Running a Bug Bounty Program
Adam Ruddermann 15 March 2018 IIA / ISACA / ACFE Joint Spring Training Event
Running a Bug Bounty Program Adam Ruddermann 15 March 2018 IIA / - - PowerPoint PPT Presentation
Running a Bug Bounty Program Adam Ruddermann 15 March 2018 IIA / ISACA / ACFE Joint Spring Training Event Bug bounty? Responsible disclosure? Huh? Huh? Security Researchers Whitehats (Optional) The Hackers company
Adam Ruddermann 15 March 2018 IIA / ISACA / ACFE Joint Spring Training Event
Bug bounty? Responsible disclosure? Huh?
Huh?
“Security Researchers” “Whitehats” “Hackers” “Your children” Find a security vulnerability in a company Report it to a company and give them time to fix it before telling anyone else (Optional) The company gives a monetary award
The agenda!
these programs
Adam ‘rudd’ Ruddermann, Practice Director
Who is rudd?
Ok so, back to ‘huh?’
What is ‘responsible disclosure?’
the security vulnerability and provide them actionable data about the bug to enable a fix.
and distribute it to their customers before disclosing it to anyone else.
the researcher is reasonably enabled to publicly disclose the unfixed vulnerability.
Clearing the air on terminology
Responsible Disclosure Bug Bounty
I promise this won’t be too boring
The component parts of these programs Legal Public Relations Daily Ops
Engineering Partnerships
Award Payouts
The component parts of these programs Legal Public Relations Daily Ops
Engineering Partnerships
Award Payouts
Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve
Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve
Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve
Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve
Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve
Day-to-day Operations / Lifecycle of a Submission Initial Triage Decision Triage Fix Resolve
Program Operations Management
hoc or refined as necessary for an org
house or outsourced through a vendor – is critical
your success and failure
The component parts of these programs Legal Public Relations Daily Ops
Engineering Partnerships
Award Payouts
Legal
Public Relations / Communications “You’re the only engineers that regularly speak
have time to clear every word with PR first.”
Public Relations / Communications
engineers and PMs
responses
internally and when escalate to the Comms team
Engineering Partnerships
Product Management Software Engineering Corporate IT
Engineering Partnerships
with the product roadmap
low/mid severity bugs
considerations
positives on sensors
Product Management Software Engineering Corporate IT
Paying out awards
Transfer, Airline Points (United), Gift Cards?
The component parts of these programs Legal Public Relations Daily Ops
Engineering Partnerships
Award Payouts
Why this is worth it
leveraging researchers will enable you you scale your security team
good testers will find more bugs than just 2 or 3 excellent testers
accurate for a point in time, bug bounty testing is continuous
Where this fits
architecture review and a traditional source code enabled pen test before considering bug bounty
great safe way to give top hackers access to a product first before launching an open bounty
pen tests to find deep, complex vulnerabilities
Adam Ruddermann
Practice Director, Bug Bounty Services
Email: rudd@nccgroup.trust Twitter: @adamruddermann