Common Security Misconfiguration Habits
Learn about common security misconfiguration habits, how hackers leverage these habits, and how to prevent these attacks.
Understand the security risks of using 3rd party code libraries, and how to mitigate these risks in a 3rd party dependant cyber environment.
TL;DR:
In the security space, we spend a tremendous amount of time working on securing our systems, processes and people. However, as the expression goes, “You’re only as good as your weakest link,” in many cases, this can be something outside of your organization. A 3rd party is a blanket term that refers to all entities outside your organization you do business with such as suppliers, partners, contractors, etc.
3rd-party code libraries are great for saving time and adding certain functionality, but every time you use them, you adopt any of the security risks found in that code (it also functions as one of the ways to accept risks by delegating the risk to a vendor). When you write code yourself, it will be subject to your company’s internal security standards, which should make it more secure. However, whenever you use 3rd-party code libraries, you accept liability for code that isn’t yours and is a risk.
There are several reasons why keeping 3rd-party code secure is a challenge:
So far, we’ve discussed the potential security issues of 3rd party code. Still, in this section, we will discuss some methods for identifying if a 3rd party code repository is secure.
Be Aware of Legal Regulations: If you are working with a vendor overseas to develop 3rd party code, you need to be mindful of regulations like HIPAA, GDPR etc. This will affect how you can share data with that company. You also need to let the company know the regulations your software will be adhering to and ensure that it functions in a way that complies with that.
Ask specific security questions: If you are working with a vendor, it’s a good idea to ask specific questions related to their security process. This includes their review process, how they secure client data, whether their staff is trained in security and what standards/processes they use for creating secure code. Here are some questions you should consider asking:
Address Security in the Contract: Your vendor contracts should include agreed-upon IT security processes and expectations. This should include common language, covering things like security audits, ongoing support for security vulnerabilities that are found, compliance requirements and any other requirements that you should have for your software.
Test the final product: As a security-conscious company, whether you pay a 3rd party to create your applications, use open-source code or build your software completely from scratch, you must test your final product with a penetration test. Even if you believe you followed all the correct guidelines and standards, hiring a professional will help you find security issues before your product hits the market. Here is a video that explains in detail the importance of evaluating your code for potential security flaws.
In this section, we’re going to discuss three main ways that you can mitigate security risks commonly found in 3rd party code libraries. It’s important to note that this is not all of the methods you can use but it is a good starting point for ensuring you have secure code.
Manual Source Code Review: If the company allows you to read the source code, you can do a manual code review for potential security vulnerabilities. This is one of the best ways to understand how code is set up/designed, but unfortunately, not all companies are willing to share their source code with their clients.
Use Static Analysis Tools: If your vendor allows you to view the code or you’re using an open-source code repository, you can use static analysis tools to evaluate source code for potential security bugs. These tools can scan thousands of lines of code and identify common security issues. Some examples of static analysis tools that you can use include Checkmarx SAST, Veracode and Snyk Code.
Use Peer Review Tools: Companies like Veracode offer 3rd-party code scanning to identify possible vulnerabilities. By using services like this, you can get an idea of any vulnerabilities in the libraries that you’re using. Additionally, simply doing some research around the library will give you information on if other people have had issues with it.
The rise of third-party liability in cybersecurity is being driven by a growing regulatory gap, with global standards pushing for increased accountability in software security. Legislation like the EU Cyber Resilience Act and U.S. Executive Order 14028 are at the forefront of this movement, aiming to establish clearer guidelines and responsibilities for software developers and vendors. These regulatory efforts can take two main forms: rule-based or outcome-based legislation. Rule-based approaches provide specific guidelines and requirements, while outcome-based legislation focuses on desired results without prescribing exact methods. Each approach has its advantages and drawbacks, with rule-based legislation offering clarity but potentially stifling innovation, and outcome-based legislation allowing for flexibility but potentially creating ambiguity in compliance.
Understanding the usage and ecosystem of third-party libraries is crucial for developers to comprehend potential risks and select trustworthy components. In-depth research and analysis of these libraries provide valuable insights for building more secure and reliable software. By strengthening the management and maintenance of third-party libraries, developers can mitigate associated risks and enhance overall system security. Studies on library ecosystems across different programming languages reveal important information about usage patterns, quality assessment, and vulnerability propagation. These findings offer beneficial resources and guidance, enabling developers to better evaluate the characteristics and potential issues within third-party library ecosystems. Armed with this knowledge, developers can make informed decisions when incorporating external libraries, ultimately improving the security and reliability of their software systems.
3rd party libraries can be a big security risk for your software products. Whether you’re using an open-source library or hiring a 3rd party to write code, you will need to evaluate the code for any signs of security bugs. This can be done in many ways, but the best ways to evaluate a library consist of doing manual code reviews, using automated analysis tools or hiring professionals to evaluate the code. These services allow you to identify security flaws in your software before it goes to market.
Security
Can be easily manipulated without detection if not properly secured.
Digitally signed and can be validated on the server. Manipulation can be detected.
Size
Limited to 4KB.
Can contain much more data, up to 8KB.
Dependency
Often used for session data on the server-side. The server needs to store the session map.
Contains all the necessary information in the token. Doesn’t need to store data on the server.
Storage Location
Browser cookie jar.
Local storage or client-side cookie.
The advantages and disadvantages of testing on staging compared to production. Which one provides more value.
Providing the quality of the biggest names in security without the price tag and complications.
Manual penetration testing
Full time Canadian hackers
Remediation support