SlideShare a Scribd company logo
1 of 27
Download to read offline
Securing and Modernizing Applications for Texas State Agencies

John Dickson, CISSP
Dan Cornell
D C       ll
Gregory Genung

August 26, 2009
  g      ,
Agenda
•   Background
•   Introductions
•   Problem: Legacy Application Proliferation
•   Solution: Secure and Modernize
•   Strategies
•   Questions
•   More Information




                                                1
Denim Group Background

•   Privately-held, professional services organization that develops
    secure software and mitigates risk with existing software
•   Trusted partner of numerous State of Texas Agencies
•   Development p p
           p      perspective influences all aspects of software security
                                               p                        y
     – All consultants regularly build software systems
     – Approach the problem of software security from a developers viewpoint
•   Thought Leaders in Secure Development Practices
        g                           p
     – Developed Sprajax – First Open Source AJAX vulnerability scanner
     – National speakers at conference such as RSA
     – OWASP National Leaders and Local Chapter




                                                                               2
Denim Group DIR Contract: DIR SDD 660

•   External Controlled Penetration Testing
     – Application Assessments


    IT Security Services

•   Risk and Vulnerability Assessment Services
     –   Application Penetration Testing
     –   Secure Code Reviews
     –   Secure Application Development Services
     –   Commercial Product Assessment
     –   Data Security Assessment
•   Security Training Services
     – Application Security Principles Training




                                                   3
Introductions
•   Name
•   Organization
•   Role
•   Current Challenges and Desired Takeaways




                                               4
Challenges with Legacy Applications




                                      5
Challenges with Legacy Applications
•   Construction
    – Targeted at non-web platforms
    – Little or no thought of security
    – Compliance and governance regimes have come into existence after application
      was originally built
•   Management
        g
    – State of the industry has advanced
    – Older technologies lack modern management and monitoring capabilities
    – Multiple platforms, multiple technologies
•   Skill sets and knowledge
    – Talent pool is shrinking for legacy platforms and languages
    – Little or no knowledge of application requirements



                                                                                     6
Opportunity




              7
Opportunity
•   Piggyback on data center migration to accomplish complementary goals
•   Move to supported platforms
•   Where appropriate and convenient – combine applications
•   Bring applications back to life
•   Build security in
                 y
•   Allow for management and monitoring




                                                                           8
Process
•   Enumerate
•   Classify
•   Plan
•   Remediate




                9
Enumerate




            10
Enumerate
•   What applications are you running?
     – How many instances?
•   Do
    D you hhave th source code?
                 the            d ?
•   Do you have documentation?
•   Who owns the applications?
•   What are the politics of remediating the application?




                                                            11
Classify




           12
Classify
•   What sort of data does the application manage?
     –   PII
     –   PHI
     –   Credit cards
     –   Information about minors
     –   Criminal background information
                      g
•   What technologies and platforms are in use?
•   Which applications are considered “mission critical”?
•   What is the volume and value of transactions?
•   How many and what types of users?




                                                            13
Plan




       14
Plan - Portfolio
•   Prioritize based on risk and value
•   Walk before you run – drive risk out of the process
•   Craft an organizational framework for remediated applications
•   Are there other mandates?
     – “Drop dead” dates tied to budgets
•   Opportunities for data sharing and business Intelligence
•   Processes and technologies for modern development
     – Continuous integration
     – Automated testing
     – Agile development




                                                                    15
Plan - Application
•   Different Approaches
     –   Migrate to data center as-is
     –   Remediate existing application
     –   Remediate via automated conversion
     –   Remediate via rewrite
•   Determine security and compliance requirements from the outset
     – World today is different than when applications were originally created
•   Data center performance requirements
•   Accessibility requirements
•   How will you test the final application?
     – Automated testing has made great strides – xUnit, QASL
•   Who ill
    Wh will own and manage th application after it i remediated?
                  d        the   li ti     ft      is    di t d?

                                                                                 16
Migration




            17
Migrate As-Is
•   Low cost / high risk
•   May require an exception from datacenter
•   Potential for reduced/no support
•   Application issues still exist
     – Security, quality, maintainability, compliance, accessibility, performance
•   “We plan to ‘end-of-life’ this application”
     – Really? For how long?




