44
Alison Gianotto (aka “snipe”) WHO AM I? Former agency CTO/CSO Security & privacy advocate 20 years in IT & so<ware development Coauthor of a few PHP/MySQL books Survivor of more corporate audits than I care to remember @snipeyhead on TwiJer 1 dotScale May 2014 #dotScale

dotScale 2014

Embed Size (px)

DESCRIPTION

CTF links: NotSoSecure CTF: http://ctf.notsosecure.com Security Shepherd: https://www.owasp.org/index.php/OWASP_Security_Shepherd http://hax.tor.hu/ https://pwn0.com/ http://www.smashthestack.org/ http://www.hellboundhackers.org/ http://www.overthewire.org/wargames/ http://counterhack.net/Counter_Hack/Challenges.html http://www.hackthissite.org/ http://exploit-exercises.com/ http://vulnhub.com/

Citation preview

Page 1: dotScale 2014

Alison Gianotto (aka “snipe”) WHO AM I? • Former  agency  CTO/CSO  • Security  &  privacy  advocate  • 20  years  in  IT  &  so<ware  development  • Co-­‐author  of  a  few  PHP/MySQL  books  • Survivor  of  more  corporate  audits  than  I  care  to  remember  • @snipeyhead  on  TwiJer  

1  dotScale  May  2014  -­‐  #dotScale  

Page 2: dotScale 2014

IT IS IMPOSSIBLE TO ANTICIPATE EVERY RISK.

2  dotScale  May  2014  -­‐  #dotScale  

Srsly.

Page 3: dotScale 2014

IT IS INAPPROPRIATE TO MITIGATE EVERY RISK.

3  dotScale  May  2014  -­‐  #dotScale  

No, Srsly.

Page 4: dotScale 2014

WHY PEOPLE HACK

4  

• To  steal/sell  idenOOes,  credit  card  numbers,  corporate  secrets,  military  secrets  • Fun/Notoriety  • PoliOcal  (“HackOvism”)  • Revenge  • Blackhat  SEO  • ExtorOon/Ransomware  

dotScale  May  2014  -­‐  #dotScale  

Page 5: dotScale 2014

MEGA BREACHES: RESULTING IN PERSONAL DETAILS OF >= 10 MILLION IDENTITIES EXPOSED IN AN INDIVIDUAL INCIDENT.

5  dotScale  May  2014  -­‐  #dotScale  

Page 6: dotScale 2014

THERE WERE EIGHT MEGA-BREACHES IN 2013, COMPARED WITH ONLY ONE IN 2012.

6  

Source:  Symantec  Internet  Security  Threat  Report  2014  ::  Volume  19,  Published  April  2014    

+700% dotScale  May  2014  -­‐  #dotScale  

Page 7: dotScale 2014

OCT 2013: ADOBE EXPOSED CUSTOMER DATA, DEBIT/CREDIT CARD NUMBERS, SOURCE IMPACTED: 152 MILLION USERS

7  

Source:  Symantec  Internet  Security  Threat  Report  2014  ::  Volume  19,  Published  April  2014    

dotScale  May  2014  -­‐  #dotScale  

Page 8: dotScale 2014

DEC 2013: TARGET EXPOSED CUSTOMER DATA, DEBIT/CREDIT CARD NUMBERS, PINS IMPACTED: 110 MILLION USERS

8  

Source:  Symantec  Internet  Security  Threat  Report  2014  ::  Volume  19,  Published  April  2014    

dotScale  May  2014  -­‐  #dotScale  

Page 9: dotScale 2014

BREACH Growth •  credit  card  info •  birth  dates •  government  ID  numbers •  home  addresses • medical  records •  phone  numbers •  financial  informa9on •  email  addresses •  login •  passwords

Data Stolen

9  

232  

552  

0   100   200   300   400   500   600  

2011  

2013  

Iden))es  Stolen  by  Year  (in  Millions)  

Source:  Symantec  Internet  Security  Threat  Report  2014  ::  Volume  19,  Published  April  2014    

dotScale  May  2014  -­‐  #dotScale  

Page 10: dotScale 2014

190,000

464,000 570,000

2011   2012   2013  

ATTACKS

10  

Source:  Symantec  Internet  Security  Threat  Report  2014  ::  Volume  19,  Published  April  2014    

Per Day

dotScale  May  2014  -­‐  #dotScale  

Page 11: dotScale 2014

SOMETIMES YOUR EFFORTS TO MITIGATE RISK CAN INCREASE YOUR ATTACK SURFACE.

