Las instrucciones para construir la demo están en [1].
Estamos viendo de hacer pronto la segunda parte, permanecé en sintonía.
Comparto con los asistentes al meetup[2] y cualquier otro interesado, la hojita que mostré con las listas de conceptos que me parece útil tener en cuenta.
Está en beta, hay cosas que faltan, vale volver en unos pocos días. La pongo en inglés por que es como me manejo habitualmente, pero si alguien necesita que la traduzca, me lo pide e irá al backlog.
[1] http://seguridad-agile.blogspot.com/2012/09/cafein.html
[2] http://www.meetup.com/agiles-bsas/events/118145402/
Information Security Principles
- Confidentiality
- Integrity
- Availabiliy
Information Access Properties
- Authentication
- Authorization
- No repudiation
Design Principles (Saltzer, Schroeder)
- Economy of mechanism
- Fail-safe defaults
- Complete mediation
- Open design
- Separation of privilege
- Least privilege
- Least common mechanism
- Psychological acceptability
Other concepts
- Defense in depth
- Security through obscurity
- Surface attack reduction
- Window of opportunity
- Shannon maxim: the enemy knows the system
Threat modelling
OWASP Application Threat Modelling
STRIDE
- Spoofing identity
- Tampering with data
- Repudiation
- Information disclosure
- Denial of service
- Elevation of privilege
DREAD
- Damage
- Reproducibility
- Exploitability
- Affected users
- Discoverability
Taxonomies
Seven Kingdoms
- Input validation and representation
- API abuse
- Security features
- Time and state
- Errors
- Code quality
- Encapsulation
- Environment
Checklists
OWASP Top Ten 2013
- Injection
- Broken authentication and session management
- Cross-site scripting (XSS)
- Insecure direct object reference
- Security misconfiguration
- Sensitive data exposure
- Missing function level access control
- Cross-site request forgery (CSRF)
- Using components with known vulnerabilities
- Unvalidated redirects and forwards
SANS top 25 software errors
- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
- Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- Missing Authentication for Critical Function
- Missing Authorization
- Use of Hard-coded Credentials
- Missing Encryption of Sensitive Data
- Unrestricted Upload of File with Dangerous Type
- Reliance on Untrusted Inputs in a Security Decision
- Execution with Unnecessary Privileges
- Cross-Site Request Forgery (CSRF)
- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- Download of Code Without Integrity Check
- Incorrect Authorization
- Inclusion of Functionality from Untrusted Control Sphere
- Incorrect Permission Assignment for Critical Resource
- Use of Potentially Dangerous Function
- Use of a Broken or Risky Cryptographic Algorithm
- Incorrect Calculation of Buffer Size
- Improper Restriction of Excessive Authentication Attempts
- URL Redirection to Untrusted Site ('Open Redirect')
- Uncontrolled Format String
- Integer Overflow or Wraparound
- Use of a One-Way Hash without a Salt
No hay comentarios:
Publicar un comentario