Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Security in an Interconnected and Complex World of Software #appsecapac2014

OWASP Japan
March 20, 2014
160

Security in an Interconnected and Complex World of Software #appsecapac2014

OWASP Japan

March 20, 2014
Tweet

Transcript

  1. About   •  Chairman  OWASP  Board     •  Shape

     Security   – Director  of  Product  Security     •   Mozilla   – Director  of  Security  Assurance   •  2012  SC  Magazine  InfluenJal      Security  Mind  
  2. Billion  Dollar  Cybercrime   ~US  $350  Billion  –  Global  Drug

     Trafficking  EsJmates   US  $170  Billion  –  Apple  Annual  Revenue  2013   US  $263  Billion  –  Hong  Kong  2012  Gross  DomesJc  Product  (GDP)   US  $469  Billion  –  Walmart  Annual  Revenue  2013   US  $95  Billion  –  Morocco  2012  Gross  DomesJc  Product  (GDP)   US  $112  Billion  –  HewleX-­‐Packard  Annual  Revenue  2013     US  $104  Billion  –  Honda  Annual  Revenue  2012  
  3. Billion  Dollar  Cybercrime   ~US  $350  Billion  –  Global  Drug

     Trafficking  EsJmates   US  $113  Billion  –  Global  price  tag  of  consumer  cybercrime   US  $170  Billion  –  Apple  Annual  Revenue  2013   US  $263  Billion  –  Hong  Kong  2012  Gross  DomesJc  Product  (GDP)   US  $469  Billion  –  Walmart  Annual  Revenue  2013   US  $95  Billion  –  Morocco  2012  Gross  DomesJc  Product  (GDP)   US  $112  Billion  –  HewleX-­‐Packard  Annual  Revenue  2013     US  $104  Billion  –  Honda  Annual  Revenue  2012   2013  Norton  Report  by  Symantec  
  4. Cost  of  Security   •  Cybercrime  cost  to  companies  

    – 26%  increase  2012  to  2013   •  Cybercrime  cost  to  individual   – 50%  increase  2012  to  2013   •  Cost  per  breached  record  to  company   – Average  US  $136  /  JPY  ¥13,923  
  5. Hacking  Becomes  Leading  Cause  of   Data  Breaches   Another

     Day,  Another  Retailer  in  a  Massive  Credit  Card   Breach   Secret  Service  invesJgaJng  possible  data  breach  at   Sears     Report:  Verizon  Uncovers  Two  More  Retail  Breaches  …     Adobe  Breach  Impacted  At  Least  38  Million  Users  
  6. Largest  Single  Culprit  :  Hacking   Verizon  Data  Breach  Report

     2013   2013  Incidents  by  Breach  Type   datalossdb.org   48%  from  Hacking   52%  involved  Hacking  
  7. Enemy   •  Script  Kiddies   – Scanners  &  generic  tools

      •  Organized  Crime   – Exploit  kits   •  Targeted  &  Specialized   – Precise,  0-­‐day,  determined  
  8. OpportunisJc  Scanners   •  Scan  web  for  common  vulnerabiliJes  

    •  Highly  leverage  automaJon   •  O6en  untargeted   75%  AOacks  OpportunisQc   Verizon  Data  Breach  Report  2013  
  9. Organized  Cybercrime   •  Financial  moJvaJon   •  Business  groups

     of  aXackers   •  Evolved  systems  for  exploitaJon  
  10. Underground  Market  Prices   2013  Dell  SecureWorks   USD  

    JPY   Visa,  American  Express,  Discover   $4-­‐$8   ¥409  -­‐  ¥818   Credit  Card  with  track  1  and  2  data   $12   ¥1227   Full  user  informaJon   $25   ¥2557   1,000  Infected  Computers   $20   ¥2046   DDOS  AXacks  (per  hour)    $3-­‐$5   ¥306  -­‐  ¥511    
  11. Underground  Marketplace   Stolen  Account  Balance     US  $700-­‐$4100

      JP  ¥760,00  –  ¥420,000   Underground  Price   US  $90-­‐$322   JP  ¥9,200  -­‐  ¥33,000  
  12. Secure  Code  vs.  Secure  So6ware   Fixing  a  single  security

     bug   Ensuring  no  criQcal  bugs  are   introduced  to  so]ware  
  13. Secure  Code  vs.  Secure  So6ware   Fixing  a  single  security

     bug   •  While  moving  fast   •  With  minimal  impact  to   developers   •  Within  an  agile  or  constant   deployment  model   •  Across  thousands  of   developers,  mulJple  sites   and  services,  and  numerous   new  lines  of  code   Ensuring  no  criQcal  bugs  are   introduced  to  so]ware  
  14. Secure  Code  vs.  Secure  So6ware   Fixing  a  single  security

     bug   •  While  moving  fast   •  With  minimal  impact  to   developers   •  Within  an  agile  or  constant   deployment  model   •  Across  thousands  of   developers,  mulJple  sites   and  services,  and  numerous   new  lines  of  code   Ensuring  no  criQcal  bugs  are   introduced  to  so]ware   Hard   Easy   (generally)  
  15. QuesJon  the  Models   •  Industry  Drivers   – PCI,  Sarbanes

