does15 - justin collins - rise of the machines security automation at twitter

60

Upload: gene-kim

Post on 10-Jan-2017

433 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
Page 2: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Alex SmolenNeil Matatall

Me

Nick Green

Page 3: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Secure by DefaultDetect via Tests

Page 4: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Don’t Fix VulnerabilitiesPrevent Them

Page 5: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Is Twitter a Unicorn?

Page 6: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

2009-2010

Page 7: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
Page 8: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

No company-provided email accounts

No admin password complexity requirements

No separate administrative login page

No limit on failed admin login attempts

No admin password rotation enforcement

No access controls on admin actions

No IP restrictions on admin logins

Page 9: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Also...

Every employee is an admin!

Page 10: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
Page 11: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Incident 01

Employee password brute-forced

Page 12: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Incident 01

Employee password brute-forced

Password:

Page 13: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Incident 01

Employee password brute-forced

Password: happiness

Page 14: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
Page 15: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
Page 16: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
Page 17: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Incident 02

Attacker gains access to employee’s email account

Page 18: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Incident 02

Attacker gains access to employee’s email account

Finds two passwords, over six months old

Page 19: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Incident 02

Attacker gains access to employee’s email account

Finds two passwords, over six months old

Infers current password

Page 20: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

FTC Order

Page 21: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

FTC Order

Page 22: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Tweets per Day

Page 23: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

About Me

Page 24: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

About Machines

Page 25: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Tool Cycle

Run Tool Wait Interpret Results Fix Issues

Page 26: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Tool Cycle

Run Tool Wait Interpret Results Fix Issues

Repeat

Page 27: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
Page 28: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Philosophy of Automation

Page 29: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Right Informationto the

Right People

Page 30: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Find Bugs asQuickly as Possible

Page 31: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Don’t RepeatYour Mistakes

Page 32: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Analyze fromMany Angles

Page 33: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Let PeopleProve You Wrong

Page 34: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Help PeopleHelp Themselves

Page 35: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Automate Dumb Work

Page 36: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Keep It Tailored

Page 37: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Legend of SADB

Page 38: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Brakeman

Page 39: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Using Brakeman

Run Tool Wait Interpret Results Fix Issues

Repeat

Page 40: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Automated Brakeman

Page 41: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Automated Brakeman

Push Code

Page 42: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Automated Brakeman

Push Code

Pull Code

Page 43: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Automated Brakeman

Push Code

Pull Code Send Results

Page 44: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Automated Brakeman

Push Code

Pull Code Send Results

Send Emails

Page 45: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
Page 46: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Warnings Over Time

Page 47: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Warnings Over Time

Started using Brakeman

Page 48: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
Page 49: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
Page 50: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Legacy of SADB

Page 51: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Automated Reviews

Pattern Match

Comment on Review

Page 52: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

01 Identify Problem

Repeated incident?

Opt-in code security?

Repetitive work?

Page 53: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

02 Solve In Code

Write a library

Make it safe by default

Enforce library use in CI

Page 54: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

04 Detect Statically

Determine fingerprint of issue

Identify suspect code

Alert during code review

Page 55: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

05 Detect Dynamically

Write Selenium tests

Write a crawler

Page 56: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

06 Use Browser Security

Content Security Policy

Strict Transport Security

Public Key Pinning

Subresource Integrity

Page 57: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Secure by DefaultDetect via Tests

Page 58: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter

Don’t Fix VulnerabilitiesPrevent Them

Page 59: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
Page 60: DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter