SlideShare una empresa de Scribd logo
1 de 32
Threat Modeling the Security
of Your Enterprise
 How not to panic all the time




Rafal M. Los
Enterprise & Cloud Security Strategist

©2011 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice
TWITTER: @WH1T3RABBIT
BLOG: HTTP://HP.COM/GO/WHITE-RABBIT
PODCAST: HTTP://PODCAST.WH1T3RABBIT.NET
First the Basics
What is threat modeling?


“Threat modeling is a procedure for optimizing security by identifying objectives
and vulnerabilities, and then defining countermeasures to prevent, or mitigate
the effects of, threats to the system.”
                                              -- http://searchsecurity.techtarget.com/definition/threat-modeling
What is threat modeling?


        What is this asset?
                 What are all the ways that
                 it can be attacked?
  …how can I effectively
  protect it from exploit?
      …and if it gets successfully
      exploited, what does that    …and how does it affect
      mean?                        these other assets?
Why learn threat modeling?

In order to enact effective strategies to protect the most critical assets and
systems, we first need to understand how they will be potentially abused, or
attacked.




If you cannot understand a system, you cannot defend it.
The Problem


Poor
visibility
•       Where are logically and physically
        critical processes, data, and systems?
•       How are critical systems, networks, and
        applications connected?



    7   Enterprise Security – HP Confidential
The Problem




             Limited insight
                 •       What is the difference between a legitimate
                         transaction, and an attack … or fraud?
                 •       How does an event in one system impact others?


8   Enterprise Security – HP Confidential
Benefits of Threat Modeling

•   Gain understanding of real attack
    surface of enterprise assets
•   Identify inter-connectedness of
    systems, applications, etc
•   Plot attack scenarios based on
    probability, impact, connectedness
•   Gain comprehensive understanding
    of real exploit impact


9   Enterprise Security – HP Confidential
Fundamentals of
Threat Modeling
When to Use Threat Modeling


•    designing a threat mitigation for a system, application, or asset
•    desire to understand how a compromised component can impact others
•    security testing a component with limited time
•    demonstrating inter-dependence of
     various enterprise components
•    comprehending failure modes and
     risk scoring

11   Enterprise Security – HP Confidential
Approaches to Threat Modeling

      •    Attacker-centric
           – Start      with attacker, evaluate their goals, methods and means
           – Completely              centered around the „actor‟ in the attack

      •    System-centric
           – Start      with a system, architecture, or software and define ways in which it can be attacked
           – Build      out system (or software, etc) map then define exposures, ways to attack system

      •    Asset-centric
           – Start      with assets entrusted to a system such as data
           – Understand               how assets relate to a system, move within a system

Source: Wikipedia[1]
      12   Enterprise Security – HP Confidential
High Level Threat Modeling Steps

1.     Understand the target
2.     Model the target
3.     Identify threats to the target
4.     Determine exploit impact
5.     Perform risk-based scoring
6.     Determine counter-measures, re-model




13   Enterprise Security – HP Confidential
The Basic Threat Model




                             Threat:                         Target:
                                             Vector:
                             The attack                      System or
                                             The method
                             agent or                        asset under
                                             of the attack
                             potential                       attack
                             risk




14   Enterprise Security – HP Confidential
3 Things to Remember
Things you must remember when threat modeling
1.         Spend enough time understanding your target
     –        Be thorough in evaluating the target‟s requirements and goals
     –        Evaluate how your target is connected to other potential pieces

2.         Don‟t miss relationships
     –        Systems, applications, threats all have relationships which may be relevant
     –        Follow processes, data flows, to their logical „dead end‟

3.         Dig deep into the details
     –        The more details present the more complete, accurate the threat model is
     –        Balance completeness vs. getting lost in the details


15       Enterprise Security – HP Confidential
Practical Threat Modeling
Important Preparation
Select the appropriate approach

         Attacker-Centric                         System-Centric                 Asset-Centric
Ideal for:                                   Ideal for:                    Ideal for:
• understanding an attacker                  • modeling complex system     • defending specific assets
• setting up penetration test                • modeling applications       • assessing public systems
• when threat actor is known                 • attacking business             with private data
                                                processes
Strengths:                                   Strengths:                    Strengths:
• motivations often drive attack             • ability to see complex      • focuses on the most basic
    strategy at all levels                       relationships in system       component, the asset
Weaknesses:                                  Weaknesses:                   Weaknesses:
• often impossible to fully                  • requires a tremendous       • potential to miss system-
  understand attacker                          amount of effort              level mitigations, defenses


17   Enterprise Security – HP Confidential
Practical: Building a Threat Model

•    Building a threat model against an enterprise application
•    Taking the most appropriate approach for the requirement
•    Start with basic information, build knowledge
•    Utilize failure mode analysis, risk scoring
•    Derive weaknesses in system, create defensive strategy




