SlideShare a Scribd company logo
1 of 27
Download to read offline
Securing and Modernizing Applications for Texas State Agencies

John Dickson, CISSP
Dan Cornell
D C       ll
Gregory Genung

August 26, 2009
  g      ,
Agenda
•   Background
•   Introductions
•   Problem: Legacy Application Proliferation
•   Solution: Secure and Modernize
•   Strategies
•   Questions
•   More Information




                                                1
Denim Group Background

•   Privately-held, professional services organization that develops
    secure software and mitigates risk with existing software
•   Trusted partner of numerous State of Texas Agencies
•   Development p p
           p      perspective influences all aspects of software security
                                               p                        y
     – All consultants regularly build software systems
     – Approach the problem of software security from a developers viewpoint
•   Thought Leaders in Secure Development Practices
        g                           p
     – Developed Sprajax – First Open Source AJAX vulnerability scanner
     – National speakers at conference such as RSA
     – OWASP National Leaders and Local Chapter




                                                                               2
Denim Group DIR Contract: DIR SDD 660

•   External Controlled Penetration Testing
     – Application Assessments


    IT Security Services

•   Risk and Vulnerability Assessment Services
     –   Application Penetration Testing
     –   Secure Code Reviews
     –   Secure Application Development Services
     –   Commercial Product Assessment
     –   Data Security Assessment
•   Security Training Services
     – Application Security Principles Training




                                                   3
Introductions
•   Name
•   Organization
•   Role
•   Current Challenges and Desired Takeaways




                                               4
Challenges with Legacy Applications




                                      5
Challenges with Legacy Applications
•   Construction
    – Targeted at non-web platforms
    – Little or no thought of security
    – Compliance and governance regimes have come into existence after application
      was originally built
•   Management
        g
    – State of the industry has advanced
    – Older technologies lack modern management and monitoring capabilities
    – Multiple platforms, multiple technologies
•   Skill sets and knowledge
    – Talent pool is shrinking for legacy platforms and languages
    – Little or no knowledge of application requirements



                                                                                     6
Opportunity




              7
Opportunity
•   Piggyback on data center migration to accomplish complementary goals
•   Move to supported platforms
•   Where appropriate and convenient – combine applications
•   Bring applications back to life
•   Build security in
                 y
•   Allow for management and monitoring




                                                                           8
Process
•   Enumerate
•   Classify
•   Plan
•   Remediate




                9
Enumerate




            10
Enumerate
•   What applications are you running?
     – How many instances?
•   Do
    D you hhave th source code?
                 the            d ?
•   Do you have documentation?
•   Who owns the applications?
•   What are the politics of remediating the application?




                                                            11
Classify




           12
Classify
•   What sort of data does the application manage?
     –   PII
     –   PHI
     –   Credit cards
     –   Information about minors
     –   Criminal background information
                      g
•   What technologies and platforms are in use?
•   Which applications are considered “mission critical”?
•   What is the volume and value of transactions?
•   How many and what types of users?




                                                            13
Plan




       14
Plan - Portfolio
•   Prioritize based on risk and value
•   Walk before you run – drive risk out of the process
•   Craft an organizational framework for remediated applications
•   Are there other mandates?
     – “Drop dead” dates tied to budgets
•   Opportunities for data sharing and business Intelligence
•   Processes and technologies for modern development
     – Continuous integration
     – Automated testing
     – Agile development




                                                                    15
Plan - Application
•   Different Approaches
     –   Migrate to data center as-is
     –   Remediate existing application
     –   Remediate via automated conversion
     –   Remediate via rewrite
•   Determine security and compliance requirements from the outset
     – World today is different than when applications were originally created
•   Data center performance requirements
•   Accessibility requirements
•   How will you test the final application?
     – Automated testing has made great strides – xUnit, QASL
•   Who ill
    Wh will own and manage th application after it i remediated?
                  d        the   li ti     ft      is    di t d?

                                                                                 16
Migration




            17
Migrate As-Is
•   Low cost / high risk
•   May require an exception from datacenter
•   Potential for reduced/no support
•   Application issues still exist
     – Security, quality, maintainability, compliance, accessibility, performance
•   “We plan to ‘end-of-life’ this application”
     – Really? For how long?




