Was I supposed to Mix the Was I supposed to Mix the Security in - - PowerPoint PPT Presentation

was i supposed to mix the was i supposed to mix the
SMART_READER_LITE
LIVE PREVIEW

Was I supposed to Mix the Was I supposed to Mix the Security in - - PowerPoint PPT Presentation

Was I supposed to Mix the Was I supposed to Mix the Security in Before I Baked It? Security in Before I Baked It? Security Beyond the Clich Security Beyond the Clich W. Brandon Martin W. Brandon Martin Deconstructed Security, LLC


slide-1
SLIDE 1

Was I supposed to Mix the Was I supposed to Mix the Security in Before I Baked It? Security in Before I Baked It?

Security Beyond the Cliché Security Beyond the Cliché

  • W. Brandon Martin
  • W. Brandon Martin

Deconstructed Security, LLC Deconstructed Security, LLC

slide-2
SLIDE 2

The Next 45 Minutes The Next 45 Minutes

01 - Introduction 01 - Introduction 02 - Background & Overview 02 - Background & Overview 03 - Security v. Business 03 - Security v. Business 04 - Security Balance 04 - Security Balance 05 - Architectural Solutions 05 - Architectural Solutions 06 - Security Practitioners 06 - Security Practitioners 07 - Questions 07 - Questions

slide-3
SLIDE 3

01 - Introduction 01 - Introduction

slide-4
SLIDE 4

About Me About Me

Christian Christian Dad (x3) Dad (x3) Independent Security Consultant Independent Security Consultant Raised in a barn Raised in a barn Creds Creds OSCP, OSWP, GPEN OSCP, OSWP, GPEN CISSP, CRISC CISSP, CRISC 6 Sigma Black Belt 6 Sigma Black Belt

Disclaimer: My statements today Disclaimer: My statements today do not do not necessarily represent anyone else's view or necessarily represent anyone else's view or actionable actionable security advice. security advice.

slide-5
SLIDE 5

02 - Background & Overview 02 - Background & Overview

slide-6
SLIDE 6

Problem Statement Problem Statement

Good security requires planning and Good security requires planning and preparation. preparation. Security requirements delay projects. Security requirements delay projects. Businesses need projects to stay in business. Businesses need projects to stay in business. Business and security goals collide. Business and security goals collide.

slide-7
SLIDE 7

Goals Goals

Explore the security / business tension. Explore the security / business tension. Review real-world balance failures. Review real-world balance failures. Review architectures that worked and failed. Review architectures that worked and failed. Re-define the security practitioner's role. Re-define the security practitioner's role.

slide-8
SLIDE 8

03 - Security v. Business 03 - Security v. Business

slide-9
SLIDE 9

Reality Reality

Business people struggle with security. Business people struggle with security. Technical people struggle with security. Technical people struggle with security. Security people struggle with both sides. Security people struggle with both sides.

slide-10
SLIDE 10

Security Requirements Security Requirements

Keep the hackers out. Keep the hackers out. Maintain compliance and/or regulator satisfaction. Maintain compliance and/or regulator satisfaction. Train developers on secure coding practices. Train developers on secure coding practices. Keep penetration testers out. Keep penetration testers out. Sanitize untrusted input. Sanitize untrusted input. Implement CIS benchmarks. Implement CIS benchmarks. No High or Critical findings No High or Critical findings

slide-11
SLIDE 11

Business Requirements Business Requirements

Calculate interest on a loan. Calculate interest on a loan. Send a purchase order electronically. Send a purchase order electronically. Automate the disbursement process. Automate the disbursement process. Complete the first sprint by Feb 28. Complete the first sprint by Feb 28.

slide-12
SLIDE 12

Technical Requirements Technical Requirements

Response latency < 2 seconds. Response latency < 2 seconds. Application must be testable. Application must be testable. Application must run on Microsoft Windows, Android, Application must run on Microsoft Windows, Android, iOS. iOS. Network throughput SLA must be 2Mb/s. Network throughput SLA must be 2Mb/s.

slide-13
SLIDE 13

The Result The Result

CFO wants results yesterday. CFO wants results yesterday. CTO wants to be meet the SLA. CTO wants to be meet the SLA. CISO wants to dot the "i" and cross the "t." CISO wants to dot the "i" and cross the "t."

