SlideShare a Scribd company logo
Barry Austin
Interactive Strategies
doBoard
http://www.whoast.com/blog/whoast%20lemonade%20stand.JPG
http://www.kaushik.net/avinash/wp-content/uploads/2007/05/enterprise_class_warship.png
http://upload.wikimedia.org/wikipedia/commons/7/72/Enterprise_free_flight.jpg
http://graphic-engine.swarthmore.edu/wp-content/uploads/2008/05/enterprise_capture_02.jpg
Enterprise (n):  a high‐stakes endeavor
High‐stakes in terms of:
 Scope
 Money
 Purpose
 Impact
http://blogs.princeton.edu/eqn/images/bigstockphoto_Security_Pad_Locks_40080.jpg
Security is the prevention of harmful events
Enterprise Security is the prevention of 
harmful events where the stakes are high
 Real risk involved
 Severe consequences of failure
If an enterprise app has a security breach…
 Public safety or military involved – people get 
 hurt, die
 amazon.com can’t process orders – enormous $$$ 
 losses
 Facebook spreads malware – millions infected at, 
 say, $100 damage each… Yikes!
 Banks get robbed electronically – rumored to be 
 happening to the tune of hundreds of millions of $
PHP is growing up

The Internet is growing up

Bad guys are growing up
PHP is driving into the enterprise software 
market
 Zend
 IBM
 Microsoft
 Others…
If my blog goes down…
 Who cares?
 Crickets? Did I hear crickets?
Case in point: Wordpress
 Has been beat upon in low‐stakes environments
This is the norm for the PHP ecosystem
PHP ecosystem has adapted to the security 
needs of low‐stakes uses
The stakes are changing
Enterprises pay specific attention to security
 Manage risk
 Hire and buy
 Establish standards, controls, process
Managing risk
 Risk is the probability of an event occuring 
 multiplied by impact
 Often managed as an aggregate covering all 
 identifiable events
 Risk can be avoided, mitigated, or transferred
Signs You’re Dealing With Enterprise Security
 Dedicated security team
 Scary consequences of security failure
 Formal security standards and requirements
 Security audit/review
 Biased against PHP
Expect a good security team to:
 Identify security drivers
 Apply requirements (standards)
 Find vulnerabilities
 Orchestrate and plan fixes
 Calculate overall risk level
 Recommend “go” or “no go”
Purpose of the application
Level of trust in users
Sensitivity of data
Criticality of functions
Integrity of transactions
Threat environment
Consequences of exploitation
Laws, regulations, rules
ISO/IEC 27002
Payment Card Industry Data Security 
Standard (PCI‐DSS)
OWASP Application Security Verification 
Standard (ASVS)
NIST Special Publications series, FIPS
 Especially NIST SP 800‐53
Common failings of security teams
 Apply rules where not really needed
 Don’t operate tools (e.g. scanners) correctly
 Shift burden of proof entirely to your side
 Bring only “no”, never “yes” or “try this”
 Lose sight of the ultimate goal
 Are overwhelmed by minutiae
How to overcome security team failings
 Understand what they need to accomplish
 Be a step ahead – ask leading questions
 Remind them about the big picture
 Engage with the goal of finding solutions
 Escalate – find a voice of reason
 Encourage focus on most important issues
 Insist on balanced burden of proof
Master the basics
Participate in security community
 OWASP events, conferences
 Other local meetups
Experiment with secure coding frameworks 
and techniques
 Inspekt
 ESAPI‐PHP
 Security features built into your framework of 
 choice
Define roles and responsibilities
Classify data and functions
Identify desired/required security properties
Define basic security architecture
Select baseline security controls
Plan for lifecycle
Do a self‐assessment
 Check OWASP criteria
 Run a scanner or hire a specialist
 Review using industry checklist/standards
Treat security requirements as any other 
requirements or constraints
Treat security vulnerabilities as bugs
Best way to get started is… to start!
High‐stakes organizations expect that PHP 
applications can stand up to the scrutiny of 
their risk management standards and 
practices
They do this to prevent harmful events that 
can have severe consequences
Enterprise‐class security is in a new league for 
many PHPers, but with the right knowledge 
and an effective approach we can handle it.
http://www.owasp.org

http://www.owasp.org/index.php/Category:O
WASP_AppSec_Conference

http://code.google.com/p/inspekt/

http://www.owasp.org/index.php/Category:O
WASP_Enterprise_Security_API
Enterprise-Class PHP Security

More Related Content

PDF
Asw feb13 low
PDF
Av MX HF June_2016 newsletter
PPT
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
PPTX
PHP and Platform Independance in the Cloud
PPTX
MySQL Optimizer Overview
PDF
Zend Core on IBM i - Security Considerations
PPT
MySQL Tech Tour 2015 - 5.7 Connector/J/Net
PDF
A Storage Story #ChefConf2013
Asw feb13 low
Av MX HF June_2016 newsletter
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
PHP and Platform Independance in the Cloud
MySQL Optimizer Overview
Zend Core on IBM i - Security Considerations
MySQL Tech Tour 2015 - 5.7 Connector/J/Net
A Storage Story #ChefConf2013

Viewers also liked (20)

