Cassio Goldschmidt May 13 th, 2009. Introduction 2.

Slides:



Advertisements
Similar presentations
Symantec Education Skills Assessment SESA 3.0 Feature Showcase
Advertisements

IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013.
© 2014 Microsoft Corporation. All rights reserved.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Bill McClanahan – Principal Business Consultant LPS Integration.
Translation in the Community LRC Localisation in the Cloud Jason Rickard Principal Product Manager, Community.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009.
Click to edit Master title style Click to edit Master subtitle style.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Project Risk Management
MIS 4600 Ethical Hacking & Network Defense January 12, 2010 Abdou Illia, Ph.D
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
GPS 2011 Slide - 1 COMPETITIVE STRATEGIES APAC Discussion.
Linda Mitchell Evaluating Community Post-Editing - Bridging the Gap between Translation Studies and Social Informatics Linda Mitchell PhD student.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
1 Security Risk Analysis of Computer Networks: Techniques and Challenges Anoop Singhal Computer Security Division National Institute of Standards and Technology.
Nullcon Goa 2010http://nullcon.net Tracking the Progress of an SDL Program - Cassio Goldschmidt.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 4 Tom Olzak, MBA, CISSP.
Software Assurance Automation throughout the Lifecycle OWASP AppSec USA 2011 September 23 rd 2011.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
1 Threat Modeling at Symantec OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Edward Bonver Principal Software Engineer, Symantec Product.
SOFTWARE ENGINEERING BIT-8 APRIL, 16,2008 Introduction to UML.
Benefits of a SUSE ® Subscription Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
Cassio Goldschmidt June 29 th, Introduction 2.
1 Safely Using Shared Computers Amanda Grady December 2013.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Five Easy Steps to Successful CC Evaluations Wesley H. Higaki International Common Criteria Conference September 2008.
Is Your Company Security Aware? Presented By: Brian Picard GSEC.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Software Security Weakness Scoring Chris Wysopal Metricon August 2007.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
GPS 2011 Slide - 1 MS CERT KIT Microworld Nova. GPS 2011 Slide - 2 Presentation of Microworld Nova The MS Cert Kit MS Cert Kit presentation The backend.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
The MSR-UR Curriculum Repository Tom Healy Lead Program Manager Microsoft Research University Relations.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
Winning with Storage Foundation 5.x – 4.x End Of Life Process Winning with Storage Foundation 5.x.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
1 APJ Curriculum Paths for Partners Specialization Accelerates Shirley Hoon APJ Partner Enablement Partner Enablement Oct
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.
Upstate NY Storage & High Availability User Group October 23, 2009.
FY16 Q3 Enterprise West QBR
SwA Co-Chair and Task Lead Strategy Session Agenda Technology, Tools and Product Evaluation Working Group Status Briefing Co-Chair(s) Michael Kass (NIST),
Instructor Materials for Course 70148: Microsoft Excel 2013 Essentials Aligned with Microsoft Office Specialist (MOS) exam : Microsoft Excel 2013.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
How We Got Here PC and Internet changed the rules –Viruses, information sharing, “outside” and “inside” indistinguishable –Vulnerability research for.
APIs related to NBU AIR Feature 1 OST APIs Related to NBU AIR Feature.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
Metrics-Focused Analysis of Network Flow Data
Automation in an XML Authoring Environment
Risk Assessment = Risky Business
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Data Science Meetup Matthew Renze Data Science Consultant
Security in the Real World – Plenary Day One
Microsoft Project Conference 2014
Presentation transcript:

Cassio Goldschmidt May 13 th, 2009

Introduction 2

Who am I? Cassio Goldschmidt –Sr. Manager, Product Security –Chapter Leader, OWASP Los Angeles Education –MBA, USC –MS Software Engineering, SCU –BS Computer Science, PUCRS –Certified Software Sec. Lifecycle Professional – CSSLP, (ISC) 2 When I’m not in the office… –Volleyball (Indoor, Beach) –Coding –Gym… 3

Typical Project Lifecycle 4

How your workout looks like 5

METRICS How your METRICS should look like 6 Exercise type: CWE Exercise type: CWE

METRICS How your METRICS should look like 7 Number of Reps: Number of Findings Number of Reps: Number of Findings

METRICS How your METRICS should look like 8 Exercise Intensity: CVSS Exercise Intensity: CVSS

METRICS How your METRICS should look like 9

Common Weakness Enumeration

Common Weakness Enumeration What is it? A common language for describing software security weaknesses Maintained by the MITRE Corporation with support from the National Cyber Security Division (DHS). Hierarchical –Each individual CWE represents a single vulnerability type –Deeper levels of the tree provide a finer granularity –Higher levels provide a broad overview of a vulnerability 11

Common Weakness Enumeration Portion of CWE structure 12

Common Weakness Enumeration What data is available for each CWE? Weakness description Applicable platforms and programming languages Common Consequences Likelihood of Exploit Coding Examples Potential Mitigations Related Attacks Time of Introduction Taxonomy Mapping 13 Link to CWE Page on XSSCWE Page on XSS

