29
Copyright © 2008 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation OWASP-Italy Day IV Milan 6th, November 2009 http://www.owasp.org Usable Security Tobias Christen CTO DSwiss / DataInherit 1

CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · [email protected]. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

Copyright © 2008 - The OWASP FoundationPermission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License.

The OWASP Foundation

OWASP-Italy Day IVMilan6th, November 2009

http://www.owasp.org

Usable Security

Tobias Christen

CTODSwiss / DataInherit

1

Page 2: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

2

Content

• Definitions and Assumptions

• Simplicity

• Usable Security in the SDLC

• What others said

• Examples

Page 3: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

3

Definition of Security

1Risk of CIA violation

Page 4: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

4

Definition of Usable (Security)

Security controls are:•accepted•learnable•cost effective

Page 5: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

5

Accountability will not work for B2C Apps

Page 6: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

6

Nr 1 Risk in IT (Security)

Complexity

Page 7: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

7

Nr 1 Goal in Usable Security

Simplicity

Page 8: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

8

SimplicityFrom

wisdomto

action

Page 9: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

9

Simplicity is the ultimate

sophistication

Page 10: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

10

Make it as simple as

possible but not simpler

Page 11: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

11

p yto eliminate

the unnecessary so that the necessary

may speak.

Page 12: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

12

REDUCE

ORGANIZE

SAVE TIME

LEARN

EMOTION

10 Laws of Simplicityby John Maeda

Page 13: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

13

Usable Security in the SDLC

Page 14: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

14

One Architect for Everything?

Performance Security Usability

Page 15: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

15

PersonasAlign ThinkingFocus Design

Recruit Testers

EMOTION

Page 16: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

16

WireframesCompare Alternatives

Organize ElementsReduce Navigation

ORGANIZE

Page 17: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

17

Graphical Design

GuidelinesRe-Usable Panels

Consistency Checks

LEARN

Page 18: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

18

Feedback Driven Small

Improvements

SAVE TIME

Page 19: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

19

What others said

Page 20: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

20

The missing model ?

Agent /Principal

Request Guard Object

/ Model

Policy

Audit Log

Authentication Authorization

Isolation Boundary

Burt Lampson

Page 21: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

21

Exploit differences

between users and bad guys

Bruce Tognazzini

Page 22: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

22

Exploit differences in

physical location

Bruce Tognazzini

Page 23: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

23

Make security understandable

Reduce configurabilityVisible security states

Intuitive user interfacesMetaphors that users can

understand

Page 24: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

24

Usable Security

Controls for Internet Apps

AuthenticationPassword helpers

Audit trailsPrivacy Protection

End-User

Sys-Admin

SecurityOperations

Page 25: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

25

Secure Remote Password Protocol

Nothing new to learn from a user’s perspective

Mitigates several pw related threats

Provides a symmetric shared secret as a side-effect

Page 26: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

26

Password helpers

Create memorizable passwordsRate passwordsAuto-fill forms

Store passwords encryptedStore in DataSafe

Page 27: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

27

DiscussionWhere did you see the lack of usability in security?

Page 28: CTO DSwiss / DataInherit - OWASP · 2021. 3. 9. · tobias.christen@dswiss.com. Title: OWASP Day IV Author: OWASP Keywords: Web Application Security Created Date: 11/9/2009 6:46:06

28

Literature

• http://simson.net/ref/2009/2009-10-29-HCI-SEC.pdf

• http://cacm.acm.org/magazines/2009/11/48419-usable-security-how-to-get-it/fulltext

• http://oreilly.com/catalog/9780596008277