ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Application Security Risk Rating
Vaibhav Gupta
Security Researcher ¨C Adobe
in.linkedin.com/in/vaibhav0
@VaibhavGupta_1
$ whoami
2
? Current
? Security Researcher - Adobe
? Previous
? Sr. Information Security Engg. ¨C Fortune 500 company
? Before that..
? InfoSec consultant at various companies
Problem Statement
1. Limited resources to security test large threat
landscape of web applications within enterprise
2. Assigning risk levels to vulnerabilities found in
manual assessments
3
in.linkedin.com/in/vaibhav0
Lets first deal with ¡°1¡±
4
1. Limited resources to security test large threat
landscape of web applications within enterprise
? Increasing threat landscape
? Slow pace of organizations to adopt secure coding practices
? Does not make sense to address all issues simultaneously
in.linkedin.com/in/vaibhav0
Solution ?
5
? Prioritization
? Focus on categorizing into high, medium and low risk
applications
in.linkedin.com/in/vaibhav0
Approach ¨C Risk Assessment of Applications
6
Analyze Business criticality of Applications
Analyze Risk Posture of Application
Categorize Applications based on Risk
Security Assessment Project Planning
in.linkedin.com/in/vaibhav0
Analyze Business criticality of Application
7
Critical
Important
Strategic
Internal
in.linkedin.com/in/vaibhav0
Sr.
#
Questions
Response
(Yes/No)
1 Is the application facing the internet?
2 Is this application dealing with credit card data?
3 Is this application dealing with SSN or any other PII data?
4 Does application host any classified or patented data?
5 If the application goes down, can it create threat to human life?
6 Will this application be subject to any compliance audits?
7
Is this application designed to aid Top Management or Board Members in
decision making?
8
Does application implement any kind of authentication? If yes, please give
additional details
9
Does application implement any kind of authorization? If yes, provide
additional details
10
Is this application developed as a plug-in or extension for other application? If
yes, please provide additional details on what all applications it will be
working with
Analyze Risk Posture of Application
8
Categorize Applications based on Risk
9
Inventory
Business
Criticality
Risk
Posture
Categorized
Inventory
Low
Medium
High
in.linkedin.com/in/vaibhav0
Test Case - Categorize Applications based on Risk
10
in.linkedin.com/in/vaibhav0
? Payroll application
Lets deal with next problem statement: ¡°2¡±
11
2. Assigning risk levels to vulnerabilities found in
manual assessments
????
Why are we
even
considering this
problem
statement
in.linkedin.com/in/vaibhav0
OWASP: Risk Rating Methodology
12
? There are many different approaches to risk analysis.
The OWASP approach is based on standard
methodologies and is customized for application
security.
? Standard risk model :
Risk = Likelihood * Impact
in.linkedin.com/in/vaibhav0
OWASP: Risk Rating Methodology - Steps
13
Step 1
? Identifying a Risk
Step 2
? Estimating Likelihood
Step 3
? Estimating Impact
Step 4
? Determining Severity of the Risk
Step 5
? Deciding What to Fix
Step 6
? Customizing Your Risk Rating Model
in.linkedin.com/in/vaibhav0
Step 1: Identifying a Risk
14
? What needs to be rated?
? XSS ?
? SQLi ?
? Threat agents ?
? Impact ?
in.linkedin.com/in/vaibhav0
Step 2: Estimating Likelihood
15
? Threat Agent Factors
? Skill level
? Motive
? Opportunity
? Size
? Vulnerability Factors
? Ease of discovery
? Ease of exploit
? Awareness
? Intrusion detection
in.linkedin.com/in/vaibhav0
Step 3: Estimating Impact
16
? Technical Impact Factors
? Loss of confidentiality
? Loss of integrity
? Loss of availability
? Loss of accountability
? Business Impact Factors
? Financial damage
? Reputation damage
? Non-compliance
? Privacy violation
in.linkedin.com/in/vaibhav0
Step 4: Determining Severity of the Risk
17
Likelihood and Impact Levels
0 to <3 LOW
3 to <6 MEDUIM
6 to 9 HIGH
in.linkedin.com/in/vaibhav0
?????????? ?? ?????? ????? =
????? ??? ?? ??????
????? ?? ?? ??????
Step 4: Determining Severity of the Risk (Cont..)
18
Test Case - OWASP Risk Rating
19
in.linkedin.com/in/vaibhav0
Step 5: Deciding What to Fix
20
in.linkedin.com/in/vaibhav0
PRIORITIZE
Critical
High
Medium
Low
Note
Note: As a general rule, you should fix the most severe risks first
Step 6: Customizing Your Risk Rating Model
21
¡°A tailored model is much more likely to produce
results that match people's perceptions about what is a
serious risk¡±
- OWASP
? Adding factors
? Customizing options
? Weighting factors
in.linkedin.com/in/vaibhav0
?? Questions ??
Vaibhav Gupta
Security Researcher ¨C Adobe
in.linkedin.com/in/vaibhav0
@VaibhavGupta_1
References:
23
? http://owasp.org/index.php/OWASP_Risk_Rating_
Methodology
? http://owasp.org

