Developing Secure Software in the Age of Advanced Persistent Threats



Similar documents
SAFECode Security Development Lifecycle (SDL)

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Defending Against Data Beaches: Internal Controls for Cybersecurity

External Supplier Control Requirements

The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.

Critical Controls for Cyber Security.

CyberArk Privileged Threat Analytics. Solution Brief

SANS Top 20 Critical Controls for Effective Cyber Defense

Protecting Your Organisation from Targeted Cyber Intrusion

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

The Next Generation Security Operations Center

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Cybersecurity and internal audit. August 15, 2014

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Practical Steps To Securing Process Control Networks

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

SPEAR PHISHING UNDERSTANDING THE THREAT

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Source Code Protection: Evaluating Source Code Security

Advanced Threats: The New World Order

External Supplier Control Requirements

Software Development: The Next Security Frontier

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Persistence Mechanisms as Indicators of Compromise

Concierge SIEM Reporting Overview

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

2015 Vulnerability Statistics Report

Leveraging Privileged Identity Governance to Improve Security Posture

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

We Prevent Breaches (and surprises) Intelligent Prevention

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Goals. Understanding security testing

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

SAST, DAST and Vulnerability Assessments, = 4

IBM Security Intelligence Strategy

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Security Issues in Cloud Computing

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

90% of data breaches are caused by software vulnerabilities.

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

WEB 2.0 AND SECURITY

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Advanced Threat Protection with Dell SecureWorks Security Services

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

Privacy + Security + Integrity

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

DEVELOPING SECURE SOFTWARE

Payment Card Industry (PCI) Terminal Software Security. Best Practices

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

VOLUME 4. State of Software Security Report. The Intractable Problem of Insecure Software

Agenda , Palo Alto Networks. Confidential and Proprietary.

September 20, 2013 Senior IT Examiner Gene Lilienthal

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

The Business Case for Security Information Management

Is security awareness a waste of time?

Continuous Network Monitoring

Beyond passwords: Protect the mobile enterprise with smarter security solutions

After the Attack. The Transformation of EMC Security Operations

24/7 Visibility into Advanced Malware on Networks and Endpoints

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM QRadar Security Intelligence April 2013

How To Manage Security On A Networked Computer System

BlackRidge Technology Transport Access Control: Overview

ISO 27002:2013 Version Change Summary

How To Handle A Threat From A Corporate Computer System

IBM Managed Security Services Vulnerability Scanning:

The Protection Mission a constant endeavor

RSA Security Anatomy of an Attack Lessons learned

Patch and Vulnerability Management Program

Where every interaction matters.

Enterprise Application Security Program

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Transcription:

Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate

Our Job: Keep our Employer out of the Headlines Product Security Group IT Security Organization The Journal Vendor [ABC] issues an emergency patch for its flagship product and urges customers to apply it without delay to address an actively exploited vulnerability The Journal Company [ABC] admits to losing sensitive information following a security breach in its corporate network. Product impact on customers risk Security impact on enterprise risk

March 2011: A breach on RSA s Infrastructure leads to Customer Risk Product Security Group IT Security Organization The Journal RSA urges customers to take immediate steps to strengthen their SecurID implementations following the detection of a sophisticated cyber attack in progress being mounted against RSA APTs are Redefining Product Security. How?

Traditional Approach to Product Security

Security Groups in High-Tech Organizations Product Security Group IT Security Organization Product security assurance programs (Vulnerability response, Security Development Lifecycle) Internal security and protection programs (Employees, systems & IP protection and risk management) Product impact on customers risk Security impact on enterprise risk

Product Security: Minimize Product Impact on Customer Risk Product Security Group Product security assurance programs (Vulnerability response, Security Development Lifecycle) Assume the customer environment is compromised Minimize risks introduced by products into the customer environment Build attack resistant products Document products for secure deployment Efficiently handle security vulnerabilities and security patches

Product Security Development Lifecycle Focuses on Software Vulnerabilities Sec. Dev. Lifecycle Training Requirements Threat modeling PRODUCT SECURITY POLICY & Related Standards Design Authentication & access control Logging Network security Cryptography and key management Serviceability Secure design principles Code analysis Security testing Documentation Product Development Lifecycle Assessment Vulnerability response Implementation Input validation Injection protection Failing securely Web and C/ C++ coding standards Handling secrets Secure Build operations Code signing Gap assessment as part of product engineering process PRODUCT RISK (4 levels) Critical: Requires executive sign-off High: Requires remediation in next release Medium: Requires monitoring Low

The Changing Landscape

Characteristics of advanced threats Single minded, determined and innovative Target individuals over systems Through reconnaissance will understand your processes, people & systems better than us Will exploit ANY weakness Countermeasures increase sophistication Custom malware, NOT detectable by signatures Are not in a hurry will take as long as it takes Goal is long term & persistent access The perimeter has shifted, all systems now exist in a hostile environment

Evolution of IT Products Creates New Attack Vectors Web Perimeter Security Cloud Cloud Computing: Technology providers host customer applications & data PC / Client-Server Network Security Mainframe System Security 10

Implications

Attacks Against Technology Providers Are Impacting Customers Loss of Intellectual Property March 2011: RSA urges customers to take immediate steps to strengthen their SecurID implementations following the detection of a sophisticated cyber attack in progress being mounted against RSA. Loss of cryptographic secrets April 2011: Microsoft issues an update to all supported versions of Windows after Comodo issues fraudulent digital certificates as a result of an attack. Loss of source code January 2012: Symantec recommends disabling the pcanywhere product as a result of a theft of source code Attacks against cloud services July 2012: Data breach at Yahoo results in disclosure of 400,000 user names and passwords

Advanced Threats are Often Undetected 94% of companies learn they have been compromised from a third party such as law enforcement The median length of time an organization has been compromised before they find out is 416 days Kill Chain Source: Mandiant M-Trends (2012) Recon Weaponize Deliver Exploit Install C2 Action Detection Response

Assume You Are Compromised Consider that no organization is impenetrable. Assume that your organization might already be compromised and go from there. Security for Business Innovation Council (August 2011)

Fighting APTs: Layered Defense, Intelligent Monitoring and Governance Layered defense Logs & Events Identity Location Division Department Geo Info Regulation Data Asset Value Data Enhancement Strong Governance Intelligent monitoring and analytics Incidents GRC Threats GRC Early detection

Technology Providers Need to Adapt their Product Security Strategy Product Security Group IT Security Organization Create an integrated governance model Build intelligent monitoring into products Design layered defense in products 16

The New Face of Product Security

Technology Providers Need to Adapt their Product Security Strategy Product Security Group IT Security Organization Create an integrated governance model Build intelligent monitoring into products Design layered defense in products 18

Rethinking Product Security Assuming the Customer and its Supply Chain are Compromised Assume every system across the supply chain is compromised Integrators & Customers Supplier Sourcing Solution Integration Product Deployment Supplier Sourcing Software Dev. Suppliers to Providers Supplier Sourcing Product Delivery Product Development Technology Providers Product Delivery Secure product delivery & hosted services Secure the product development environment Secure the supply chain Minimize risks introduced by products into the customer environment Develop secure software + 19

Expanding the Security Development Lifecycle into Product Operations Product Security Group IT Security Organization Product Governance Drive standard adoption as part of our Security Development Lifecycle Product Operations: Hosting, Engineering systems, Manufacturing Collaborate on standards for: Source code management Anti-counterfeiting Cloud / Hosting Enterprise Governance Ensure continuous monitoring as part of the enterprise security management program 20

Product Governance: Expanding EMC Security Development Lifecycle Sec. Dev. Lifecycle Training Requirements Threat modeling Code analysis Security testing Documentation Assessment Vulnerability response PRODUCT SECURITY POLICY & Related Standards Gap assessment as part of product engineering process Design Authentication & access control Logging Network security Cryptography and key management Serviceability Secure design principles Implementation Input validation Injection protection Failing securely Web and C/ C++ coding standards Handling secrets Secure Build operations Code signing Product Development Lifecycle Source Code Protection Counterfeiting Protection PRODUCT RISK (4 levels) Critical: Requires executive sign-off High: Requires remediation in next release Medium: Requires monitoring Low

Enterprise Governance: Product Security has Become Part of Enterprise GRC Strategy Supplier risk management Counterfeiting prevention Software integrity controls Source code and hosting infrastructure protection Software integrity controls Supply Chain Risk Product Security Risk IT Security Risk EMC Enterprise GRC Other Business Risks

