6 Project2
6 Project2
6 Project2
Group project:
application security verification
using OWASP ASVS
Assurance
Big challenge:
how can we provide assurance that an application is
secure?
You may decide that it’s not worth the effort to provide some
assurance.
Group Project
We do a security code review of a web-application
We’ll discuss and compare our findings in November (about the tools)
and in December (overall)
(white box) code review vs (black box) pen test
5
Goals
Experiencing a software security review process
8
Non-goals
• For some, this is throwing you in at the deep end.
I realise your experience varies a lot!
Dynamic Static
using running using source code
application
aka code review
aka (penetration)
testing
This can be
This can be
manual application
penetration testing • manual
automated application • automated using code
penetration testing analysis tools
• https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework
• https://www.securityknowledgeframework.org/
Before you start
1. Form groups; possibly via Brightspace
• Send me an email when you have a group
• Fill in the questionnaire on the web page
2. Fix a weekly morning/afternoon to work on this
3. Keep a log what you are doing, and who does what
17
To start
1. Read the ASVS
2. Map the tool warnings to ASVS requirements
5. Dig in deeper
• Check tool warnings for false/true positives
• Look into the other requirements
• …
18
To complete
• Keep track of your findings in the .xls
• Template will be provided in Brigtspace
• Produce findings in one PDF at the end
19
Remember: we’re skipping the most important steps
By jumping straight to look at the code using the ASVS
we skip the most important first steps of any security analysis:
1. identifying security requirements and their importance
– ie. threats and impacts, for a good risk assessment
2. defining attacker model
– eg ’standard’ online attacker, insiders, vandals, hacktivists,
mafia, NSA, …
– should also consider capabilities & motivation