     Oxley,  Hipaa,  Self  RegulaJon   •  Business  Drivers   – InnovaJon,  fail  fast,  Jme  to  market,  compeJJve   disadvantage     •  Development  PracJces   – Code  Reuse,  Libraries,  Patching  
  16. Standards  Based  Security  is  Failing   •  MoJvates  for  compliance

     over  security   •  Complex  &  unrealisJc  in  many  scenarios   •  RetroacJve  removal  of  cerJficaJon  
  17. Business  MoJvaJon   •  Security  someJmes  viewed  as  tax  

    •  Tradeoff  of  Jme  to  market   •  Put  off  by  aggressive  security  requirements   – An  overly  secure  system  used  by  no  one  provides   no  security  
  18. Hiring  More  Security  Isn’t  RealisJc   Security  Professionals   – Expensive

      – Hard  to  find   – CompeJJon  for  employment  
  19. Centralized  Security  OrganizaJon   •  Accountability  &  leadership   • 

    Increases  communicaJon   •  Enables  security  vision  &   forward  planning   •  Cohesive  vision  across   security  disciplines   ApplicaJon   Security   Network  Ops   Security   Corporate   Security   InformaJon   Security  
  20. Centralized  Security  OrganizaJon   •  Build  bridges  throughout  company  

    •  Become  partners  with  groups   •  Increase  communicaJon  &  support   Dev   QA   Product   PR   IT   Legal   Security  
  21. Influence  instead  of  Dictate   •  Teach  security   approaches

      throughout  org   •  Build  tools  &  guidance   •  Avoid  processes  that   require  security  staff   involvement   Avoid  security  choke  point   Influence  without  blocking  
  22. Embedding  Approach   •  Embedding  security   inside  dev  team

      – team  effort  to  deliver   product   – real  Jme   collaboraJon   – eliminates  “us”  vs   “them”   – build  alliance   Developer   Team   Developer   Team   Developer   Team   Security  Team  
  23. OrganizaJonal  Strategy   •  Scaling  via  Security  Champions   • 

    Primary  Role:  Developer,  Secondary:  Security     •  Scales  EffecJvely   •  Liaison  to  security  team   Developer  Team   Security  Champion   Developer  Team  
  24. Development   •  Developer  Training   •  Coding  Guidelines  

    – Cheat  Sheets   – Concise,  Usable   owasp.org/index.php/Cheat_Sheets  
  25. Development   •  Security  Libraries  &  Services   – Abstract  away

     internals  of  security  code   – Standardized  security  libraries   •  OWASP  ESAPI  –  an  example  of  what  you  should  build   within  your  organizaJon   •  Engineered  web  services  for  security  
  26. Safety  Proof  &  Shi6  Burden   Current   •  Developer

     must  remember   to  enable  security   •  Ability  to  build  anything  –   for  beXer  or  worse   Necessary   •  Security  fully  enabled,  opt-­‐ out  of  security  with  cauJon   •  Pre-­‐packaged  code  widgets   –  Appeal  to  masses   –  Limited  customizaJon   –  Safe  for  beginners  
  27. Smart  AutomaJon   •  Dynamic  security   analysis  built  for

      developers   –  Report  what  can  be   found  >95%  accuracy   –  Skip  issues  where   accuracy  is  low   –  Accurate  Tool  >  Tool   which  requires   security  team   wiki.mozilla.org/Security/Projects/Minion  
  28. AutomaJon   StaQc  /  Dynamic  Analysis     Can  scale

     if  homogenous  environment   Careful  of  human  involvement     Security  X  as  a  Service   Yes!  The  Future!  
  29. Quality  Assurance   •  Security  validaJon  within  QA   • 

    FuncJonal  tesJng  of  forms  +  basic  sec  tests   •  Follow  paXerns  of  current  QA   – Pass  /  Fail   – Self  contained  tesJng  –  no  need  for  security   evaluaJon   “><script>alert(‘problem’)</script>  
  30. Post  Release  –  Defend  The  App   •  Detect  and

     repel  common   aXacks     –  Web  ApplicaJon  Firewall   •  Detect  and  repel  custom   aXacks  at  business  layer     –  Integrated  applicaJon  defense   –  OWASP  AppSensor     •  Disable  ability  for  automated   aXacks   owasp.org/index.php/OWASP_AppSensor_Project  
  31. Post  Release  –  Defend  at  Scale   •  Design  for

     Scale   – Automated  aXack   blocking  &  deflecJon   – No  human  analysis  in   criJcal  path.   •  Human  interacJon     – Slow     – IneffecJve  against   distributed  aXacks  
  32. Key  Points   Adversary  is  moJvated  and  talented   – Organized

     criminal  aXackers   – Resourced  and  focused  
  33. Key  Points   SaJsfying  security  standards  is  a  false  sense

     of   security   – Focus  on  acJviJes  brining  value   – Meet  required  standards  &  understand  lack  of   value  
  34. Key  Points   Complex  systems  require  comprehensive   security  

    – Integrate  security  in  every  step  of  so6ware   development   – Build  to  scale  with  business  needs  &  development   speed