Thursday, December 19, 2024
HomeWeb ApplicationsMost Important Vulnerability test methods for application security assessments

Most Important Vulnerability test methods for application security assessments

Published on

SIEM as a Service

Many security Experts are thrust into the uncomfortable position of dealing with a huge portfolio of potentially insecure applications, limited resources and an overwhelming sense of urgency.

Security Experts should ensure applications undergo security assessments, as applications have quickly become a favorite vector of malicious attackers seeking to disrupt day-to-day business activities or infiltrate corporate defenses to steal sensitive data.

In this tip, we’ll add some clarity to the enterprise application security assessment process by outlining the techniques used to review applications and comparing and contrasting strategic paradigms for application assessments.

- Advertisement - SIEM as a Service
1. The Big Bang Approach:

Perhaps the most traditional method is to focus testing resources on the applications with the most public exposure, such as the most widely used Internet-facing Web applications.

Once those apps are identified, comprehensive automated and manual runtime vulnerability assessments can be performed. Unfortunately, this approach ignores other critical albeit lower-profile applications, such as extranet apps, internal accounting applications and critical Intranet sites.

It’s important to remember that all Internet-facing applications are subject to external attack, regardless of how popular they are.

Moreover, the rising danger posed by insider threats and client-side vulnerabilities makes ignoring internal applications a significant risk. In addition, many experts in the application security community believe that blackbox testing alone is not as effective as combining source-code review with black/gray box assessments

2. The Steam Roller Approach:

Often when organizations realize the risks posed by The Big Bang Approach, they decide to broaden their comprehensive testing initiative to more applications during a longer period of time.

We’ve seen companies hire teams of penetration testers to test every Web application in the enterprise. As you can imagine, only a handful of organizations can afford this approach.

More importantly, the applications that aren’t tested right away may be exposed to attacks until both testing and remediation are completed; this can often take a year or more!

3. The Application Triaging Approach:

A preferred approach is to rank application risk using several factors, including a variety of assessment techniques based on an application’s risk profile. To start, look at the following dimensions of each application:

  • Purpose of the application: What is the application used for? How many people use it? A telephone directory application doesn’t have the same risk profile as an accounting application.
  • Data risk: Are confidentiality or integrity requirements tied to the application? Does the application or its servers need 99.999% availability? Is the application affected by any compliance drivers, such as PCI DSS, HIPAA, etc.?
  • Architecture and design: Is the application a Web application, Web service, client/server, mainframe, mid-tier, desktop or something else? Is it Internet or intranet facing? What programming language and framework was it developed in? Does the application use any known high-risk components such as Ajax or PHP? Approximately how large is the application (in lines of source code)?
  • Existing security features: What security features are already known to exist in the application? For example, how does the application perform authentication, authorization, input validation, etc.?

With this method, it’s important to build guidelines that assign numeric risk values for each of these factors. For example, “Add 25 points for Internet-facing applications,” “Subtract 5 points for applications that don’t share data or interfaces with any other applications,” etc.

The end result should be a number that allows you to rank applications against one another.

Remember that profiling applications is often time consuming and hard to perfect, so rather than forcing yourself to get all data for all applications, try to stick to a limit for how much time to spend gathering info on each app.

Your scoring methodology should be tolerant of imperfect information and should be able to rank applications against each other even if you have a deeper understanding of one versus another.

Don’t be too rigid about the scoring system — if a security expert sees an application as particularly high risk, but the scoring system does not backup his intuition, side with the security expert.

Applications in the high-risk bucket should undergo threat modeling, followed by manual and automated runtime vulnerability testing and source-code review.

Moderate-risk applications should be subject to automated runtime vulnerability testing and source-code review with manual verification. Low-risk applications may simply need to undergo runtime vulnerability testing and, time permitting, manual verification.

If the results of testing an application from the lower buckets are particularly negative, then the application should undergo more comprehensive testing.

4. The Health Check Approach:

An alternative to normal triaging is to perform short, one-day combined manual and automated runtime assessments on all applications. In this scenario, assessors limit automated scanning to a small number of test cases, substantially reducing scanning time (to close to an hour typically).

To do this, it’s important to reduce the total number of variants performed for each attack type, such as 10 cross-site scripting, 10 SQL injection, etc.

The manual component entails reviewing and validating the scan results and spending additional time to perform a limited set of manual tests.

Based on the results, an experienced assessor can decide whether to prioritize an application for additional assessment time or to defer additional testing until after reviewing higher-risk applications.

5. The Unauthenticated Health Check Approach:

An alternative to the Health Check Approach is to perform short 1-2 day automated runtime vulnerability assessment on all applications in a short period of time without authentication credentials.

This approach mirrors the attack methods of script kiddies and bots, such as the infamous ASP SQL injection bot that continues to plague Web applications.

Consider this method in cases when it would be too difficult or time-consuming to get authentication credentials.

However, be cognizant that in many applications authenticated users pose the most significant risks. Unauthenticated scans miss all these attacks.

So what’s the best approach? Aligning the assessment with business risk allows for meaningful prioritization of time and money. A hybrid of approaches is ideal: Immediately identify and comprehensively test a small set of the highest risk applications (e.g. your company.com website).

In parallel, start the application triaging process to determine what gets tested next. If the resources are available, begin the unauthenticated health check assessments while you’re triaging.

This process allows you to benefit from the broad analysis of profiling along with the objective results of a quick scan.

Follow up the rest of the process like a normal Risk Triaging Approach: Start with the highest risk apps and work toward the lowest.

Assessments, of course, are only one part of the entire application security equation. The next important step involves remediation.

Luckily, the triaging approach lays the ground work for prioritizing remediation: Start with the highest risk vulnerabilities in the highest risk apps, and move down from there.

A good application security team will also be able to identify root causes to system findings and suggest remediation steps in the software development lifecycle to make its applications more secure from the ground up.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Shut Down Phishing Attacks -Detection & Prevention Checklist

In today's interconnected world, where digital communication and transactions dominate, phishing attacks have become...

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

10 Best Linux Distributions In 2024

The Linux Distros is generally acknowledged as the third of the holy triplet of...