Practical Magic: Behavior- based Security Design for IoT Kelly - - PowerPoint PPT Presentation

practical magic behavior based security design for iot
SMART_READER_LITE
LIVE PREVIEW

Practical Magic: Behavior- based Security Design for IoT Kelly - - PowerPoint PPT Presentation

Practical Magic: Behavior- based Security Design for IoT Kelly Shortridge (@swagitda_) Troopers 2018 Hi, Im Kelly I usually solve problems by letting them devour me. Franz K afka 3 100 90 80 70 60 50 40 30 20 10 0


slide-1
SLIDE 1

Practical Magic: Behavior- based Security Design for IoT

Kelly Shortridge (@swagitda_) Troopers 2018

slide-2
SLIDE 2

Hi, I’m Kelly

slide-3
SLIDE 3

3

“I usually solve problems by letting them devour me.” ― Franz Kafka

slide-4
SLIDE 4

4

10 20 30 40 50 60 70 80 90 100 January 1, 2007 January 1, 2009 January 1, 2011 January 1, 2013 January 1, 2015 January 1, 2017

IoT IoT Security

Source: Google Trends

slide-5
SLIDE 5

5

We’re engendering a Kafkaesque paradigm for IoT security

slide-6
SLIDE 6

6

Dyn DDoS / Mirai Botnet Reaper Botnet RSAC 2017

10 20 30 40 50 60 70 80 90 100 January 1, 2007 January 1, 2009 January 1, 2011 January 1, 2013 January 1, 2015 January 1, 2017

Source: Google Trends

slide-7
SLIDE 7

7

IoT botnets are the first, and ravenous, boss of the IoT security battle

slide-8
SLIDE 8

8

Mirai: 60 default passwords led to 100k node botnet attack against Dyn

slide-9
SLIDE 9

9

But we’re promoting complexity & a seemingly endless set of hurdles

slide-10
SLIDE 10

10

Lackluster IoT security is not a secret –

  • ur ideas are clearly not working
slide-11
SLIDE 11

11

By understanding behavior, we can guide choice & support secure habits

slide-12
SLIDE 12

12

  • 1. Existing Suggestions
  • 2. Incentive Problems
  • 3. Behavior-Based Design
  • 4. IoT Security Ideas
slide-13
SLIDE 13

Existing Suggestions

slide-14
SLIDE 14

14

FTC recommends building-in security from the beginning (simple as that!)

slide-15
SLIDE 15

15

FDA: Pre- & Post-Market Guidelines (H/T @marasawr)

slide-16
SLIDE 16

16

Pre-market: a lot of documentation & threat modelling

slide-17
SLIDE 17

17

Post-market: monitoring & a mitigation deployment strategy

slide-18
SLIDE 18

18

OWASP: IoT Testing Guide, IoT Attack Surface Areas, Principles of IoT Sec…

slide-19
SLIDE 19

19

Designed for the penetration tester user persona – not developers

slide-20
SLIDE 20

20

Cisco’s guidelines: “Secure Analytics,” Network Enforced Policy, Auth^2

slide-21
SLIDE 21

21

Compensating Controls: post-market remedies by third parties

slide-22
SLIDE 22

22

Burden is primarily on the end user

slide-23
SLIDE 23

23

Actionable, real-time behavioral analytics for visibility & intelligence…

slide-24
SLIDE 24

24

Maybe feasible for enterprises, but what are consumers to do?

slide-25
SLIDE 25

Incentive Problems

slide-26
SLIDE 26

26

Principal-agent problem: someone else makes the decisions, but you bear the impact

slide-27
SLIDE 27

27

The Agent has their own self-interest. It’s likely not the same as yours.

slide-28
SLIDE 28

28

Moral Hazard: people take more risks because someone else bears the cost

slide-29
SLIDE 29

29

Next level: Equifax’s customers aren’t the end users whose data is stored

slide-30
SLIDE 30

30

Prospect Theory: people care about relative vs. objective outcomes

slide-31
SLIDE 31

31

Maintain a reference point against which outcomes are measured

slide-32
SLIDE 32

32

Overweight small probabilities & underweight large probabilities

slide-33
SLIDE 33

33

Overhyping low-probability vuln exploitation vs. default passwords

slide-34
SLIDE 34

34

Loss aversion: people prefer to avoid losses vs. acquire the same gain

slide-35
SLIDE 35

35

Framing security as a time & cost sink facilitates natural resistance

slide-36
SLIDE 36

36

Hyperbolic discounting: future rewards are discounted vs. present

slide-37
SLIDE 37

37

Many security initiatives are “investments” with long-term benefits

slide-38
SLIDE 38

38

Dual System Theory: lizard brain (system 1) vs. philosopher brain (sys 2)

slide-39
SLIDE 39

39

Most policies work on System 2 – we need to work with System 1 instead

slide-40
SLIDE 40

40

Overchoice: too many options causes analysis paralysis

slide-41
SLIDE 41

41

Which of the 100 items do devs tackle 1st in a 10-page IoT attack surface doc?