More Related Content

Viewers also liked (20)

OAuth 2.0 & Security Considerations
OAuth 2.0 & Security ConsiderationsOAuth 2.0 & Security Considerations
OAuth 2.0 & Security Considerations
Vaibhav Gupta
?
Model-Based Systems Engineering Tool How To Use Innoslate Pt. 2
Model-Based Systems Engineering Tool How To Use Innoslate Pt. 2Model-Based Systems Engineering Tool How To Use Innoslate Pt. 2
Model-Based Systems Engineering Tool How To Use Innoslate Pt. 2
Elizabeth Steiner
?
Minimizing Business Risk in IT Projects
Minimizing Business Risk in IT ProjectsMinimizing Business Risk in IT Projects
Minimizing Business Risk in IT Projects
ITPSB Pty Ltd
?
Reducing Application Risk: minimizing your web application's attack surface
Reducing Application Risk: minimizing your web application's attack surfaceReducing Application Risk: minimizing your web application's attack surface
Reducing Application Risk: minimizing your web application's attack surface
Security Innovation
?
Simulazione di un Penetration Test
Simulazione di un Penetration TestSimulazione di un Penetration Test
Simulazione di un Penetration Test
Salvatore Lentini
?
Gilda's Club 2011 "Live! From South Florida...It's Saturday Night!" Virtual ...
Gilda's Club 2011 "Live! From South Florida...It's Saturday Night!"  Virtual ...Gilda's Club 2011 "Live! From South Florida...It's Saturday Night!"  Virtual ...
Gilda's Club 2011 "Live! From South Florida...It's Saturday Night!" Virtual ...
Gilda's Club South Florida
?
Beyondfreud
BeyondfreudBeyondfreud
Beyondfreud
Tajana Klaric
?
Spark - Volume 3
Spark - Volume 3Spark - Volume 3
Spark - Volume 3
S.P. Jain center of Management
?
tema 3 tema 1tema 3 tema 1
tema 3 tema 1
failyn yousei chan
?
GPP Final Draft for Scott Wells
GPP Final Draft for Scott WellsGPP Final Draft for Scott Wells
GPP Final Draft for Scott Wells
Scott Wells
?
47035 0 mma
47035 0 mma47035 0 mma
47035 0 mma
Operator Warnet Vast Raha
?
Mercenaries Unleashed, 2016
Mercenaries Unleashed, 2016Mercenaries Unleashed, 2016
Mercenaries Unleashed, 2016
Russel Harland
?
Pre Internship Vaibhav Gupta Samtel
Pre Internship Vaibhav Gupta SamtelPre Internship Vaibhav Gupta Samtel
Pre Internship Vaibhav Gupta Samtel
Vaibhav Gupta
?
Master version draft final
Master version draft finalMaster version draft final
Master version draft final
irbgcpartners
?
Foreign Educational Institutions In India Vaibhav Gupta
Foreign Educational Institutions In India   Vaibhav GuptaForeign Educational Institutions In India   Vaibhav Gupta
Foreign Educational Institutions In India Vaibhav Gupta
Vaibhav Gupta
?
Career Profile - Anshuman Jain
Career Profile - Anshuman JainCareer Profile - Anshuman Jain
Career Profile - Anshuman Jain
Anshuman Jain
?
13 0716 session 1 & 2 webinars-final
13 0716 session 1 & 2 webinars-final13 0716 session 1 & 2 webinars-final
13 0716 session 1 & 2 webinars-final
CleantechOpen
?
Publication listing
Publication listingPublication listing
Publication listing
Kevin D. Brown, Ph.D.
?
Spartacus and the slave war
Spartacus and the slave warSpartacus and the slave war
Spartacus and the slave war
tastamal
?
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeLessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Matt Tesauro
?
OAuth 2.0 & Security Considerations
OAuth 2.0 & Security ConsiderationsOAuth 2.0 & Security Considerations
OAuth 2.0 & Security Considerations
Vaibhav Gupta
?
Model-Based Systems Engineering Tool How To Use Innoslate Pt. 2
Model-Based Systems Engineering Tool How To Use Innoslate Pt. 2Model-Based Systems Engineering Tool How To Use Innoslate Pt. 2
Model-Based Systems Engineering Tool How To Use Innoslate Pt. 2
Elizabeth Steiner
?
Minimizing Business Risk in IT Projects
Minimizing Business Risk in IT ProjectsMinimizing Business Risk in IT Projects
Minimizing Business Risk in IT Projects
ITPSB Pty Ltd
?
Reducing Application Risk: minimizing your web application's attack surface
Reducing Application Risk: minimizing your web application's attack surfaceReducing Application Risk: minimizing your web application's attack surface
Reducing Application Risk: minimizing your web application's attack surface
Security Innovation
?
Simulazione di un Penetration Test
Simulazione di un Penetration TestSimulazione di un Penetration Test
Simulazione di un Penetration Test
Salvatore Lentini
?
Gilda's Club 2011 "Live! From South Florida...It's Saturday Night!" Virtual ...
Gilda's Club 2011 "Live! From South Florida...It's Saturday Night!"  Virtual ...Gilda's Club 2011 "Live! From South Florida...It's Saturday Night!"  Virtual ...
Gilda's Club 2011 "Live! From South Florida...It's Saturday Night!" Virtual ...
Gilda's Club South Florida
?
tema 3 tema 1tema 3 tema 1
tema 3 tema 1
failyn yousei chan
?
GPP Final Draft for Scott Wells
GPP Final Draft for Scott WellsGPP Final Draft for Scott Wells
GPP Final Draft for Scott Wells
Scott Wells
?
Mercenaries Unleashed, 2016
Mercenaries Unleashed, 2016Mercenaries Unleashed, 2016
Mercenaries Unleashed, 2016
Russel Harland
?
Pre Internship Vaibhav Gupta Samtel
Pre Internship Vaibhav Gupta SamtelPre Internship Vaibhav Gupta Samtel
Pre Internship Vaibhav Gupta Samtel
Vaibhav Gupta
?
Master version draft final
Master version draft finalMaster version draft final
Master version draft final
irbgcpartners
?
Foreign Educational Institutions In India Vaibhav Gupta
Foreign Educational Institutions In India   Vaibhav GuptaForeign Educational Institutions In India   Vaibhav Gupta
Foreign Educational Institutions In India Vaibhav Gupta
Vaibhav Gupta
?
Career Profile - Anshuman Jain
Career Profile - Anshuman JainCareer Profile - Anshuman Jain
Career Profile - Anshuman Jain
Anshuman Jain
?
13 0716 session 1 & 2 webinars-final
13 0716 session 1 & 2 webinars-final13 0716 session 1 & 2 webinars-final
13 0716 session 1 & 2 webinars-final
CleantechOpen
?
Spartacus and the slave war
Spartacus and the slave warSpartacus and the slave war
Spartacus and the slave war
tastamal
?
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeLessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Matt Tesauro
?

