this world of ours

31
This World of Ours .NET Hub #3 (2017)

Upload: slicklash

Post on 15-Apr-2017

132 views

Category:

Software


3 download

TRANSCRIPT

Page 1: This World of Ours

This World of Ours.NET Hub #3 (2017)

Page 2: This World of Ours

About me

Audrius Kovalenko | @slicklash

NOT Computer Security Expert

Just a developer

Page 3: This World of Ours

Which one is more secure?

Page 5: This World of Ours

What’s a “secure” system?

PreventionDetectionResponse & Recovery

Good security (classical)

Page 6: This World of Ours

What’s a “secure” system?

Prevention ShieldingDetectionResponse & Recovery

Good security (modern)

Page 8: This World of Ours

Security properties

Authentication

Integrity

Non-repudiation

Confidentiality

Availability

Authorization

Page 9: This World of Ours

Security threats

Authentication Spoofing

Integrity Tampering

Non-repudiation Repudiation

Confidentiality Information Disclosure

Availability Denial of Service

Authorization Elevation of Privilege

STRIDE

Page 10: This World of Ours

SpoofingSTRIDE

Page 11: This World of Ours

Tampering

Dr. David Warren

STRIDE

Page 12: This World of Ours

RepudiationSTRIDE

Page 14: This World of Ours

Denial of serviceSTRIDE

Mirai 2016-11-211.2 Tbps

Leet 2016-12-21650 Gbps

Page 15: This World of Ours

Elevation of privilegeSTRIDE

Linux kernel 2007-2016

Page 16: This World of Ours

Securing the systemthreat modeling

Page 17: This World of Ours

What are you building?data flow diagram

Page 18: This World of Ours

Decompositionroles

User RolesName Authentication Description

Admin Windows ...Partner Basic ...User Forms ...

Service RolesName Authentication Description

APP Role Windows (ApplicationPoolIndentity) ...SVC Role Windows (Local System) ...MSMQ Role Windows (Network Service) ...

Page 19: This World of Ours

Decomposition (2)components

ComponentsName Roles Type Run As Communication

ChannelTechnology Uses

APP AdminUser

Website APP Role HTTPS C#, ASP.NET MVC 5

Cryptography,File I/O

API Partner Website API Role HTTPS C#, ASP.NET MVC 5

Cryptography,File I/O

SVC MSMQ Windows Service

SVC Role TCP/IP C# Cryptography,File I/O

Page 20: This World of Ours

Decomposition (3)data

DataName Data Elements Data Stores Description

Form Fields Database Non-sensitiveRole Access Control Remarks

Admin C R U D

Partner R Limited information. Form must be published.

User

Page 21: This World of Ours

What can go wrong?card games

Page 23: This World of Ours

How to prioritize?convert threat to risk

risk = threat_freq1 * prob_loss2 * m3

1 - threat event frequency2 - probability threat agent actions result in loss3 - loss magnitude

Page 24: This World of Ours

How to mitigate?raise the cost

Time

Skills

Money

etc.

capability

Page 25: This World of Ours

How to mitigate? (2)get your model right

“In the real world, threat models are much simpler. You're either dealing with Mossad or not-Mossad.”

This World of Ours, USENIX Article (2014) James Mickens

Page 26: This World of Ours

How to make it work for you?

Practice

Experience

Reflection

Theory

find your own way

read the bloody books

do the walking

do the talkingshare

Page 27: This World of Ours

DON’T CLICK THAT LINK

Security of software is the mirror of

organization’s security culture

Conway’s Law

Page 28: This World of Ours

Books

http://www.cl.cam.ac.uk/~rja14/book.html

“The Pragmatic Programmer”of security books

Page 29: This World of Ours

Books

FAIR STRIDE PASTA

Page 31: This World of Ours

QA