18   Enterprise Security – HP Confidential
Understanding the Target
Component                                     Notes
“External” web interface                      •   Exposed to the Internet   External
                                              •   Written in Flash            App
                                              •   Mixed content
                                              •   SSL-required
“Internal” customer                           • Protected content
representative interface                      • Written in Java
                                              • Access multiple
                                                customer data

Mobile application                            • Mixed content               Mobile
                                              • iOS and Android OS           App
                                              • Encrypted https
Automated API for 3rd                         • REST-based API
party access                                  • Access basic sensitive      3rd Party
                                                information                    API
                                              • Certificate-based
                                                access

 19   Enterprise Security – HP Confidential
Model the Target – Iteration 1
                        JavaScrip
                            t
                           Adobe
                              Flash
                                              Web                             MS
                                                                              MQ
                                             Browser             MS SQL      Serve
                                                                               r




                                                                 WebSpher    Web
                                                                  e App
                                                                  Server    Browser
                                                                             Applet
                              Webkit/
                               Safari
                              JavaScrip
                                  t            iOS

                                                         REST
                                             3rd Party
                                               Web
                                             Service
                     UNTRUSTED                                  TRUSTED
20   Enterprise Security – HP Confidential
Model the Target – Iteration 2
                        JavaScrip
                            t
                           Adobe
                           Flash
                                              Web                                     MS
                                                                                      MQ
                              Google         Browser             MS SQL              Serve
                                                                                       r
                              Gears



                                                                 WebSpher         Web
                                                                  e App
                                                                  Server         Browser
                                                                                     Applet
                              Webkit/
                               Safari
                              JavaScrip
                                  t            iOS
                                                                            Oracle



                                                         REST
                                             3rd Party
                                               Web                                            CS
                                                                                              R
                                             Service
                                                                                     mySQL

                     UNTRUSTED                                  TRUSTED
21   Enterprise Security – HP Confidential
Model the Target – Iteration 3
                        JavaScrip                        SQLit
                            t                            e
                           Adobe
                           Flash
                                              Web                                      MS
                                                                                       MQ
                              Google         Browser              MS SQL              Serve
                                                                                        r
                              Gears
                                                                                               SQLit
                                                                                               e

                                                                  WebSpher         Web
                                                                   e App
                                                                   Server         Browser
                                                                                      Applet
                                                         SQLit
                              Webkit/                    e
                               Safari
                              JavaScrip
                                  t            iOS
                                                                             Oracle



                                                          REST
                                             3rd Party
                                               Web                                              CS
                                                                                                R
                                             Service
                                                                                      mySQL

                     UNTRUSTED                                   TRUSTED
22   Enterprise Security – HP Confidential
Identify Threats to the Target
                             1


                        JavaScrip                        SQLit
                            t                            e
                  2        Adobe
                           Flash
                                              Web                                      MS
                                                                                       MQ
                              Google         Browser              MS SQL
                                                                    3
                                                                                      Serve
                                                                                        r                  Attack local
                              Gears                                                                    1   database of external
                                                                                               SQLit
                                                                                               e           user

                                                                  WebSpher           Web               2
                                                                                                           Attack Flash client of
                                                                   e App                                   external user
                                                                   Server           Browser
                                                                                      Applet               Attack main
                                                         SQLit                                             application db
                              Webkit/                    e                                             3
                                                                                4                          through SQL
                               Safari
                              JavaScrip
                                  t            iOS                                                         injection
                                                                             Oracle
                                                                                                           Attack secondary
                                                                                                           application db
                                                          REST                                         4
                                             3rd Party                                                     through SQL
                                               Web                                              CS         injection
                                                                                                R
                                             Service                                                   5
                                                                                                           …
                                                                                      mySQL

                      UNTRUSTED                                  TRUSTED
23   Enterprise Security – HP Confidential
Identify Threats to the Target
Item           Attack Description                              Effectiveness   Difficulty
     1         Attack local cache/database of external user    Medium          High
     2         Exploit flash client of external user           High            Medium
               Attack main application database through SQL
     3                                                         High            Low
               injection
               Attack secondary application database through
     4                                                         High            Low
               SQL injection
     5         …                                               …               …




24   Enterprise Security – HP Confidential
Determine Exploit Impact
                        JavaScrip
                            t
                                                         SQLit
                                                         e
                                                                                                       Focus on one
                           Adobe
                           Flash
                                              Web                                      MS
                                                                                       MQ              attack at a time.
                              Google         Browser              MS SQL              Serve
                                                                                        r
                              Gears
                                                                                               SQLit
                                                                                               e       If #4 is successful
                                                                  WebSpher           Web               (penetrate secondary
                                                                   e App
                                                                   Server           Browser            database) what can
                                                         SQLit
                                                                                      Applet           the exploit impact be?
                              Webkit/                    e                      4
                               Safari
                              JavaScrip
                                  t            iOS
                                                                             Oracle



