Slide 1

Slide 1 text

No content

Slide 2

Slide 2 text

How LINE does enterprise security > SeungJin Lee / GrayLab Lead

Slide 3

Slide 3 text

Agenda > Why enterprise security is hard > How LINE security team does • Hands-on • Community activities

Slide 4

Slide 4 text

About Me @beist Previous Hacker Career > Speaking at popular information security conferences including BLACKHAT USA > Conference review board member (BLACKHAT, CODEBLUE) > First asian who passed the Defcon CTF qual Lead of GrayLab Security Team at LINE > Code review, penetration testing, security consulting > Community activities > Worked since 2000 (Penetration testing company) > Researcher at Korea Army > Founder of information security company called GRAYHASH in Korea

Slide 5

Slide 5 text

Why Enterprise Security Is Hard > You have too many attack things to protect at big firms • Not only servers, laptops, mobiles • But also, the big number of employees • 3rd parties (products, services, even contractors) • Big infrastructure

Slide 6

Slide 6 text

Why Enterprise Security Is Hard > Development side • - I can’t code on a laptop not connected to the internet • However, not everyone knows how to protect oneself • - I want to surf the internet on my laptop • And people easily go to malicious websites without notice • Developers usually have sensitive information • Also, hacking engineers is much easier than hacking servers

Slide 7

Slide 7 text

Why Enterprise Security Is Hard > Infrastructure side • - I want to access the wiki, mail, git server at home • - I also need to access to the live SSH server so that I can work at home • .. And, once any single employee gets hacked, huge risks come • VPN, 2FA don’t perfectly save your computers

Slide 8

Slide 8 text

Why Enterprise Security Is Hard > Other problems • Spaghetti business services: Complexity could go too far • Vulnerable 3rd party products: • What if your company VPN is vulnerable • Think about Orange’s finding

Slide 9

Slide 9 text

Why Security Matters > Security is not only part of Internet but also real life > People spend their time on our services - Life with LINE > What challenges we’ve faced

Slide 10

Slide 10 text

Service Release Process Release Implementation Requirements Verification Design Training

Slide 11

Slide 11 text

Service Release Process Release Implementation Requirements Verification Design Training

Slide 12

Slide 12 text

Service Release Process Release Implementation Requirements Verification Design Training

Slide 13

Slide 13 text

Service Release Process Release Implementation Requirements Verification Design Training

Slide 14

Slide 14 text

Service Release Process Release Implementation Requirements Verification Design Training

Slide 15

Slide 15 text

Service Release Process Release Implementation Requirements Verification Design Training

Slide 16

Slide 16 text

Security Education Platform > We internally develop a Security Education Platform for employees • For both non-engineers and engineers > For non-engineers • Security 101, APT attack recognition, “Protect yourself” > For engineers • Secure code, cryptography, “How to make secure code”

Slide 17

Slide 17 text

Security Education Platform

Slide 18

Slide 18 text

Security Education Platform

Slide 19

Slide 19 text

Security Education Platform > Wargame • Not only lesson • Hands-on style hacking • Developers can understand
 much better by solving
 hacking challenges

Slide 20

Slide 20 text

Risk Management > When new service is planned, all related teams are in a same room • Assign role and responsibility • Discuss on attack surface and risk management > Security and privacy risk management • Privacy by design

Slide 21

Slide 21 text

During Implementation > Security team checks • White-box testing (To find insecure code by static analysis) • Tools and libraries (If insecure ones or old version used) > Strict dev environment: isolation for alpha, beta, release • Important for not having real data in dev mode and for future security test > Challenges: dependency issues, often vulnerable functions used

Slide 22

Slide 22 text

Verification > Manual code auditing, Fuzzing testing • Injection, Broken Authentication, XXE, Insecure Deserialization, so on > Services can’t be released until the security team approves • All major issues have to be fixed before release • Even they can’t have public IP addresses > Spending most of time on communicating with the dev-teams

Slide 23

Slide 23 text

After Release > Always-on fuzz testing • Not common, but not informed update • Testing all of API and comparing to previous results > Incident response plan executed • LINE has dedicated teams for data breaches, abuses, any incident • Always connected with the development team

Slide 24

Slide 24 text

Machine Learning Machine Learning for Information Security Is Not Easy

Slide 25

Slide 25 text

Machine Learning > Machine Learning for defense • Account hijacking attack detection • Anti spam filter • Malicious network connection detection

Slide 26

Slide 26 text

Machine Learning 0

Slide 27

Slide 27 text

Machine Learning Total Suspicious Filter for Suspicious Logs

Slide 28

Slide 28 text

Machine Learning > ML for offense (Very early stage at LINE, yet) • To find vulnerabilities in our code > Collecting LINE code to modeling • Luckily, JAVA is most used at work • Also, there are many services meaning many code generated everyday

Slide 29

Slide 29 text

Machine Learning > At current stage, ML has fundamental problems when defense • Could work well on specific data sets but not other • Not robust even when only detecting - false positive > But, LINE security team tries to put ML everywhere as much as possible • For both defense and offense • Because It can save our time and we have limited resource > To have an actual helpful ML system: Tuning your code everyday Lessons learned

Slide 30

Slide 30 text

Tooling > In-house tooling is what we spend much time • Blackbox web security bug scanners (XSS, SQLi) • API fuzzing test • Monitoring suspicious behaviors • 3rd party cloud service monitoring (Check if sensitive assets uploaded) • Copyright checker > Continuous running it at scale

Slide 31

Slide 31 text

BECKS > We value information security community • Thus, we run local security meet ups in Taiwan, Japan, and Korea • Once per every two month > Connecting people and sharing knowledge • Students, developers, security engineers, non-engineers • Also, good chance to meet talented engineers (Hiring?) > Website: https://becks.io

Slide 32

Slide 32 text

BECKS BECKS In Taiwan BECKS in Japan Talks and Free Beer and Snacks

Slide 33

Slide 33 text

Bug Bounty Program > LINE has run public bug bounty program since 2015 • To collaborate with 3rd party hackers to make the company secure > We have security team but It’s important to have different point of view • We’ve rewarded hackers for security issues, more than 200 bugs > More bounty programs on the way • Hint: threat bounty > Website: https://hackerone.com/line

Slide 34

Slide 34 text

Note > Enterprise security is a challenge for every company • Limited resource, but many services and fast development • Everything is super connected for some reason which bring risks • Even cutting-edge can’t solve most of problems that we’re facing > Our job is not to find problems, but to fix them in an efficient way • We think most important thing is to know how to work with other teams • Thus, good communication is a mandatory required skill at LINE > Keywords to win: Good process, tooling, tuning and communication

Slide 35

Slide 35 text

QnA > https://twitter.com/beist > [email protected]

Slide 36

Slide 36 text

Thank You