11  dotScale  May  2014  -­‐  #dotScale  

Because THAT’S fair.

Page 12: dotScale 2014

DEFENSE IN DEPTH PROMISES

12  

• MiOgates  single  points  of  failure.  (“Bus  factor”)  • Requires  more  effort  on  the  part  of  the  aJacker,  theoreOcally  exhausOng  aJacker  resources.    

Except...

dotScale  May  2014  -­‐  #dotScale  

Page 13: dotScale 2014

DEFENSE IN DEPTH CHALLENGES

13  

• Larger,  more  complicated  systems  are  harder  to  maintain.    • Can  lead  to  more  cracks  for  bad  guys  to  poke  at  • More  surfaces  that  can  get  be  overlooked    • The  bad  guys  have  nearly  limitless  resources.  We  don’t.    • AJacks  are  commodiOzed  now.    Botnets  for  $2/hour.  

dotScale  May  2014  -­‐  #dotScale  

Page 14: dotScale 2014

HACKERS ARE NOT YOUR ONLY PROBLEM.

14  dotScale  May  2014  -­‐  #dotScale  

Sorry. :(

Page 15: dotScale 2014

CIA Confidentiality, Integrity & Availability

dotScale  May  2014  -­‐  #dotScale  

Page 16: dotScale 2014

CONFIDENTIALITY IS A SET OF RULES THAT LIMITS ACCESS TO INFORMATION

16  dotScale  May  2014  -­‐  #dotScale  

Page 17: dotScale 2014

INTEGRITY IS THE ASSURANCE THAT THE INFORMATION IS TRUSTWORTHY & ACCURATE.

17  dotScale  May  2014  -­‐  #dotScale  

Page 18: dotScale 2014

AVAILABILITY IS A GUARANTEE OF READY ACCESS TO THE INFO BY AUTHORIZED PEOPLE.

18  dotScale  May  2014  -­‐  #dotScale  

Page 19: dotScale 2014

APPSEC STRATEGY

PICK  TWO  

19  

ABSOLUTELY  F*CKED  UTTERLY  F*CKED  

COMPLETELY  F*CKED  

dotScale  May  2014  -­‐  #dotScale  

Page 20: dotScale 2014

CREATING A RISK MATRIX

20  

• Type  of  resource  • Third-­‐Party  • Diagram  ID  • DescripOon  • Triggering  AcOon  • Consequence  of  Failure  • Risk  of  Failure  • Probability  of  Failure  • User  Impact  

• Method  used  for  monitoring  this  risk  • Efforts  to  MiOgate  in  Case  of  Failure  • Contact  info  

Grab  a  starter  template  here!    hJp://snipe.ly/risk_matrix    

dotScale  May  2014  -­‐  #dotScale  

Page 21: dotScale 2014

20 THINGS YOU CAN START DOING TODAY.

21  

Dooo eeeeeet.

dotScale  May  2014  -­‐  #dotScale  

Page 22: dotScale 2014

#1. CAPTURE ALL THE FLAGS!

22  dotScale  May  2014  -­‐  #dotScale  

Page 23: dotScale 2014

23  

•  Strip  specific  messaging  from  login  forms.  •  Use  solid  password+salOng  like  bcrypt.  •  Implement  brute-­‐force  prevenOon  for  all  login  systems.  •  Encrypt  everything,  where  feasible.  •  Supress  debugging  and  server  informaOon  (language/

framework  versions,  web  server  versions,  stack-­‐traces,  etc.)  

