Security Controls: Data at Rest Encryption Cryptographic Storage
13
Security Controls: Data in Transit
14
Root Cause The type of software with vulnerable components
15
Fundamental Security Principle
16
Components Examples
17
Implement a Logging Library
18
Simple Wrapper
19
Implement a Payment Gateway Scenario • Vendor APS-line payment gateways . Can have more than one payment gateway in an application • Required to be interchangeable
20
Adapter Design Pattern
21
Implement a Single Sign-On
22
Façade Design Pattern
23
Secure Software Starts from Design!
24
Configuration Hardening
25
Final Takeaways
26
Security Controls for Secure Development
27
Global AppSee Amsterdam
Description:
Explore security vulnerabilities decomposition in this 41-minute OWASP Foundation conference talk. Delve into SQL injection classification, security controls, intrusion detection points, and secure data handling workflows. Learn about cryptographic storage, data encryption, and fundamental security principles. Examine design patterns for implementing payment gateways and single sign-on systems. Gain insights on configuration hardening and essential security controls for secure software development. Discover a fresh perspective on analyzing and addressing vulnerabilities in web applications.
Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities