Veracode's Brennan on the Benefits of Security-as-a-Service
Companies spend billions of dollars every year to build, buy, and outsource software development. But yet, we continue to read about another high-profile company reporting another major security breach that is often linked back to their software. Many of today's attacks are targeted, and yesterday's signature based approach simply isn't good enough any longer. Attacks are often multidimensional in nature, including social engineering and phishing techniques coupled with zero-dayvulnerabilities and techniques that use the inherent vulnerabilities of the Internet and your infrastructure against you. A real-world example of this would be web-based applications that are deployed in a secure manner, all the patches are applied, security logging and monitoring is in place, secure socket layer (SSL) encryption was used, and solid information security defense in depth practices were followed. What's the problem? Too often, simple vulnerabilities in the application code are the root source of major security breaches. I recently wrote an article outlining injection vulnerabilities that illustrates how easy it is for unauthorized attackers to take advantage of simple oversights in your coding practices. Even large corporations with sizable security and IT budgets continue to make this mistake as evidenced by the continual reporting of significant security breaches. On October 1, 2012, a hacker group called "Team GhostShell" published the personal records of students, faculty, employees, and alumni from 53 universities including Harvard, Princeton, Stanford, Cornell, Johns Hopkins, and the University of Zurich on pastebin.com. The hackers claimed that they were trying to "raise awareness towards the changes made in today's education", bemoaning changing education laws in Europe and increases in tuition in the United States. In July 2012 a hacker group was reported to have stolen 450,000 login credentials from Yahoo!. The logins were stored in plain text and were allegedly taken from a Yahoo subdomain, Yahoo! Voices. The group breached Yahoo's security by using a "union-based SQL injection technique". In May 2012, the website for Wurm Online, a massively multiplayer online game, was shut down from an SQL injection while the site was being updated In June 2011, PBS was hacked, mostly likely through use of SQL injection; the full process used by hackers to execute SQL injections was described in this Imperva blog. On June 1, 2011, "hacktivists" of the group Lulzsec were accused of using SQLI to steal coupons, download keys, and passwords that were stored in plaintext on Sony's website, accessing the personal information of a million users. Over a period of 4 hours on April 27, 2011, an automated SQL injection attack occurred on Broadband Reports website that was able to extract 8% of the username/password pairs: 8,000 random accounts of the 9,000 active and 90,000 old or inactive accounts. On April 11, 2011, Barracuda Networks was compromised using an SQL injection flaw. E‑mail addresses and usernames of employees were among the information obtained On March 27, 2011, mysql.com, the official homepage for MySQL, was compromised by a hacker using SQL blind injection On February 5, 2011 HBGary, a technology security firm, was broken into by LulzSec using a SQL injection in their CMS-driven website I see the smart organization's moving towards an intelligence-based approach for identifying their most relevant threats, and they truly understand the risks of deploying applications that face the Internet. Because of the lack of maturity in the industry, organizations are building their security intelligence efforts in-house and often times do not have a formal process to review security vulnerabilities as part of their SDLC or business process. The internal approach for security intelligence and secure code reviews will not scale because you cannot hire enough smart people and build enough tools to adequately address the scope of the problem. Any of the major research firms such as Gartner, Forrester, and IDC confirm this line of thinking.