“You’ve Got Your Nice List of Bugs, Now What?” Vulnerability Discovery and Management Processes in the Wild
Noura Alomar, Primal Wijesekera, Edward Qiu, and Serge Egelman
University of California (Berkeley) and ICSI
Youve Got Your Nice List of Bugs, Now What? Vulnerability Discovery - - PowerPoint PPT Presentation
Youve Got Your Nice List of Bugs, Now What? Vulnerability Discovery and Management Processes in the Wild Noura Alomar, Primal Wijesekera, Edward Qiu, and Serge Egelman University of California (Berkeley) and ICSI Motivation Many
University of California (Berkeley) and ICSI
○ Penetration testing ○ Blue/ red and purple teams ○ Bug bounty programs ○ Quality assurance teams
2
○ Penetration testing ○ Blue/ red and purple teams ○ Bug bounty programs ○ Quality assurance teams
3
4
○ CISOs, CTOs, security managers ○ Pen testers, bug bounty hunters, red/blue/purple teamers, internal security testers
○ Bangladesh, Canada, Germany, India, Israel, Serbia, Singapore, Brazil, UK and US
5
6
7
When to create a bug bounty program? When to employ what testing strategy? When to create an internal team vs hire a testing firm?
8
What are the activities of each team? What managers expect from each team?
When to create a bug bounty program? When to employ what testing strategy? When to create an internal team vs hire a testing firm?
9
What are the activities of each team? What managers expect from each team? When to create a bug bounty program? When to employ what testing strategy? When to create an internal team vs hire a testing firm? How to fix uncovered vulnerabilities? How to prioritize remediation tasks? How to triage vulnerability reports received from external researchers?
10
11
12
13
14
15
16
17
18
19
20
21
22
◆ Trust ◆ Communication ◆ Staffing & funding ◆ Misalignment between business & security priorities
nnalomar@berkeley.edu @Noura_7N
Noura Alomar, Primal Wijesekera, Edward Qiu, and Serge Egelman