Paragon Initiative Enterprises Blog

The latest information from the team that develops cryptographically secure PHP software.

Checklist-Driven Security Considered Harmful

Application security has a checklist problem.

There's an old article titled The Six Dumbest Ideas in Computer Security. When someone attempts to secure an application or a network using a checklist, they're committing the second fallacy in that list: "Enumerating Badness."

(Related: security through configuration rather than competent design is common in the PHP ecosystem.)

Until recently, a few checklists were given a pass because they were generally considered reputable among information security professionals. The reasons usually given vary from "At least this checklist isn't that bad" to "It helps bridge a gap between security teams and development teams". One such "christened checklist" was the infamous OWASP Top 10.

And then OWASP published their draft for the 2017 edition of the OWASP Top 10. The reactions and criticisms were equal parts appropriate and ferocious.

The addition of "A7. Insufficient Attack Protection" in the 2017 edition was enough to prompt a lot of information security professionals to decry the OWASP Top 10 project as a useful security tool. I'm arguing that this doesn't go far enough. It's time to face facts:

There Are No Good Application Security Checklists

There are several problems with security checklists:

  • Checklists (explicitly or implicitly) beg readers to interpret their list order as an indicator of priority.
  • Checklists assume congruent granularity.
  • Checklists are finite, which almost inevitably leads to enumerating badness (which, as argued above, is a stupid idea in computer security).
  • Different stacks have different risk profiles, and this nuance is not captured by any Top X vulnerability list.

For example, the OWASP Top 10 list doesn't provide any guidance on using secure randomness, avoiding race conditions (which are a problem for designing crypto-currencies), or side-stepping cache-timing attacks. Depending on the project in question, these might be very important. A weak random generator could become a potent backdoor.

The problem isn't that the team behind OWASP is corrupt or incompetent. The problem is that checklists are the wrong tool for the job.

A Better Idea: Vulnerability Taxonomy

Inspired by biologists' efforts to classify the variety of life forms on Earth, I wrote A Gentle Introduction to Application Security which classified vulnerabilities based on four main types, and then drilled down into specifics.

At the highest level, you have:

  • Treating Code as Data, or vice versa
  • Unsound Logic
  • Operating Environment
  • Cryptographic Flaws (side-channels)

If you look into the first category, you can get more specific:

  • Treating Code as Data, or vice versa
    • Buffer Overflow
    • SQL Injection
    • Cross-site Scripting
    • Local/Remote File Inclusion
    • Unsafe deserialization
    • ...

To be clear: I'm not saying that my specific classifications are the ones that we should commit to forever. They're merely an example. I trust that the security industry at large can refine this proposal, going forward.

Building a taxonomy model for vulnerability classification has a lot of advantages over a checklist.

You can teach software developers the core fundamental lessons of each major classification ("don't let user input alter the program in any way", "make sure your logic is sound", "keep your software up-to-date and well configured", "cryptography requires expert care"). This transforms vulnerability mitigation from "here's another item to memorize and hopefully apply when you develop software under time pressure" into "here's a slightly more specific instance of the core lesson, so if you forget how to prevent these specific vulnerabilities, you'll probably remember the core lesson".

Additionally, like security research itself, a taxonomy isn't ever really "finished". As new vulnerabilities are discovered, they can be inserted at an appropriate depth in the tree of vuln. This is more compatible with the mindset of a security researcher than a rigid short list that only gets updated every few years.

It's high time we rethought how we approach application security. I think the taxonomy model will work where a checklist failed.

About the Author

Scott Arciszewski

Chief Development Officer

With 15 years of software development, application security, and system administration experience, Scott aspires to help others attain a happier work-life balance by solving difficult problems and automating trivial tasks. He is mostly known in the community for his open source software security research and strong progressive positions on providing tools and frameworks that are secure by default. @CiPHPerCoder


Need Technology Consultants?

Will tomorrow bring costly and embarrassing data breaches? Or will it bring growth, success, and peace of mind?

Our team of technology consultants have extensive knowledge and experience with application security and web/application development.

We specialize in cryptography and secure PHP development.

Let's Work Together Towards Success

Our Security Newsletters

Want the latest from Paragon Initiative Enterprises delivered straight to your inbox? We have two newsletters to choose from.

The first mails quarterly and often showcases our behind-the-scenes projects.

The other is unscheduled and gives you a direct feed into the findings of our open source security research initiatives.

Quarterly Newsletter   Security Announcements