security at scale - lessons from six months at yahoo

31
Building Security at Scale PRESENTED BY Alex Stamos Black Hat USA 2014 | August 7, 2014

Upload: alex-stamos

Post on 07-May-2015

6.080 views

Category:

Internet


0 download

DESCRIPTION

This is my talk on building security at scale from Black Hat USA 2014. In it I outline the lessons I've learned from six months as Yahoo's CISO and share ideas for how the security industry can better address problems at web scale.

TRANSCRIPT

Page 1: Security at Scale - Lessons from Six Months at Yahoo

Building Security at Scale

P R E S E N T E D B Y A l e x S t a m o s| B l a c k H a t U S A 2 0 1 4 | A u g u s t 7 , 2 0 1 4

Page 2: Security at Scale - Lessons from Six Months at Yahoo

Agenda

▪ The Security Industry and Web Scale Problems !▪ Combating Security Nihilism !▪What is Yahoo doing about it?

2

Page 3: Security at Scale - Lessons from Six Months at Yahoo

Theses

3

▪ The security industry has failed to consider the needs of scale, including diversity of user base !

▪ A post-Snowden nihilism is affecting our industry’s approach to securing users !

▪ Enterprise security teams need to evolve to proactively gain trust

Page 4: Security at Scale - Lessons from Six Months at Yahoo

The Security Industry and Web Scale Problems

Page 5: Security at Scale - Lessons from Six Months at Yahoo

5

What do I mean by scale?

Amount of !

› Data › Systems › Users

Diversity of !

› Users › Threat Models

Page 6: Security at Scale - Lessons from Six Months at Yahoo

Who is the prototypical customer of security products?

6

Page 7: Security at Scale - Lessons from Six Months at Yahoo

7

Big Banks Web Scale

Customers x 10 x 10

Concurrent Users x 10 x 10

Front-End Servers x 10 x 10

Total Servers x 10 x 10

Customer Value $100’s $.01s

Cust Stickiness High Low-Medium

Meat-Space Identity Strong Weak

Post-Facto Action? Yes Rarely

Page 8: Security at Scale - Lessons from Six Months at Yahoo

8

Most security companies are aiming for this

Our reality is more like this

[1]

[1] Flickr user Kevin Gebhart CC BY-NC-SA 2.0 [2] Flickr user Dan Buczynski CC BY-NC-ND 2.0

[2]

Page 9: Security at Scale - Lessons from Six Months at Yahoo

Things People Try to Sell Us

Page 10: Security at Scale - Lessons from Six Months at Yahoo

What they try to sell us:

10

Super smart pizza boxes Software sensors with centralized intelligence

What we would buy:

[1]

[1] Flickr user ms.akr CC BY 2.0 [2] Flickr user Mike Fleming CC BY SA 2.0

[2]

Page 11: Security at Scale - Lessons from Six Months at Yahoo

11

Arista 7508E 1152 x 10GbE

30Tbps backplane 5kW

Palo Alto 7050 120Gbps throughput

2.4kW

Page 12: Security at Scale - Lessons from Six Months at Yahoo

12

5kW

600kW

Page 13: Security at Scale - Lessons from Six Months at Yahoo

What they try to sell us:

Databased back SIEM Hadoop based anomaly detection

What we would buy:

[1]

[1] Flickr user Bob Mical CC BY 2.0

Page 14: Security at Scale - Lessons from Six Months at Yahoo

What they try to sell us:

14

Windows Anti-APT Virtualization or Kernel Firewall

Docker HIDS

What we would buy:

[1]

[1] Flickr user broterham CC BY NC 2.0 !

Page 15: Security at Scale - Lessons from Six Months at Yahoo

Free Business Ideas

15

▪ Freemium Key Management System › Bootstrap via manual approval, trust in network, or remote attestation › Create master cert, view into corporate keyspace with lazy security checks

!▪ Freemium Overlay Network › Goes great with key manager! › Allow for easy IP management across public/private cloud › Could be IPv6 only. Terminate inside of containers?

