0

I'm a developer working on a POC for an internal web app (Python\SQL) which will handle sensitive employee information within our company. In going over the application with our security department to decide whether or not we want to use it...we went over the design and how sensitive data is encrypted and protected end to end from where it is displayed to the user in the web app, back to where it is encrypted in the database so that even dbas cannot access it.

At some point I was asked if we could use a tool to dynamically look at what is happening in memory to make sure there are no issues. I guess what they were getting at was how we account for buffer overflow attacks or memory leaks, but they were being very vague. We went over how this is all handled by the Python Memory Manager which was not a good enough answer. They were insistent that there was some sort of tool that we could purchase for this.

I don't have a background in memory forensics, but my basic understanding of how virtual memory is managed by the OS and assigned to processes makes me skeptical that something like that exists. Am I wrong on this, and even so is this overkill? Because I feel like I am getting the run around.

  • This is overkill. You can (and should) perform static and dynamic code reviews and there are tools to help with this. But that’s different from what your “security” people are asking for. – pm1391 Nov 30 '19 at 06:36
  • Thanks for the feedback. Yeah that is kind of what I gathered. We already do static analysis and manual code reviews, but I've started researching some DAST tools to do dynamic reviews which would definitely improve our dev workflow. Hopefully that satisfies our infosec guys. – bfoxofb Dec 02 '19 at 15:12
  • Sure thats a good start. Theres tool like veracode that could help with this, and others. When I have created applications, I find performing penetration tests alongside the tester (and the tester asking questions) is most helpful. "Hey Im going to forge a token, how would the backend handle this?". Consider doing this with your security team... and it makes them be specific with their requests :) – pm1391 Dec 02 '19 at 16:45

0 Answers0