Risk
9/23/2013
04:55 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Lack Of Security Expertise? App-Analysis Services Could Help

Companies now have a selection of software-scanning services to help assess their Web applications and find bugs -- here's a look at what makes a good service

For companies developing their own in-house applications or Web services, vulnerabilities need to be found and fixed before deploying code -- or firms risk a breach.

In 2012, for example, poor input validation for databases put SQL injection on top of the short list of vulnerability-related attacks, with the three largest breaches compromising nearly 20 million records, according to the State of Software Security Report released annually by application-security firm Veracode. While the tools are available to solve the problems, developers are still focused on features over security.

Part of the problem is the lack of necessary security expertise. Without a focus on security, developers are hard-pressed to find and close the vulnerabilities in their code, says Brian Mizelle, vice president of operations at Cigital, a vulnerability software and service provider.

"What we are finding in the market is that vulnerabilities are piling up, and no one is able to bring that queue down," Mizelle says. "This is all about fixing them, verifying them, and getting the cycle going again, so companies are not piling on vulnerability after vulnerability, with the same ones showing up every time they test their code."

A number of companies are trying to solve the problem by offering automated static-code checking and dynamic vulnerability scanning as cloud services. Last week, code-security firm Cigital, for example, released details of two security services that allow companies to check their code for security flaws using either static or dynamic analysis. Veracode and Cenzic are two other firms that have offered similar services. The services range from a simple automated scan of a Web application to additional consulting services to explain the results and help developers close the security holes.

"You have to worry about not just testing, but fixing," says Chris Wysopal, chief technology officer for Veracode. "It is very difficult to find skilled application security people. That's one reason why going to a service provider scales better."

[A network scanner that can survey the Internet in less than an hour will make it easier for research groups to expose vulnerabilities on the Internet. See Fast Scanning To Fuel 'Golden Age' Of Global Flaw Finding.]

When looking for an application assessment service, companies should consider what vulnerabilities the service can detect. The OWASP Top-10 list of Web application vulnerabilities and SANS Top 25 Most Dangerous Software Errors are good starting points, but companies should look for deeper scans as well. In addition, the service should recommend strategies for fixing the problems and methods of avoiding the issues in the future, says Bala Venkat, chief marketing officer for Cenzic, a software security firm.

"You really need to have a metric showing the level of security or the level of vulnerability that the application has," he says. "You can track that and tell them why they have that score and how they go about addressing those vulnerabilities."

Companies also need to ask questions about how far the software-analysis service can scale, and whether the turnaround time on tests satisfy their software development life cycle, Venkat says. In addition, firms should ask the service provider how they minimize false positives.

Finally, the service's ability to give clients the benefit of their security expertise is key. Most services have a number of levels: a basic cloud service that includes an automated application scan, and more involved services, which include meetings with the developers to explain the vulnerabilities and teach them how to avoid such mistakes in the future.

"The offering has to be based on the risk profile of the customer," Cigital's Mizelle says. "You don't want to be overpaying for something that you are not going to use."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Robert Lemos is a veteran technology journalist of more than 16 years and a former research engineer, writing articles that have appeared in Business Week, CIO Magazine, CNET News.com, Computing Japan, CSO Magazine, Dark Reading, eWEEK, InfoWorld, MIT's Technology Review, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
marktroester
50%
50%
marktroester,
User Rank: Apprentice
9/30/2013 | 5:03:02 PM
re: Lack Of Security Expertise? App-Analysis Services Could Help
The other thing to consider is how applications are developed today - most are constructed using open source components using agile methodologies. To keep up with today's development pace, application security has to fit well into this model, or there will likely be resistance from developers. If the security team can provide information to the developers in the tools that they use - up front in the development process - they are more likely to have success. OWASP has recognized the need for managing components effectively by updating the specification to include A9, which addresses the use of vulnerable components.

And one way to help with the lack of expertise is to automate the work - and I'm not talking about automation of vulnerability identification - I'm talking about automation of policies that help guide developers early in the process, and automation of policies that stop applications from being promoted to production if they don't meet your policies.

Thanks,

Mark Troester

Sonatype

@mtroester
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3154
Published: 2014-04-17
DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file conte...

CVE-2013-2143
Published: 2014-04-17
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

CVE-2014-0036
Published: 2014-04-17
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.

CVE-2014-0054
Published: 2014-04-17
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External ...

CVE-2014-0071
Published: 2014-04-17
PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

Best of the Web