Building Trustworthy Systems with SDL

Similar documents
Secure Development Lifecycle

CCISO Blueprint v1. EC-Council

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Threat Centric Vulnerability Management

RiskSense Attack Surface Validation for IoT Systems

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Cisco s Security Dojo: Raising the Application Security Awareness of 20,000+ Chris Romeo, Security Journey; formerly of Cisco Systems

Security+ SY0-501 Study Guide Table of Contents

Kaspersky Enterprise Cybersecurity. Kaspersky Security Assessment Services. #truecybersecurity

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

External Supplier Control Obligations. Cyber Security

Case Study: The Evolution of EMC s Product Security Office. Dan Reddy, CISSP, CSSLP EMC Product Security Office

CyberArk Privileged Threat Analytics

Seagate Supply Chain Standards and Operational Systems

You knew the job was dangerous when you took it! Defending against CS malware

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Technical Reference [Draft] DRAFT CIP Cyber Security - Supply Chain Management November 2, 2016

LESSONS LEARNED IN SMART GRID CYBER SECURITY

Un SOC avanzato per una efficace risposta al cybercrime

Express Monitoring 2019

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

To Audit Your IAM Program

CND Exam Blueprint v2.0

Security analysis and assessment of threats in European signalling systems?

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Protect Your Organization from Cyber Attacks

Trustwave Managed Security Testing

K12 Cybersecurity Roadmap

Certified Cyber Security Specialist

10 FOCUS AREAS FOR BREACH PREVENTION

RSA NetWitness Suite Respond in Minutes, Not Months

Department of Management Services REQUEST FOR INFORMATION

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Stopping Advanced Persistent Threats In Cloud and DataCenters

Nebraska CERT Conference

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Cloud Customer Architecture for Securing Workloads on Cloud Services

Are we breached? Deloitte's Cyber Threat Hunting

Chapter 5: Vulnerability Analysis

Security Solutions. Overview. Business Needs

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

Students should have an understanding and a working knowledge in the following topics, or attend these courses as a pre-requisite:

Microsoft SDL 한국마이크로소프트보안프로그램매니저김홍석부장. Security Development Lifecycle and Building Secure Applications

McAfee Product Security Practices

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

Pass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

WHO AM I? Been working in IT Security since 1992

Engineering Your Software For Attack

TRUE SECURITY-AS-A-SERVICE

REGULATORY COMPLIANCE REGULATORY COMPLIANCE SERVICES. Dynamic Solutions. Superior Results.

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Framework for Improving Critical Infrastructure Cybersecurity

Segmentation for Security

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

INFORMATION ASSURANCE DIRECTORATE

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Designing and Building a Cybersecurity Program

TEL2813/IS2820 Security Management

Improving Security in Embedded Systems Felix Baum, Product Line Manager

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

Combating Cyber Risk in the Supply Chain

GDPR Update and ENISA guidelines

2017 Annual Meeting of Members and Board of Directors Meeting

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

RiskSense Attack Surface Validation for Web Applications

CS 356 Operating System Security. Fall 2013

Google Cloud & the General Data Protection Regulation (GDPR)

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Cyber Security Audit & Roadmap Business Process and

Gujarat Forensic Sciences University

Securing Devices in the Internet of Things

Run the business. Not the risks.

Defense in Depth Security in the Enterprise

Compliance Audit Readiness. Bob Kral Tenable Network Security

Security: The Key to Affordable Unmanned Aircraft Systems

the SWIFT Customer Security

Digital Wind Cyber Security from GE Renewable Energy

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

The Common Controls Framework BY ADOBE

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

locuz.com SOC Services

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Transcription:

Building Trustworthy Systems with SDL Chris Shenefiel 1

Agenda The Threat Problem The SDL Wheel SDL Implementation Across Cisco SDL Value

The Threat Problem Increasing Threats via the Networked Infrastructure Increasing Product Security Incidents Security Knowledge Base Needs to Be Expanded Across All Products

The SDL Wheel Product Security Requirements 3 rd Party Security Secure Design Secure Coding Static Analysis Vulnerability Testing

The SDL Wheel & its Trusses The SDL Wheel is a structure comprised of multiple triangular units (trusses). Each add structural security stability to our products just as construction trusses add structural stability to buildings, bridges, and towers. When applied as the entire wheel, SDL trusses connected to span the overall distance of the product development lifecycle.