slide-42
SLIDE 42

42

We have to work with how people think, not against it

slide-43
SLIDE 43

Behavior-based Design

slide-44
SLIDE 44

44

What is choice architecture?

slide-45
SLIDE 45

45

Design presentation of choices to promote improved decision-making

slide-46
SLIDE 46

46

Example: MINDSPACE framework for behavioral design

slide-47
SLIDE 47

47

Messenger: people dismiss info from sources they don’t like / respect

slide-48
SLIDE 48

48

Incentives: losses can be more motivating than rewards

slide-49
SLIDE 49

49

Norms: People follow social standards, (even when counterproductive)

slide-50
SLIDE 50

50

Defaults: People prefer things to remain the same (inertia)

slide-51
SLIDE 51

51

Salience: Novel & relevant draws attention & influences choices

slide-52
SLIDE 52

52

Priming: Senses subconsciously influence us

slide-53
SLIDE 53

53

Affect: Emotional reactions are our brains’ first responders

slide-54
SLIDE 54

54

Commitments: Judgements made in advance to create “automatic” actions

slide-55
SLIDE 55

55

Ego: People like to feel better about themselves & preserve self-image

slide-56
SLIDE 56

56

Reinforcement mechanisms: consequences to guide behavior

slide-57
SLIDE 57

57

Pay-for-performance lacks empirical evidence for fixing moral hazard

slide-58
SLIDE 58

58

Set clear, achievable goals – “fix all the bugs” is neither

slide-59
SLIDE 59

59

Goal setting must be matched with feedback, ideally immediate

slide-60
SLIDE 60

60

Framing effects: reduce the gap between concern & willingness to act

slide-61
SLIDE 61

61

Focus on leveraging system 1 to your advantage by altering habits

slide-62
SLIDE 62

62

How do you create a habit loop?

slide-63
SLIDE 63

63

Step 1: Routine

slide-64
SLIDE 64

64

Make it stable, frictionless, & fit into existing context

slide-65
SLIDE 65

65

Minimize perceived effort & number

  • f decisions the user has to make
slide-66
SLIDE 66

66

Step 2: Triggers & Rewards

slide-67
SLIDE 67

67

Contextual cues: “If X, do Y”

slide-68
SLIDE 68

68

Magical brew of rewards: mix of short- term & accumulated long-term ones

slide-69
SLIDE 69

69

Step 3: Ingrain

slide-70
SLIDE 70

70

Foster ample opportunities for practice & interaction

slide-71
SLIDE 71

71

Cultivate a sense of meaning behind the habit – a deeper purpose

slide-72
SLIDE 72

72

People don’t like feeling like habit machines; play into self-identity

slide-73
SLIDE 73

Ideas for IoT Sec

slide-74
SLIDE 74

74

Set concrete goals: “build-in security” is too nebulous

slide-75
SLIDE 75

75

“Ensure each feature release uses a 10-point checklist” is a clear ask

slide-76
SLIDE 76

76

Value should consider maximum security benefit at minimum cost

slide-77
SLIDE 77

77

How to turn security into a habit?

slide-78
SLIDE 78

78

Teams should have a regular, brief time & space to review security goals

slide-79
SLIDE 79

79

Context cues: “if login portal, require change of default creds during setup”

slide-80
SLIDE 80

80

Specify attainable steps with minimal complexity, like a checklist

slide-81
SLIDE 81

81

Security suitably serves as a deeper purpose – frame it as a noble cause

slide-82
SLIDE 82

82

How can we leverage MINDSPACE for IoT security?