Similar to Application Security Risk Rating (20)

When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Cam Fulton
?
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
jpubal
?
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
Resolver Inc.
?
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24
?
Ownux global July 2023.pdf
Ownux global July 2023.pdfOwnux global July 2023.pdf
Ownux global July 2023.pdf
Bella Nirvana Center
?
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in india
iFour Consultancy
?
OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
Chandan Singh Ghodela
?
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
jpubal
?
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
Ryan Faircloth
?
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
Ryan Faircloth
?
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecWhat the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
IBM Security
?
The Four(ish) Appsec Metrics You Can¡¯t Ignore
The Four(ish) Appsec Metrics You Can¡¯t IgnoreThe Four(ish) Appsec Metrics You Can¡¯t Ignore
The Four(ish) Appsec Metrics You Can¡¯t Ignore
Veracode
?
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security Metrics
Cigital
?
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
AyidAlmgati
?
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.ppt
DorraLamouchi1
?
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
avisha23
?
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
rbrockway
?
Ijetcas14 370
Ijetcas14 370Ijetcas14 370
Ijetcas14 370
Iasir Journals
?
ASIS - Training #4 - Social innovation risk management
ASIS - Training #4 -  Social innovation risk managementASIS - Training #4 -  Social innovation risk management
ASIS - Training #4 - Social innovation risk management
armelleguillermet
?
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
Synopsys Software Integrity Group
?
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Cam Fulton
?
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
jpubal
?
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
Resolver Inc.
?
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24
?
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in india
iFour Consultancy
?
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
jpubal
?
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
Ryan Faircloth
?
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
Ryan Faircloth
?
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecWhat the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
IBM Security
?
The Four(ish) Appsec Metrics You Can¡¯t Ignore
The Four(ish) Appsec Metrics You Can¡¯t IgnoreThe Four(ish) Appsec Metrics You Can¡¯t Ignore
The Four(ish) Appsec Metrics You Can¡¯t Ignore
Veracode
?
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security Metrics
Cigital
?
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
AyidAlmgati
?
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.ppt
DorraLamouchi1
?
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
avisha23
?
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
rbrockway
?
ASIS - Training #4 - Social innovation risk management
ASIS - Training #4 -  Social innovation risk managementASIS - Training #4 -  Social innovation risk management
ASIS - Training #4 - Social innovation risk management
armelleguillermet
?
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
Synopsys Software Integrity Group
?

