Rationalizing Security
Matt Konda
Jemurai
@mkonda
[email protected]
https://en.wikipedia.org/wiki/Rational_function
Slide 2
Slide 2 text
Introduction
1997 2006 2014
Consultant
Engineer
Software
Architect
Director of
Engineering
Rabble Rouser:
Perl
Java Applet
C++
J2EE
J2EE
Spring
Analytics
Certificate Authority
Vulnerability Scanner
Penetration Test Manager
Pricing
Retail
Banking
Manufacturing
Pharma
Healthcare
Research
Ruby
Rails
Chicago BSides 2011, 2012
Defcon Skytalk
OWASP Chicago, MSP 2013
AppSec USA 2012, 2013
ChicagoRuby 2013
Secure 360
Lone Star Ruby 2013
WindyCityRails 2013
Chicago JUG 2014
RailsConf 2014
Converge 2014
ChicagoCoderConference 2015
MS in CS
Founder
Consultant
Agile
Clojure
Graph Database
Big Data
Trying to hack a
business model that
succeeds while
helping developers.
Domains:
Projects:
DevOps / Automation
Training
Coaching
Code Review
Plugged in to SDLC
Consulting
Assessments
@mkonda
[email protected]
Secure
DevOps
Growing
OWASP
Board
Agile Security
Slide 3
Slide 3 text
Census?
Slide 4
Slide 4 text
What are you hoping
to get out of this?
Slide 5
Slide 5 text
Metasploit Demo
Slide 6
Slide 6 text
Case Study 1
e-Commerce Fraud
Slide 7
Slide 7 text
“This year, organized crime became
the most frequently seen threat
actor for Web App Attacks.”
Verizon 2015 DBIR
Slide 8
Slide 8 text
No content
Slide 9
Slide 9 text
See
• Botnets
• Widespread use of harvested credentials
• Account takeover
• Credit card fraud
• Dumps of passwords and sensitive data with SQLi
• User pwnage with XSS
Slide 10
Slide 10 text
Case Study 2
Healthcare Fraud
Slide 11
Slide 11 text
“Two thirds of the incidents in this
pattern had no attacker-attribution
information whatsoever.”
Verizon 2015 DBIR
Cyber-Espionage
Slide 12
Slide 12 text
See
• Long term investment
• Systematic targeting
• Phishing / Social Engineering
• Pivoting
Slide 13
Slide 13 text
How long does it take for your
host to get scanned / attacked
on the open internet?
Slide 14
Slide 14 text
As a startup, you’re
probably not an
You’re in experimental mode …
Slide 15
Slide 15 text
You don’t want to worry about it
Slide 16
Slide 16 text
There are generally three
things that force you to
think about security.
Use Services Provided
• Use IAM to define groups users. Use MFA.
• Limit Network Access, Use TrustedAdvisor
• CloudTrail
• Use encryption for S3, EBS, RDS, etc.
• New: Inspector, WAF, Config Rules
Slide 29
Slide 29 text
• XSS is really code injection.
• The distinction is that the code is running in
your user’s browser.
• This can have crippling significance -
because it bypasses network and other
typical controls.
Cross-site Scripting
Tiers
• 0
–
Cursory
–
You
have
done
something.
You
define.
• 1
–
Opportunistic
–
Adequately
defends
against
easily
discoverable
items.
• 2
–
Standard
–
Adequately
defends
against
items
of
moderate
to
serious
risk.
• 3
–
Advanced
–
Defends
against
even
advanced
attacks
and
demonstrates
good
security
design.
Slide 42
Slide 42 text
No content
Slide 43
Slide 43 text
Discussion …
Slide 44
Slide 44 text
Technical questions?
Eg. I’m using … what do I need to
worry about?
Slide 45
Slide 45 text
Get a partner and talk
about what data you have
that people might want …