WHAT DEVS LEARN FROM CTF

dotScale  May  2014  -­‐  #dotScale  

Page 24: dotScale 2014

24  dotScale  May  2014  -­‐  #dotScale  

Page 25: dotScale 2014

#2. START EVERY PROJECT RISK-FIRST.

25  dotScale  May  2014  -­‐  #dotScale  

Page 26: dotScale 2014

#3. BUILD A CLEAR INVENTORY OF SURFACE AREAS AND THEIR VALUE.

26  dotScale  May  2014  -­‐  #dotScale  

Page 27: dotScale 2014

#4. RISK MATRIX FOR EVERY MAJOR PROJECT OR PRODUCT.

27  dotScale  May  2014  -­‐  #dotScale  

Page 28: dotScale 2014

#5. KNOW WHAT HAPPENS WHEN THIRD-PARTY SERVICES FAIL.

28  dotScale  May  2014  -­‐  #dotScale  

Page 29: dotScale 2014

#6. TRUST YOUR GUT. WHEN SOMETHING DOESN’T LOOK RIGHT, IT PROBABLY ISN’T.

29  dotScale  May  2014  -­‐  #dotScale  

Page 30: dotScale 2014

#7. KEEP YOUR SYSTEMS AS SIMPLE AS POSSIBLE.

30  dotScale  May  2014  -­‐  #dotScale  

Page 31: dotScale 2014

#8. INCREASED TRANSPARENCY REDUCES RISK ACROSS DEPARTMENTS.

31  dotScale  May  2014  -­‐  #dotScale  

Page 32: dotScale 2014

#9. GET TO KNOW YOUR USERS’ BEHAVIOR. BE SUSPICIOUS IF IT CHANGES FOR NO REASON.

32  dotScale  May  2014  -­‐  #dotScale  

Page 33: dotScale 2014

#10. AUTOMATE EVERYTHING.

33  dotScale  May  2014  -­‐  #dotScale  

Page 34: dotScale 2014

#11. LOG (ALMOST) EVERYTHING. KNOW WHERE YOUR LOGS ARE.

34  dotScale  May  2014  -­‐  #dotScale  

Page 35: dotScale 2014

#12. ALWAYS EMPLOY THE PRINCIPLE OF “LEAST PRIVILEGE”.

35  dotScale  May  2014  -­‐  #dotScale  

Page 36: dotScale 2014

#13. ONLY COLLECT THE DATA YOU ABSOLUTELY NEED.

36  dotScale  May  2014  -­‐  #dotScale  

Page 37: dotScale 2014

#14. IMPLEMENT TWO-FACTOR AUTHENTICATION. IT’S EASIER THAN YOU THINK.

37  dotScale  May  2014  -­‐  #dotScale  

Page 38: dotScale 2014

#15. CREATE A DATA RECOVERY PLAN AND TEST IT. NO, REALLY. TEST IT. MORE THAN ONCE.

38  dotScale  May  2014  -­‐  #dotScale  

Page 39: dotScale 2014

#16. MOAR PAPERWORK!

39  dotScale  May  2014  -­‐  #dotScale  

Page 40: dotScale 2014

#17. LEVERAGE BUILT-IN VALIDATION/SANITIZATION FROM FRAMEWORKS.

40  dotScale  May  2014  -­‐  #dotScale  

Page 41: dotScale 2014

#18. PERFORM REGULAR WHITE-BOX AND BLACK-BOX TESTING.

41  dotScale  May  2014  -­‐  #dotScale  

Page 42: dotScale 2014

#19. PAY ATTENTION TO YOUR ALERTS.

42  dotScale  May  2014  -­‐  #dotScale  

Page 43: dotScale 2014

#20. BECOME A PASSIONATE SECURITY AMBASSADOR FOR YOUR USERS.

43  dotScale  May  2014  -­‐  #dotScale  

Page 44: dotScale 2014

Alison Gianotto (aka “snipe”) THANK YOU! • @snipeyhead  on  TwiJer  • [email protected]  

44  dotScale  May  2014  -­‐  #dotScale