…but now i see—a vulnerability disclosure maturity model

31
Presenter’s Company Logo – replace on master slide #RSAC SESSION ID: #RSAC …But Now I See - a Vulnerability Disclosure Maturity Model HT-R04F

Upload: priyanka-aash

Post on 08-Apr-2017

156 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

SESSION ID:

#RSAC

…But Now I See - a Vulnerability Disclosure Maturity Model

HT-R04F

Page 2: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Who the FSCK Are You? What is it you do here?

2

Chief Policy Officer, HackerOne

Former Microsoft Security Strategist

Former Hacker for Hire

ISO Standards Editor

New America Foundation Fellow

MIT Sloan Visiting Scholar

Harvard Belfer Affiliate

Page 3: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Measuring Our Maturity

3

How would you answer these questions?When someone emails security@mycompany, who responds? How quickly?

Would my company’s legal department threaten a well-intentioned hacker who came to us with a valuable bug?

Presenter
Presentation Notes
create a five-factor model for modeling the maturity of organizations regarding vulnerability research disclosures.
Page 4: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Measuring Our Maturity

4

Does engineering prioritize the importance of product features alongside security bugs that come in from the wild?

If a reporter asked my CEO about a breach reported at our company, would she know what steps were taken to ensure user safety?

Is $10,000 is too much, too little, or just right to offer a hacker for a bug?

Page 5: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC#RSAC

The 5 Key Elements of Vulnerability Coordination Maturity

Page 6: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Vulnerability Coordination Maturity Model

6

New model for organizations to assess maturity of their vulnerability coordination process

Model guides how to organize and improve efforts inside and outside of an organization

5 Capability Areas: Organizational, Engineering, Communications, Analytics and Incentives

3 Maturity Levels for each Capability: Basic, Advanced or Expert

Companies can benchmark their capabilities against the industry

Analytics

Communications

EngineeringIncentives

Organizational

Presenter
Presentation Notes
One of the key aspects of the maturity model is organizational.  A program usually starts with getting a mandate to even respond to hackers in the wild. Normally, companies don’t respond to any party with information about how to improve a company. That can be for intellectual property protection purposes, but also for personnel bandwidth, especially for engineering. Authorized spokespersons for a company usually need rigorous training because they speak with the authority of the entire company. �
Page 7: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Organizational

7

Level Capability

Basic Executive support to respond to vulnerability reports and a commitment to security and quality as core organizational values.

Advanced Policy and process for addressing vulnerabilities according to ISO 29147 and ISO 30111, or a comparable framework.

Expert You have executive support, processes, budget and dedicated personnel for handling vulnerability reports.

People, process, and resources to handle potential vulnerabilities

Page 8: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

8

Page 9: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Engineering

9

Level Capability

Basic Clear way to receive vulnerability reports, and an internal bug database to track them to resolution. See ISO 29147.

Advanced Dedicated security bug tracking and documentation of security decisions, deferrals, and trade-offs.

Expert Use vulnerability trends and root cause analysis to eliminate entire classes of vulnerabilities. See ISOs 29147, 30111, 27034.

Capabilities to evaluate and remediate security holes, and improve software development lifecycle

Page 10: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

10

Page 11: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Communications

11

Level Capability

Basic Ability to receive vulnerability reports and a verifiable channel to distribute advisories to affected parties. See ISO 29147.

Advanced Tailored, repeatable communications for each audience, including security researchers, partners, customers, and media.

Expert Structured information sharing programs with coordinated distribution of remediation.

Ability to communicate to audiences internally and externally about vulnerabilities.

Page 12: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

12

Page 13: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Analytics

13

Level Capability

Basic Track the number and severity of vulnerabilities over time to measure improvements in code quality.

Advanced Use root causes analysis to feed back into your software development lifecycle. See ISOs 29147, 30111, 27034.

Expert Track real-time telemetry of active exploitation to drive dynamic pivots of remediation strategy.

Data analysis of vulnerabilities to identify trends and improve processes.

Page 14: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

14

Page 15: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Incentives

15

Level Capability

Basic Show thanks or give swag. Clearly state that no legal action will be taken against researchers who report bugs.

Advanced Give financial rewards or bug bounties to encourage reporting the most serious vulnerabilities.

Expert Understand adversary behavior and vulnerability markets, and structure advanced incentives to disrupt them.

Ability to encourage security researchers to report vulnerabilities directly.

