Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Measuring Security Uncertainty

Measuring Security Uncertainty

Using confusion matrices to provide figures of merit for security solutions, given improved measurements of performance matched to needs at each stage of the development to production lifecycle.

coffeefueled

April 19, 2020
Tweet

More Decks by coffeefueled

Other Decks in Technology

Transcript

  1. MEASURING SECURIT Y UNCERTAINT Y C O N F U

    S I O N M AT R I C E S A S F I G U R E S O F M E R I T F O R S E C U R I T Y S O L U T I O N S
  2. FIGURES OF MERIT (FOM) R E D U C I

    N G T H E Q U A L I T Y O F S O L U T I O N S D OW N TO S I M P L E N U M B E R S
  3. WHERE IS A FOM USEFUL? Anywhere we want to understand

    what risk we are exposed to by acting or not acting on outputs of a system. • AV • DAST • DLP • EDR • IDS/IPS • MSSP • SAST • SIEM • SOC • TI • UBA • WAF
  4. S E C U R I T Y T E

    S T I N G L I F E C Y C L E J U S T A Q U I C K R E F R E S H E R , I P R O M I S E
  5. T R U T H , B E A U

    T Y, A N D T E S T S T RY I N G TO G E T T H E T E R M I N O L O G Y R I G H T
  6. WHAT IS TRUTH? Not a philosophical issue What is true

    is what is true regardless of our tests, or at least what we say is true We can only take a sample of ‘truth’
  7. TESTS, POSITIVES AND NEGATIVES Our tests will say that a

    vulnerability does or does not exist. Where our test claims there’s a vulnerability, this is a positive. Anything which is not a positive given the way our tests work, is assumed to test negative. Where our test reflects the underlying truth, this is a true positive or negative.
  8. NO CONFUSION AT ALL To keep it simple, this isn’t

    confusing at all. A test will give either a positive or negative for a finding that is or is not true. Bear with me.
  9. TRUTH POSITIVE NEGATIVE TEST POSITIVE TRUE POSITIVE A finding from

    our test (e.g. SQL injection, which can be actively exploited) FALSE POSITIVE A finding from our test (e.g. cross-site scripting, which does not exist and is not exploitable.) NEGATIVE FALSE NEGATIVE An exploitable vulnerability which is not found by our test (e.g. unpatched software not detected by monitoring tools) TRUE NEGATIVE Anything which is not exploitable, and is not detected by our tests.
  10. WHAT IS A CONFUSION MATRIX? O T H E R

    T H A N H I G H LY C O N F U S I N G W I T H L I M I T E D S TA N D A R D I S E D T E R M I N O L O G Y
  11. WHICH MEASURES MATTER? At different lifecycle stages, different aspects matter

    more. When remediation costs are highest, we care most about false positives. When remediation costs are lowest, we care most about false negatives. When determining ground truth is difficult, we care less about truth. When determining ground truth is easy, we care more about truth.
  12. WORKED EXAMPLE C A L C U L AT I

    N G T H E D I F F E R E N T M E T R I C S
  13. SAMPLE REPORT Hypothetical sample system with known findings. Any additional

    findings can be examined and determined as false or true through testing. Different ‘sample’ systems are applicable at each lifecycle stage, but we can calculate FoMs in the same way. With vulnerability findings, we usually will not have true negatives as testing outcomes. False negatives include any positives not identified. Actual Positive Actual Negative Test Positive 62 38 Test Negative 14 0
  14. Actual Positive Actual Negative Test Positive 62 38 PPV: 0.62

    Test Negative 14 0 NPV: 0.00 TPR: 0.82 TNR: 0.00
  15. USE CASES W O R K E D E X

    A M P L E S F O R D I F F E R E N T S TA G E S
  16. DEFINITION At this stage: • Remediation costs are low •

    Identifying true positives is expensive So: • False positives are cheap • False negatives may be caught in later testing We want: • High sensitivity over all
  17. DESIGN At this stage: • Remediation costs are low •

    Identifying true positives is expensive So: • False positives are cheap • False negatives may be caught in later testing We want: • High sensitivity over all
  18. DEVELOPMENT At this stage: • Remediation costs are middling •

    Identifying true positives is middling So: • False positives require effort and create backlog • False negatives may be caught in later testing We want: • Balance of sensitivity and overall accuracy
  19. DEPLOYMENT At this stage: • Remediation costs are high •

    Identifying true positives is easy So: • False positives are expensive • False negatives create unknown residual risk We want: • Negative and positive predictive value to be high
  20. MAINTENANCE At this stage: • Identifying true positives is easy,

    but undesirable • Inappropriate responses can have significant impact So: • False positives are potentially disastrous • False negatives mean an extended breach We want: • As few false positives and negatives as possible
  21. RECAP 1.Security assessment and monitoring can be measured. 2.Measurement does

    not require a lot of work. 3.Which measure is important varies with lifecycle. If you’ve enjoyed this, donate to TMHC Isolation Con fundraiser for MSF! and get in touch @coffee_fueled https://linkedin.com/in/jbore [email protected]