Common Weakness Enumeration How useful is this information? 14 Pie Chart showing the frequency of CWEs found in penetration tests Pie Chart showing the frequency of CWEs found in penetration tests

Common Vulnerability Scoring System

Objective (and “perfect enough”) metric A universal way to convey vulnerability severity –Can be used for competitive analysis CVSS score ranges between 0.0 and 10.0 –Can be expressed as high, medium, low as well Composed of 3 vectors –Base Represents general vulnerability severity: Intrinsic and immutable –Temporal Time-dependent qualities of a vulnerability –Environmental Qualities of a vulnerability specific to a particular IT environment 16 Common Vulnerability Scoring System (CVSS) What is it?

17 Common Vulnerability Scoring System (CVSS) BASE Vector Access Vector Access Complexity Authenti… NetworkHighNone Adjacent Network MediumSingle Instance LocalLowMult. Instances Undefined Confident…IntegrityAvailability None Partial Complete Undefined ExploitabilityImpact Sample Score: 7.5 Sample Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Every CVSS score should be accompanied by the corresponding vector

18 Common Vulnerability Scoring System (CVSS) The Calculator

Training and Metrics.

Training and Metrics A special activity in the SDL 20 Security training is what food is to a workout Same workout metrics do not apply Quality of your intake affects overall performance Staff needs ongoing training

Training and Metrics Security Learning Process Pre classClass Fixation Exercises Pos Class Survey Keeping Staff Current 21

Training and Metrics Security Learning Process Pre classClass Fixation Exercises Pos Class Survey Keeping Staff Current 22 Understand who is the audience Previous knowledge about secure coding and secure testing Programming languages in use Supported platforms Type of product Understand who is the audience Previous knowledge about secure coding and secure testing Programming languages in use Supported platforms Type of product

Training and Metrics Security Learning Process Pre classClass Fixation Exercises Pos Class Survey Keeping Staff Current 23 Train everyone involved in the SDL Developers: Secure Coding, Threat Model QA: Security Testing, Tools Managers: Secure Development Lifecycle (also known as Symmunize) Train everyone involved in the SDL Developers: Secure Coding, Threat Model QA: Security Testing, Tools Managers: Secure Development Lifecycle (also known as Symmunize)

Training and Metrics Security Learning Process Pre classClass Fixation Exercises Pos Class Survey Keeping Staff Current 24 Quality Assurance - Capture the flag Use Beta software Approximately 3 hours long Top 3 finders receive prizes and are invited to explain what techniques and tools they used to find the vulnerabilities to the rest of the group Quality Assurance - Capture the flag Use Beta software Approximately 3 hours long Top 3 finders receive prizes and are invited to explain what techniques and tools they used to find the vulnerabilities to the rest of the group

Training and Metrics Security Learning Process Pre classClass Fixation Exercises Pos Class Survey Keeping Staff Current 25 Pos Class Survey Anonymous Metrics Class content Instructor knowledge Exercises Pos Class Survey Anonymous Metrics Class content Instructor knowledge Exercises

Training and Metrics Security awareness is more than training 26

Training and Metrics Security awareness is more than training 27 What: Symantec’s company-wide knowledge sharing session. How Often: Occurs every two weeks. 2 hours long. Who: Internal and external guests present on a topic of choice to Symantec’s engineering community What: Symantec’s company-wide knowledge sharing session. How Often: Occurs every two weeks. 2 hours long. Who: Internal and external guests present on a topic of choice to Symantec’s engineering community

Training and Metrics Security awareness is more than training 28 What: Symantec’s company-wide internal technical conference. How Often: Once a year. 3 days long. Who: Top engineers present on a topic of choice to Symantec’s engineering community. 25% of the talks are related to security. What: Symantec’s company-wide internal technical conference. How Often: Once a year. 3 days long. Who: Top engineers present on a topic of choice to Symantec’s engineering community. 25% of the talks are related to security.

Training and Metrics Security awareness is more than training 29 What: Symantec’s internal newsletter. How Often: Every quarter. 50 pages long. Who: Top engineers write on a topic of choice to Symantec’s engineering community. 1-3 security article in every issue since inception. What: Symantec’s internal newsletter. How Often: Every quarter. 50 pages long. Who: Top engineers write on a topic of choice to Symantec’s engineering community. 1-3 security article in every issue since inception.

Conclusions and final thoughts

Why This Approach Makes Sense? 31 Compare Apples to Apples Quantify results in a meaningful way to “C” executives –Past results can be used to explain impact of new findings –Can be simplified to a number from 1-10 or semaphore (green, yellow and red). –Can be used for competitive analysis Harder to game CVSS CWE can be easily mapped to different taxonomies

Final Thoughts… 32 Other metrics are useful too! Defense is like forcing muscle growth. It’s a proactive, measured and well fueled endeavor.

Copyright © 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Thank You! Cassio Goldschmidt