Running a Bug Bounty Program Adam Ruddermann 15 March 2018 IIA / - - PowerPoint PPT Presentation

running a bug bounty program
SMART_READER_LITE
LIVE PREVIEW

Running a Bug Bounty Program Adam Ruddermann 15 March 2018 IIA / - - PowerPoint PPT Presentation

Running a Bug Bounty Program Adam Ruddermann 15 March 2018 IIA / ISACA / ACFE Joint Spring Training Event Bug bounty? Responsible disclosure? Huh? Huh? Security Researchers Whitehats (Optional) The Hackers company


slide-1
SLIDE 1

Running a Bug Bounty Program

Adam Ruddermann 15 March 2018 IIA / ISACA / ACFE Joint Spring Training Event

slide-2
SLIDE 2

Bug bounty? Responsible disclosure? Huh?

slide-3
SLIDE 3

Huh?

“Security Researchers” “Whitehats” “Hackers” “Your children” Find a security vulnerability in a company Report it to a company and give them time to fix it before telling anyone else (Optional) The company gives a monetary award

slide-4
SLIDE 4
slide-5
SLIDE 5

The agenda!

  • Part 2: Huh?
  • The component parts of

these programs

  • Where it fits, where it doesn’t
  • Questions
slide-6
SLIDE 6

Adam ‘rudd’ Ruddermann, Practice Director

slide-7
SLIDE 7

Who is rudd?

slide-8
SLIDE 8

Ok so, back to ‘huh?’

slide-9
SLIDE 9

What is ‘responsible disclosure?’

  • Researchers make a reasonable effort to contact the organization that can fix

the security vulnerability and provide them actionable data about the bug to enable a fix.

  • Researchers give the organization a reasonable amount of time to fix the bug

and distribute it to their customers before disclosing it to anyone else.

  • CCERT: 45 days
  • Google: 90 days
  • If the organization does not act in good faith or does not intend to fix the bug,

the researcher is reasonably enabled to publicly disclose the unfixed vulnerability.

slide-10
SLIDE 10

Clearing the air on terminology

  • Publicly published:
  • Responsible disclosure rules
  • Product scope and boundaries
  • Legal safe harbor provisions
  • A dedicated channel to submit bugs
  • Thanks page and/or Hall of Fame
  • Monetary and/or prize awards

Responsible Disclosure Bug Bounty

slide-11
SLIDE 11
  • Wait. How did we get here?
slide-12
SLIDE 12

The component parts

I promise this won’t be too boring

slide-13
SLIDE 13

The component parts of these programs Legal Public Relations Daily Ops

Engineering Partnerships

Award Payouts

slide-14
SLIDE 14
slide-15
SLIDE 15
slide-16
SLIDE 16

The component parts of these programs Legal Public Relations Daily Ops

Engineering Partnerships

Award Payouts

slide-17
SLIDE 17

Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve

slide-18
SLIDE 18

Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve

  • Engine room of the cruise ship
  • Noise filtering
  • Staff typically do not need to read code or be able to suggest fixes
  • Unambiguous and well understood final decisions are made here
  • Feels a lot like a help desk, but is much more technical
slide-19
SLIDE 19

Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve

  • The captain of the ship
  • The most technical person in the process
  • Looks deep to understand root causes – including reading code
  • Usually has day-to-day oversight of how things are going
  • Everyone is supporting this person
slide-20
SLIDE 20

Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve

  • Working with engineering teams to get it fixed
  • Step 1: Let the team know
  • Step 2: Agree on how impactful the vulnerability
  • Step 3: Agree on resourcing and timelines
  • Step 4: Track it!
slide-21
SLIDE 21

Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve

  • Verify and land the fix, pay the researcher
  • Make sure the fix actually works… or doesn’t introduce other problems
  • Land it in production… does it break the product? (it happens)
  • Let the researcher know and pay them (if you haven’t already)
slide-22
SLIDE 22

Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve

slide-23
SLIDE 23

Program Operations Management

  • This process can be as ad

hoc or refined as necessary for an org

  • Good software – either built in

house or outsourced through a vendor – is critical

  • Operational metrics will define

your success and failure

slide-24
SLIDE 24

The component parts of these programs Legal Public Relations Daily Ops

Engineering Partnerships

Award Payouts

slide-25
SLIDE 25

Legal

  • Clear lines of communications and expectations with corporate legal teams
  • Contract law
  • EULA – exempt whitehats, precise carve outs, or fully require adherence?
  • Program-unique terms
  • Criminal law and legal safe harbors
  • USA: CFAA, DMCA
  • UK: CMA
  • Corporate compliance
  • Data privacy: GDPR, Privacy Shield, etc
  • Sanctions and anti-terrorism: Various US and EU lists
  • Diversity and anti-corruption: checks for verifying corporate policies
slide-26
SLIDE 26
slide-27
SLIDE 27

Public Relations / Communications “You’re the only engineers that regularly speak

  • fficially on the behalf of the company that don’t

have time to clear every word with PR first.”

  • Melanie Ensign (@imeluny)
slide-28
SLIDE 28

Public Relations / Communications

  • Communications training for

engineers and PMs

  • Build a library of templated

responses

  • Consensus on when to escalate

internally and when escalate to the Comms team

slide-29
SLIDE 29

Engineering Partnerships

Product Management Software Engineering Corporate IT

slide-30
SLIDE 30

Engineering Partnerships

  • Coordinating scope changes

with the product roadmap

  • Thoughtful prioritization of

low/mid severity bugs

  • Software security education
  • Very specific scope

considerations

  • Managing potential false

positives on sensors

  • This is Expert Mode bug bounty

Product Management Software Engineering Corporate IT

slide-31
SLIDE 31

Paying out awards

  • What?
  • How much should you pay?
  • How?
  • PayPal, Payoneer, Bitcoin, Wire

Transfer, Airline Points (United), Gift Cards?

  • Taxes!
  • Withhold income tax?
  • Require W8s?
slide-32
SLIDE 32

The component parts of these programs Legal Public Relations Daily Ops

Engineering Partnerships

Award Payouts

slide-33
SLIDE 33

”Ok, now what?”

slide-34
SLIDE 34

Why this is worth it

  • With good relationships,

leveraging researchers will enable you you scale your security team

  • Think of it like QA: Dozens of

good testers will find more bugs than just 2 or 3 excellent testers

  • Traditional pen tests are only

accurate for a point in time, bug bounty testing is continuous

slide-35
SLIDE 35

Where this fits

  • Products should have a security

architecture review and a traditional source code enabled pen test before considering bug bounty

  • A small, private bug bounty is a

great safe way to give top hackers access to a product first before launching an open bounty

  • Recurring source code enabled

pen tests to find deep, complex vulnerabilities

slide-36
SLIDE 36

About those hacker parties…

slide-37
SLIDE 37
slide-38
SLIDE 38

Questions?

Adam Ruddermann

Practice Director, Bug Bounty Services

Email: rudd@nccgroup.trust Twitter: @adamruddermann