Slide 1

Slide 1 text

safeguarding sensitive data in the cloud Elliot Murphy CTO, CommonGround

Slide 2

Slide 2 text

– Cory Doctorow in 2008 http://www.theguardian.com/technology/2008/jan/15/data.security “We should treat personal electronic data with the same care and respect as weapons-grade plutonium - it is dangerous, long-lasting and once it has leaked there's no getting it back”

Slide 3

Slide 3 text

No content

Slide 4

Slide 4 text

No content

Slide 5

Slide 5 text

–The Guardian http://www.theguardian.com/world/2014/oct/16/-sp-revealed-whisper-app- tracking-users “Revealed: how Whisper app tracks ‘anonymous’ users”

Slide 6

Slide 6 text

– US Senator John D Rockefeller, Chairman of Committee with oversight over the Federal Trade Commission and consumer protection issues http://www.rockefeller.senate.gov/public/index.cfm/files/serve? File_id=a9d102ef-ac4a-445e-8a49- fc0f0377960e&SK=B8C08E13132161C24B2074067EF20FD5 “Unfortunately, recent media accounts have raised serious questions regarding Whisper’s practices and commitment to the terms of its own privacy policy”

Slide 7

Slide 7 text

US HHS Wall of Shame http://www.hhs.gov/ocr/privacy/hipaa/administrative/ breachnotificationrule/breachtool.html

Slide 8

Slide 8 text

No content

Slide 9

Slide 9 text

Attacked from the inside • Wireless (802.11b/g/n) high gain Bluetooth & USB Ethernet adapters • Fully-automated NAC/802.1x/ Radius bypass • One-click EvilAP, stealth mode & passive recon • Kali linux

Slide 10

Slide 10 text

No content

Slide 11

Slide 11 text

Snoopy proof of concept • Drones collect probe SSIDs • Offer rogue access points with matching SSID • traffic transparently proxied via squid and logged • SSLstrip removes https • mitmproxy injection into web pages • https://wigle.net to map from probe to GPS • Google maps street view

Slide 12

Slide 12 text

FOOD

Slide 13

Slide 13 text

Not-so-nice restaurants • Widely varying resources • Widely varying education levels • Widely varying local customs and challenges • Extremely competitive • Price pressure • Many workers, minimal training • Workers may not be motivated

Slide 14

Slide 14 text

Acceptable level of risk

Slide 15

Slide 15 text

Acceptable level of risk

Slide 16

Slide 16 text

Acceptable level of risk Wash your hands

Slide 17

Slide 17 text

Acceptable level of risk “CDC estimates that each year in the US roughly 1 in 6 (or 48 million people) gets sick, 128,000 are hospitalized, and 3,000 die of foodborne diseases” source: http://www.cdc.gov/ foodsafety/facts.html

Slide 18

Slide 18 text

• Wash your hands • Go for walks • Play with others • Run in circles • Tell stories

Slide 19

Slide 19 text

Wash your hands • Use a password manager • Use multi-factor authentication, particularly on your password manager, DNS, and Email • Develop basic fluency in using encryption. Understand what options exist, and the human factors at play. • Use full disk encryption (even on your mobile devices) • Use encryption on all data in flight and at rest. This includes connections inside your application (webapp to backend) • Run the rest of the steps in order to customize this list for your environment

Slide 20

Slide 20 text

Crash course in encryption Everything reduces to a key management problem Shamir secret sharing, N-of-M splits Homomorphic encryption exists Data you don’t have can’t get stolen Attend Real World Crypto Jan 2015 in London

Slide 21

Slide 21 text

Go for walks

Slide 22

Slide 22 text

Go for walks keylogger on a sysadmins laptop stolen ssh private key engineer accidentally adds a SQL injection Someone with access to data goes rogue and sells it

Slide 23

Slide 23 text

Go for walks This is called risk assessment The fictional reasonable person Hand rule or http://en.wikipedia.org/wiki/ Calculus_of_negligence

Slide 24

Slide 24 text

Play with others Group cognition Elevation of privilege game, Cornucopia game https://www.owasp.org/index.php/ OWASP_Cornucopia 3rd party pentests and audits

Slide 25

Slide 25 text

Run in circles

Slide 26

Slide 26 text

Tell stories

Slide 27

Slide 27 text

Tell stories https://www.owasp.org/ https://www.feistyduck.com/books/bulletproof-ssl- and-tls/ https://training.catalyze.io • https://github.com/catalyzeio/policies

Slide 28

Slide 28 text

• Wash your hands - take reasonable basic precautions • Go for walks - schedule time to reflect on your risk • Play with others - engage in group problem solving around threat modeling • Run in circles - run an OODA loop • Tell stories - help your colleagues value meaningful security and reject FUD