APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING
|
|
|
- Earl Norris
- 10 years ago
- Views:
Transcription
1 APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING Katie Moussouris Senior Security Strategist Microsoft Security Response Center (that s a zero) Session ID: ASEC-T18 Session Classification: Intermediate
2 Agenda Introductions A Tale of Two Standards ISO and ISO Vulnerability Disclosure Overview ISO Vulnerability Handling Processes Overview Technical Capabilities for Handling Vulnerabilities Communication Capabilities Say what?! Other Considerations - Timing for Publication Taking it all In And Applying It to Scale Questions for the Editor
3 A Tale of Two Standards for the best and worst of times
4 Who Am I Joined Microsoft in April 2007 Now I run Microsoft Security Community Outreach & Strategy, MSVR, and BlueHat Editor Vulnerability Handling (30111) (29147) Vulnerability Disclosure * Was a molecular biologist in a past professional life, worked on the Human Genome Project
5 A Tale of Two Standards ISO Standard on Vulnerability Disclosure (29147) How vendors should deal with vulnerability reports from external finders (AKA: Hackers) ISO Standard on Vulnerability Handling Processes (30111) How vendors should investigate, triage, and resolve ALL potential vulnerabilities, whether reported from external finders, or via the vendor s internal testing
6 Interconnection: and 30111
7 Interconnection: and 30111
8 Interconnection: and 30111
9 Interconnection: and 30111
10 Receiving Vuln Reports The Easy Way
11 Where is the Front Door? CC Attribution
12 Where is the Front Door? CC Attribution
13 Where There s A Will CC Attribution
14 Red Carpet or Welcome Matt CC Attribution
15 Got it! Now what? Acknowledge Receipt of the Report
16 Autoreply Good Enough? CC Attribution
17 Vendors: Ask for This Information Affected Product(s)/versions/URLs System Details (Operating System, etc.) Technical Description and Repro Steps PoC Other Parties/Products Involved Disclosure Plans/Dates
18 Dear Vuln Abbey: What Should the Advisory Say in Polite Company?
19 Example Advisory Excerpt Active Directory Invalid Free Vulnerability - CVE A remote code execution vulnerability exists in implementations of Active Directory on Microsoft Windows 2000 Server. The vulnerability is due to incorrect freeing of memory when processing specially crafted LDAP or LDAPS requests. An attacker who successfully exploited this vulnerability could take complete control of an affected system. View the full advisory at
20 Example Advisory Excerpt Active Directory Invalid Free Vulnerability - CVE A remote code execution vulnerability exists in implementations of Active Directory on Microsoft Windows 2000 Server. The vulnerability is due to incorrect freeing of memory when processing specially crafted LDAP or LDAPS requests. An attacker who successfully exploited this vulnerability could take complete control of an affected system. View the full advisory at
21 Example Advisory Excerpt Active Directory Invalid Free Vulnerability - CVE A remote code execution vulnerability exists in implementations of Active Directory on Microsoft Windows 2000 Server. The vulnerability is due to incorrect freeing of memory when processing specially crafted LDAP or LDAPS requests. An attacker who successfully exploited this vulnerability could take complete control of an affected system. View the full advisory at
22 Example Advisory Excerpt Active Directory Invalid Free Vulnerability - CVE A remote code execution vulnerability exists in implementations of Active Directory on Microsoft Windows 2000 Server. The vulnerability is due to incorrect freeing of memory when processing specially crafted LDAP or LDAPS requests. An attacker who successfully exploited this vulnerability could take complete control of an affected system. View the full advisory at
23 Example Advisory Excerpt Active Directory Invalid Free Vulnerability - CVE A remote code execution vulnerability exists in implementations of Active Directory on Microsoft Windows 2000 Server. The vulnerability is due to incorrect freeing of memory when processing specially crafted LDAP or LDAPS requests. An attacker who successfully exploited this vulnerability could take complete control of an affected system. View the full advisory at
24 Vulnerability Disclosure Standard (29147) Vendors should have a clear way to receive vuln reports Vendors should acknowledge receipt of vuln reports within 7 calendar days Vendors should coordinate with finders Vendors should issue advisories that contain useful information, at a minimum: Some Unique Identifier Affected products Impact/severity of damage if vuln is exploited How to eliminate or mitigate the issue (guidance or patching instructions) Generally a good idea to give finders credit in the advisory if the finder wishes to be publicly acknowledged.
25 Great But You Skipped the Good/Hard Parts! How to Investigate and Remediate?!
26 Remember: Don t Panic!
27 Vulnerability Handling Standard (30111) Vendors should have a process and organizational structure to support vuln investigation and remediation Vendors should perform root cause analysis Vendors should weigh various remediation options to adjust for real world risk factors Balance speed with thoroughness Vendors should try to coordinate with other vendors if appropriate multi-vendor issues supply chain issues
28 Vulnerability Response Capability Areas Policy Why Response? Organizational Capabilities Who s in charge of Response? Engineering Capabilities How quickly, effectively, and thoroughly do we respond? Communication Capabilities How clear and timely is our guidance? Analysis Capabilities How can we learn from this to prevent more vulns? Can we predict trends to aid in investment of resources?
29 Vulnerability Handling Process
30 Vulnerability Report Received External finder vs Internal testing Overall process is similar, but risks may change If an external finder was involved, follow to Understand the communication expectations Take into consideration the finder s intentions and publication plans during the resolution development phase
31 Verification Steps* Initial Investigation: The vendor attempts to confirm the potential vulnerability Root Cause Analysis: The vendor attempts to determine the underlying cause of the vulnerability Further Investigation: The vendor attempts to find other instances of the same type of vulnerability in the product or service, or in other products. Prioritization: The vendor considers the threat posed by the vulnerability to affected users of the product or online service. For each affected product or online service, there may be different severities of the same underlying issue. * Some processes may occur in parallel, rather than sequentially
32 Verification Possible Exit Conditions No Repro: The bug could not be reproduced. If reported by an external finder, see before closing the case Duplicate Bug: The issue is a duplicate vulnerability and is already being addressed via this process or is already fixed. Obsolete Product Bug: The vulnerability is in a product that is no longer supported by the vendor. Non-security Bug: The issue is a bug that either has no security implications, or is not exploitable with currently known techniques. Vendors need to keep up with current exploitation techniques Third-party Bug: The vulnerability is due to thirdparty code, configurations, or is present in a specification for which the vendor is not directly responsible.
33 Resolution Development Resolution decision: The vendor determines how the vulnerability can be resolved comprehensively, how to reduce the impact of successful exploitation of the vulnerability, or how to reduce exposure. Produce Remediation: The vendor produces patch(es), fix(es), upgrade(s), or documentation or configuration change(s) to address a vulnerability. Test Remediation: The vendor develops and performs appropriate tests to ensure the vulnerability issue has been addressed on all supported platforms.
34 Release Online service vulnerability resolution: Follow your organizations update deployment or configuration change processes for production systems. Product vulnerability resolution: For vulnerabilities in products where affected users must take some action to protect themselves (e.g. Install a patch) Release the remediation via an advisory, as outlined via the processes defined in ISO/IEC
35 Post Release Case maintenance: After the resolution has been released, further updates to the resolution might continue. Security development lifecycle feedback: The vendor updates the development lifecycle using information gained during root cause analysis to prevent similar vulnerabilities in new or updated products or services. (see 27034) Monitoring: For online services vulnerabilities, after the vendor applies the remediation, the vendor should monitor the stability of the product or service. Post-patch release monitoring for exploitation can help focus communication to most affected users.
36 Communication: Know What to Say and When to Say It
37 Communication: Say What?! Communication with external finders Have a secure method such as PGP to communicate technical details Convey fix timelines and schedule slips Communication with product business divisions Have an SLA in place for internal teams for both emergencies and non-emergencies Response Team should update with developments in threat landscape Communication with coordinators or other vendors Get to know your counterparts at other vendors Communication with affected users Establish a verifiable communication channel to alert users of threats
38 Other Vulnerability Handling Process Considerations
39 Monitoring Vulnerability Handling Phases Speed: Vendors should monitor the time it takes to address a vulnerability through this process and try to speed up without losing quality. Completeness: Vendors should monitor the completeness of the remediation, to ensure that it addresses the root cause of the vulnerability. Persistence: Vendors should monitor the remediation s effectiveness after it is released to affected users.
40 Confidentiality of Vulnerability Information Vendors should take care to maintain the confidentiality of sensitive vulnerability information. Any PII associated with the vulnerability report (e.g. stolen SSNs, or the finder s info, if they wish to remain anonymous) Vulnerability information that is not yet published or widely known, for which there is no defense yet, such as technical details that inordinately benefit attackers Premature disclosure of sensitive vulnerability information can increase the costs and risks associated with disclosure for vendors and users. Vendors should take reasonable steps to protect vulnerability information, as they would any HBI data.
