Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Security in an Interconnected and Complex World...

Sponsored · Your Podcast. Everywhere. Effortlessly. Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
Avatar for OWASP Japan OWASP Japan
March 20, 2014
190

Security in an Interconnected and Complex World of Software #appsecapac2014

Avatar for OWASP Japan

OWASP Japan

March 20, 2014
Tweet

More Decks by OWASP Japan

Transcript

  1. About   •  Chairman  OWASP  Board     •  Shape

     Security   – Director  of  Product  Security     •   Mozilla   – Director  of  Security  Assurance   •  2012  SC  Magazine  InfluenJal      Security  Mind  
  2. Billion  Dollar  Cybercrime   ~US  $350  Billion  –  Global  Drug

     Trafficking  EsJmates   US  $170  Billion  –  Apple  Annual  Revenue  2013   US  $263  Billion  –  Hong  Kong  2012  Gross  DomesJc  Product  (GDP)   US  $469  Billion  –  Walmart  Annual  Revenue  2013   US  $95  Billion  –  Morocco  2012  Gross  DomesJc  Product  (GDP)   US  $112  Billion  –  HewleX-­‐Packard  Annual  Revenue  2013     US  $104  Billion  –  Honda  Annual  Revenue  2012  
  3. Billion  Dollar  Cybercrime   ~US  $350  Billion  –  Global  Drug

     Trafficking  EsJmates   US  $113  Billion  –  Global  price  tag  of  consumer  cybercrime   US  $170  Billion  –  Apple  Annual  Revenue  2013   US  $263  Billion  –  Hong  Kong  2012  Gross  DomesJc  Product  (GDP)   US  $469  Billion  –  Walmart  Annual  Revenue  2013   US  $95  Billion  –  Morocco  2012  Gross  DomesJc  Product  (GDP)   US  $112  Billion  –  HewleX-­‐Packard  Annual  Revenue  2013     US  $104  Billion  –  Honda  Annual  Revenue  2012   2013  Norton  Report  by  Symantec  
  4. Cost  of  Security   •  Cybercrime  cost  to  companies  

    – 26%  increase  2012  to  2013   •  Cybercrime  cost  to  individual   – 50%  increase  2012  to  2013   •  Cost  per  breached  record  to  company   – Average  US  $136  /  JPY  ¥13,923  
  5. Hacking  Becomes  Leading  Cause  of   Data  Breaches   Another

     Day,  Another  Retailer  in  a  Massive  Credit  Card   Breach   Secret  Service  invesJgaJng  possible  data  breach  at   Sears     Report:  Verizon  Uncovers  Two  More  Retail  Breaches  …     Adobe  Breach  Impacted  At  Least  38  Million  Users  
  6. Largest  Single  Culprit  :  Hacking   Verizon  Data  Breach  Report

     2013   2013  Incidents  by  Breach  Type   datalossdb.org   48%  from  Hacking   52%  involved  Hacking  
  7. Enemy   •  Script  Kiddies   – Scanners  &  generic  tools

      •  Organized  Crime   – Exploit  kits   •  Targeted  &  Specialized   – Precise,  0-­‐day,  determined  
  8. OpportunisJc  Scanners   •  Scan  web  for  common  vulnerabiliJes  

    •  Highly  leverage  automaJon   •  O6en  untargeted   75%  AOacks  OpportunisQc   Verizon  Data  Breach  Report  2013  
  9. Organized  Cybercrime   •  Financial  moJvaJon   •  Business  groups

     of  aXackers   •  Evolved  systems  for  exploitaJon  
  10. Underground  Market  Prices   2013  Dell  SecureWorks   USD  

    JPY   Visa,  American  Express,  Discover   $4-­‐$8   ¥409  -­‐  ¥818   Credit  Card  with  track  1  and  2  data   $12   ¥1227   Full  user  informaJon   $25   ¥2557   1,000  Infected  Computers   $20   ¥2046   DDOS  AXacks  (per  hour)    $3-­‐$5   ¥306  -­‐  ¥511    
  11. Underground  Marketplace   Stolen  Account  Balance     US  $700-­‐$4100

      JP  ¥760,00  –  ¥420,000   Underground  Price   US  $90-­‐$322   JP  ¥9,200  -­‐  ¥33,000  
  12. Secure  Code  vs.  Secure  So6ware   Fixing  a  single  security

     bug   Ensuring  no  criQcal  bugs  are   introduced  to  so]ware  
  13. Secure  Code  vs.  Secure  So6ware   Fixing  a  single  security

     bug   •  While  moving  fast   •  With  minimal  impact  to   developers   •  Within  an  agile  or  constant   deployment  model   •  Across  thousands  of   developers,  mulJple  sites   and  services,  and  numerous   new  lines  of  code   Ensuring  no  criQcal  bugs  are   introduced  to  so]ware  
  14. Secure  Code  vs.  Secure  So6ware   Fixing  a  single  security

     bug   •  While  moving  fast   •  With  minimal  impact  to   developers   •  Within  an  agile  or  constant   deployment  model   •  Across  thousands  of   developers,  mulJple  sites   and  services,  and  numerous   new  lines  of  code   Ensuring  no  criQcal  bugs  are   introduced  to  so]ware   Hard   Easy   (generally)  
  15. QuesJon  the  Models   •  Industry  Drivers   – PCI,  Sarbanes

