Application and Database Security
Featuring 66 Papers as of April 27, 2015
Protection from the Inside: Application Security Methodologies Compared
by Jacob Williams - April 27, 2015
- Associated Webcasts: Analyst Webcast: RASP vs. WAF: Comparing Capabilities and Efficiencies
- Sponsored By: HP
A SANS Analyst Program review by Jacob Williams. This webcast will explore the relative capabilities and efficiencies of RASP and WAF technologies, and discuss a blind, vendor-anonymous review of a representative product in each category.
Web Application Firewalls
by Jason Pubal - March 16, 2015
For years, attackers have assailed networks and exploited system level vulnerabilities, fueling demand for products like firewalls and intrusion detection systems.
Protecting Access to Data and Privilege with Oracle Database Vault
by Pete Finnigan - January 29, 2015
- Associated Webcasts: Analyst Webcast: Securing Oracle Databases Made Easy
- Sponsored By: Oracle
A review of Oracle Database Vault 12c by security expert Pete Finnigan. Oracle Database Vault takes advantage of built-in features of the Oracle ecosystem, and provides a holistic approach to data security management.
Secure Design with Exploit Infusion
by Wen Chinn Yew - November 11, 2014
In the age of a highly digitally connected world, the ever-increasing security threat has prompted many initiatives to address it. One important area is to build security into software development.
Data Encryption and Redaction: A Review of Oracle Advanced Security
by Dave Shackleford - September 15, 2014
- Associated Webcasts: Simplifying Data Encryption and Redaction Without Touching the Code
- Sponsored By: Oracle
A review of Oracle Advanced Security for Oracle Database 12c by SANS Analyst and Senior Instructor Dave Shackleford. It explores a number of the product's capabilities, including transparent data encryption (TDE) and effortless redaction of sensitive data, that seamlessly protect data without any developer effort from unauthorized access.
Building an Application Vulnerability Management Program
by Jason Pubal - July 28, 2014
For years, attackers have assailed network and system level vulnerabilities, fueling demand for products like firewalls and network vulnerability scanners.
Incident Response in a Microsoft SQL Server Environment
by Juan Walker - July 3, 2014
Incident Response in a Microsoft SQL Server environment starts with planning and requires the Intelligence approach.
How to Win Friends and Remediate Vulnerabilities
by Chad Butler - March 20, 2014
In today's era of rapid release development projects, finding vulnerabilities is not difficult.
Survey on Application Security Programs and Practices
by Jim Bird, Frank Kim - February 12, 2014
- Associated Webcasts: Application Security Programs On the Rise, Skills Lacking: A SANS Survey
- Sponsored By: Qualys Hewlett Packard Veracode
Survey shows application security programs on the rise but skill are lacking.
Database Activity Monitoring and Audit: A Review of Oracle Audit Vault and Database Firewall
by Tanya Baccam - January 14, 2014
- Sponsored By: Oracle
Review of Oracle Audit Vault and Database Firewall (AVDF). A platform for organizations looking to increase security with enterprise wide database activity monitoring, auditing and reporting.
Protecting applications against Clickjacking with F5 LTM
by Michael Nepomnyashy - November 21, 2013
Clickjacking is a web framing attack that uses iframes to hijack a user's web session. It is a powerful hacking technique that poses a threat to many types of web applications. The Information Security Organization of ACC Corporation decided to deploy centralized protection against clickjacking for hosted applications. The implementation of an anti-clickjacking solution can be quite challenging in a large scale hosting organization with over 70 applications that often frame each other. This paper describes a dynamic HTTP headers approach that protects hosted applications without breaking existing web framing relationship between webpages.
A Hands-on XML External Entity Vulnerability Training Module
by Carrie Roberts - November 4, 2013
Web based attacks are on the rise, and the most exploited vulnerabilities are often not the newest (Symantec Corporation, 2013).
Introduction to the OWASP Mutillidae II Web Pen-Test Training Environment
by Jeremy Druin - October 22, 2013
Web application security has become increasingly important to organizations.
Securing Web Applications Made Simple and Scalable
by Gregory Leonard - October 10, 2013
- Associated Webcasts: Securing Web Applications Made Simple and Scalable
- Sponsored By: Hewlett Packard
Evaluation of HP Fortify WebInspect 10.10, an application security testing (DAST) tool.
Application Security: Tools for Getting Management Support and Funding
by John Pescatore - October 4, 2013
- Associated Webcasts: John Pescatore Analyst Webcast - Actionable Tools for Convincing Management to Fund Application Security
- Sponsored By: WhiteHat Security
This paper provide tools and techniques that demonstrate the need for better application security and the appropriate level of investment.