Product Security Requirements! Security Baseline Requirements Insures consistency when implementing industry recognized standard practices Incorporates requirements into product Functional Spec(s) and Test Plan(s) Aligns with Public sector compliance (FIPS, DoD IA, Common Criteria)! Product Security Baseline (PSB) Gap Analysis Conduct at beginning of product lifecycle to drive additional requirements Conduct prior to customer release as part of verification Completed PSB GAP Worksheet Security Req s Architecture Traffic Handling Attack Surface Crypto Foundational Features Foundational Processes

3rd Party Software Fundamentals! Ensure your product as a whole is secure! Minimize exposure by considering hidden costs in your decision process Perform gap analysis Establish maintenance plan Verify no backdoors Address all known vulnerabilities before ship! Manage 3 rd party security alerts Register components in a centralized database Contract support for critical security fixes! Planned response to security issues Follow established maintenance plan

Secure Design Threat Modeling Methodology to identify & assess risk, and mitigate security problems in feature development Leads development engineers to consider how a feature can be attacked and how best to mitigate the attack Not a one-time event, it s a way of thinking about security for every feature Diagram Draw system architecture Add trust boundaries and detail Find threats Find threats with a method like STRIDE/element Iterate over diagram Mitigate Threats Redesign, utilize standard mitigations Custom mitigations when unavoidable Validate Validate diagrams match code Test effectiveness of the mitigations

Secure Design: Image Signing Tamper protection for Cisco software Digital signature creation and verification using asymmetric key pairs Rommon Boot loader Image Base Packages Image Signing Value Statement: Provide increased integrity and authenticity assurance, support the requirements of FIPS 140-3 and provide authentic software when securely booting the platform.

Secure Coding: Run Time Integrity Run Time Integrity Common Code Across Product Line Object Size Checking Address Space Layout Randomization X-Space Use safe libraries Perform complete input validation Best Practices Guidelines for each OS Value Statement: Run Time Integrity and the other secure coding processes prevent many security attacks.

Static Analysis! Established as part of the development process! Security Checkers are very effective at finding key vulnerability types, such as certain buffer overflows Run SA with Security Checkers enabled Ongoing work to improve performance (find more actual and important bugs, fewer false positives)! C/C++ switch from Klocwork to Coverity driven by significant performance improvement

Vulnerability Testing Check Protocol Robustness for implementation of RFC, input validation and packet fuzzing Duplicate Hacker Attacks using open source tools to Penetrate, scan and attack! Record test results in TIMS! Open defects and follow CSDL defect filing documentation guidelines

The Implementation of SDL Maintaining Product Security Requirements Training Consulting with Security Engagement Managers & Security Advocates Accelerating via shared Security Technology Modules Tracking and reporting compliance

SDL Maintenance: Constant Improvement Given New Threats, Mitigations, Technologies, and Applications Threat Landscape Market Info, Research, Standards, and Organizations Advanced Research Vulnerabilities Mitigations PSIRT Product Security Technology, Standards, and Innovations Product Security Baseline (PSB) Customer Specific Req. Customer-Found Defects 3 rd Party Vendor Security Notices Certifications Government Regulations Intellishield & CIAM 3 rd Party Rqmts Certification Rqmts Next Gen Cryptography Supply Chain Security & Secure Development Lifecycle

On-going Training: e.g., Cisco Security Ninja Program! Computer based training to increase one s Security IQ! Multiple modules on a variety of product security topics! Pass the assessment test and earn your belt! Security conferences to share learning and best practices

Consulting: Security Engagement Managers! Accelerating SDL Implementation By Market Segments! Security Experts Dedicated by Market Segment! Works Cross Functionally to increase the Security IQ for the product teams

Consulting: Security Advocates Accelerating SDL Implementation within the Development Team! Security Advocate = a person who speaks in support of making products secure.! Training every month on threats, mitigations, and solutions which they can apply in their product families.! On-going Social Community for discussions, updates, and knowledge exchange.

