Measuring & Maximizing Crowdsourced Vuln Discovery Mike Shema - - PowerPoint PPT Presentation

measuring maximizing crowdsourced vuln discovery
SMART_READER_LITE
LIVE PREVIEW

Measuring & Maximizing Crowdsourced Vuln Discovery Mike Shema - - PowerPoint PPT Presentation

Measuring & Maximizing Crowdsourced Vuln Discovery Mike Shema October 4, 2018 mike@cobalt.io You see, in this world theres two kinds of people, my friend: Those with loaded guns and those who dig. You dig. Clint Eastwood,


slide-1
SLIDE 1

Mike Shema


mike@cobalt.io

Measuring & Maximizing Crowdsourced Vuln Discovery

October 4, 2018

slide-2
SLIDE 2

– Clint Eastwood, The Good, the Bad, and the Ugly.

“You see, in this world there’s two kinds of people, my friend: Those with loaded guns and those who dig. You dig.”

slide-3
SLIDE 3

– Eli Wallach, The Good, the Bad, and the Ugly.

“There are two kinds of spurs, my friend. Those that come in by the door; those that come in by the window.”

slide-4
SLIDE 4

“What’s the price for this vuln?”
 — Bounties “What’s the cost to fix this vuln?”
 — DevOps “What’s the value of finding vulns?”
 — CSOs

slide-5
SLIDE 5

“When?”
 — Everyone

slide-6
SLIDE 6
  • Vulns. Bounties. Crowds. Herds.
slide-7
SLIDE 7

Bounties are an imperfect proxy for risk, where price implies impact. $0 $15K ~$800 - $1,000 avg. $50

XSS self, no auth

$10K

XSS any auth’d user,
 expose sensitive info

slide-8
SLIDE 8

Bounties are an imperfect proxy for work, where earnings diverge from effort.

slide-9
SLIDE 9
slide-10
SLIDE 10

Noise increases cost of discovery and reduces efficiency.

slide-11
SLIDE 11

Build a Story (Cautiously)

Ask an interesting question. Collect signals, beware silence. Create metrics, beware tunnel vision. Create a story, beware myth.

slide-12
SLIDE 12

R, www.r-project.org RStudio, www.rstudio.com data.table ggplot2

slide-13
SLIDE 13
slide-14
SLIDE 14
slide-15
SLIDE 15
slide-16
SLIDE 16

Since any report: +1, +7, +31

slide-17
SLIDE 17

50% of bounty vulns

slide-18
SLIDE 18

50% of pen test vulns

slide-19
SLIDE 19

Scanners

Overlaps and limitations in capabilities. Fixed-cost, efficient, yet still require triage and maintenance.

slide-20
SLIDE 20

An Alliance of Appsec

Establish a baseline. Refocus a noisy program. Refine a stale program. Identify effective bug finders. Fix vulns, improve process.

slide-21
SLIDE 21

“We’ll always have bugs.
 Eyes are shallow.”

slide-22
SLIDE 22

BugOps vs. DevOps

Chasing bugs isn’t a strategy.

slide-23
SLIDE 23

(shiftless) Shift left isn’t merely finding vulns earlier. Implement security controls earlier. Design secure architectures earlier.

slide-24
SLIDE 24

“You’re not using HTTPS.” “Use HTTPS.” “Seriously. Please use HTTPS.” Let’s Encrypt.

slide-25
SLIDE 25

Always Basic


(never easy)

Enumerate apps. Enumerate dependencies. Identify ownership.

slide-26
SLIDE 26

Threat Modeling

DevOps exercise guided by security. Influences design. Informs implementation.

slide-27
SLIDE 27
slide-28
SLIDE 28
slide-29
SLIDE 29

Maybe— Most vulns are noise. Many vulns aren’t worth fixing.

slide-30
SLIDE 30
slide-31
SLIDE 31

“Spend Left”

Rebalance vuln discovery investments to favor the effort of discovering risk rather than the risk discovered. When possible, invest in removing risk.

slide-32
SLIDE 32

Who’s finding vulns in my app? How often do they succeed? What are they finding? What’s the price paid for that effort? What’s the cost of [not] fixing the vulns? What’s the risk that’s been reduced?

slide-33
SLIDE 33

Bounty prices as a proxy for DevSecOps,
 where price implies maturity. $ 1 Experimenting $ 1,000 Enumerating $ 10,000 Exterminating $ 100,000 Extinct-ifying

slide-34
SLIDE 34

Measure vuln discovery effort Monitor risk for trends Mend brittle design Dev[Sec]Ops

slide-35
SLIDE 35

Thank You!

cobalt.io

slide-36
SLIDE 36

Questions?

@CodexWebSecurum

@CodexWebSecurum

slide-37
SLIDE 37

www.owasp.org/index.php/Category:OWASP_Top_Ten_Project www.owasp.org/index.php/Category:Threat_Modeling github.com/bugcrowd/vulnerability-rating-taxonomy www.iso.org/standard/45170.html www.iso.org/standard/53231.html www.r-project.org github.com/Rdatatable/data.table/wiki ggplot2.tidyverse.org