running a bug bounty program
play

Running a Bug Bounty Program Adam Ruddermann 15 March 2018 IIA / - PowerPoint PPT Presentation

Running a Bug Bounty Program Adam Ruddermann 15 March 2018 IIA / ISACA / ACFE Joint Spring Training Event Bug bounty? Responsible disclosure? Huh? Huh? Security Researchers Whitehats (Optional) The Hackers company


  1. Running a Bug Bounty Program Adam Ruddermann 15 March 2018 IIA / ISACA / ACFE Joint Spring Training Event

  2. Bug bounty? Responsible disclosure? Huh?

  3. Huh? “Security Researchers” “Whitehats” (Optional) The “Hackers” company gives a “Your children” monetary award Find a security Report it to a company vulnerability in and give them time to fix it a company before telling anyone else

  4. The agenda! - Part 2: Huh? - The component parts of these programs - Where it fits, where it doesn’t - Questions

  5. Adam ‘rudd’ Ruddermann, Practice Director

  6. Who is rudd?

  7. Ok so, back to ‘huh?’

  8. What is ‘responsible disclosure?’ • Researchers make a reasonable effort to contact the organization that can fix the security vulnerability and provide them actionable data about the bug to enable a fix. • Researchers give the organization a reasonable amount of time to fix the bug and distribute it to their customers before disclosing it to anyone else. • CCERT: 45 days • Google: 90 days • If the organization does not act in good faith or does not intend to fix the bug, the researcher is reasonably enabled to publicly disclose the unfixed vulnerability.

  9. Clearing the air on terminology Responsible Disclosure • Publicly published: • Responsible disclosure rules • Product scope and boundaries • Legal safe harbor provisions • A dedicated channel to submit bugs Bug Bounty • Thanks page and/or Hall of Fame • Monetary and/or prize awards

  10. Wait. How did we get here?

  11. The component parts I promise this won’t be too boring

  12. The component parts of these programs Public Daily Engineering Legal Award Partnerships Relations Ops Payouts

  13. The component parts of these programs Public Daily Engineering Legal Award Partnerships Relations Ops Payouts

  14. Day-to-day Operations / Lifecycle of a Submission Initial Decision Fix Resolve Triage Triage

  15. Day-to-day Operations / Lifecycle of a Submission Initial Decision Fix Resolve Triage Triage • Engine room of the cruise ship • Noise filtering • Staff typically do not need to read code or be able to suggest fixes • Unambiguous and well understood final decisions are made here • Feels a lot like a help desk, but is much more technical

  16. Day-to-day Operations / Lifecycle of a Submission Initial Decision Fix Resolve Triage Triage • The captain of the ship • The most technical person in the process • Looks deep to understand root causes – including reading code • Usually has day-to-day oversight of how things are going • Everyone is supporting this person

  17. Day-to-day Operations / Lifecycle of a Submission Initial Decision Fix Resolve Triage Triage • Working with engineering teams to get it fixed • Step 1: Let the team know • Step 2: Agree on how impactful the vulnerability • Step 3: Agree on resourcing and timelines • Step 4: Track it!

  18. Day-to-day Operations / Lifecycle of a Submission Initial Decision Fix Resolve Triage Triage • Verify and land the fix, pay the researcher • Make sure the fix actually works… or doesn’t introduce other problems • Land it in production… does it break the product? (it happens) • Let the researcher know and pay them (if you haven’t already)

  19. Day-to-day Operations / Lifecycle of a Submission Initial Decision Fix Resolve Triage Triage

  20. Program Operations Management • This process can be as ad hoc or refined as necessary for an org • Good software – either built in house or outsourced through a vendor – is critical • Operational metrics will define your success and failure

  21. The component parts of these programs Public Daily Engineering Legal Award Partnerships Relations Ops Payouts

  22. Legal • Clear lines of communications and expectations with corporate legal teams • Contract law • EULA – exempt whitehats, precise carve outs, or fully require adherence? • Program-unique terms • Criminal law and legal safe harbors • USA: CFAA, DMCA • UK: CMA • Corporate compliance • Data privacy: GDPR, Privacy Shield, etc • Sanctions and anti-terrorism: Various US and EU lists • Diversity and anti-corruption: checks for verifying corporate policies

  23. Public Relations / Communications “You’re the only engineers that regularly speak officially on the behalf of the company that don’t have time to clear every word with PR first.” - Melanie Ensign (@imeluny)

  24. Public Relations / Communications • Communications training for engineers and PMs • Build a library of templated responses • Consensus on when to escalate internally and when escalate to the Comms team

  25. Engineering Partnerships Product Management Corporate IT Software Engineering

  26. Engineering Partnerships Product Management Corporate IT Software Engineering • Coordinating scope changes • Very specific scope with the product roadmap considerations • Thoughtful prioritization of • Managing potential false low/mid severity bugs positives on sensors • This is Expert Mode bug bounty • Software security education

  27. Paying out awards • What? • How much should you pay? • How? • PayPal, Payoneer, Bitcoin, Wire Transfer, Airline Points (United), Gift Cards? • Taxes! • Withhold income tax? • Require W8s?

  28. The component parts of these programs Public Daily Engineering Legal Award Partnerships Relations Ops Payouts

  29. ”Ok, now what?”

  30. Why this is worth it • With good relationships, leveraging researchers will enable you you scale your security team • Think of it like QA: Dozens of good testers will find more bugs than just 2 or 3 excellent testers • Traditional pen tests are only accurate for a point in time, bug bounty testing is continuous

  31. Where this fits • Products should have a security architecture review and a traditional source code enabled pen test before considering bug bounty • A small, private bug bounty is a great safe way to give top hackers access to a product first before launching an open bounty • Recurring source code enabled pen tests to find deep, complex vulnerabilities

  32. About those hacker parties…

  33. Questions? Adam Ruddermann Practice Director, Bug Bounty Services Email: rudd@nccgroup.trust Twitter: @adamruddermann

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend