17
WE HAVE MET THE ENEMY AND HE IS US BSIDES SEATTLE 2013 DAVID F. SEVERSKI, @DSEVERSKI

We Have Met the Enemy

Embed Size (px)

DESCRIPTION

Presented at BSides Seattle 12/14/2013

Citation preview

Page 1: We Have Met the Enemy

WE HAVE MET THE ENEMY AND HE IS USBSIDES SEATTLE 2013

DAVID F. SEVERSKI, @DSEVERSKI

Page 2: We Have Met the Enemy

2

AGENDA

The Dark Side Discovery All The

Things

Shiny Rocket Ships and Puppies

Page 3: We Have Met the Enemy

3

AKA…WHO THE FSCK ARE YOU?

Come to the Dark Side…

Page 4: We Have Met the Enemy

4

DATA-DRIVEN DISCOVERY

Page 5: We Have Met the Enemy

5

INITIAL REPORTING AND TRACKING

Discover

Open Finding

Define Remediation Actions

Assign DateTrack

Verify

Close

Page 6: We Have Met the Enemy

6

STUCK FINDINGS

Page 7: We Have Met the Enemy

7

“SUCCESS” OF DATE-DRIVEN FINDINGS

OpenFindings

Open Findings Over Time

Plateau of Despair

Page 8: We Have Met the Enemy

8

AND HOW ABOUT THAT PATCHING PROGRAM?

Number ofVulnerabilities

Vulnerability Count over Time

It’s Over 9000!!

Page 9: We Have Met the Enemy

9

THE DEFINITION OF INSANITY

Page 10: We Have Met the Enemy

10

ANALYZE THIS!

What went wrong?

Competing priorities Too much else to do.

Unscheduled work.

Why should we care? High/Medium/Low a go-go

Page 11: We Have Met the Enemy

11

PRINCIPLES

Use the data that’s already present

Transparent measurement process

Joint goal setting

Continuous measurement

Specify problems…not solutions (No, Really!)

Self-service reporting

Page 12: We Have Met the Enemy

12

SETTING PERFORMANCE GOALS

High Risk Apps

# of Severe Vulnerabilitie

sTotal

Vulnerabilities

High Risk Hosts

Measuring the Riskiest

HostsTotal Number

of Vulnerabilitie

s

Maintain the Program

Median Time to Patch Servers

Scan Frequency

Page 13: We Have Met the Enemy

13

DATA SOURCES AND TOOLS

Data Sources• CMDB• Vulnerability Scan Data• Network Configurations

Tools• PowerShell (Extraction)• SQL Server (Storage)• Tableau (Presentation)

Page 14: We Have Met the Enemy

14

CURRENT STATE – NEW SHINY

24 mo. pilot underway for Vulnerability Management

Established reasonable goals in consultation with ops

Regular reporting – Reporting on Demand

Incorporated security into CIO messaging

Generating lots of discussion Driving towards process and automation

Data pulled from existing systems

Page 15: We Have Met the Enemy

15

TO INFINITY…AND BEYOND!

Page 16: We Have Met the Enemy

16

IF YOU’VE GOT 99 PROBLEMS…

Don’t have your finding process be the source of problems

Takeaways Provide flexibility to the doers

Determine the goals and methods for measuring success up front

You probably have more (usable) data available than you think

Report, report, report!

Page 17: We Have Met the Enemy

17

THANKS!

Questions? Comments? Complaints?

@dseverski