                                                                                    18
Remediate Existing Application (Upgrade)
•   Upgrade platform version
     – JDK or .NET version, application server version
     – May be required for support in the datacenter
•   Address security vulnerabilities and functionality that is non-compliant
•   Use automated tools and automated functional tests as a guide
     – S t a standard f personnel d i remediation
       Sets   t d d for         l doing   di ti
•   Refactor to increase quality and maintainability
•   Incrementally adopt best practices
     –   Create automated tests
     –   Start continuous integration
     –   Secure coding standards for all new code
     –   Instrument for monitoring


                                                                               19
Remediate via Automated Conversion




                                     20
Remediate via Automated Conversion
•   Automated conversion from one platform to another
     – Example: PowerBuilder to Java
•   Pro: t
    P ostensibly k
               ibl keeps b i
                          business l i i t t
                                   logic intact
•   Makes for a great science project, reality can be disappointing
     – Architectural issues, performance issues, security issues
•   Depending on amount of business logic, you may be better off
    rewriting




                                                                      21
Remediate via Rewrite




                        22
Remediate via Rewrite
•   Use the original application as the specification
     – Minimizes the riskiest part of an application development project (requirements)
     – Use both source code and a running application – static and dynamic
     – Relies heavily on communication with users
•   Provides greatest opportunity for a truly “modern” application
•   Get the most benefit from security, quality and maintainability tools
                              security
     – Much easier to use from the outset of a project than to bolt on later
•   How much business logic has to be rewritten?
     – What do you lose during the rewrite? Depends on type of software
     – Line of business applications often less challenging than system software




                                                                                          23
Remediation Strategy
•   Execution is key
    – Clearly communicate goals, standards and priorities
•   Beware bottlenecks
    B      b ttl    k
    – User acceptance testing
    – Actual deployment into data center
•   Data generation – where does test data come from?
•   Data migration early for legacy data
    – Do not want to be surprised later




                                                            24
Questions




            25
For More Information
Denim Group                    John Dickson, CISSP
DIR Contract: DIR-SDD-660      john@denimgroup.com
(210) 572 4400
      572-4400                 @johnbdickson
                               @j h bdi k
Web: www.denimgroup.com
Blog: denimgroup.typepad.com   Dan Cornell
                               dan@denimgroup.com
                               d @d i
                               @danielcornell

                               Gregory Genung
                               G       G
                               ggenung@denimgroup.com
                               @ggenung



                                                        26

More Related Content

More from Denim Group

Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Denim Group
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleDenim Group
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFixDenim Group
 
OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20Denim Group
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramAppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramDenim Group
 
Using Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team SportUsing Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team SportDenim Group
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Denim Group
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationDenim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsDenim Group
 
An Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsAn Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsDenim Group
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Denim Group
 
A New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixA New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixDenim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Denim Group
 
AppSec in a World of Digital Transformation
AppSec in a World of Digital TransformationAppSec in a World of Digital Transformation
AppSec in a World of Digital TransformationDenim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsDenim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Denim Group
 
AppSec in a World of Digital Transformation
 AppSec in a World of Digital Transformation AppSec in a World of Digital Transformation
AppSec in a World of Digital TransformationDenim Group
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceDenim Group
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceDenim Group
 

More from Denim Group (20)

Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFix
 
OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramAppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
 
Using Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team SportUsing Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team Sport
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your Organization
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native Applications
 
An Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsAn Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT Systems
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
 
A New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixA New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFix
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
 
AppSec in a World of Digital Transformation
AppSec in a World of Digital TransformationAppSec in a World of Digital Transformation
AppSec in a World of Digital Transformation
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native Applications
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
 
AppSec in a World of Digital Transformation
 AppSec in a World of Digital Transformation AppSec in a World of Digital Transformation
AppSec in a World of Digital Transformation
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack Surface
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack Surface
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Securing And Modernizing Applications For Texas State Agencies

