Security Design & High-Risk Users HITB GSEC 2015



Similar documents
ADVANCED KILL CHAIN DISRUPTION. Enabling deception networks

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

Cloud Computing. What does it really mean for your business?

Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M?

IT Governance. What is it and how to audit it. 21 April 2009

THE ADVANTAGES AND DISADVANTAGES OF STRATEGIC MANAGEMENT

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Application Research of CMM in Real Estate Entreprise Management

Security Engineering Best Practices. Arca Systems, Inc Boone Blvd., Suite 750 Vienna, VA

Threat Information Sharing; Perspectives, Strategies, and Scenarios

A shift in responsibility. More parties involved Integration with other systems. 2

Control Design & Implementation Week #5 CRISC Exam Prep ~ Domain #4. Bill Pankey Tunitas Group. Job Practice

Lowering business costs: Mitigating risk in the software delivery lifecycle

GENERATING VALUE WITH CONTINUOUS SECURITY TESTING

Agile ETRM from Allegro

The Global Attacker Security Intelligence Service Explained

"Gaming versus Exercises: Designing Surprise-resilient Organizations for a Cybered World

FREQUENTLY ASKED QUESTIONS

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives

SOA : To Do or Not to Do

Measuring Executive Support For Projects Michael O Brochta, PMP President, Zozer Inc. Abstract. Executive Actions

Risk Management Guidelines

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

How To Change A Business Model

TechCenter.com EXCELLENCE THROUGH EXPERTISE

Engineering Update November 2014

White Paper from Global Process Innovation. Fourteen Metrics for a BPM Program

how can I comprehensively control sensitive content within Microsoft SharePoint?

INTERMEDIATE QUALIFICATION

Prescriptive Analytics. A business guide

Strategic Risk Management for School Board Trustees

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

DoD Strategy for Defending Networks, Systems, and Data

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

The Biggest Constraint to DevOps in the Cloud has a Solution

ICAgile Learning Roadmap Agile Testing Track

Service Management Personas: Aligning Business Users to IT Service Provisioning

Instilling Confidence in Security and Risk Operations with Behavioral Analytics and Contextualization

i2isales Training Solution - Sales Management

How To Interview For A Job

IT Management On Demand

IBM Global Technology Services March Virtualization for disaster recovery: areas of focus and consideration.

Sage ERP X3 I White Paper

Behaviourally Based Questions

The Software Development Life Cycle: An Overview. Last Time. Session 8: Security and Evaluation. Information Systems Security Engineering

Navy Information Dominance Industry Day

Managing the Unpredictable Human Element of Cybersecurity

Microsoft Services Premier Support. Security Services Catalogue

Audit Readiness Lessons Learned

To act as a professional inheritor, critic and interpreter of knowledge or culture when teaching students.

Juniper Networks Secure

Dissertation Seminar III: Data Collection 3 credits EDL 867

Ohio Supercomputer Center

Informatica MDM High Availability Solution

Software Life Cycle Processes

Cybersecurity: Mission integration to protect your assets

Efficient BPMN: from Anti-Patterns to Best Practices

Chapter 4 Information Security Program Development

The most suitable system methodology for the proposed system is drawn out.

Information security versus network security in the Internet as critical infrastructure Security of Internet and Critical Infrastructures: European

Realizing True Data Integrity Through Automated Discrepancy Management

CPSC 467: Cryptography and Computer Security

Tips for Leveraging Changes in the Incentive Compensation Plan Process

Cybersecurity MORE THAN A GOOD HEADLINE. Protect more

WHITE PAPER NOVEMBER Eliminate Software Development and Testing Constraints with Service Virtualization

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

white SECURITY TESTING WHITE PAPER

how can I improve performance of my customer service level agreements while reducing cost?

Protecting your Enterprise

1.1 The Nature of Software... Object-Oriented Software Engineering Practical Software Development using UML and Java. The Nature of Software...

AKAMAI AND RIVERBED JOINTLY DEVELOP INNOVATIVE SAAS ACCELERATION SOLUTION

Enterprise 2.0 Knowledge Management Development Trends

Managing IT Security with Penetration Testing

The Training Material on Supply Chain Collaboration & Logistics Solutions has been produced under Project Sustainable Human Resource Development in

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA

Information Technology Integration Putting IT to work in driving deal success

Application Security in the Software Development Lifecycle

Agenda Overview for Customer Experience, 2015

Using Story Points to Estimate Software Development Projects in the Commercial Phase

Scrum in a Large Project Theory and Practice

Certified Information Professional 2016 Update Outline

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

RUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch

Integrating Project Management and Service Management

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices

Current Issues in School Leadership 3 credits EDL 827

FlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk

Fujitsu Cloud IaaS Trusted Public S5. shaping tomorrow with you

Web Services in SOA - Synchronous or Asynchronous?