slide-83
SLIDE 83

83

Find the right messenger: preachy infosec people probably aren’t it

slide-84
SLIDE 84

84

“Gift” budget that is eroded if security goals aren’t met (loss aversion)

slide-85
SLIDE 85

85

Treat security habits as norms: “90% of

  • ur developers fix bugs within 3 days”
slide-86
SLIDE 86

86

Show long-term expenses of options to highlight ROI of proactive security

slide-87
SLIDE 87

87

Transparency around quality & cost: easiest measures with highest impact

slide-88
SLIDE 88

88

Control instincts to security issues – slow down via threat modelling

slide-89
SLIDE 89

89

Team bonus if you complete the checklist & fix bugs within 30 days – if not, it goes to charity

slide-90
SLIDE 90

90

Black Girls Code, Calyx Institute, IFF Diversity & Inclusion Fund, Mozilla Foundation, Signal Foundation

slide-91
SLIDE 91

91

Public lists of IoT vendors allowing default cred changes (like the Two Factor Auth List)

slide-92
SLIDE 92

92

One-page checklist to ensure & document IoT security basics

slide-93
SLIDE 93

93

Streamlined number of steps per lifecycle stage – design, build, test

slide-94
SLIDE 94

94

  • 1. Design UX workflow to change

default passwords (everywhere)

slide-95
SLIDE 95

95

  • 2. Spoof headers to look like most

common web servers

slide-96
SLIDE 96

96

  • 3. Encrypt data in transit with SSL or

TLS

slide-97
SLIDE 97

97

  • 4. Don’t call bash scripts from the web

interface

slide-98
SLIDE 98

98

  • 5. Don’t use custom API protocols –

just use REST or SOAP

slide-99
SLIDE 99

99

Design Build Test

  • Does the device use:
  • A login portal?
  • Yes, and we allow

the change of default creds

  • No
  • User Data
  • Yes, & we encrypt

data w/ SSL or TLS

  • No
  • Web Interface
  • Yes, and we do not

call bash scripts or use custom API protocols

  • No

If internet-connected, spoof headers to appear “normal” Cross-checking by teams of critical measures to be taken

  • Share essential information

concerning security steps with the team

  • Confirm each team member

understands the security requirements

  • Have any new features been

added since design that require review? (ie interfacing w/ the internet, collecting user data)

  • Anticipated Security Events
  • What are the critical or

non-routine security controls required?

  • How long will

implementation of controls take?

  • What are the anticipated

impacts of the controls?

  • Tester to confirm:
  • Completion of account

controls (default credential alerts, lockouts, 2FA)

  • List of data used by the

device, and labelling of user data

  • Whether there are any

vulnerabilities to be addressed

  • For builders:
  • What are the key

concerns around management going forward and any future security concerns?

  • Instructions for

immediate post-testing security management are drawn up together

slide-100
SLIDE 100

100

Formalized & usable checklist to be released soon…

slide-101
SLIDE 101

Conclusion

slide-102
SLIDE 102

102

IoT security ideas must treat devs as time-constrained humans

slide-103
SLIDE 103

103

Prioritizing security can go against incentives – but that can be changed

slide-104
SLIDE 104

104

Our complex, “endgame-level” solutions are too formidable

slide-105
SLIDE 105

105

Compensating controls aren’t enough – we can’t expect magic post-hoc

slide-106
SLIDE 106

106

But practical magic using behavioral design can improve decision making

slide-107
SLIDE 107

107

Goal: straightforward ways to erode risky habits & promote security habits

slide-108
SLIDE 108

108

A basic, one-page checklist is a simple way to start growing security culture

slide-109
SLIDE 109

109

We cannot wallow in sermonizing – we can’t let the problem devour us

slide-110
SLIDE 110

“Good enough is good enough. Good enough always beats perfect.” – Dan Geer

slide-111
SLIDE 111

111

Suggested reading

▪ “Approaches based on behavioral economics could help nudge patients and providers toward lower health spending growth,” A. Darzi, F. Greaves, D. King, I. Vlaev ▪ “Behavior-based Safety Guide,” Ireland Health & Safety Authority ▪ “Farmer Behaviour, Agricultural Management and Climate Change,” OECD ▪ “Guidance for the Content of Premarket Submissions for Software Contained in Medical Devices,” FDA ▪ “Influencing behaviour: The mindspace way,” P. Dolan, et al. ▪ “Postmarket Management of Cybersecurity in Medical Devices,” FDA ▪ “A Surgical Safety Checklist to Reduce Morbidity and Mortality in a Global Population,” Alex B. Haynes, et al. ▪ “The Theory of Value-Based Payment Incentives and Their Application to Health Care,” Conrad DA

111

slide-112
SLIDE 112

112

@swagitda_ /in/kellyshortridge kelly@greywire.net