defense at scale

45
Defense at Scale an op.mis.c #infosec talk in two slides BSidesNYC 2016 Jan Schaumann @jschauma h8ps://v.gd/defenseAtScale

Upload: jan-schaumann

Post on 21-Apr-2017

2.705 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Defense at Scale

Defense  at  Scale  an  op.mis.c  #infosec  talk  in  two  slides  

BSidesNYC  2016  

Jan  Schaumann  @jschauma  h8ps://v.gd/defenseAtScale  

Page 2: Defense at Scale

@jschauma  

Page 3: Defense at Scale

¯ˉ\_(ツ)_/¯ˉ    h8ps://v.gd/defenseAtScale03  

Page 4: Defense at Scale

Defense  at  Scale  an  op.mis.c  #infosec  talk  in  two  or  more  slides  

BSidesNYC  2016  

Jan  Schaumann  @jschauma  

Page 5: Defense at Scale
Page 6: Defense at Scale

1  in  a  million  is  next  Tuesday.  

h8ps://v.gd/defenseAtScale04  

Page 7: Defense at Scale

h8ps://v.gd/defenseAtScale05  

Got  phished.  

Downloaded  drive-­‐by  malware.  

Got  pwned  by  script  kiddies.  

Uses  Flash  

Actually  targeted  by  NSA.  

Page 8: Defense at Scale

h8ps://v.gd/defenseAtScale06  

Page 9: Defense at Scale

h8ps://v.gd/defenseAtScale07  

Page 10: Defense at Scale
Page 11: Defense at Scale

💩  

Page 12: Defense at Scale

You  get  to  drink  from  the  FIREHOSE!!!  

Page 13: Defense at Scale

No  capYon  necessary.  

Page 14: Defense at Scale
Page 15: Defense at Scale
Page 16: Defense at Scale

Skin  in  the  Game  

•  Who  carries  the  cost  of  fixing  security  problems?  

•  Who  pays  out  the  Bug  Bounty  for  the  same  set  of  command-­‐injecYon  or  XSS  vulnerabiliYes?  

•  Who  is  incenYvized  to  improve  security?  

Page 17: Defense at Scale

PrioriYze.  

Page 18: Defense at Scale

100%  secure  is  impossible  –  but  that’s  ok.  

 Raising  the  cost  of  an  a8ack  is  ofen  sufficient.    (Know  your  Threat  Model.)  

Page 19: Defense at Scale

Fucks  don’t  scale.  

Page 20: Defense at Scale

“Prevent,  Detect,  React”  

💩  

Page 21: Defense at Scale

“Prevent,  Detect,  React”    

Firewalls,  Monitoring,  Patching    

💩  

Page 22: Defense at Scale

“Prevent,  Detect,  React”    

Firewalls,  Monitoring,  Patching    

Vendor  Crap,  Vendor  Crap,  ¯ˉ\_(ツ)_/¯ˉ    

💩  

Page 23: Defense at Scale

“Are  vulnerabili-es  in  so0ware  dense  or  sparse?  If   they  are   sparse,   then   every  one   you  find  and  fix  meaningfully   lowers   the   number   of   avenues  of  a?ack  that  are  extant.    If  they  are  dense,  then  finding   and   fixing   one   more   is   essen-ally  irrelevant   to   security   and   a   waste   of   the  resources  spent  finding  it.  Six-­‐take-­‐away-­‐one  is  a  15%  improvement.  Six-­‐thousand-­‐take-­‐  away-­‐one  has  no  detectable  value.”                          Geer/Schneier  

h8ps://v.gd/defenseAtScale08  

Page 24: Defense at Scale
Page 25: Defense at Scale

If  you  can  make  things  be8er  without  making  things  worse,  do  it.  

 Even  if  it  doesn't  make  things  perfect.  

h8ps://v.gd/defenseAtScale09  

Page 26: Defense at Scale

If  what  you’re  doing  doesn't  make  things  be8er,  stop  doing  it.  

 Even  if  you've  always  done  it.  

 Even  if  it  took  a  lot  of  effort  to  start  

doing.  

h8ps://v.gd/defenseAtScale09  

Page 27: Defense at Scale

Think  big.  