                                                                                    18
Remediate Existing Application (Upgrade)
•   Upgrade platform version
     – JDK or .NET version, application server version
     – May be required for support in the datacenter
•   Address security vulnerabilities and functionality that is non-compliant
•   Use automated tools and automated functional tests as a guide
     – S t a standard f personnel d i remediation
       Sets   t d d for         l doing   di ti
•   Refactor to increase quality and maintainability
•   Incrementally adopt best practices
     –   Create automated tests
     –   Start continuous integration
     –   Secure coding standards for all new code
     –   Instrument for monitoring


                                                                               19
Remediate via Automated Conversion




                                     20
Remediate via Automated Conversion
•   Automated conversion from one platform to another
     – Example: PowerBuilder to Java
•   Pro: t
    P ostensibly k
               ibl keeps b i
                          business l i i t t
                                   logic intact
•   Makes for a great science project, reality can be disappointing
     – Architectural issues, performance issues, security issues
•   Depending on amount of business logic, you may be better off
    rewriting




                                                                      21
Remediate via Rewrite




                        22
Remediate via Rewrite
•   Use the original application as the specification
     – Minimizes the riskiest part of an application development project (requirements)
     – Use both source code and a running application – static and dynamic
     – Relies heavily on communication with users
•   Provides greatest opportunity for a truly “modern” application
•   Get the most benefit from security, quality and maintainability tools
                              security
     – Much easier to use from the outset of a project than to bolt on later
•   How much business logic has to be rewritten?
     – What do you lose during the rewrite? Depends on type of software
     – Line of business applications often less challenging than system software




                                                                                          23
Remediation Strategy
•   Execution is key
    – Clearly communicate goals, standards and priorities
•   Beware bottlenecks
    B      b ttl    k
    – User acceptance testing
    – Actual deployment into data center
•   Data generation – where does test data come from?
•   Data migration early for legacy data
    – Do not want to be surprised later




                                                            24
Questions




            25
For More Information
Denim Group                    John Dickson, CISSP
DIR Contract: DIR-SDD-660      john@denimgroup.com
(210) 572 4400
      572-4400                 @johnbdickson
                               @j h bdi k
Web: www.denimgroup.com
Blog: denimgroup.typepad.com   Dan Cornell
                               dan@denimgroup.com
                               d @d i
                               @danielcornell

                               Gregory Genung
                               G       G
                               ggenung@denimgroup.com
                               @ggenung



                                                        26

More Related Content

More from Denim Group

Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Denim Group
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleDenim Group
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFixDenim Group
 
OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20Denim Group
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramAppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramDenim Group
 
Using Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team SportUsing Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team SportDenim Group
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Denim Group
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationDenim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsDenim Group
 
An Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsAn Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsDenim Group
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Denim Group
 
A New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixA New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixDenim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Denim Group
 
AppSec in a World of Digital Transformation
AppSec in a World of Digital TransformationAppSec in a World of Digital Transformation
AppSec in a World of Digital TransformationDenim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsDenim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Denim Group
 
AppSec in a World of Digital Transformation
 AppSec in a World of Digital Transformation AppSec in a World of Digital Transformation
AppSec in a World of Digital TransformationDenim Group
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceDenim Group
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceDenim Group
 

More from Denim Group (20)

Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFix
 
OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramAppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
 
Using Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team SportUsing Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team Sport
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your Organization
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native Applications
 
An Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsAn Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT Systems
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
 
A New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixA New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFix
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
 
AppSec in a World of Digital Transformation
AppSec in a World of Digital TransformationAppSec in a World of Digital Transformation
AppSec in a World of Digital Transformation
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native ApplicationsThe As, Bs, and Four Cs of Testing Cloud-Native Applications
The As, Bs, and Four Cs of Testing Cloud-Native Applications
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
 
AppSec in a World of Digital Transformation
 AppSec in a World of Digital Transformation AppSec in a World of Digital Transformation
AppSec in a World of Digital Transformation
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack Surface
 
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack SurfaceEnumerating Enterprise Attack Surface
Enumerating Enterprise Attack Surface
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Securing And Modernizing Applications For Texas State Agencies