The Value of SDL Efficient Use of Development Resources Consistency in Product Security Technology Design And Maintenance Alignment to Standards Foundational Proactive Defense Against Known Threats

Secure Development Lifecycle (SDL) Why Security is Good Business Sense: Perform GAP Analysis Register Validate and Requirements Update and Resiliency 3rd Party Software Identify and Detect Address Security Security Defects Prevent Threats Security Attacks Reduced cost of fixing bugs Remove expense and pain of changing security architecture Reduces TTM (time to market) over time Day-one advantage over our less security savvy competitors Improve customer satisfaction Lower PSIRT and CAP cases

Aligning to Standards! CSDL conforms with the guidelines of ISO 27034 Following CSDL is part of Cisco s ISO compliance In 2013, Cisco used ISO/IEC 27034-1, as a baseline to evaluate CSDL. All current mandatory application security related policies, standards, and procedures along with their supporting people, processes, and tools meet or exceed the guidance in ISO/IEC 27034-1 as published in 2011. Product Security Baseline aligns with Common Criteria certification requirements Cisco Confidential 20

SDL: Foundational Layer for Effective Threat Defense in a multi-layered approach Remote, Adjacent and Local attack protection The network is the first attack point. Once in, attackers can infiltrate and steal, disrupt and monitor

Once in, attackers further infiltrate, looking for prized targets Once in the Enterprise, attackers typically expand access to multiple systems in order to steal information or disrupt operations Multiple levels of security inside and outside the network make infiltration and theft much more difficult

Theft is a growing motivation for attacks: Verizon 2015 DBIR The 2015 Data Breach Investigations Report (DBIR) analyzes 79,790 incidents and 2,122 confirmed breaches The highest number of breeches affected public sector institutions (60%) 92% of breaches were perpetrated by outsiders 70% of attacks with known motives targeted secondary victims 60% of attacks compromise victims in minutes More than 70% of attacks used well known vulnerabilities http://www.verizonenterprise.com/dbir/

Profile Attacker Threat Activities Implication to Systems Development and Operations Requirements A"ack the network edge (Includes Denial of Service) Penetrate Persistent presence and expansion across the Enterprise. Infiltrate Exfiltrate Export or transfer of assets

DBIR Profile of Attack Patterns Financial Services Persistent Poking Financial Services and Insurance companies must pay special attention to the Penetrate phase since attackers will persist at the edge until they find a vulnerability. Penetrate Social Engineering Phone calls or emails impersonating internal authorities seeking security credentials. Malware used aeer penetrabon Infiltrate Exfiltrate Export financial account informabon or money Source Verizon DBIR Industry Snapshot 2012

DBIR Profile of Attack Patterns Information/Public Sector Companies (Manufacturing, Government, IT Services) Social Engineering Majority of compromises resulted from combined social engineering and malware which stole credentials/information. Penetrate IniBal a"ack to penetrabon (hrs) IniBal compromise to discovery (yrs) Objective is most often intellectual property so the goal is to stay in as long as possible Infiltrate Exfiltrate Exfiltrate assets (backdoors, spyware, steal credentials) Source Verizon DBIR Industry Snapshot 2012

How Secure Development Protects Software Products Secure Development builds security into the products that protect the network from Penetration Infiltration Exfiltration The following represents a select subset of Cisco s Product Security requirements

Unnecessary services, when enabled by default cause customers to be at risk if a vulnerability is accessible via that service. Penetrate Is this an essential service? RISK Should service be exposed to network? If intentionally exposed, is authentication in place? Are system resources managed? Product Security Requirements Prohibit non-essential services and requires scans to reveal listening services Industry Reference Defense APP STIG 6030 NERC CIP R2 Is all input validated? 28

Internal application services, when configured to listen on the network instead of just to other internal processes expose internal resources to attack. Is this an essential service? Should Service be exposed to network? Penetrate RISK If intentionally exposed, is authentication in place? Are system resources managed? Threat Modeling analyzes what needs to be exposed to whom and how. Industry Reference Defense APP STIG 6300 NET STIG 0135 NERC CIP R2.1, R2.2 Is all input validated? 29

Is this an essential service? Penetrate RISK Should Service be exposed to network? Don t assume that users won t find services that are not documented. Enable secure authentication. If intentionally exposed, is authentication in place? Are system resources managed? Require authentication and encryption for listening services Industry Product Security Requirements Reference Defense CC Network STIG WLANPP, NDPP Is all input validated? 30

Is this an essential service? Penetrate RISK Should Service be exposed to network? During threat modeling consider setting limits and handling error conditions during resource allocation and cleanup If intentionally exposed, is authentication in place? Are system resources managed? Is all input validated? Industry Testing Requirements with flooding and fuzzing tools. Reference Defense APP STIG 3760/3780/6080 NET-IDSPS-010/012, UCR 5.4.6.2.5-2.b UCR 5.3.5.4.7-14.3 NET STIG 0375 31