Recently uploaded (20)

Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025
kherorpacca00126
?
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptxUnderstanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
shyamraj55
?
Early Adopter's Guide to AI Moderation (Preview)
Early Adopter's Guide to AI Moderation (Preview)Early Adopter's Guide to AI Moderation (Preview)
Early Adopter's Guide to AI Moderation (Preview)
nick896721
?
L01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardnessL01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardness
RostislavDaniel
?
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog GavraReplacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
ScyllaDB
?
Transform Your Future with Front-End Development Training
Transform Your Future with Front-End Development TrainingTransform Your Future with Front-End Development Training
Transform Your Future with Front-End Development Training
Vtechlabs
?
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev
?
Computational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the WorldComputational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the World
HusseinMalikMammadli
?
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOTSMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
TanmaiArni
?
Q4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor PresentationQ4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor Presentation
Dropbox
?
The Future of Repair: Transparent and Incremental by Botond De?nes
The Future of Repair: Transparent and Incremental by Botond De?nesThe Future of Repair: Transparent and Incremental by Botond De?nes
The Future of Repair: Transparent and Incremental by Botond De?nes
ScyllaDB
?
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarterQ4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
MariaBarbaraPaglinaw
?
FinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptxFinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptx
Tracxn
?
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
Tsuyoshi Hirayama
?
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar PatturajInside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
ScyllaDB
?
Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Stronger Together: Combining Data Quality and Governance for Confident AI & A...Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Precisely
?
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Jonathan Bowen
?
BoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is DynamicBoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is Dynamic
Ortus Solutions, Corp
?
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-StoryRevolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
ssuser52ad5e
?
UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10
?
Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025
kherorpacca00126
?
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptxUnderstanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
shyamraj55
?
Early Adopter's Guide to AI Moderation (Preview)
Early Adopter's Guide to AI Moderation (Preview)Early Adopter's Guide to AI Moderation (Preview)
Early Adopter's Guide to AI Moderation (Preview)
nick896721
?
L01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardnessL01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardness
RostislavDaniel
?
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog GavraReplacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
ScyllaDB
?
Transform Your Future with Front-End Development Training
Transform Your Future with Front-End Development TrainingTransform Your Future with Front-End Development Training
Transform Your Future with Front-End Development Training
Vtechlabs
?
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev
?
Computational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the WorldComputational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the World
HusseinMalikMammadli
?
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOTSMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
TanmaiArni
?
Q4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor PresentationQ4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor Presentation
Dropbox
?
The Future of Repair: Transparent and Incremental by Botond De?nes
The Future of Repair: Transparent and Incremental by Botond De?nesThe Future of Repair: Transparent and Incremental by Botond De?nes
The Future of Repair: Transparent and Incremental by Botond De?nes
ScyllaDB
?
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarterQ4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
MariaBarbaraPaglinaw
?
FinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptxFinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptx
Tracxn
?
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
Tsuyoshi Hirayama
?
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar PatturajInside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
ScyllaDB
?
Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Stronger Together: Combining Data Quality and Governance for Confident AI & A...Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Precisely
?
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Jonathan Bowen
?
BoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is DynamicBoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is Dynamic
Ortus Solutions, Corp
?
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-StoryRevolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
ssuser52ad5e
?
UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10
?