  • 1. Securing and Modernizing Applications for Texas State Agencies John Dickson, CISSP Dan Cornell D C ll Gregory Genung August 26, 2009 g ,
  • 2. Agenda • Background • Introductions • Problem: Legacy Application Proliferation • Solution: Secure and Modernize • Strategies • Questions • More Information 1
  • 3. Denim Group Background • Privately-held, professional services organization that develops secure software and mitigates risk with existing software • Trusted partner of numerous State of Texas Agencies • Development p p p perspective influences all aspects of software security p y – All consultants regularly build software systems – Approach the problem of software security from a developers viewpoint • Thought Leaders in Secure Development Practices g p – Developed Sprajax – First Open Source AJAX vulnerability scanner – National speakers at conference such as RSA – OWASP National Leaders and Local Chapter 2
  • 4. Denim Group DIR Contract: DIR SDD 660 • External Controlled Penetration Testing – Application Assessments IT Security Services • Risk and Vulnerability Assessment Services – Application Penetration Testing – Secure Code Reviews – Secure Application Development Services – Commercial Product Assessment – Data Security Assessment • Security Training Services – Application Security Principles Training 3
  • 5. Introductions • Name • Organization • Role • Current Challenges and Desired Takeaways 4
  • 6. Challenges with Legacy Applications 5
  • 7. Challenges with Legacy Applications • Construction – Targeted at non-web platforms – Little or no thought of security – Compliance and governance regimes have come into existence after application was originally built • Management g – State of the industry has advanced – Older technologies lack modern management and monitoring capabilities – Multiple platforms, multiple technologies • Skill sets and knowledge – Talent pool is shrinking for legacy platforms and languages – Little or no knowledge of application requirements 6
  • 9. Opportunity • Piggyback on data center migration to accomplish complementary goals • Move to supported platforms • Where appropriate and convenient – combine applications • Bring applications back to life • Build security in y • Allow for management and monitoring 8
  • 10. Process • Enumerate • Classify • Plan • Remediate 9
  • 11. Enumerate 10
  • 12. Enumerate • What applications are you running? – How many instances? • Do D you hhave th source code? the d ? • Do you have documentation? • Who owns the applications? • What are the politics of remediating the application? 11
  • 13. Classify 12
  • 14. Classify • What sort of data does the application manage? – PII – PHI – Credit cards – Information about minors – Criminal background information g • What technologies and platforms are in use? • Which applications are considered “mission critical”? • What is the volume and value of transactions? • How many and what types of users? 13
  • 15. Plan 14
  • 16. Plan - Portfolio • Prioritize based on risk and value • Walk before you run – drive risk out of the process • Craft an organizational framework for remediated applications • Are there other mandates? – “Drop dead” dates tied to budgets • Opportunities for data sharing and business Intelligence • Processes and technologies for modern development – Continuous integration – Automated testing – Agile development 15
  • 17. Plan - Application • Different Approaches – Migrate to data center as-is – Remediate existing application – Remediate via automated conversion – Remediate via rewrite • Determine security and compliance requirements from the outset – World today is different than when applications were originally created • Data center performance requirements • Accessibility requirements • How will you test the final application? – Automated testing has made great strides – xUnit, QASL • Who ill Wh will own and manage th application after it i remediated? d the li ti ft is di t d? 16
  • 18. Migration 17
  • 19. Migrate As-Is • Low cost / high risk • May require an exception from datacenter • Potential for reduced/no support • Application issues still exist – Security, quality, maintainability, compliance, accessibility, performance • “We plan to ‘end-of-life’ this application” – Really? For how long? 18
  • 20. Remediate Existing Application (Upgrade) • Upgrade platform version – JDK or .NET version, application server version – May be required for support in the datacenter • Address security vulnerabilities and functionality that is non-compliant • Use automated tools and automated functional tests as a guide – S t a standard f personnel d i remediation Sets t d d for l doing di ti • Refactor to increase quality and maintainability • Incrementally adopt best practices – Create automated tests – Start continuous integration – Secure coding standards for all new code – Instrument for monitoring 19
  • 21. Remediate via Automated Conversion 20
  • 22. Remediate via Automated Conversion • Automated conversion from one platform to another – Example: PowerBuilder to Java • Pro: t P ostensibly k ibl keeps b i business l i i t t logic intact • Makes for a great science project, reality can be disappointing – Architectural issues, performance issues, security issues • Depending on amount of business logic, you may be better off rewriting 21
  • 24. Remediate via Rewrite • Use the original application as the specification – Minimizes the riskiest part of an application development project (requirements) – Use both source code and a running application – static and dynamic – Relies heavily on communication with users • Provides greatest opportunity for a truly “modern” application • Get the most benefit from security, quality and maintainability tools security – Much easier to use from the outset of a project than to bolt on later • How much business logic has to be rewritten? – What do you lose during the rewrite? Depends on type of software – Line of business applications often less challenging than system software 23
  • 25. Remediation Strategy • Execution is key – Clearly communicate goals, standards and priorities • Beware bottlenecks B b ttl k – User acceptance testing – Actual deployment into data center • Data generation – where does test data come from? • Data migration early for legacy data – Do not want to be surprised later 24
  • 26. Questions 25
  • 27. For More Information Denim Group John Dickson, CISSP DIR Contract: DIR-SDD-660 john@denimgroup.com (210) 572 4400 572-4400 @johnbdickson @j h bdi k Web: www.denimgroup.com Blog: denimgroup.typepad.com Dan Cornell dan@denimgroup.com d @d i @danielcornell Gregory Genung G G ggenung@denimgroup.com @ggenung 26