Web Application Injection Vulnerabilities: A Web App's Security Nemesis?
by Erik Couture - June 14, 2013
An ever-increasing number of high profile data breaches have plagued organizations over the past decade.
2013 SANS Mobile Application Security Survey
by Kevin Johnson, James Jardine - June 6, 2013
Survey to assess organizational awareness and the procedures around mobile application risk.
Setting Up a Database Security Logging and Monitoring Program
by Jim Horwath - May 10, 2013
This paper is about implementing a database security logging and monitoring program to increase the security posture of a corporate infrastructure.
Next-Generation Datacenters = Next-Generation Security
by Dave Shackleford - May 1, 2013
- Associated Webcasts: Datacenter Virtualization from a Security Perspective
- Sponsored By: McAfee, a division of Intel Security
Whitepaper breaks down the foundations of a virtual infrastructure, examines pros and cons of security tools and controls available for risk layers, present the pros and cons of different approaches, and looks at new technology to implement protection models in virtual and cloud-based data centers.
Endpoint Security through Application Streaming
by Adam Walter - March 15, 2013
Throughout the last 30 years technology has undergone a shift in implementation.
SANS Survey on Application Security Programs and Practices
by Jim Bird, Frank Kim - December 6, 2012
Application security survey to understanding what works in appsec and why.
Auditing ASP.NET applications for PCI DSS compliance
by Christian Moldes - February 7, 2012
This paper intends to provide specific guidance on how to audit ASP.NET applications and validate that they meet PCI DSS requirements. It does not intend to provide guidance on how to conduct penetration tests on ASP.NET applications, identify secure coding vulnerabilities, or remediate ASP.NET vulnerabilities.
Oracle Advanced Security
by Tanya Baccam - December 9, 2011
- Sponsored By: Oracle
Review of Oracle Advanced Security encryption covers important product capabilities including network encryption for data in flight and Transparent Data Encryption (TDE) for data at rest.
Securing Blackboard Learn on Linux
by David Lyon - December 1, 2011
Blackboard Learn (Bb Learn) is an application suite providing educational technology to facilitate online, web based learning. It is typical to see Bb Learn hosting courses and content. Common add-ons include the Community and Content systems which are licensed separately.
Integrating Security into Development, No Pain Required
by Dave Shackleford - September 20, 2011
- Sponsored By: IBM
This paper looks at software development from both the security and development perspectives, and then evaluates what tools and techniques can help integrate security into development cycles without slowing down the process or creating too much overhead.
SANS Institute Review: Oracle Database Vault
by Tanya Baccam - August 27, 2011
- Sponsored By: Oracle
Review of Oracle Database Vault with Oracle Database Enterprise Edition 11g Release 2demonstrates strong performance, while making it easy to add, change and modify rules and groups. as well as gain visibility into user activity through a variety of audit and compliance reports available through the Oracle Database Vault application.
Security of Applications: It Takes a Village
by Dave Shackleford - June 20, 2011
- Sponsored By: Adobe Systems Inc.
This paper discusses the role of vendors and consumers in protecting against client-side application attacks.
Mass SQL Injection for Malware Distribution
by Larry Wichman - April 20, 2011
Cybercriminals have made alarming improvements to their infrastructure over the last few years. One reason for this expansion is thousands of websites vulnerable to SQL injection. Malicious code writers have exploited these vulnerabilities to distribute malware.
Four Attacks on OAuth - How to Secure Your OAuth Implementation
by Khash Kiani - March 24, 2011
A technical study of an emerging open-protocol technology and its security implications.
Protecting Users: The Importance Of Defending Public Sites
by Kristen Sullivan - January 18, 2011
In the application security industry, one of the hardest elements to communicate to customers is the need for building secure web applications even if those applications transmit minimally sensitive data. The purpose of this document is to provide a valid case for why all applications should follow a minimum standard for secure coding practices. Many assume the only applications requiring protection are those which store sensitive or confidential data, but that is a grievous misjudgment. Additionally, with tight budgets and limited security resources, it is hard to justify reasons for securing public facing sites only offering open record information. The main cause of this is a lack of understanding the risk associated.
Application Whitelisting: Panacea or Propaganda
by Jim Beechey - January 18, 2011
Every day, organizations of all sizes struggle to protect their endpoints from a constant barrage of malware. The number of threats continues to increase dramatically each year.