     Oxley,  Hipaa,  Self  RegulaJon   •  Business  Drivers   – InnovaJon,  fail  fast,  Jme  to  market,  compeJJve   disadvantage     •  Development  PracJces   – Code  Reuse,  Libraries,  Patching  
  16. Standards  Based  Security  is  Failing   •  MoJvates  for  compliance

     over  security   •  Complex  &  unrealisJc  in  many  scenarios   •  RetroacJve  removal  of  cerJficaJon  
  17. Business  MoJvaJon   •  Security  someJmes  viewed  as  tax  

    •  Tradeoff  of  Jme  to  market   •  Put  off  by  aggressive  security  requirements   – An  overly  secure  system  used  by  no  one  provides   no  security  
  18. Hiring  More  Security  Isn’t  RealisJc   Security  Professionals   – Expensive

      – Hard  to  find   – CompeJJon  for  employment  
  19. Centralized  Security  OrganizaJon   •  Accountability  &  leadership   • 

    Increases  communicaJon   •  Enables  security  vision  &   forward  planning   •  Cohesive  vision  across   security  disciplines   ApplicaJon   Security   Network  Ops   Security   Corporate   Security   InformaJon   Security  
  20. Centralized  Security  OrganizaJon   •  Build  bridges  throughout  company  

    •  Become  partners  with  groups   •  Increase  communicaJon  &  support   Dev   QA   Product   PR   IT   Legal   Security  
  21. Influence  instead  of  Dictate   •  Teach  security   approaches

      throughout  org   •  Build  tools  &  guidance   •  Avoid  processes  that   require  security  staff   involvement   Avoid  security  choke  point   Influence  without  blocking  
  22. Embedding  Approach   •  Embedding  security   inside  dev  team

      – team  effort  to  deliver   product   – real  Jme   collaboraJon   – eliminates  “us”  vs   “them”   – build  alliance   Developer   Team   Developer   Team   Developer   Team   Security  Team  
  23. OrganizaJonal  Strategy   •  Scaling  via  Security  Champions   • 

    Primary  Role:  Developer,  Secondary:  Security     •  Scales  EffecJvely   •  Liaison  to  security  team   Developer  Team   Security  Champion   Developer  Team  
  24. Development   •  Developer  Training   •  Coding  Guidelines  

    – Cheat  Sheets   – Concise,  Usable   owasp.org/index.php/Cheat_Sheets  
  25. Development   •  Security  Libraries  &  Services   – Abstract  away

     internals  of  security  code   – Standardized  security  libraries   •  OWASP  ESAPI  –  an  example  of  what  you  should  build   within  your  organizaJon   •  Engineered  web  services  for  security  
  26. Safety  Proof  &  Shi6  Burden   Current   •  Developer

     must  remember   to  enable  security   •  Ability  to  build  anything  –   for  beXer  or  worse   Necessary   •  Security  fully  enabled,  opt-­‐ out  of  security  with  cauJon   •  Pre-­‐packaged  code  widgets   –  Appeal  to  masses   –  Limited  customizaJon   –  Safe  for  beginners  
  27. Smart  AutomaJon   •  Dynamic  security   analysis  built  for

      developers   –  Report  what  can  be   found  >95%  accuracy   –  Skip  issues  where   accuracy  is  low   –  Accurate  Tool  >  Tool   which  requires   security  team   wiki.mozilla.org/Security/Projects/Minion  
  28. AutomaJon   StaQc  /  Dynamic  Analysis     Can  scale

     if  homogenous  environment   Careful  of  human  involvement     Security  X  as  a  Service   Yes!  The  Future!  
  29. Quality  Assurance   •  Security  validaJon  within  QA   • 

    FuncJonal  tesJng  of  forms  +  basic  sec  tests   •  Follow  paXerns  of  current  QA   – Pass  /  Fail   – Self  contained  tesJng  –  no  need  for  security   evaluaJon   “><script>alert(‘problem’)</script>  
  30. Post  Release  –  Defend  The  App   •  Detect  and

     repel  common   aXacks     –  Web  ApplicaJon  Firewall   •  Detect  and  repel  custom   aXacks  at  business  layer     –  Integrated  applicaJon  defense   –  OWASP  AppSensor     •  Disable  ability  for  automated   aXacks   owasp.org/index.php/OWASP_AppSensor_Project  
  31. Post  Release  –  Defend  at  Scale   •  Design  for

     Scale   – Automated  aXack   blocking  &  deflecJon   – No  human  analysis  in   criJcal  path.   •  Human  interacJon     – Slow     – IneffecJve  against   distributed  aXacks  
  32. Key  Points   Adversary  is  moJvated  and  talented   – Organized

     criminal  aXackers   – Resourced  and  focused  
  33. Key  Points   SaJsfying  security  standards  is  a  false  sense

     of   security   – Focus  on  acJviJes  brining  value   – Meet  required  standards  &  understand  lack  of   value  
  34. Key  Points   Complex  systems  require  comprehensive   security  

    – Integrate  security  in  every  step  of  so6ware   development   – Build  to  scale  with  business  needs  &  development   speed