41 Supply Chain! Multi-Vendor! If the vuln is part of another vendor s supply chain (either upstream or downstream), or is a multi-vendor issue Coordinate: Vendors should attempt to include other affected vendors in the discussion of potential resolutions if possible Common Supply Chain/Multi-vendor Scenarios: Vuln affects specific platform(s) due to underlying OS or CPU Flawed standard functional specification or in published algorithms; vulnerabilities in commonly used libraries; vulnerabilities in software components that lack a current maintainer. This often gets messy, so flexibility is key! The focus should be to minimize risk
42 Bonus Pro Tips: For Online Services Not in the Standards, but a Pretty Good Idea Vendors should ask that finders, where possible: Give a reasonable amount of time to fix before going public with technical details of the vuln Try not to DoS the online service while looking for vulns Try not to compromise the PII of other users E.g. Suggest setting up two test accounts, rather than going after other real users data Tell the vendor if PII of other users was compromised The vendor will likely have to disclose that fact to those users Vendors may want to try stating clearly that if the finder follows the above rules, then the vendor won t take legal action
43 Vulnerability Disclosure and Handling Process Standards Not If But When
44 Publication Timing ISO Standard of Vulnerability Disclosure (29147) The Vote is in! DIS was approved (40.99). Likely publication by end of 2013 ISO Standard on Vulnerability Handling Processes (30111) DIS registered in October 2012 (40.20) Expected publication by end of 2013
45 How ISO Will Affect Vulnerability Handling Vuln Disclosure Standard (29147) Help make it easier for finders to report vulns to vendors Help make the advisories a vendor releases more useful Vuln Handling Standard (30111) Help raise the level of security investigation and remediation that vendors do Help foster appropriate vulnerability coordination between vendors
46 Related Standard Bringing It Full Circle ISO/IEC Information technology Security techniques Application security Root Cause Analysis from feeds information back into the Security Development Lifecycle Overall improvement of product security depends on learning from one s mistakes. Improving Security Development Saves Orgs Time and Money Can your org afford to keep making the same security mistakes? Investing in Response Helps Stop the Bleeding, but Investing in Secure Development Helps Limit the Wounds
47 About Scale and Differentiation Many Hats: Efficient but Lacks Scalability Specialization: Well-resourced but Complex
48 Vulnerability Handling Policy Decide to respond, roll out the carpet, and open the front door. Organizational Capabilities Executive Support, Growth, then Specialization Engineering Capabilities Got Root (cause)? Balance timing and testing. Communication Capabilities How do users know they re vulnerable? How do they fix it? Analysis Capabilities How can we learn from this and can we predict trends?
49 CC attribution
50 Questions for the Editor? (that s a zero)
Vulnerability Management Nirvana: A Study in Predicting Exploitability
SESSION ID: TECH-F01 Vulnerability Management Nirvana: A Study in Predicting Exploitability Kymberlee Price Senior Director of Operations Bugcrowd @Kym_Possible Michael Roytman Senior Data Scientist Risk
Security Vulnerability Management. Mark J Cox
Security Vulnerability Management Mark J Cox Responsibility & Accountability Unique challenges Many vendors all ship the same thing The vulnerabilities are there. The fact that somebody in the middle of
Closing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
Securing OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
Management (CSM) Capability
CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security Table of Contents 1 PURPOSE
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Intro to Patching. Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode
Intro to Patching Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode RHCA, RHCSS, RHCDS, RHCVA, RHCX Agenda 2 Who am I? Who are you?
How To Manage A Patch Management Program
Patch Management Best Practices What is Patch Management? Patch management is the practice of reviewing, understanding, testing, deploying and reconciling the deployment state for software product updates.
Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name
Network Assessment Prepared For: Prospect Or Customer Prepared By: Your Company Name Environment Risk and Issue Score Issue Review Next Steps Agenda Environment - Overview Domain Domain Controllers 4 Number
JBoss security: penetration, protection and patching. David Jorm [email protected]
JBoss security: penetration, protection and patching David Jorm [email protected] Contents The problem Background Historical vulnerabilities JBoss worm Security response for products The solution The Problem
Guidelines for Security Vulnerability Reporting and Response Organization for Internet Safety Version 2.0 01 September 2004
Guidelines for Security Vulnerability Reporting and Response Organization for Internet Safety Version 2.0 01 September 2004 Table of Contents 1 Introduction... 1 1.1 Purpose... 1 1.2 Definition of a Security
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Information and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
Streamlining Patch Testing and Deployment
Streamlining Patch Testing and Deployment Using VMware GSX Server with LANDesk Management Suite to improve patch deployment speed and reliability Executive Summary As corporate IT departments work to keep
Vulnerability Management in Software: Before Patch Tuesday KYMBERLEE PRICE BUGCROWD
Vulnerability Management in Software: Before Patch Tuesday KYMBERLEE PRICE BUGCROWD whoami? Senior Director of a Red Team PSIRT Case Manager Data Analyst Internet Crime Investigator Security Evangelist
From Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. [email protected] +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011
NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011 Executive Summary BACKGROUND The NYS Local Government Vulnerability Scanning Project was funded by a U.S. Department of Homeland Security
6. Exercise: Writing Security Advisories
CERT Exercises Toolset 49 49 6. Exercise: Writing Security Advisories Main Objective Targeted Audience Total Duration Time Schedule Frequency The objective of the exercise is to provide a practical overview
eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success
: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success FAST FACTS Over 10 Million Windows Server 2003 Devices Still In Use Less Than 250 Days To Windows Server
Security within a development lifecycle. Enhancing product security through development process improvement
Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web
Microsoft STRIDE (six) threat categories
Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
8 Steps for Network Security Protection
8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because
8 Steps For Network Security Protection
8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER
A C a s e s t u d y o n h o w Z e n Q h a s h e l p e d a L e a d i n g K - 1 2 E d u c a t i o n & L e a r n i n g S o l u t i o n s P r o v i d e r i n U S g a u g e c a p a c i t y o f t h e i r f l
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Developing Secure Software in the Age of Advanced Persistent Threats
Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Proactive. Professional. IT Support and Remote Network Monitoring.