slide-14
SLIDE 14

04 - Security Balance 04 - Security Balance

slide-15
SLIDE 15

Security Overpowers Business Security Overpowers Business

A German pro basketball team was relegated to a lower A German pro basketball team was relegated to a lower division due to a Windows update (2015) division due to a Windows update (2015) User can't create a valid password at change time (2019) User can't create a valid password at change time (2019) GrooveShark (2015) GrooveShark (2015) Countless failed startups you never heard mentioned Countless failed startups you never heard mentioned

slide-16
SLIDE 16

Business Overpowers Security Business Overpowers Security

Mirai Botnet Mirai Botnet Target's Heating and Cooling System Breach (~$202M) Target's Heating and Cooling System Breach (~$202M) Yahoo lost 500M Passwords; Linkedin 117M Yahoo lost 500M Passwords; Linkedin 117M Hillary Clinton's Email Server Hillary Clinton's Email Server

slide-17
SLIDE 17

Balance is Key Balance is Key

Risk perspective is missing. Risk perspective is missing. Context is under-appreciated. Context is under-appreciated. Healthy discourse is difficult. Healthy discourse is difficult.

slide-18
SLIDE 18

05 - Architectural Solutions 05 - Architectural Solutions

slide-19
SLIDE 19

Architecting the Internet - TCP/IP Architecting the Internet - TCP/IP

Designed in the 1970's Designed in the 1970's Adopted in the 1980's Adopted in the 1980's Secured in the 1990's Secured in the 1990's Online Banking and Paris Hilton widely adopted in the Online Banking and Paris Hilton widely adopted in the 2000's 2000's

slide-20
SLIDE 20

Architecting the Internet - DNS Architecting the Internet - DNS

Proposed in 1983; essential since 1985 Proposed in 1983; essential since 1985 Designed for 50M addresses, currently 271M Designed for 50M addresses, currently 271M DNSSEC introduced in 1997 DNSSEC introduced in 1997 Dan Kaminsky's bug 2008 Dan Kaminsky's bug 2008 DNSpionage 2019; 25% US Adoption of DNSSEC DNSpionage 2019; 25% US Adoption of DNSSEC

slide-21
SLIDE 21

Lessons Learned Lessons Learned

Some controls are difficult to "bolt on" after rollout. Some controls are difficult to "bolt on" after rollout. Forecasting unexpected use cases is hard. Forecasting unexpected use cases is hard. The architecture must leave "bolt holes" for security. The architecture must leave "bolt holes" for security. Consumers don't always prioritize security. Consumers don't always prioritize security. Security can take years. Security can take years.

slide-22
SLIDE 22

Improving Security Improving Security

Containers Containers Don't patch, rebuild Don't patch, rebuild Infrastructure as code Infrastructure as code (i.e. version tracking) (i.e. version tracking) DevSecOps - Integrating Security Testing In Development DevSecOps - Integrating Security Testing In Development Static Application Security Testing Static Application Security Testing Dynamic Application Security Testing. Dynamic Application Security Testing. Software Frameworks Software Frameworks Solve common problems Solve common problems

slide-23
SLIDE 23

06 - Security Practitioners 06 - Security Practitioners

slide-24
SLIDE 24

Partner Perceptions Partner Perceptions

Just say no. Just say no. Abuse fear, uncertainty, & doubt (FUD). Abuse fear, uncertainty, & doubt (FUD). Overstate risk. Overstate risk. Don't understand the technology's built-in controls. Don't understand the technology's built-in controls. Slow down and delay projects. Slow down and delay projects. Only understand [Insert Background] Only understand [Insert Background]

slide-25
SLIDE 25

Ideals Ideals

"Yes, and…" "Yes, and…" Trust, Assurance & Confidence (TAC). Trust, Assurance & Confidence (TAC). Understand enough background to be helpful. Understand enough background to be helpful. Paint accurate risk pictures. Paint accurate risk pictures. Understand technical controls. Understand technical controls. Connect silos and accelerate projects. Connect silos and accelerate projects. Don't accept risk. Don't accept risk.

slide-26
SLIDE 26

Hard to find good help Hard to find good help

We can't all be the best. We can't all be the best. Can't educate a practitioner to full competence. Can't educate a practitioner to full competence. Industry trend - full stacking Industry trend - full stacking Information Security Information Security Risk Analysis Risk Analysis Networking, Servers, Clients, Mobile, Users Networking, Servers, Clients, Mobile, Users

slide-27
SLIDE 27

Addressing the Talent Gap Addressing the Talent Gap

Security Associate Programs (OJT) Security Associate Programs (OJT) Job rotation Job rotation Certification Certification Mentoring Mentoring Cybersecurity Education Reform Cybersecurity Education Reform Sales and Presentation Skills Sales and Presentation Skills

slide-28
SLIDE 28

07 - Questions 07 - Questions