managing crowdsourced security
play

Managing Crowdsourced Security RVAsec Mike Shema June 8, 2017 - PowerPoint PPT Presentation

Managing Crowdsourced Security RVAsec Mike Shema June 8, 2017 mike@cobalt.io You see, in this world theres two kinds of people, my friend: Those with loaded guns and those who dig. You dig. Clint Eastwood, The Good, the Bad,


  1. Managing Crowdsourced Security RVAsec Mike Shema June 8, 2017 mike@cobalt.io

  2. “You see, in this world there’s two kinds of people, my friend: Those with loaded guns and those who dig. You dig.” – Clint Eastwood, The Good, the Bad, and the Ugly .

  3. “There are two kinds of spurs, my friend. Those that come in by the door; those that come in by the window.” – Eli Wallach, The Good, the Bad, and the Ugly .

  4. A cacophony of hordes. A scrutiny of crowds.

  5. How do we… find vulns efficiently ? spend wisely ? reduce risk ?

  6. Bounties are an imperfect proxy for risk, where price implies impact. $0 — $15K ~$800 avg. $10,000 $50 XSS vs. any auth’d user, 
 Reflected XSS, self, access sensitive info no auth

  7. Bounties are an imperfect proxy for work, where earnings may diverge from effort. 100% 80% 50%

  8. ~33% ~87%

  9. Noise increases cost of discovery and reduces efficiency.

  10. Clear, concise documentation Scope Rules of engagement Filters Practical SLAs for responses Expectations of reasonable threat models

  11. Cost-ineffective, Inefficient Cost-ineffective, Efficient Cost-effective, Inefficient Cost-effective, Efficient

  12. Days Since Valid (Any) Report 2016 7 (4) 16 (8) 33 (14) 2015 4 (1) 10 (5) 23 (11) 2014 3 (2) 8 (4) 16 (7) 50% 80% 95% Days since any report: 2, 5, 11

  13. Baseline — 
 Initial cost + 
 Ongoing maintenance Volume — 
 Reports/day, 
 Percent valid Triage — 
 Reports/hour, 
 Hourly rate ~15% savings

  14. Where are the scanners? Overlaps, gaps, and ceilings in capabilities. Fixed-cost, typically efficient, but still requires triage and maintenance.

  15. Public, Private Bounties

  16. Pen Testing

  17. “We always have bugs. Eyes are shallow.” – Mike Shema’s Axiom of AppSec

  18. BugOps vs. DevOps Chasing bugs isn’t a strategy.

  19. Risk reduction.

  20. “You’re not using HTTPS.” “Use HTTPS.” “Seriously. Please use HTTPS.” “Let’s Encrypt.”

  21. Risk Strategies Decrease rate of reports for ___ vulns. Increase speed of deploying fixes for ___ vulns. Deploy ___ to counter ___ vuln class.

  22. Realistic threat models. Incentives oriented towards Bounties quality and effort. Machine-readable reports.

  23. Public bounty Private bounty Crowds Pen testing Threat intel sharing Fuzzing farms

  24. Find efficient vuln discovery methods, strive for automation. Small crowds can have high impact.

  25. Thank You! blog.cobalt.io

  26. Questions?

  27. R — 
 www.r-project.org RStudio — 
 www.rstudio.com data.table ggplot

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend