Development Team Project: Design Document

Assignment Brief

For this this first assessment, your team (the vulnerability test team) will need to produce a design document/proposal that promotes the benefit of what you will be doing for the business. This assignment counts towards 20% of the overall module mark.

Development Team Project: Design Document (Team A)

Introduction

Online shopping or e-commerce has increased from 14% of all global trade in 2019 to 19% in 2020, and is forecast to increase further (Hude, 2021). This growing market has led to an estimated 5-fold increase in cyber-attacks. which underscores the need for adequate security for both customers and the businesses providing the online service (Chin et al., 2020).

This design proposal will effectively articulate our plan to plan to carry out testing of your website for vulnerabilities, as well as how serious we deem the risks to be. Once security flaws are detected, we will advise you on how to mitigate the risks, which will be provided in a follow up document. We will also analyse compliance with current legislation and current security standards.

Threats

Open Web Application Security Project (OWASP) had released a list of their top 10 security threats in 2017. We plan to analyse both the top 10 threats as well as specific threats to the e-commerce store. All the business specific threats are included in the OWASP top 10.

Business specific threats include:

  • Malware and ransomware- Attackers may gain access to sensitive data and encrypt this data so that the business may not have access to it.
  • Point of sale- Attackers may take advantage of unencrypted communications when processing payments, and therefore steal the customers personal details.
  • Compliance with industry standards- Compliance with General Data Protection Regulation (GDPR) and Payment Card Industry Data Security Standard (PCI-DSS). Noncompliance may lead to legal challenges.
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks- Overloading of network systems prevent customers from completing transactions, as well as preventing the business from running efficiently.
  • Infrastructure- Outdated hardware without current firmware updates may allow attackers to exploit a known vulnerability.
  • Vulnerable third-party modules- Any third-party applications in use by the business may be a source of attack. We will analyse all these applications to ascertain the level of risk to the business and customers.

Compliance with legislation or standards

GDPR - Data privacy law enacted in 2018 across Europe (European Union, 2018).

PCI-DSS - The PCI standards Council was formed in 2006. They developed the standards and the security features to mitigate the possibility for data breaches for merchants as well as end users. All entities that store, process, or transmit cardholder data must validate PCI-DSS compliance (Global Payments Integrated, N.D.).

Investigation of threats

A virtual box is a hypervisor software. A hypervisor is computer software that creates a virtual hardware by borrowing the hardware from the host computer. This process is called virtualisation. We will use Kali Linux Operating system in a virtual machine in order to conduct most tests. All testing will be done remotely due to practicality. We will run multiple assessments from a variety of sources to determine the threats posed to the website by malicious actors. This will be done using the following tools:

    1. OWASP web application security guide - This guide provides resources to outline the approach for testing web applications. We will use this guideline as a basis for our testing methodology, in line with industry best practices.

    2.OWASP Zed Attack Proxy (ZAP) - This tool will be used to automatically and manually test the given website. Outcomes include the ability to detect security misconfiguration, sensitive data exposure and SQL injection vulnerabilities (Mburano and Si, 2019; Al Anhar and Suryanto, 2021).

    3.GDPR - GDPR compliance will be assessed automatically and manually. The automatic testing will be done using Cookiebot, which analyses compliance by performing a GDPR cookie compliance test. This service will analyse cookies and trackers on the target website. The manual part of this assessment will be conducted using the GDPR checklist.

    4.The Harvester - The harvester is an open-source tool that scans 40 public sources for emails, DNS names and subdomains belonging to an organization. This is an automated scanning tool. It allows in early phases of an attack to determine the attack surface. We are going to run harvester to verify that there are no sensitive data leaks, and advise as to how to mitigate these threats (theHarvester, N.D.).

    5.NMAP - Nmap is a free and open-source utility for network discovery and security auditing. This is an automated scanning tool. It can be used for things including port scanning, service detection, and OS detection. This will allow us to see any open ports which may be vulnerable and any out- of-date software running on the network, as well as being able to view any unknown devices operating on it (NMAP, N.D.).

    6.OpenVAS - OpenVAS is a free and open-source vulnerability scanning tool. This is an automated scanning tool. It can be used to scan a network for vulnerabilities against a feed of known security vulnerabilities, which is daily updated. As well as highlighting any vulnerabilities found, OpenVAS also gives a severity score to each one as well as providing descriptions of the vulnerability (Greenbone Vulnerability Management, N.D.).

Assumptions

  • The website will be running during all hours, as well as all days of the week
  • The website will be typical of an e-commerce site, i.e., process payments, query stock levels, store users’ personal information, order information (past and present).
  • User to gain access to the target website based on the infrastructure scheme set out in Appendix 2.
  • All tools are free and open source so that they can be audited and constantly updated.

Limitations:

  • Due to the target website being an AWS educate account, there will be a limitation as to the number of hours available per month for the site to be running. As such we will liaise with the site owners to arrange testing at suitable times.
  • The only access point to the web server is going to be a proxy server that is going to be publicly accessible, but that is going to restrict unallowed traffic using a whitelist mechanism.

Business impacts due to vulnerability testing:

  • Some tests place a high load on the network and may slow down or cause the website to be unavailable. These tests will be done during low network usage hours, and the business will be duly informed prior to testing.

References

Al Anhar, A. and Suryanto, Y. (2021) ‘Evaluation of Web Application Vulnerability Scanner for Modern Web Application’, ICAICST 2021 - 2021 International Conference on Artificial Intelligence and Computer Science Technology. IEEE, pp. 200–204. doi: 10.1109/ICAICST53116.2021.9497831. [Accessed 15 September 2021]

Chin, I. E. et al. (2020) ‘Cyber Attacks in the Era of Covid-19 and Possible Solution Domains’, Preprints 2020, (September), pp. 1–15. doi: 10.20944/preprints202009.0630.v1. [Accessed 15 September 2021]

European Union (2018) ‘General Data Protection Regulation (GDPR) – Official Legal Text’, General Data Protection Regulation, pp. 1–99. Available at: https://gdpr-info.eu/ [Accessed: 17 September 2021].

Greenbone Vulnerability Management (N.D.) Background. Available from: https://greenbone.github.io/docs/background.html#openvas-scanner [Accessed 15 September 2021]

Hude, J. (2021) ‘SURGE IN ONLINE SHOPPING IN CORONA TIMES’.

Mburano, B. and Si, W. (2019) ‘Evaluation of web vulnerability scanners based on OWASP benchmark’, 26th International Conference on Systems Engineering, ICSEng 2018 - Proceedings. IEEE. doi: 10.1109/ICSENG.2018.8638176. [Accessed 15 September 2021]

NMAP (N.D.) Introduction. Available from: https://nmap.org [Accessed 15 September 2021]

Global Payments Integrated. (N.D.) PCI-DSS: The 6 Major Principles. Available from: https://www.globalpaymentsintegrated.com/en-us/blog/2019/09/17/pci-dss- the-6-major-principles [Accessed: 17 September 2021].

theHarvester. (N.D.) theHarvester/README.md. Available from: https://github.com/laramies/theHarvester/blob/master/README.md [Accessed: 16 September 2021].