php & the secure development lifecycle

23
PHP & The Secure Application Development Life-cycle “The art of building secure PHPyramids” Robert van der Linde Santa Clara, 16 september 2008

Upload: guestaaf017

Post on 17-Dec-2014

2.793 views

Category:

Technology


0 download

DESCRIPTION

Slides from the zendcon'08 presentation "PHP & The secure development lifecycle" by Robert van der Linde

TRANSCRIPT

Page 1: PHP & The secure development lifecycle

PHP & The Secure Application Development

Life-cycle“The art of building secure PHPyramids”

Robert van der LindeSanta Clara, 16 september 2008

Page 2: PHP & The secure development lifecycle

Who’s that dude?

• Robert van der Linde• 5 years of PHP

experience• Team lead PaSS-PHP• Sogeti’s PHP training

coordinator• Zend Certified

Engineer

Page 3: PHP & The secure development lifecycle

Secure PHPyramids

Page 4: PHP & The secure development lifecycle

• An application is secure if does exactly what is expected at all times

What is a secure application?

Design Implementation

Page 5: PHP & The secure development lifecycle

So what do we do?

• Applications are information• Threats are everywhere• Creating secure applications need

a standardized approach• There is tooling available to help

you

Page 6: PHP & The secure development lifecycle

Application === Information

IntegrityAvailability Confidentiality

Information security

Page 7: PHP & The secure development lifecycle

Where do you implement security?

Page 8: PHP & The secure development lifecycle

Where do threats come from?

• Conciously

Page 9: PHP & The secure development lifecycle

Where do threats come from?

• Unconsciously

Page 10: PHP & The secure development lifecycle

Approach

Page 11: PHP & The secure development lifecycle

Requirements

Page 12: PHP & The secure development lifecycle

Test plans

• Training• Awareness• Outside-the-box thinking• Codified security test plans• Tools

>OWASP WebScarab>Ratproxy>NTO Spider

Page 13: PHP & The secure development lifecycle

Test results

• Review with programmers• Reporting and analysis• End goal: clean bill of health

Page 14: PHP & The secure development lifecycle

Code

• Owasp PHP top 5>Remote code execution>Cross site scripting>SQL Injection>PHP Configuration>File system attacks

• Best practices>Whitelisting vs. blacklisting>Filter input, escape output>Keep errors to yourself

Page 15: PHP & The secure development lifecycle

Feedback

• Consciously handle found issues• Praise, not prey• Handle proactively

Page 16: PHP & The secure development lifecycle

The key to all this

• Awareness

Page 17: PHP & The secure development lifecycle

Implementation at Sogeti

• PaSS (Pro-active Security Strategy)• Workgroup per expertise

>PHP>Design>Testing>Etc.

• Added value

Page 18: PHP & The secure development lifecycle

Tooling example

Finally.... some code!

Page 19: PHP & The secure development lifecycle

Setting it up

Page 20: PHP & The secure development lifecycle

The result

Page 21: PHP & The secure development lifecycle

Working with the result

Page 22: PHP & The secure development lifecycle

What’s next?

• Logging attacks>File>MySQL>Email

• Reporting and analysis

Page 23: PHP & The secure development lifecycle

Thank you for watching

• Referenties:> www.php.net> www.owasp.com> www.php-ids.org> www.sogeti.nl> www.zend.com

• Contact:E: [email protected]: [email protected]: linderobBlog: http://php.linde002.nl/