Application Security Risk Rating

  • 1. Application Security Risk Rating Vaibhav Gupta Security Researcher ¨C Adobe in.linkedin.com/in/vaibhav0 @VaibhavGupta_1
  • 2. $ whoami 2 ? Current ? Security Researcher - Adobe ? Previous ? Sr. Information Security Engg. ¨C Fortune 500 company ? Before that.. ? InfoSec consultant at various companies
  • 3. Problem Statement 1. Limited resources to security test large threat landscape of web applications within enterprise 2. Assigning risk levels to vulnerabilities found in manual assessments 3 in.linkedin.com/in/vaibhav0
  • 4. Lets first deal with ¡°1¡± 4 1. Limited resources to security test large threat landscape of web applications within enterprise ? Increasing threat landscape ? Slow pace of organizations to adopt secure coding practices ? Does not make sense to address all issues simultaneously in.linkedin.com/in/vaibhav0
  • 5. Solution ? 5 ? Prioritization ? Focus on categorizing into high, medium and low risk applications in.linkedin.com/in/vaibhav0
  • 6. Approach ¨C Risk Assessment of Applications 6 Analyze Business criticality of Applications Analyze Risk Posture of Application Categorize Applications based on Risk Security Assessment Project Planning in.linkedin.com/in/vaibhav0
  • 7. Analyze Business criticality of Application 7 Critical Important Strategic Internal in.linkedin.com/in/vaibhav0
  • 8. Sr. # Questions Response (Yes/No) 1 Is the application facing the internet? 2 Is this application dealing with credit card data? 3 Is this application dealing with SSN or any other PII data? 4 Does application host any classified or patented data? 5 If the application goes down, can it create threat to human life? 6 Will this application be subject to any compliance audits? 7 Is this application designed to aid Top Management or Board Members in decision making? 8 Does application implement any kind of authentication? If yes, please give additional details 9 Does application implement any kind of authorization? If yes, provide additional details 10 Is this application developed as a plug-in or extension for other application? If yes, please provide additional details on what all applications it will be working with Analyze Risk Posture of Application 8
  • 9. Categorize Applications based on Risk 9 Inventory Business Criticality Risk Posture Categorized Inventory Low Medium High in.linkedin.com/in/vaibhav0
  • 10. Test Case - Categorize Applications based on Risk 10 in.linkedin.com/in/vaibhav0 ? Payroll application
  • 11. Lets deal with next problem statement: ¡°2¡± 11 2. Assigning risk levels to vulnerabilities found in manual assessments ???? Why are we even considering this problem statement in.linkedin.com/in/vaibhav0
  • 12. OWASP: Risk Rating Methodology 12 ? There are many different approaches to risk analysis. The OWASP approach is based on standard methodologies and is customized for application security. ? Standard risk model : Risk = Likelihood * Impact in.linkedin.com/in/vaibhav0
  • 13. OWASP: Risk Rating Methodology - Steps 13 Step 1 ? Identifying a Risk Step 2 ? Estimating Likelihood Step 3 ? Estimating Impact Step 4 ? Determining Severity of the Risk Step 5 ? Deciding What to Fix Step 6 ? Customizing Your Risk Rating Model in.linkedin.com/in/vaibhav0
  • 14. Step 1: Identifying a Risk 14 ? What needs to be rated? ? XSS ? ? SQLi ? ? Threat agents ? ? Impact ? in.linkedin.com/in/vaibhav0
  • 15. Step 2: Estimating Likelihood 15 ? Threat Agent Factors ? Skill level ? Motive ? Opportunity ? Size ? Vulnerability Factors ? Ease of discovery ? Ease of exploit ? Awareness ? Intrusion detection in.linkedin.com/in/vaibhav0
  • 16. Step 3: Estimating Impact 16 ? Technical Impact Factors ? Loss of confidentiality ? Loss of integrity ? Loss of availability ? Loss of accountability ? Business Impact Factors ? Financial damage ? Reputation damage ? Non-compliance ? Privacy violation in.linkedin.com/in/vaibhav0
  • 17. Step 4: Determining Severity of the Risk 17 Likelihood and Impact Levels 0 to <3 LOW 3 to <6 MEDUIM 6 to 9 HIGH in.linkedin.com/in/vaibhav0 ?????????? ?? ?????? ????? = ????? ??? ?? ?????? ????? ?? ?? ??????
  • 18. Step 4: Determining Severity of the Risk (Cont..) 18
  • 19. Test Case - OWASP Risk Rating 19 in.linkedin.com/in/vaibhav0
  • 20. Step 5: Deciding What to Fix 20 in.linkedin.com/in/vaibhav0 PRIORITIZE Critical High Medium Low Note Note: As a general rule, you should fix the most severe risks first
  • 21. Step 6: Customizing Your Risk Rating Model 21 ¡°A tailored model is much more likely to produce results that match people's perceptions about what is a serious risk¡± - OWASP ? Adding factors ? Customizing options ? Weighting factors in.linkedin.com/in/vaibhav0
  • 22. ?? Questions ?? Vaibhav Gupta Security Researcher ¨C Adobe in.linkedin.com/in/vaibhav0 @VaibhavGupta_1

Editor's Notes

  • #8: Critical - > paypal.com for paypal Important -> Strategic - > company¡¯s main website Internal -> payroll app/AMS