Proactive. Professional. IT Support and Remote Network Monitoring. Watching Your Greatest Asset with the Latest Technology. Focus on your Business. We ll focus on your IT. Recent business trends coupled
Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.
Some IPS systems can be easily fingered using simple techniques. The unintentional disclosure of which security devices are deployed within your defences could put your network at significant risk. Security
Why should I care about PDF application security?
Why should I care about PDF application security? What you need to know to minimize your risk Table of contents 1: Program crashes present an opportunity for attack 2: Look for software that fully uses
Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development
Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC) 3 12 February 2015 Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching,
Kaspersky Lab Product Support. Enterprise Support Program
Kaspersky Lab Product Support Enterprise Support Program Contents 1 Definitions... 3 2 Overview... 4 3 Description... 6 4 Limitations... 11 2 1 Definitions Product(s) shall mean software product(s) of
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
AVOIDING PATCH DOOMSDAY Best Practices for Performing Patch Management
AVOIDING PATCH DOOMSDAY Best Practices for Performing Patch Management The Patch Management Imperative Nearly every business in the world today depends on IT to support day-to-day operations and deliver
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
Manage Vulnerabilities (VULN) Capability Data Sheet
Manage Vulnerabilities (VULN) Capability Data Sheet Desired State: - Software products installed on all devices are free of known vulnerabilities 1 - The list of known vulnerabilities is up-to-date Desired
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
How To Use Adobe Software For A Business
EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed
LESSON 6.3. 98-365 Windows Server Administration Fundamentals. Understand Updates
Understand Updates Lesson Overview In this lesson, you will learn about: Update management Microsoft Baseline Security Analyzer (MBSA) Windows Server Update Services Anticipatory Set What is the Windows
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES Ira Winkler Codenomicon Session ID: MBS-W05 Session Classification: Intermediate Zero Day Attacks Zero day attacks are rising in prominence They tend to be
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
SECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE
Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4
2015 Vulnerability Statistics Report
2015 Vulnerability Statistics Report Introduction or bugs in software may enable cyber criminals to exploit both Internet facing and internal systems. Fraud, theft (financial, identity or data) and denial-of-service
Complete Patch Management
Complete Patch Management Targeted, Reliable and Cost-efficient Brief Secunia CSI Corporate Software Inspector Empower your organisation to take control of the vulnerability threat & optimize your ITsecurity
Introduction to OVAL: A new language to determine the presence of software vulnerabilities
Introduction to OVAL: A new language to determine the presence of software vulnerabilities Matthew Wojcik / Tiffany Bergeron / Robert Roberge November 2003 The MITRE Corporation Table of Contents Introduction
AUTOMATING THE 20 CRITICAL SECURITY CONTROLS
AUTOMATING THE 20 CRITICAL SECURITY CONTROLS Wolfgang Kandek, CTO Qualys Session ID: Session Classification: SPO-T07 Intermediate 2012 the Year of Data Breaches 2013 continued in a similar Way Background
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder [email protected] Winter School in Information Security, Finse May
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS
TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS Technical audits in accordance with Regulation 211/2011 of the European Union and according to Executional Regulation 1179/2011 of the
Security Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Vulnerability Intelligence & 3 rd party patch management
Vulnerability Intelligence & 3 rd party patch management Presented By: William Hamilton Melby Company Overview Brief Secunia facts Established: 2002 HQ: Copenhagen, Denmark Regional office: Minneapolis,
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Specific recommendations
Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It
Guideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust
SSL Interception Proxies Jeff Jarmoc Sr. Security Researcher Dell SecureWorks and Transitive Trust About this talk History & brief overview of SSL/TLS Interception proxies How and Why Risks introduced
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015
NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps
Ivan Medvedev Principal Security Development Lead Microsoft Corporation
Ivan Medvedev Principal Security Development Lead Microsoft Corporation Session Objectives and Takeaways Session Objective(s): Give an overview of the Security Development Lifecycle Discuss the externally