Is this an essential service? Penetrate RISK Should service be exposed to network? If intentionally exposed, is authentication in place? Are system resources managed? Secure coding practices and Safe Libraries. Treat all input as suspect. Insufficient input validation is the number one cause of vulnerabilities. * It is very often how a product is breached. Is all input validated? Industry Reference Defense APP STIG 6030 32

Estimating Risk: Common Vulnerability Scoring System Common Vulnerability Scoring System sponsored by the Forum of Incident Response and Security Teams (FIRST) Used by industry to attempt to quantify the risk of a given vulnerability Enterprises use CVSS score to prioritize mitigation We will use CVSS scoring in this presentation to hypothetically illustrate how CSDL mitigates vulnerability risk http://nvd.nist.gov/cvss.cfm?calculator&version=2

System Risk Estimate using CVSS: Penetration Phase 10 9 8 7 6 5 4 3 2 1 CSDL Requirement Restrict Non-Essential Services Threat Modeling Secure Authentication Manage System Resources Input Validation CVSS Factor Impact Related exploit range: Adjacent Network Attack Complexity: Medium Level of Authentication: Single Impact Metrics: Partial Attack Complexity: High CVSS Risk Estimate CVSS scores indicate estimated risk and may not reflect real-world experience

Use Secure Storage and certificatebased authentication protocols to protect credentials and access. Infiltrate Secure Authentication? RISK Are memory locations randomized and is execution restricted? Is system authenticity and integrity managed? Product Security Requirements Require secure credential management and authentication for remote access. Industry Reference Defense Network STIG CC WLANPP, NDPP System patched and current? 35

Secure Authentication? Infiltrate RISK Application services that use predictable memory address space or file locations are vulnerable to attack. Are memory locations randomized and is execution restricted? Is system authenticity and integrity managed? Requires ASLR and XSPACE. Industry Defense Reference OS Red Hat GEN008420 System patched and current? 36

Secure authentication? Infiltrate RISK Are memory locations randomized and is execution restricted? System images are signed and hashed and logs controlled to maintain authenticity and integrity. Is system authenticity and integrity managed? Require Mandatory Access Control and Cisco signed images. Industry Reference System patched and current? Defense CC VvoIP1201/1710/1935 FMT_SMF.1, FPT_TUD_EXT.1 37

Secure authentication? Penetrate RISK Are memory locations randomized and is execution restricted? Is system authenticity and integrity managed? Require software and 3 rd Party vulnerability updates Industry Defense Reference APP6050, DSN17.04/05 DSN02.04, EN020, NET0384. GEN000120, VVOIP1700 Vulnerability patching and updates. System patched and current? NERC CIP R4.2 38

System Risk Estimate: Infiltration Phase CVSS score animates in presentation mode 10 9 8 7 6 5 4 3 2 1 CSDL Requirement Secure Authentication ASLR/XSpace Image Signing System patched and current CVSS Factor Impact Related exploit range: Local Level of Authentication: Multiple % Vulnerable: 26-75 Vulnerability Temporal Score: Unproven, Official Fix CVSS Risk Estimate CVSS scores indicate estimated risk and may not reflect real-world experience

Exfiltrate Detection and Mitigation support Network Product Contribution Most exfiltration occurs in application domains Networks can help to detect suspicious activities through: Anomaly detection and policy violations Confirmation and Compliance Management Systems Decreasing Infiltration directly reduces Exfiltration

Consistency through Secure Development Lifecycle (CSDL) SDL is the approach to use for ensuring product security: Incorporate security requirements in Product Security Baseline, Identify security threats and mitigations during design phase with Threat Modeling Prevent security defects using Safe Libraries and Static Analysis tools with appropriate security rules Defend against exploits using Runtime Defense techniques, while Validating system through Security Testing Validate Requirements and Resiliency Detect Security Defects Perform GAP Analysis Prevent Security Attacks Register and Update 3 rd Party Software Identify and Address Security Threats Value Statement: Ensures consistent product security through proven techniques and technologies, reducing the number and severity of vulnerabilities in software

Glossary of Referenced Industry Requirements/Specifications Industry Standards Common Criteria (CC) Defense NERC CIP Cisco Specifications Protection Profiles: Wireless LAN (WLAN) Network Device (ND) Firewall (FW) VPN Secure Technical Implementation Guide (STIG): Application (APP) Network (NET) Unified Capabilities (UCR) VoIP (Voice over IP) Defense Switched Network (DSN) North American Electric Reliability Corporation Critical Infrastructure Protection Cisco Secure Development Lifecycle (CSDL) Product Security Baseline (PSB) for all Cisco products