Reducing Organizational Risk Through Virtual Patching
by Joseph Faust - January 11, 2011
Software patching for IT Departments across the organizational landscape has always been an integral part of maintaining functional, usable and stable software. Historically the traditional patch cycle has been focused on fixing or resolving issues which affect functionality. In recent years, with the advancement of more sophisticated and targeted threats which are occurring in quicker cycles, this focus is dramatically changing. (Risk Assessment Cisco, n.d.; Executive Office of The United States, 2005) . Corporations and Government now have a greater understanding of potential losses and expenses incurred by not maintaining application security and are moving towards an increased focus on patching and security (Epstein, Grow & Tschang, 2008). With organizations reputations, consumer confidence and corporate secrets at risk, corporations and government are recognizing the need to shift and address vulnerabilities at a much faster pace than they historically have done so (Chan, 2004). Over roughly the last ten years, the length of time between the documentation of a given vulnerability in a piece of software and the development of an actual exploit that can take advantage of the weakness in the application, has decreased tremendously. According to Andrew Jaquith, senior analyst at Yankee Group, the average time between vulnerability discovery and the release of exploit code is less than one week. (Shrinking time from, 2006). It has also been identified that 99% of intrusions result from exploitation of known vulnerabilities or configuration errors where countermeasures were available ("Risk reduction and.," 2010) . Clearly these statistics alone can prove daunting for many businesses trying to keep pace and maintain proper defenses against the bad guys.
Enabling Social Networking Applications for Enterprise Usage
by Eric Cole, PhD - December 1, 2010
- Sponsored By: Palo Alto Networks
Businesses must define a secure social networking policy and educate employees about the risks associated with using social networking sites.
Oracle Database Security: What to Look for and Where to Secure
by Tanya Baccam - April 10, 2010
- Sponsored By: Oracle
This paper discusses four risk management basics that must be addressed to protect databases and their sensitive data.
Making Database Security an IT Security Priority
by Tanya Baccam - November 11, 2009
- Sponsored By: Oracle
A discussion of security strategy and the key controls that should be considered to database security and protection of an organizations information assets.
AppSec - Cross Site Request Forgery: What Attackers Don't Want You to Know
by Jason Lam & Johannes B. Ullrich - May 22, 2009
AppSec - Protecting Your Web Apps: Two Big Mistakes and 12 Practical Tips to Avoid Them
by Ed Skoudis and Frank Kim - March 2, 2009
Many web application vulnerabilities are a direct result of improper input validation and output filtering, which leads to numerous kinds of attacks, including cross-site scripting (XSS), SQL injection, command injection, buffer overflows and many others. This article describes some of the best defenses against such attacks, which every Web application developer should master.
Web Based Attacks
by Justin Crist - January 4, 2008
Attacks upon information security infrastructures have continued to evolve steadily overtime; legacy network based attacks have largely been replaced by more sophisticated web application based attacks. This paper will introduce and address web based attacks from attack to detection. Information security professionals new to application layer attacks will be in a better position to understand the underlying application attack vectors and methods of mitigation after reading this paper.
Analyzing Attack Surface Code Coverage
by Justin Seitz - November 14, 2007
The art of analyzing a software system for security and robustness flaws can be a daunting task, and often begs a question: when is the analysis complete? Commonly a researcher or analyst answers this question by determining whether they have run out of budget, time, or have found bugs. However, these are not empirical pieces of evidence, what is really required is to understand how much of the software that is attackable was exercised.
Forensic Analysis of a SQL Server 2005 Database Server
by Kevvie Fowler - September 28, 2007
In-depth analysis of a forensic analysis of a SQL Server 2005 Database Server.
Automated Scanning of Oracle 10g Databases
by Rory McCune - August 7, 2007
This paper analyses the various areas of Oracle security covered by the course and seeks to propose details of which checks could be carried out automatically and how (for example what parameters to check, and what the various resultant values would indicate about the security of the database).
Using Oracle Forensics to determine vulnerability to Zero Day exploits
by Paul Wright - February 27, 2007
The aim of this paper is to explain the threat of PLSQL injection on Oracle databases and show how principles from the world of computer forensics can be transferred to Oracle in order to deduce vulnerability to past and future exploits with a high level of certainty. This paper will enable the reader to assess the effects of applying an Oracle security patch (CPU), and identify windows of past vulnerability that can be usefully correlated with archived audit logs in order to locate previous attacks.
Security in Sun Java System Application Server Platform Edition 8.0
by Sid Ansari - June 29, 2005
In what follows, we will examine the various parts of this definition before turning to an examination of how Enterprise Java Beans can be secured.
Web Browser Insecurity
by Paul Asadoorian - June 2, 2005
There has been much debate lately between two different browsers, namely Microsoft's Internet Explorer and the Mozilla Project's Firefox web browser. Security is in the center of this debate, accompanied by features and usability.
