Can we agree, for the sake of argument, that the financial services sector is a primary target for Internet attackers,...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
and consequently, the one sector that must take a stronger stance with regard to Web application security?
There are simply too many opportunities for criminals to abuse your online offerings and exploit your customers. Yet financial-services firms, like companies in other industries, put themselves at risk by not investing in Web application security best practices. According to the Security Spending Benchmarks Project Report, Web application security makes up less than 10% of overall security spending in 36% of companies. Another 33% don't even know what portion of their security spending is on Web applications. Finance was the largest group represented in the survey.
My research illustrates the industry's lack of attention to Web security. As part of a recent campaign I call Online Finance Flaws , I've uncovered and reported Web application vulnerabilities in sites operated by American International Group Inc. (AIG), American Express, JP Morgan Chase & Co., Fiserv Inc., Merrill Lynch & Co. Inc., National City Bank, TIAA-CREF, U.S. Bank, and Visa Inc. Most recently, I revealed a flaw in a Citibank Hungary online offering. In addition, there are findings I have not yet disclosed, or was told very specifically that doing so would bring legal challenges.
I must note that in all cases, the above mentioned financial-services providers made swift repairs and were attentive and courteous in their responses to my reports. The single shortcoming in some cases was timely escalation to the appropriate teams for repair.
However, in each case, I was able to perform cross-site scripting or cross-site request forgeries in the context of the vulnerable financial site. See below for an example involving a Spanish-language Visa site succumbing to a cross-site scripting flaw:
Two elements were consistent in most of my findings; typically a "one or the other" scenario:
- The Web application was developed by a third party, or
- The Web application was included in an acquisition as part of venture integration.
In all scenarios, two practices would have gone a long way in preventing these issues:
- Ensuring use of a security development lifecycle (SDL), both in-house, and as a requirement of all third parties conducting work on behalf of the financial providers.
- Application threat modeling: Determine all possible use case scenarios for the Web application (vision); conduct high level to detailed/granular diagramming sessions of the Web application's data flow (model/diagram); determine all entry points and trust boundaries by thinking like an attacker (identify threats); determine all possible ways to prevent those threats from being realized (mitigate); and confirm all assumptions made in each prior step (validate).
This is a process that can implemented as a cycle, a perpetual undertaking inherent to enterprise security practices; in essence, wash, rinse, repeat.
While current Microsoft guidance regarding the SDL and threat modeling is development-centric, you needn't be a developer or a security expert to threat model. To that end, there is the SDL Threat Modeling Tool to aid you in the process. There's another useful tool called Practical Threat Analysis (PTA). Also, consider as a resource my article specific to analyzing threats to Web applications.
Financial-services providers who commit to these practices will reduce the threats to their Web applications and computing environments significantly. Further, ensuring that third parties take these steps as part of their contractual commitment will instill increased confidence in the financial firms utilizing them, as well as consumers at large.
But if the OWASP survey is any indication, it's going to take a big shift in priorities for organizations to dedicate the needed resources to online security. Compliance was cited by survey respondents most frequently (40%) as the most important driver behind security spending. Companies that suffered a public data breach in the last two years were more likely (86% to 52%) to have a specific IT security budget. Thus, fear and catastrophe are motivators? My research indicates that financial-services providers have much of which to be afraid.
About the author:
Russ McRee is a security analyst, researcher, and founder of holisticinfosec.org, where he advocates a holistic approach to the practice of information assurance. He also writes toolsmith, a monthly column for the ISSA Journal, and has written for numerous other publications