1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
| class ApplicationSecurityLayer:
def __init__(self):
self.applications = {}
self.security_controls = {}
self.vulnerability_scans = {}
self.code_analysis = {}
def register_application(self, app_id, app_config):
"""Registrar aplicación"""
self.applications[app_id] = {
'app_id': app_id,
'name': app_config['name'],
'type': app_config['type'],
'version': app_config.get('version', '1.0'),
'security_controls': app_config.get('security_controls', []),
'vulnerability_status': 'unknown',
'last_scan': None,
'security_score': 0.0
}
def implement_security_control(self, control_id, control_config):
"""Implementar control de seguridad de aplicación"""
self.security_controls[control_id] = {
'control_id': control_id,
'type': control_config['type'],
'application_id': control_config['application_id'],
'implementation': control_config['implementation'],
'status': 'active',
'effectiveness': control_config.get('effectiveness', 0.0),
'last_test': None
}
def perform_vulnerability_scan(self, app_id, scan_type='automated'):
"""Realizar escaneo de vulnerabilidades"""
if app_id not in self.applications:
return None
scan_id = f"SCAN-{app_id}-{datetime.now().strftime('%Y%m%d%H%M%S')}"
# Simular escaneo de vulnerabilidades
vulnerabilities = self.simulate_vulnerability_scan(app_id)
self.vulnerability_scans[scan_id] = {
'scan_id': scan_id,
'app_id': app_id,
'scan_type': scan_type,
'timestamp': datetime.now(),
'vulnerabilities': vulnerabilities,
'total_vulnerabilities': len(vulnerabilities),
'critical_count': len([v for v in vulnerabilities if v['severity'] == 'critical']),
'high_count': len([v for v in vulnerabilities if v['severity'] == 'high']),
'medium_count': len([v for v in vulnerabilities if v['severity'] == 'medium']),
'low_count': len([v for v in vulnerabilities if v['severity'] == 'low'])
}
# Actualizar estado de la aplicación
self.applications[app_id]['vulnerability_status'] = self.calculate_vulnerability_status(vulnerabilities)
self.applications[app_id]['last_scan'] = datetime.now()
return self.vulnerability_scans[scan_id]
def simulate_vulnerability_scan(self, app_id):
"""Simular escaneo de vulnerabilidades"""
# Simulación de vulnerabilidades comunes
vulnerabilities = [
{
'id': f'VULN-{app_id}-001',
'type': 'SQL Injection',
'severity': 'high',
'cvss_score': 8.5,
'description': 'SQL injection vulnerability in login form',
'location': '/login.php',
'remediation': 'Use parameterized queries'
},
{
'id': f'VULN-{app_id}-002',
'type': 'Cross-Site Scripting (XSS)',
'severity': 'medium',
'cvss_score': 6.1,
'description': 'Reflected XSS in search functionality',
'location': '/search.php',
'remediation': 'Implement input validation and output encoding'
},
{
'id': f'VULN-{app_id}-003',
'type': 'Insecure Direct Object Reference',
'severity': 'medium',
'cvss_score': 5.3,
'description': 'Direct access to user files without authorization',
'location': '/files.php',
'remediation': 'Implement proper authorization checks'
}
]
return vulnerabilities
def calculate_vulnerability_status(self, vulnerabilities):
"""Calcular estado de vulnerabilidades"""
if not vulnerabilities:
return 'clean'
critical_count = len([v for v in vulnerabilities if v['severity'] == 'critical'])
high_count = len([v for v in vulnerabilities if v['severity'] == 'high'])
if critical_count > 0:
return 'critical'
elif high_count > 2:
return 'high'
elif high_count > 0 or len(vulnerabilities) > 5:
return 'medium'
else:
return 'low'
def perform_code_analysis(self, app_id, code_files):
"""Realizar análisis de código"""
analysis_id = f"CODE-{app_id}-{datetime.now().strftime('%Y%m%d%H%M%S')}"
# Simular análisis de código
issues = self.simulate_code_analysis(code_files)
self.code_analysis[analysis_id] = {
'analysis_id': analysis_id,
'app_id': app_id,
'timestamp': datetime.now(),
'files_analyzed': len(code_files),
'issues': issues,
'total_issues': len(issues),
'security_issues': len([i for i in issues if i['type'] == 'security']),
'quality_issues': len([i for i in issues if i['type'] == 'quality']),
'performance_issues': len([i for i in issues if i['type'] == 'performance'])
}
return self.code_analysis[analysis_id]
def simulate_code_analysis(self, code_files):
"""Simular análisis de código"""
issues = []
for file in code_files:
if 'password' in file.lower():
issues.append({
'file': file,
'line': 15,
'type': 'security',
'severity': 'high',
'description': 'Hardcoded password detected',
'rule': 'SEC001'
})
if 'sql' in file.lower():
issues.append({
'file': file,
'line': 42,
'type': 'security',
'severity': 'medium',
'description': 'Potential SQL injection vulnerability',
'rule': 'SEC002'
})
return issues
def get_application_security_summary(self, app_id):
"""Obtener resumen de seguridad de aplicación"""
if app_id not in self.applications:
return None
app = self.applications[app_id]
# Obtener escaneos recientes
recent_scans = [scan for scan in self.vulnerability_scans.values()
if scan['app_id'] == app_id and
scan['timestamp'] >= datetime.now() - timedelta(days=30)]
# Obtener análisis de código recientes
recent_analyses = [analysis for analysis in self.code_analysis.values()
if analysis['app_id'] == app_id and
analysis['timestamp'] >= datetime.now() - timedelta(days=30)]
summary = {
'app_id': app_id,
'name': app['name'],
'vulnerability_status': app['vulnerability_status'],
'total_vulnerabilities': sum(scan['total_vulnerabilities'] for scan in recent_scans),
'critical_vulnerabilities': sum(scan['critical_count'] for scan in recent_scans),
'security_issues': sum(analysis['security_issues'] for analysis in recent_analyses),
'last_scan': app['last_scan'],
'security_score': self.calculate_security_score(app, recent_scans, recent_analyses)
}
return summary
def calculate_security_score(self, app, scans, analyses):
"""Calcular score de seguridad"""
base_score = 100.0
# Penalizar por vulnerabilidades
for scan in scans:
base_score -= scan['critical_count'] * 20
base_score -= scan['high_count'] * 10
base_score -= scan['medium_count'] * 5
base_score -= scan['low_count'] * 1
# Penalizar por problemas de código
for analysis in analyses:
base_score -= analysis['security_issues'] * 5
return max(0.0, base_score)
# Ejemplo de uso
app_layer = ApplicationSecurityLayer()
# Registrar aplicación
app_layer.register_application('APP-001', {
'name': 'Customer Portal',
'type': 'Web Application',
'version': '2.1',
'security_controls': ['WAF', 'Input Validation', 'Authentication']
})
# Realizar escaneo de vulnerabilidades
scan_result = app_layer.perform_vulnerability_scan('APP-001')
print(f"Resultado del escaneo: {scan_result['total_vulnerabilities']} vulnerabilidades encontradas")
# Realizar análisis de código
code_analysis = app_layer.perform_code_analysis('APP-001', ['login.php', 'search.php', 'database.php'])
print(f"Análisis de código: {code_analysis['total_issues']} problemas encontrados")
# Obtener resumen de seguridad
security_summary = app_layer.get_application_security_summary('APP-001')
print(f"Resumen de seguridad: {security_summary}")
|