Governance structure Executive Security Council Information Security Governance, Risk & Compliance Council VP Information Risk(Chair) SVP Global Services, SVP Finance, SVP Sales, SVP Engineering, SVP IT, SVP Marketing Organization-wide Governance Global Sec Office Product Sec Office Privacy Office Internal Audit Risk Register GS Sponsoring Exec GS BSM GA Sponsoring Exec GA BSM Sales Sponsoring Exec Sales BSM Marketing Sponsoring Exec Marketing BSM Engineering Sponsoring Exec IIP BSM IT Sponsoring Exec IT BSM Local Governance Local Governance Local Governance Local Governance Local Governance Local Governance Risk Identification Risk Identification Risk Identification Risk Identification Risk Identification Risk Identification Process Integration Process Integration Process Integration Process Integration Process Integration Process Integration Compliance Compliance Compliance Compliance Compliance Compliance Reporting Reporting Reporting Reporting Reporting Reporting

Technology Providers Need to Adapt their Product Security Strategy Product Security Group IT Security Organization Create an integrated governance model Build intelligent monitoring into products Design layered defense in products 24

Building Attack-aware Software: Add Intelligence to Security Logs Leverage threat modeling to dynamically log software abuse Buffer overflow SQL Injections Evolve from logging to debug towards logging for detection and alerting Insert anomaly logging in program logic Direction: Design software to leverage the enterprise risk ecosystem Reputation, white lists

Technology Providers Need to Adapt their Product Security Strategy Product Security Group IT Security Organization Create an integrated governance model Build intelligent monitoring into products Design layered defense in products 26

Designing APT-Resistant Software: Split-value cryptographic authentication Blue Server Password XOR d with Random Number Password (1) Passwords are stored split between two servers: Compromising one server does not expose the password New random number Random Number Red Server (3) Random number is regularly refreshed to reduce the windows of time for a successful attack on both servers Claimed Password (2) During authentication, claimed passwords are verified without exposing the legitimate password

Assume the Source Code is Compromised No hardcoded secrets Accelerate the adoption of a Secure Software Development Lifecycle Threat modeling Code scanning Security Testing Account for source code disclosure in threat modeling Build integrity control in source code review and protection Pay close attention to comments $secretkey = London2012 ; Avoid unsafe string functions e.g. strcpy() /* * To do: * Add authentication */ 28

Build Software Integrity Controls Sourcing & Development Source code protection Authenticity and integrity control of embedded components Backdoor testing and code review People, process and supplier controls Delivery & Execution Executable signing Malware scanning Secure code signing process Use of hardware root of trust White listing Reference: Software Integrity Controls (June 2010) - Published by SAFECode (www.safecode.org)

Developing Software for the Cloud: Security in Agile Stories Tasks Tasks Tasks Agile Software Development Methodology Security Stories Security focused stories Associated security tasks Operational Security Tasks Targeted at Agile practitioners Conducted on an ongoing basis Advanced Security Tasks Most advanced security tasks Require guidance from security practitioners Industry Secure Development Practices & CWE

Secure Agile Development Example Security-focused story As a architect/developer, I want to ensure AND As QA, I want to verify correct permission assignment and maintenance for all critical resources Backlog task(s) [D/T] When a critical resource is defined or accessed, make sure that the access permissions (programmatic and systemic) to it are left in their most restrictive but useful possible setting. [D] Describe correct permissions for the resource in the security configuration guide. SAFECode Fundamental Practice(s) Use least privilege CWE -ID CWE-732 Source: Practical Security Stories and Security Tasks for Agile Development Environment (July 2012) - Published by SAFECode (www.safecode.org)

Wrap-Up 32

Apply: Change Your Software Development Assumptions Assume every system is compromised If you have not done it yet, define a secure software development process and train your developers Bridge IT security and software security groups Integrate governance models Integrate software integrity controls in your secure software development process Code review for backdoors Verification of source code system security Implement a process for controlling integrity and authenticity of external components Start with an inventory Implement a secure code signing process Build intelligent logging for security, not just for debugging Translate your secure software development process in Agile stories 33

Summary Secure product development as grown as an software engineering discipline The changing threat landscape and the emergence of cloud are products attack surface Technology providers and software development organization need to adapt their secure software development process Change trust assumptions in threat assessment Integrate code integrity controls Develop an integrated governance model Adapt security controls to Agile 34