PDF
MySQL Manchester TT - Replication Features
PDF
Script it
PDF
MySQL Manchester TT - 5.7 Whats new
PDF
Oracle Compute Cloud Service介绍
KEY
Framework Shootout
PPTX
Application Diagnosis with Zend Server Tracing
PDF
MySQL in your laptop
PPT
PHP on Windows - What's New
KEY
Zend_Tool: Practical use and Extending
PDF
Oracle Compute Cloud Service快速实践
PDF
Oracle cloud 使用云市场快速搭建小型电商网站
PDF
Why MySQL High Availability Matters
PDF
Oracle cloud ravello介绍及测试账户申请
PDF
Solving the C20K problem: Raising the bar in PHP Performance and Scalability
PPTX
PHP on IBM i Tutorial
PDF
MySQL Manchester TT - Security
PDF
Tiery Eyed
PPT
Functions in php
PPTX
MySQL Head to Head Performance
PDF
MySQL Intro JSON NoSQL
MySQL Manchester TT - Replication Features
Script it
MySQL Manchester TT - 5.7 Whats new
Oracle Compute Cloud Service介绍
Framework Shootout
Application Diagnosis with Zend Server Tracing
MySQL in your laptop
PHP on Windows - What's New
Zend_Tool: Practical use and Extending
Oracle Compute Cloud Service快速实践
Oracle cloud 使用云市场快速搭建小型电商网站
Why MySQL High Availability Matters
Oracle cloud ravello介绍及测试账户申请
Solving the C20K problem: Raising the bar in PHP Performance and Scalability
PHP on IBM i Tutorial
MySQL Manchester TT - Security
Tiery Eyed
Functions in php
MySQL Head to Head Performance
MySQL Intro JSON NoSQL
Ad

Similar to Enterprise-Class PHP Security (20)

PDF
How Current Advanced Cyber Threats Transform Business Operation
PDF
Journal+Feature-InsiderThreat
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PPT
Eileen Presentation
PDF
2010 Sc World Congress Nyc
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
DOCX
Technological Threats to Businesses (Independent Study)
PDF
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
PDF
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
PDF
Outsourcing
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PPT
Risk Management on the Internet
PPTX
Importance of cyber security in education sector
PPT
Security analysis
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PPTX
Web security-–-everything-we-know-is-wrong-eoin-keary
PPTX
Copy of OWASP Threat and Safeguard Matrix.pptx
How Current Advanced Cyber Threats Transform Business Operation
Journal+Feature-InsiderThreat
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Eileen Presentation
2010 Sc World Congress Nyc
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Technological Threats to Businesses (Independent Study)
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Outsourcing
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Risk Management on the Internet
Importance of cyber security in education sector
Security analysis
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Web security-–-everything-we-know-is-wrong-eoin-keary
Copy of OWASP Threat and Safeguard Matrix.pptx
Ad

More from ZendCon (20)

PPT
I18n with PHP 5.3
PDF
Cloud Computing: The Hard Problems Never Go Away
PPT
Planning for Synchronization with Browser-Local Databases
PPT
Magento - a Zend Framework Application
PDF
PHP and IBM i - Database Alternatives
PDF
Insights from the Experts: How PHP Leaders Are Transforming High-Impact PHP A...
PDF
Joe Staner Zend Con 2008
PDF
Make your PHP Application Software-as-a-Service (SaaS) Ready with the Paralle...
PDF
DB2 Storage Engine for MySQL and Open Source Applications Session
PDF
Digital Identity
PDF
Modernizing i5 Applications
PDF
Lesser Known Security Problems in PHP Applications
PDF
Architecting for PHP5 - Why "Runs on PHP5" is not "Written for PHP5"
PDF
SQL Query Tuning: The Legend of Drunken Query Master
PDF
ZendCon 2008 Closing Keynote
PDF
Top Zend Studio Secrets
PDF
VIM for (PHP) Programmers
PDF
Test Driven Development
PDF
Rickroll To Go With PHP, WURFL, and Other Open Source Tools
PDF
PECL Picks - Extensions to make your life better
I18n with PHP 5.3
Cloud Computing: The Hard Problems Never Go Away
Planning for Synchronization with Browser-Local Databases
Magento - a Zend Framework Application
PHP and IBM i - Database Alternatives
Insights from the Experts: How PHP Leaders Are Transforming High-Impact PHP A...
Joe Staner Zend Con 2008
Make your PHP Application Software-as-a-Service (SaaS) Ready with the Paralle...
DB2 Storage Engine for MySQL and Open Source Applications Session
Digital Identity
Modernizing i5 Applications
Lesser Known Security Problems in PHP Applications
Architecting for PHP5 - Why "Runs on PHP5" is not "Written for PHP5"
SQL Query Tuning: The Legend of Drunken Query Master
ZendCon 2008 Closing Keynote
Top Zend Studio Secrets
VIM for (PHP) Programmers
Test Driven Development
Rickroll To Go With PHP, WURFL, and Other Open Source Tools
PECL Picks - Extensions to make your life better

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Electronic commerce courselecture one. Pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPT
Teaching material agriculture food technology
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Approach and Philosophy of On baking technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Electronic commerce courselecture one. Pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Group 1 Presentation -Planning and Decision Making .pptx
Programs and apps: productivity, graphics, security and other tools
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Tartificialntelligence_presentation.pptx
Spectroscopy.pptx food analysis technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Teaching material agriculture food technology
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Approach and Philosophy of On baking technology
Big Data Technologies - Introduction.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Enterprise-Class PHP Security