Page 16: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

16

Page 17: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC#RSAC

Measuring Success in Vulnerability Disclosure

A look at 100+ Companies

Page 18: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Measuring Success in Vulnerability Disclosure

18

Survey Data

N=194IT/Security ProfessionalsCollected between Sept. 2015 – Jan. 2016 via online survey

Page 19: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Measuring Success in Vulnerability Disclosure

19

Capability Mean Score

Analytics 1.52

Communications 1.38

Engineering 1.49

Incentives 1.09

Organizational 1.59

Analytics

Communications

EngineeringIncentives

Organizational

Page 20: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Avg. By Industry (min. 10 respondents)

20

Industry Sample Size Analytics Communications Engineering Incentives OrganizationalEducation 15 1.27 1.27 1.40 0.67 1.53Finance 15 2.07 1.47 2.20 1.53 2.00

Government 10 1.50 1.20 1.20 0.40 1.60Healthcare 13 1.54 1.46 1.54 0.92 1.54

Manufacturing 21 1.52 1.52 1.62 1.14 1.67Other 15 1.13 1.20 1.00 0.93 1.73

Technology - B2B 37 1.62 1.49 1.54 1.30 1.70Technology - B2C 17 1.24 1.18 1.24 1.06 1.24

Technology -Mobile Apps 10 1.90 1.90 1.90 1.60 2.10

Unknown 10 1.40 1.50 1.30 1.00 1.40163 1.52 1.42 1.50 1.10 1.65

Green = 1 𝛔𝛔 above Red = 1 𝛔𝛔 below Bold = 2𝛔𝛔 above or below

Page 21: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Measuring Success in Vulnerability Disclosure

21

Analytics Comms Engineering Incentives Organizational

Finance 1 5 1 2 2Technology -Mobile Apps

2 1 2 1 1

Technology - B2B 3 4 4 3 4

Healthcare 4 6 5 8 7

Manufacturing 5 2 3 4 5

Government 6 8 9 10 6

Unknown 7 3 7 6 9

Education 8 7 6 9 8

Technology - B2C 9 10 8 5 10

Other 10 9 10 7 3

Rank of Industry by Capability, min. 10 respondents (1 = best, 10 = worst)

Page 22: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Technology – B2B vs Overall Average

22

Analytics

Communications

EngineeringIncentives

Organizational

Overall Average Technology - B2B

Page 23: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Government vs Overall Average

23

Analytics

Communications

EngineeringIncentives

Organizational

Overall Average Government

Page 24: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Finance vs Overall Average

24

Analytics

Communications

EngineeringIncentives

Organizational

Overall Average Finance

Page 25: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Sample Company – Riot

25

Capability Average Riot

Analytics 1.52 2

Comms 1.38 2

Engineering 1.49 3

Incentives 1.09 3

Org. 1.59 3

Analytics

Comms

EngineeringIncentives

Organizational

Riot vs. VCMM AverageAverage Riot

Page 26: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Sample Company – Adobe

26

Capability Average Adobe

Analytics 1.52 2

Comms 1.38 2

Engineering 1.49 3

Incentives 1.09 1

Org. 1.59 3

Analytics

Comms

EngineeringIncentives

Organizational

Adobe vs. VCMM AverageAverage Adobe

Page 27: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Sample Company – ToyTalk

27

Capability Average ToyTalk

Analytics 1.52 2

Comms 1.38 2

Engineering 1.49 3

Incentives 1.09 3

Org. 1.59 3

Analytics

Comms

EngineeringIncentives

Organizational

ToyTalk vs. VCMM AverageToyTalk Average

Page 28: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Next Steps

28

Continue to gather dataNon self-reported

Larger sample size

Multi-vendor coordination is needed

Page 29: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC#RSAC

Put Your Organization To The Test – Where Do You Rank

Page 30: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

“Apply”

30

Take the free maturity assessment within minutes at hackerone.com/vulnerability-coordination-maturity-model

Presenter
Presentation Notes
Example: Next week you should: Identify critical database(s) within your organization In the first three months following this presentation you should: Understand who is accessing the database(s), from where and why Define appropriate controls for the database Within six months you should: Select a security system which allows proactive policy to be set according to your organization’s needs Drive an implementation project to protect all critical databases
Page 31: …But Now I See—A Vulnerability Disclosure Maturity Model

Presenter’s Company Logo – replace on

master slide

#RSAC

Appendix

31