  • 1. Securing and Modernizing Applications for Texas State Agencies John Dickson, CISSP Dan Cornell D C ll Gregory Genung August 26, 2009 g ,
  • 2. Agenda • Background • Introductions • Problem: Legacy Application Proliferation • Solution: Secure and Modernize • Strategies • Questions • More Information 1
  • 3. Denim Group Background • Privately-held, professional services organization that develops secure software and mitigates risk with existing software • Trusted partner of numerous State of Texas Agencies • Development p p p perspective influences all aspects of software security p y – All consultants regularly build software systems – Approach the problem of software security from a developers viewpoint • Thought Leaders in Secure Development Practices g p – Developed Sprajax – First Open Source AJAX vulnerability scanner – National speakers at conference such as RSA – OWASP National Leaders and Local Chapter 2
  • 4. Denim Group DIR Contract: DIR SDD 660 • External Controlled Penetration Testing – Application Assessments IT Security Services • Risk and Vulnerability Assessment Services – Application Penetration Testing – Secure Code Reviews – Secure Application Development Services – Commercial Product Assessment – Data Security Assessment • Security Training Services – Application Security Principles Training 3
  • 5. Introductions • Name • Organization • Role • Current Challenges and Desired Takeaways 4
  • 6. Challenges with Legacy Applications 5
  • 7. Challenges with Legacy Applications • Construction – Targeted at non-web platforms – Little or no thought of security – Compliance and governance regimes have come into existence after application was originally built • Management g – State of the industry has advanced – Older technologies lack modern management and monitoring capabilities – Multiple platforms, multiple technologies • Skill sets and knowledge – Talent pool is shrinking for legacy platforms and languages – Little or no knowledge of application requirements 6
  • 9. Opportunity • Piggyback on data center migration to accomplish complementary goals • Move to supported platforms • Where appropriate and convenient – combine applications • Bring applications back to life • Build security in y • Allow for management and monitoring 8
  • 10. Process • Enumerate • Classify • Plan • Remediate 9
  • 11. Enumerate 10
  • 12. Enumerate • What applications are you running? – How many instances? • Do D you hhave th source code? the d ? • Do you have documentation? • Who owns the applications? • What are the politics of remediating the application? 11
  • 13. Classify 12
  • 14. Classify • What sort of data does the application manage? – PII – PHI – Credit cards – Information about minors – Criminal background information g • What technologies and platforms are in use? • Which applications are considered “mission critical”? • What is the volume and value of transactions? • How many and what types of users? 13
  • 15. Plan 14
  • 16. Plan - Portfolio • Prioritize based on risk and value • Walk before you run – drive risk out of the process • Craft an organizational framework for remediated applications • Are there other mandates? – “Drop dead” dates tied to budgets • Opportunities for data sharing and business Intelligence • Processes and technologies for modern development – Continuous integration – Automated testing – Agile development 15
  • 17. Plan - Application • Different Approaches – Migrate to data center as-is – Remediate existing application – Remediate via automated conversion – Remediate via rewrite • Determine security and compliance requirements from the outset – World today is different than when applications were originally created • Data center performance requirements • Accessibility requirements • How will you test the final application? – Automated testing has made great strides – xUnit, QASL • Who ill Wh will own and manage th application after it i remediated? d the li ti ft is di t d? 16
  • 18. Migration 17
  • 19. Migrate As-Is • Low cost / high risk • May require an exception from datacenter • Potential for reduced/no support • Application issues still exist – Security, quality, maintainability, compliance, accessibility, performance • “We plan to ‘end-of-life’ this application” – Really? For how long? 18
  • 20. Remediate Existing Application (Upgrade) • Upgrade platform version – JDK or .NET version, application server version – May be required for support in the datacenter • Address security vulnerabilities and functionality that is non-compliant • Use automated tools and automated functional tests as a guide – S t a standard f personnel d i remediation Sets t d d for l doing di ti • Refactor to increase quality and maintainability • Incrementally adopt best practices – Create automated tests – Start continuous integration – Secure coding standards for all new code – Instrument for monitoring 19
  • 21. Remediate via Automated Conversion 20
  • 22. Remediate via Automated Conversion • Automated conversion from one platform to another – Example: PowerBuilder to Java • Pro: t P ostensibly k ibl keeps b i business l i i t t logic intact • Makes for a great science project, reality can be disappointing – Architectural issues, performance issues, security issues • Depending on amount of business logic, you may be better off rewriting 21
  • 24. Remediate via Rewrite • Use the original application as the specification – Minimizes the riskiest part of an application development project (requirements) – Use both source code and a running application – static and dynamic – Relies heavily on communication with users • Provides greatest opportunity for a truly “modern” application • Get the most benefit from security, quality and maintainability tools security – Much easier to use from the outset of a project than to bolt on later • How much business logic has to be rewritten? – What do you lose during the rewrite? Depends on type of software – Line of business applications often less challenging than system software 23
  • 25. Remediation Strategy • Execution is key – Clearly communicate goals, standards and priorities • Beware bottlenecks B b ttl k – User acceptance testing – Actual deployment into data center • Data generation – where does test data come from? • Data migration early for legacy data – Do not want to be surprised later 24
  • 26. Questions 25
  • 27. For More Information Denim Group John Dickson, CISSP DIR Contract: DIR-SDD-660 john@denimgroup.com (210) 572 4400 572-4400 @johnbdickson @j h bdi k Web: www.denimgroup.com Blog: denimgroup.typepad.com Dan Cornell dan@denimgroup.com d @d i @danielcornell Gregory Genung G G ggenung@denimgroup.com @ggenung 26