370 likes | 786 Views
OWASP. The OWASP Enterprise Security API ( ESAPI ). ESAPI Mission. To ensure that strong simple security controls are available to every developer in every environment. Where Do Vulnerabilities Come From?. Controls Every Application Needs. Security Controls. Are Hard.
E N D
OWASP The OWASP Enterprise Security API ( ESAPI )
ESAPI Mission To ensure thatstrongsimple security controls are available to every developerin every environment
Security Controls Are Hard
Escaping Gone Wild < Percent Encoding %3c %3C HTML Entity Encoding < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < &lT &Lt < < &lT; ≪ < JavaScript Escape \< \x3c \X3c \u003c \U003c \x3C \X3C \u003C \U003C CSS Escape \3c \03c \003c \0003c \00003c \3C \03C \003C \0003C \00003C Overlong UTF-8 %c0%bc %e0%80%bc %f0%80%80%bc %f8%80%80%80%bc %fc%80%80%80%80%bc US-ASCII ¼ UTF-7 +ADw- Punycode <-
Positive Security accountability architecture verification policy visibility AssuranceWorld patterns metrics threats exploits controls assurance completeness pentest impact Risk World flaws risks attacks scanning vulnerabilities
Deceptively Tricky Problems for Developers • Input Validation and Output Encoding • Authentication and Identity • URL Access Control • Business Function Access Control • Data Layer Access Control • Presentation Layer Access Control • Errors, Logging, and Intrusion Detection • Encryption, Hashing, and Randomness Lots more…
Stopping Injection Ad Hoc Escaping Quick and Dirty Generic Validation
Stopping Injection Automatic Escaping Enterprise Managed Specific Validation Managed Generic Validation
Jeff WilliamsAspect Security CEOOWASP Foundation Chair jeff.williams@aspectsecurity.comhttp://www.aspectsecurity.com twitter @planetlevel 410-707-1487 Questions Questions?
Stopping Injection Ad Hoc Escaping Quick and Dirty Generic Validation
Stopping Injection Mandatory Escaping Strong Application Specific Validation Generic Validation (+can)
ESAPI Web App Firewall (WAF) Critical Application? PCI requirement? 3rd party application? Legacy application? Incident response? WAF attacker ESAPI user Virtual patches Authentication rules URL access control Egress filtering Attack surface reduction Real-time security
AuthN and AuthZ User in Session Quick and Dirty Simple Authentication Model Ad Hoc Authorization
AuthN and AuthZ Alternate Authentication Strong Application Identity Everywhere Automatic CG Authorization Automatic FG Authorization
AuthN and AuthZ Identity Management Enterprise AuthZ Policy Management AuthZ Entitlement Mgmt
Applications Enjoy Attacks Live Search Blogger YouTube
Accountability and Detection Ad Hoc Security Logging Quick and Dirty Security Exceptions (2 msgs) Ad Hoc Authorization
Accountability and Detection Automatic Security Logging Strong Application Intrusion Detection
Accountability and Detection Centralized Logging Enterprise Log Policy Management Dynamic Incident Response