Page 28: Defense at Scale

VulnerabiliYes  are  not  sparse.    

Don’t  fix  individual  bugs,  focus  on  eliminaYng  enYre  vulnerability  

classes  instead.  

Page 29: Defense at Scale

If  you  keep  fixing  the  same  issue  over  and  over  again,  you’re  not  

making  progress.  

Page 30: Defense at Scale
Page 31: Defense at Scale

h8ps://v.gd/defenseAtScale10  

Page 32: Defense at Scale

SIEMs  don’t  detect  compromises.  

A  human  going  “huh,  weird”  detects  a  compromise.  

Page 33: Defense at Scale

compromise  indicator  

some  of  the  data  you  collect  

you  

Page 34: Defense at Scale

Lead  by  example.  

Page 35: Defense at Scale

Engineer:   “Hey,  can  we  add  the  new  service  account  ‘fishbone’  everywhere?  Needs  full  sudo,  no  password.”  

Infosec:   “LOL  what?  No  way.”  

Infosec  eng1:   “Hey,  can  we  add  ‘nessus’  everywhere?  Needs  full  sudo,  no  password.”  

Infosec  eng2:   “Sure,  one  sec.”  

Page 36: Defense at Scale

Lead  by  example.    

If  another  team  asked  you,  would  you  say  ’no’?  

Page 37: Defense at Scale

Other  people’s  fucks  are  also  limited.  

h8ps://v.gd/defenseAtScale11  

Page 38: Defense at Scale

VulnerabiliYes  are  dense.  

Embrace  automaYon.  

CI/CD  is  your  friend.  

Page 39: Defense at Scale

CI/CD  is  your  friend.  

•  You  cannot  update  individual  systems;    you  can  ensure  all  your  systems  regularly  get  all  updates  automaYcally.  

•  You  cannot  remove  individual  vulnerabiliYes;  you  can  gate  deployments  on  using  the  right  libraries.  

•  You  cannot  manually  change  a  config  file  on  a  few  hundred  thousand  systems;  you  can  enforce  consistent  convergence  in  idempotent  changesets  prescribed  by  your  configuraYon  management  system.  

Page 40: Defense at Scale

Your  endpoint  security  model  should  assume  the  network  is  compromised;    your  network  security  model  should  

assume  the  endpoint  is.    

Both  in  fact  are.  

Page 41: Defense at Scale

Consider  today:  •  auto-­‐update  your  OS,  third-­‐party-­‐  and  custom  sofware  

•  mandatory  configuraYon  management  across  your  fleet  

•  2FA  SSO  with  Yme-­‐bound  authenYcaYon  tokens  

•  provide  libraries  for  common  problems  (secret  management,  input/output  validaYon,  hashing,  encrypYng,  ...)  

•  have  exactly  one  TLS  stack  that  everybody  uses  (internally  and  externally)  

Page 42: Defense at Scale

…and  what  may  come:  

•  Embrace  the  cloud.    You  are  already  operaYng  in  hosYle  networks  and  crossing  trust  boundaries.  

•  Rethink  your  ‘trusted  network’  (BeyondCorp).  

•  Rethink  the  need  for  user  accounts.  

h8ps://v.gd/defenseAtScale13  

Page 43: Defense at Scale

•  Containers  are  just  big  ass  staYc  binaries  with  all  their  problems.    Deal  with  it.  

•  Build  upon  remote  a8estaYon  of  both  hardware  and  sofware;  signed  containers.  

…and  what  may  come:  

Page 44: Defense at Scale

Defend  smarter,  not  harder.  •  Don’t  waste  your  Yme  on  busy  work.    Measure  your  impact.    PrioriYze.  

•  Embrace  automaYon.  Move  fast.  

•  Help  others  take  responsibility.  Guide  them.  

•  Have  a  Red  Team.          “You  can’t  grade  your  own  homework.”                                                                                        –  @MicahZenko  

Page 45: Defense at Scale

Thanks!  

BSidesNYC  2016  

Jan  Schaumann  @jschauma  h8ps://v.gd/defenseAtScale