Application Firewalls: Don't Forget About Layer 7
by Russell Eubanks - May 17, 2005
Securing web-based communication is and will remain vital to existing business sustainability and future growth.
Reining in the LAN client
by David Monaco - February 25, 2005
We'll often see inadequate access control for the local area network (LAN). It is usually considered a "trusted zone" thus unfortunately a frequently neglected zone. While the LAN may well be the most trusted zone, to achieve an appropriate level of layered security, authorizing clients attaching to the LAN is paramount.
Assessing Vendor Application Security A Practical Way to Begin
by Barton Hubbs - April 8, 2004
Many companies are adopting a preference toward buying vendor software versus building software in-house to meet business needs. Some of the drivers for this preference are integration, scalability, outsourcing, support, speed-to market, process savings, and reducing the cost of information technology (IT).
Securing SQL Connection String
by Dmitry Dessiatnikov - April 8, 2004
Securing authentication information used to establish connection between two applications is one of the most critical aspects of application security. This paper will focus on protecting connection strings used to authenticate communication between the web server and the back-end database.
Application Development Technology and Tools: Vulnerabilities and threat management with secure programming practices, a defense in-depth approach
by Vilas Ankolekar - December 13, 2003
This paper addresses the security challenges that exist due to programming flaws, and explains how simple programming practices can reduce the risks.
SQL Server 2000: Permissions on System Tables Granted to Logins Due to the Public Role
by K Kelley - December 13, 2003
Microsoft SQL Server 7.0 and 2000 make use of the concept of roles at the server level and within each database which is discussed in this paper, specifically taking a close look at the public role.
SQL Server Email - vulnerability issues and prevention strategies
by Frank Ress - October 6, 2003
This paper will explore some of the ways this feature could be used by both legitimate users and intruders.
Securing End User Active Server Page Applications on an Intranet
by Bob Bohn - September 26, 2003
This paper discusses the evolution of end user computing as well as the issues involved, and explores a number of techniques which can be used to secure end user applications in a Microsoft IIS 4.0 intranet environment.
J.D. Edwards Security using RBAC
by Scott Gordee - September 4, 2003
Although OneWorld security is incredibly flexible, it can also become convoluted and difficult to manage if a security model isn't created and enforced in the infancy of its implementation.
Deploying a Secure Web Application: From a Coding Perspective
by Jaime Spicciati - August 8, 2003
The purpose of this document is to give a developer a very detailed and reproducible guideline for the development of a typical web application, focused on common flaws that recently emerged in popular web applications.
Security for a CRM environment
by Jason LaFrance - February 22, 2003
This paper is designed to help the security professional determine the considerations that are involved with a secure CRM rollout.
Securing Server Side Java
by William Rushmore - December 21, 2002
Although Java has many security features, some Java programmers may think these built-in protections are adequate for securing their applications, however, nothing could be further from the truth.
Framework for Secure Application Design and Development
by Chris McCown - December 19, 2002
This paper presents a framework to assist developers in the practice of secure application design and development.
Security Scenarios in Analysis and Design
by Dwight Haworth - September 16, 2002
This article addresses the issue of designing security into systems rather than trying to add it to systems after development.
Distributed Systems Security: Java, CORBA, and COM+
by April Moreno - September 14, 2002
The purpose of this paper is to examine three popular architectures for distributed systems applications and their security implications.
Web Application Security for Managers
by Pierre Brassinne - August 24, 2002
Recommendations to managers for securing web applications
Making Your Network Safe for Databases
by Duane Winner - July 21, 2002
Guidelines for securing a database-driven web site.
Distributed Object Technology: Security Perspective
by Subbu Cherukuwada - February 14, 2002
An introduction to distributed object technology and an overview of security features available in Microsoft.NET and CORBA.
An Approach to Application Security
by Ian Rathie - January 30, 2002
This document discusses an approach to assessing application security and developing a simple Security Development Life Cycle to complement an organization's Systems Development Life Cycle.
Database - The Final Firewall
by Brian Suddeth - January 28, 2002
Multiple layers of security may be set in your database management system, this last line of defense, helping to control access, monitor usage, set tripwires for intrusions, and attempt to maintain evidence needed if intrusions or misuse occur
Source Code Revelation Vulnerabilities
by Christopher Short - August 30, 2001
Application security cannot be ignored in today's complex and competitive environment.
Service Account Vulnerabilities
by Barbara Guhanick - August 15, 2001
This paper discusses "powerful" accounts used to run application sofware service, and/or, internally to provide data access as vulnerabilities in application security (Microsoft NT/2000 environment).
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact firstname.lastname@example.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.