THE THREE WAYS OF SECURITY
Jeff Williams Co-founder and CTO Contrast Security
WAYS OF SECURITY Jeff Williams Co-founder and CTO Contrast - - PowerPoint PPT Presentation
THE THREE WAYS OF SECURITY Jeff Williams Co-founder and CTO Contrast Security 1. TODAYS AVERAGE APPLICATION IS A SECURITY DISASTER 2. SOFTWARE IS LEAVING SECURITY IN THE DUST Typical enterprise has hundreds or thousands of
Jeff Williams Co-founder and CTO Contrast Security
SECURITY DISASTER
DUST
SOFTWARE SECURITY 2000 2010 2020
SAST DAST WAF
enterprise has hundreds or thousands of applications
by far the leading cause of breaches (Verizon DBIR)
TOTALLY BROKEN
Jan Feb Mar Apr May Jun Jul Aug Sept Oct March 7 CVE-2017-5638 Disclosed, Apache releases fixed version March 8 We observed widespread attack probes Mid-May Equifax breach
July 29 Equifax learns of breach Sept 7 Equifax discloses, Four more Struts2 CVEs disclosed Equifax ignores Protected Disaster Livin’ la vida loca Prepared Equifax unaware
DIAGNOSIS: GOALS UNCLEAR, TIME WASTED What we are delivering: What we must deliver: Right defenses in place Defenses are effective Attacks detected/blocked “I ran a scanner”
Application/API portfolio Application/API portfolio
PUPPY MONKEY BABY
SO WHAT IS DEVOPS?
https://itrevolution.com/the-three-ways-principles-underpinning-devops/
The “Three Ways”
1. Establish work flow 2. Ensure instant feedback 3. Culture of experimentation
Small batch sizes Tight feedback loops Swarm on problems Optimize for downstream consumers Produce awesome software
QUESTION: CAN DEVOPS HELP SECURITY?
quality, late, slow, and doesn’t provide business value.
late, slow, and doesn’t provide business value.
Static Analysis
Dynamic Scanning WAF Pen Testing
DEV OPS != SHOVING LEGACY SECURIT Y TOOLS AND PROCES SES INTO SEC
The “Three Ways”
* Shamelessly adapted from The Phoenix Project, by Gene Kim
The First Security Way Establish Security Work Flow Optimize delivery of security work that is valued by the business
Business Security Projects
Building defenses, compliance, reporting, etc…
Internal Security Work
Threat modeling, security architecture, security research, vulnerability assessment, tools
Operational Security Jobs
Remediation, updates, analytics, alerts, tickets, etc…
Unplanned Security Tasks
Security “firefighting,” response, recovery, public relations, etc…
UMM…. WHAT IS SECURITY “WORK”?
* Shamelessly lifted from the Rugged Software Project
Your security story maps threat model ➡︐ defense strategy ➡︐ defenses ➡︐ assurance Making security concrete:
FIRST WAY – BUILD A CONCRETE SECURITY STORY OVER TIME
Leverage existing DevOps processes and tools Refactor monolithic security tasks into small batch sizes. Deliver security one little piece at a time
FIRST WAY – ENABLE DEVELOPMENT TO BUILD SECURITY
FIRST WAY – WORK ON BIGGEST THREATS, ONE AT A TIME
Add a single risk to threat model
Prevent XXE Create defense strategy
config
Implement defense
Establish continuous assessment
failures
cases
Establish attack protection
Monitor DEV and OPS
Slack alert
and VictorOps
Do you really need security experts for all these tasks?
XXE Updated Security Story
The Second Security Way Ensure Instant Security Feedback Establish tight security feedback loops across the lifecycle
SECOND WAY – ENABLE SELF-INVENTORY
the exact version of every app, api, and library running on every server in every environments
automate self- inventory
DEV
Internal
APIs Containers Private
Public Cloud
OPS
Automatic Application Inventory
SECOND WAY – GET REAL APPLICATION THREAT INTELLIGENCE
Establish the infrastructure to…
attacking you
techniques they’re using
targeting
hours
Equifax Attack
SECOND WAY – ESTABLISH A REALTIME APPSEC CONTROL PLANE
PROD DEV TEST
APIs Containers Private
Public Cloud
APIs Containers Private
Public Cloud
APIs
The Third Security Way
Build Security Culture A culture that constantly advances security with the threat through experimentation and learning
THIRD WAY – MIGRATE TO “POSITIVE” SECURITY
Testing for all the ways you might introduce XSS Testing to verify your XSS defense Measure positive security directly from your running application
THIRD WAY – ACCELERATE THE EVOLUTION OF YOUR SECURITY STORY
Celebrate new big risks without recrimination
Focus on strength and simplicity
The faster you cycle, the faster you get secure
THIRD WAY – PROMOTE SECURITY IN SUNSHINE
AppSec Visibility Cycle
Audit Developers Infosec Legal Architects Users Research Business
Monitor Threat Create Security Story Define Security Defenses Implement Security Defenses Share Intelligence Understand Laws Verify Compliance Understand Stakeholders
We Trust We Blame We Hide
TRUST
“Don’t hate the playa Hate the game”
BLAME
The first rule of security is… …You do not talk about security HIDE
The “Three Ways”
* Shamelessly adapted from The Phoenix Project, by Gene Kim
CLOSING THOUGHTS – TURNING SECURITY INTO CODE
to build software securely…
security into something you build!
LEADER
Software Development Solution