ACCELERATE INTERNATIONAL EXPANSION WITH ERP. Building a Cost-Effective Foundation to Enable Growth

The Emergence of Security Business Intelligence: Risk

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Quality Management Plan 1

Project, Portfolio Management (PPM) for the Enterprise Whose System is it Anyway?

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government

Alarm Management What, Why, Who and How?

Transcription:

Security Design & High-Risk Users Eleanor Saitta @Dymaxion HITB GSEC 2015

Security is not about computers.

People built computers to accomplish tasks. People built more computers and networked them to accomplish more tasks. Those computers got compromised. People paid us to fix the problem. We made the mistake of thinking they meant us to fix the computers.

Having made this mistake, we built an entire industry around solving the wrong problem. People built yet more computers and networks. We realized we couldn t secure them individually and started looking at probabilities and scaling. We never did fix the problem.

Security is the set of activities that reduce the likelihood of a set of adversaries successfully frustrating the goals of a set of users.

The ability to define and determine what a technical system will and will not do is necessary but not sufficient to determine whether it is secure. Defining security for a system means understanding what your humans want.

Security design is the process of understanding user culture, goals, and workflows, organizational technical capabilities, and adversary capabilities and dispositions and synthesizing a satisficing solution.

Outcomes are messy

Understanding the Operations Process Planning in the presence of an adversary OODA Loops Cognitive overhead Operational utility Functional deployability

Operational Planning Risk Analysis Resource Management Adversary Modeling Digital Practices Task Domain Practices Observe Orient Act Decide Operational Planning Well-Being Practices Community Practices Communication Practices Physical Practices Operational Practices

Efficacy Worse is Better

Invariants Accuracy Adaptability Agility Anticipation Assurance Availability Awareness Capacity Coherence Concealment Confidentiality Continuity Control Completeness Cooperation Coordination Deception Deployability Deniability Depth Deterrence Discipline Dispersion Economy Efficacy Endurance Exposure Identifiability Initiative Integration Integrity Interoperability Goodwill Mobility Nonrepudiation Objectivity Precision Predictability Readiness Receptivity Redundancy Relevancy Resilience Responsiveness Simplicity Simultaneity Surprise Survivability Synchronization Trust Timeliness Susceptibility Uncertainty Unlinkability Unpredictability Velocity

Accuracy Adaptability Agility Anticipation Assurance Availability Awareness Capacity Coherence Concealment Confidentiality Continuity Control Completeness Cooperation Coordination Deception Deployability Deniability Depth Deterrence Discipline Dispersion Economy Efficacy Endurance Exposure Identifiability Initiative Integration Integrity Interoperability Goodwill Mobility Nonrepudiation Objectivity Precision Predictability Readiness Receptivity Redundancy Relevancy Resilience Responsiveness Simplicity Simultaneity Surprise Survivability Synchronization Trust Timeliness Susceptibility Uncertainty Unlinkability Unpredictability Velocity Invariants

Legibility

Design Understanding, documenting, and communicating constraints and capabilities Synthesize and validate potential solutions Communicate and justify those solutions Support the development process & prevent drift

Participatory Design Recognize users as authorities on their goals Deep cultural engagement for complex scenarios Surface tacit and embodied knowledge Build long-term community trust Short-circuit long development processes Create blended countermeasures Minimize team ego

Mapping the Security Task Requirements Analysis Architectural Design Development Testing Operations

Mapping the Security Task Requirements Analysis Architectural Design Development Testing Architectural Analysis Standards & Frameworks Security Testing Operations Monitoring & Incident Response

Mapping the Requirements Analysis Architectural Design Threat Modeling Architectural Analysis Security Development Standards & Frameworks Task Testing Security Testing Operations Monitoring & Incident Response

Mapping the Requirements Analysis Architectural Design Threat Modeling Adversary Modeling Architectural Analysis Security Development Standards & Frameworks Task Testing Security Testing Operations Monitoring & Incident Response

Mapping the Security Task Participatory Design Requirements Analysis Architectural Design Development Testing Security Design Threat Modeling Adversary Modeling Architectural Analysis Standards & Frameworks Security Testing Operations Monitoring & Incident Response

Practical Process Change Find your UX designers and product managers Insist on coming to all of their meetings Learn their language and process Learn what your users are actually trying to do Design requirements-level security support Document and solidify once you have results Give yourself room to fail Work across your org to center user goals

Thank you! ella@dymaxion.org twitter http Support my security research and writing: http://patreon.com/dymaxion HITB GSEC 2015 Security Design and High-Risk Users