Application Security Assessment Methods
Results 1 to 3 of 3

Thread: Application Security Assessment Methods

  1. #1
    Senior Member
    Join Date
    Aug 2002

    Application Security Assessment Methods

    Hey all,

    The pen-test mailing list @ securityfocus has been recently buzzing with a plethora of information regarding web-application penetration testing.

    A lot of people apparently are interested in the methodology on how to "to conduct
    a successful application security assessment."

    A brief paper has been prepared to "better assess the security of an application - without the overhead of a complex methodology."

    Its a good read for consultants, security professionals, and fellow AO'ers. Take a look at it when you have the time (its very comprehensive)
    It\'s 106 miles to Chicago, we\'ve got a full tank of gas, half a pack of cigarettes, it\'s dark and we\'re wearing sunglasses.

    Hit it!

  2. #2
    oldie ric-o's Avatar
    Join Date
    Nov 2002

    Thumbs up

    Thanks Showtime8000, looks like a good checklist of questions to ask/investigate!

    Perfect timing as doing some web app dev/sec evaluation right now.

  3. #3
    Join Date
    May 2003
    *grumble* these kinds of things really bug me.

    On the one hand, it does what it sets out to do very well. If you are wishing to review web application security it is an excellent resources. However, the very fact that is is good is what makes it so terrible! Have I confused you yet?

    This makes people think that with such an extensive resource that application security is a viable route to take when high security is concerned and this is an utter falsehood. You can have applications that are riddled with bugs and exploits that will still be more secure than highly hardened apps if you follow one simple principal. Limit what the appication can do.

    Each level of a system should be secured by the level above it and this security should be monodirectional. For example, the web server can effect the security of the web app, but not the other way around.
    The web server secures the web app. The web server compartment secures the web server. The operating system secures the web server compartment. The security kernel secures the operating system.

    This is a correct security model, leaving only transactions and covert channels to worry about.

    I have attached a document that discusses how this type of model would have prevent from being owned in an attack a few years back.

    The sad thing is that most of you will not have the chance to work with such systems so for you, the topic link is an excellent resource. I just figured some of you might want to look beyond.


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts