7. Broken Authentication and Session Management
  8. Insecure Cryptographic Storage
  9. Insecure Communications
  10. Failure to Restrict URL Access

We can conduct a full audit, black-box review, or a risk-based audit (using OWASP’s Top 10 for 2010 as a framework).


Contact infotex for assistance with your Assessment needs!

Latest News
    A Webinar Movie This presentation is intended for those who are planning to participate in an infotex incident response test. Please let us know what questions you have, when we have our Plan Walkthrough and Test Plan Approval meeting!
    What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular posts.  Because laws surrounding the use (and abuse) of technology are always evolving, we thought it was worth taking another […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! In the spirit of October and Halloween we have put together a gallery of our “spooky” Awareness Posters at halloween.infotex.com. Use them to help decorate for the holiday! Check […]
    With nearly three in four people using third-party payment services tied to their bank accounts, the risk isn’t limited to your own policies and procedures… An article review. When working on cybersecurity awareness messages for your customers you may be inclined to focus on your own systems, but a new study on security in digital […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX infotex is excited to announce that Cody Smith has joined the team as the newest Data Security Analyst. Cody holds several industry certifications (including the most recent: SSCP) as well as a B.S in Cyber Security & Information Assurance from Western Governors University. […]
    It’s all about protecting Customer information . . . In 1999 the Gramm-Leach-Bliley Act (GLBA) directed the Federal Deposit Insurance Corporation (FDIC) and other federal banking agencies to ensure that financial institutions have policies, procedures, and controls in place to prevent the unauthorized disclosure of customer financial information.  The FDIC and other federal banking agencies […]
    A Ghoulish Gallery! Just a few scary-themed Awareness posters from our collection, which you can see at posters.infotex.com! Below you will find both the vertical and horizontal versions of each of the posters, all you need to do is “right-click > “Save link as…” to download! Vertical 8.5″ x 11″ Format   Horizontal 11″ x […]
    What to Expect in an Annual Information Security Report to the Board Webinar-Movie Information security ranks as a top risk to financial institutions, both in terms of likelihood and overall impact. It is important that boards receive annual comprehensive reporting from management about the information security risks and incidents, and the actions taken to address […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    With the potential to break all existing forms of encryption, quantum computing poses a unique challenge… An article review. While quantum computing has been a buzzword for some time now the technology remains largely theoretical, with small scale proofs-of-concept that still suffer from serious limitations.  That hasn’t stopped security researchers from worrying about the technology’s […]