Application Security Threats and Attacks
Supplier Risk Assessment
Definition: Evaluating the risks associated with acquiring third-party software.
Process:
Identify potential impacts (financial, operational, strategic).
Assess the likelihood of disruption.
Evaluate the impact on business operations.
Web Application Firewall (WAF)
Function: Filters, monitors, and blocks HTTP traffic to/from a web application.
Difference from Regular Firewall: WAF focuses on specific web application content, while regular firewalls handle overall network traffic.
Common Application Security Threats and Attacks
Input Validation:
Attacks: Cross-site scripting (XSS), SQL injection, buffer overflow.
Authentication:
Attacks: Brute force attacks, credential theft, network eavesdropping.
Authorization:
Attack: Elevation of privilege.
Configuration Management Threats
Common Attacks: Unauthorized access to admin interfaces, configuration stores, clear text data, lack of accountability, over-privileged accounts.
Exception Management Threat
Example: Denial-of-service (DoS) attacks, which disrupt service availability.
Auditing and Logging Threats
Common Issues: User denies performing actions, lack of traceability, attackers covering their tracks.
OWASP Top 10 Application Security Risks
Injection
Issue: Untrusted data sent to an interpreter can execute unintended commands or access unauthorized data.
Broken Authentication
Issue: Flaws in authentication and session management can lead to compromised credentials and unauthorized user access.
Sensitive Data Exposure
Issue: Inadequate protection of sensitive data (e.g., financial, healthcare) can lead to theft or modification.
XML External Entities (XXE)
Issue: Poorly configured XML processors can lead to internal file disclosure, remote code execution, and denial-of-service attacks.
Broken Access Control
Issue: Improper enforcement of user access restrictions can lead to unauthorized data access or functionality.
Security Misconfiguration
Issue: Insecure default configurations, incomplete setups, or misconfigured settings can expose vulnerabilities.
Cross-Site Scripting (XSS)
Issue: Untrusted data included in webpages can lead to script execution in users' browsers, session hijacking, and defacement.
Insecure Deserialization
Issue: Flaws in deserialization can lead to remote code execution, replay attacks, or privilege escalation.
Using Components with Known Vulnerabilities
Issue: Components with known vulnerabilities can lead to data loss or server takeover.
Insufficient Logging and Monitoring
Issue: Inadequate logging and ineffective incident response can delay breach detection and enable further attacks.
Last updated