!▪ Bug Bounty with Automatic Verification › We’re building this ourselves with Selenium

Page 16: Security at Scale - Lessons from Six Months at Yahoo

More Free Ideas

16

▪ ARM CoreOS Servers with Lightweight Remote Attestation › ARM is going to be big in Big Data environments › At scale building systems remotely is currently terrifying › Any scale organization does not have 100% physical control

!▪ OpenSSL with Remotable Handshake › Why are we putting private keys on the most exposed systems? › Need to remote the handshake to an HSM or TXT backed key server › Should get 20:1 ratio

Page 17: Security at Scale - Lessons from Six Months at Yahoo

Breaking through the excuses

Page 18: Security at Scale - Lessons from Six Months at Yahoo

Security Nihilism

18

Ve believe zat nothing… ist secure enough vor ze real world, Lebowski!

Flickr user Joe Goldberg CC BY-SA 2.0

[1]

[1]

Page 19: Security at Scale - Lessons from Six Months at Yahoo

19

“Your system is not secure against this [advanced attack|unlikely scenario] therefore it shouldn’t exist”

“That’s just security through obscurity!”

We need to build systems for all levels of user and adversary

Non-obvious protections can increase the chance of catching an attacker in time, especially for interactive systems

Page 20: Security at Scale - Lessons from Six Months at Yahoo

20

“The [NSA|FSB|PLA] will just own up the user’s system and get the data that way”

“Users are idiots and will screw this up”

Forcing an adversary to expend resources and risk detection is a valid goal

A system is only secure if it is safe, by default, for the 25th percentile user

Page 21: Security at Scale - Lessons from Six Months at Yahoo

What are we doing about it?

Page 22: Security at Scale - Lessons from Six Months at Yahoo

The New Yahoo Paranoids

22

CISO

Corp Security Operations and Monitoring

Product Security Engineering Paranoid Labs Penetration Testing

Intelligence, Investigations and

Response

Risk and Vulnerability Management

Privacy Engineering

Chief of Staff

Page 23: Security at Scale - Lessons from Six Months at Yahoo

New Yahoo Paranoids

23

Chris Rohlf Doug DePerry Yan Zhu

Page 24: Security at Scale - Lessons from Six Months at Yahoo

24

Transport Encryption

Complete !

› TLS 1.2 › ECDH(E) › AES-GCM › RSA 2048

Next up !

› HSTS and pre-load › ECDSA certificates › Certificate Transparency › ChaCha20 and Poly1305 › STARTTLS Pinning

Page 25: Security at Scale - Lessons from Six Months at Yahoo

Backbone Encryption

25

Page 26: Security at Scale - Lessons from Six Months at Yahoo

Self-Service Security

26

▪ Our scaling challenges in providing app sec services: › Breadth: 80+ products in 60+ countries › Speed: multiple daily web pushes and weekly mobile !

▪ Any large org needs to create self-service options › Mobile libraries • Authentication and device identity

• TLS with pinning

› Mobile code scanning portal › CI/CD Scanner integration • Open-source coming!

Page 27: Security at Scale - Lessons from Six Months at Yahoo

Bug Bounty

27

Page 28: Security at Scale - Lessons from Six Months at Yahoo

Bug Bankruptcy

28

▪ Important factors in getting bugs closed: › Detailed descriptions and mitigation instructions › Accurate prioritization › Consistent follow-up and real-time reporting › Executive visibility › Convincing company that you are a madman

Works well for me

Page 29: Security at Scale - Lessons from Six Months at Yahoo

29

Page 30: Security at Scale - Lessons from Six Months at Yahoo

The Future is Bright

30

▪ Our profession has never been so impactful on… › Individuals › Nation-States › History !

▪ With great power… › It is impossible to work in this field without being a moral actor

!▪ Remember that trust is more than security! !

▪ Take this opportunity to do something that you will remember with pride

Page 31: Security at Scale - Lessons from Six Months at Yahoo

Thank you !

[email protected]