Vulnerability Reporting Process

Slides:



Advertisements
Similar presentations
Sachin Rawat Crypsis SDL Threat Modeling.
Advertisements

ISO How to leverage Dick Hacking Cornerstones of Trust 2014.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Network security policy: best practices
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Architecting secure software systems
1 Threat Modeling at Symantec OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Edward Bonver Principal Software Engineer, Symantec Product.
Information Systems Security Computer System Life Cycle Security.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
1 1 Vulnerability Assessment of Grid Software Jim Kupsch Associate Researcher, Dept. of Computer Sciences University of Wisconsin-Madison Condor Week 2006.
1 Vulnerability Assessment of Grid Software James A. Kupsch Computer Sciences Department University of Wisconsin Condor Week 2007 May 2, 2007.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
General Security Advice CS5493(7493). 1. Dispel Your Pride Assume there is someone out there that is smarter, more knowledgeable, more capable, and with.
Chapter 1 COMPUTER AND NETWORK SECURITY PRINCIPLES.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Module 7: Designing Security for Accounts and Services.
Full Disclosure: Is It Beneficial? Project Based Information Systems Tim Schultz 12/02/02.
Community of Practice K Lead Project Team: الالتزامالتحفيز التفكير المؤسسي المرونةالتميزالشراكةالاستقامة.
How To Run a Golf Tournament. As many of you know, hosting a charity golf tournament is no easy task. Between creating the day’s agenda, tracking down.
Methods of Secure Information System Design
The Benefits of Getting a License Agreement for Your Business
How to write an effective RFP
Protection of Minors Program Coordinators Refresher Session
Proactive Incident Response
Case study Get This Car app
The Project Infrastructure
Creating your online identity
Introduction and implementation OWASP Risk Rating Management
Chapter 7. Identifying Assets and Activities to Be Protected
Presented by Rob Carver
Scams & Schemes Common Sense Media.
Systems Analysis and Design in a Changing World, 4th Edition
Evaluating Existing Systems
Contracting Officer Podcast Slides
What is a Credit Bureau? A cooperative repository of information
LCG/EGEE Incident Response Planning
Evaluating Existing Systems
Off-line Risk Assessment of Cloud Service Provider
IT Roles and Responsibilities
What is performance management?
Description of Revision
THE DEVELOPMENT SERVICE
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
High Secured Inter-Cloud Connectivity via Public Networks
Choosing the Discovery Model Martin Forsberg
Internal Selection Process
Digital Forensics in the Corporation
Leigh Grundhoefer Indiana University
Collaborative Business Solutions
CSCD 303 Essential Computer Security
Trust Relationships Meeting Notes September 26, 2003 Dartmouth College.
RESOURCE MOBILIZATION Col Dr Vijay Deshpande
HingX Project Overview
Bethesda Cybersecurity Club
CSCD 303 Essential Computer Security
Project Name - Testing Iteration 1 UAT Kick-off
Start Commenting Trulia Voices Linkedin Answers Answers.yahoo.com
Chapter 5 IS630.
Engineering Secure Software
Access and Use Policies
Executive Project Kickoff
Project Kick-off <Customer Name> <Project Name>
{Project Name} Organizational Chart, Roles and Responsibilities
7 KEYS FOR RESPONDING TO AN RFP For many businesses, the first step in generating revenue is responding to a request for proposal (RFP). RFPs are invitations - contraxaware.com
WORKSHOP Establish a Communication and Training Plan
Collaborative Security: Securing Open Source Software
Presentation transcript:

Vulnerability Reporting Process David Coffey Principal Security Architect David_coffey@mcafee.com

What is a vulnerability Types of vulnerability Finders May 6, 2019 Overview 30,000 foot view What is a vulnerability Types of vulnerability Finders Types of process Full Disclosure Responsible Disclosure Organization for Internet Safety (OIS) Establishing process Wrap-up

Vulnerability gets reported Vulnerability is validated May 6, 2019 30,000 foot view (good) Vulnerability gets reported Vulnerability is validated Vulnerability gets fixed Code proceeds through QA and testing Update released Customers are safe and happy

Vulnerability gets reported (if possible) May 6, 2019 30,000 foot view (bad) Vulnerability gets reported (if possible) Vulnerability gets ignored/mis-handled Finder goes public with exploit Customers are un-safe and un-happy So are share-holders, employees, management…

Security Vulnerability May 6, 2019 Security Vulnerability Typical development process Clearly defined Widely adopted Everyone has their role Everyone has bugs A security flaw is a special bug Some people make the distinction between flaw and bug A security vulnerability is an exploitable security flaw/bug Security vulnerabilities will be discovered

S.T.R.I.D.E. (Microsoft’s model) May 6, 2019 Vulnerability types S.T.R.I.D.E. (Microsoft’s model) Spoofing Identity Tampering with data Repudiation Information Disclosure Denial of Service Elevation of Privilege Any one of these can be bad if reported and not handled

Types of Finders Internal External Employee of the company May 6, 2019 Types of Finders Internal Employee of the company Hired security firm External Security researcher Partner Knowledgeable end-user

Developer, architect, QA, hired security hand May 6, 2019 Internal Finders Developer, architect, QA, hired security hand Usually can be trust worthy it is their job contracts Has several motivations Curiosity Prestige Mission Job

External Security Researcher May 6, 2019 External Security Researcher Someone who finds security flaws in applications Unknown trust level They will usually communicate their intentions Has several motivations Money Prestige Curiosity Mission Malice

Business partner who is exposed to more IP Usually can be trustworthy May 6, 2019 External Partner Business partner who is exposed to more IP Usually can be trustworthy You are in business together Has several motivations Risk Assessment Business improvement Customer acquisition

Someone who discovered the flaw by chance Unknown trust level May 6, 2019 External Customer Someone who discovered the flaw by chance Unknown trust level Usually do not understand implications They are a customer Has several motivations Be safer Curiosity

Guidelines published by RFP May 6, 2019 Full Disclosure Definition: disclose all known information about a security vulnerability Alt: direct opposite of security through obscurity Theory: company will fix flaws faster by threatening full public disclosure Guidelines published by RFP 5 days for company to answer report Company coordinate publication of flaw with reporter Company gives reporter full credit for discovery Company usually has 30 days before disclosure This is difficult for large organizations

Responsible Disclosure May 6, 2019 Responsible Disclosure Similar to Full Disclosure except: Not required to publish flaw information Not required to publish all information Timeline can be flexible Allow a fix to be in place before disclosure occurs

Organization for Internet Safety May 6, 2019 Organization for Internet Safety Created guidelines for handling the reporting of security vulnerabilities Formalizes the good 30,000 foot view 5 phases Discovery Notification Investigation Resolution Release 30 day time period is the starting point for negotiations

Process Infrastructure May 6, 2019 Process Infrastructure Need to post process so people understand Need to have a reporting infrastructure / repository Website (http://www.microsoft.com/security/) Email (security-alert@foo.com) Possibly anonymous Need to have formalized vulnerability reports Need to have a tracking system in place Need to have established roles/responsibilities

Formal Report Structure May 6, 2019 Formal Report Structure You want all the information up-front Who are you? Contact information? What product? what OS? What tools did you use? What are your intentions? Proof of Concept code? Steps for re-production?

Communication is your friend May 6, 2019 Communication is your friend Finder locates your published process Finder submits report Format established in process Vendor sends an acknowledgement Establish rough dates Vendor sends weekly status mail to finder Encourage open communication and relationship Track all communication, dates, etc. (legal backup)

Establish process and communicate publicly Establish infrastructure May 6, 2019 Wrap-up Establish process and communicate publicly Establish infrastructure Establish roles / responsibilities Foster communication Track everything Remember, people generally want to do the right thing

May 6, 2019 Questions?