                                                          REST
                                             3rd Party
                                               Web                                              CS
                                                                                                R
                                             Service
                                                                                      mySQL

                     UNTRUSTED                                   TRUSTED
25   Enterprise Security – HP Confidential
Determine Exploit Impact
                        JavaScrip
                            t
                                                         SQLit
                                                         e
                                                                                                       Relationships
                           Adobe
                           Flash
                                              Web                                      MS
                                                                                       MQ              help us visualize
                              Google         Browser              MS SQL              Serve
                              Gears
                                                                                        r
                                                                                                       the impact of a
                                                                                               SQLit
                                                                                               e       successful exploit
                                                                  WebSpher           Web               on any given
                                                                   e App
                                                                   Server           Browser
                                                                                      Applet
                                                                                                       component.
                                                         SQLit
                              Webkit/                    e                      4
                               Safari
                              JavaScrip
                                  t            iOS
                                                                             Oracle



                                                          REST
                                             3rd Party
                                               Web                                              CS
                                                                                                R
                                             Service
                                                                                      mySQL

                     UNTRUSTED                                   TRUSTED
26   Enterprise Security – HP Confidential
Perform Risk-Based Scoring
Score each threat scenario based on
     – Criticality

     – Likelihood

     – Difficulty
     – Impact



Create matrix called a “Failure Mode Analysis”
     – Assign             numerical values to modifiers for analysis
     – Compute                  mathematical risk impact for objective analysis


27   Enterprise Security – HP Confidential
Sample Failure Mode Analysis Matrix




                                             Criticality

                                                           Likelihood

                                                                        Exploitability

                                                                                         Impact
Threat Scenario                                                                                   Total
Local cache (db)                               1             1              1             1               4
Flash client                                   4             4              9             4               21   High = 9
                                                                                                               Medium = 4
Primary SQL Injection                          9             9              9             9               36
                                                                                                               Low = 1
Secondary SQL                                  9             9              9             4               31
Injection



28   Enterprise Security – HP Confidential
Determine Counter-Measures

Mathematical, objective analysis will determine countermeasures
Most critical failures modes aren‟t always obvious
Most critical failure modes aren‟t always most complex or difficult to protect
Counter-measures should be appropriate to the threat criticality


…after formulating counter-measures, re-run threat scenario to validate.




29   Enterprise Security – HP Confidential
Resources
Prior work …
1.   Wikipedia - http://en.wikipedia.org/wiki/Threat_model

2.   OWASP “Threat Modeling” by Martin Knobloch - https://www.owasp.org/images/c/cf/OWASP-BeNeLux_2010_ThreatModeling.pdf

3.   John Steven, Citical (OWASP presentations, various works)
THANK YOU

Más contenido relacionado

La actualidad más candente

Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingMarco Morana
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementPriyanka Aash
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat ModelingDanny Wong
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingPriyanka Aash
 
Rapid Threat Modeling Techniques
Rapid Threat Modeling TechniquesRapid Threat Modeling Techniques
Rapid Threat Modeling TechniquesPriyanka Aash
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Rafal Los
 
Threat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security RiskThreat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security RiskSecurity Innovation
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And AnalysisLalit Kale
 
5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)Michael Man
 
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best PracticesSource Conference
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scalePriyanka Aash
 
Threat modeling demystified
Threat modeling demystifiedThreat modeling demystified
Threat modeling demystifiedPriyanka Aash
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNorth Texas Chapter of the ISSA
 
Security Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementSecurity Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementMarco Morana
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case studyAntonio Fontes
 
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...EC-Council
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling EverythingAnne Oikarinen
 
Mobile application security and threat modeling
Mobile application security and threat modelingMobile application security and threat modeling
Mobile application security and threat modelingShantanu Mitra
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular usersGeoffrey Vaughan
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security ResilienceJoel Aleburu
 

La actualidad más candente (20)

Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio Management
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
 
Rapid Threat Modeling Techniques
Rapid Threat Modeling TechniquesRapid Threat Modeling Techniques
Rapid Threat Modeling Techniques
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."
 
Threat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security RiskThreat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security Risk
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And Analysis
 
5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)
 
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best Practices
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
 
Threat modeling demystified
Threat modeling demystifiedThreat modeling demystified
Threat modeling demystified
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
 
Security Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementSecurity Compliance Web Application Risk Management
Security Compliance Web Application Risk Management
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case study
 
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
 
Mobile application security and threat modeling
Mobile application security and threat modelingMobile application security and threat modeling
Mobile application security and threat modeling
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 

Similar a Threat modeling the security of the enterprise

PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeDenim Group
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityLarry Ball
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
5 step plan to securing your APIs
5 step plan to securing your APIs5 step plan to securing your APIs
5 step plan to securing your APIs💻 Javier Garza
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsTim Mackey
 
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis PresentationGRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentationrclark004
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksImperva
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingClinton DSouza
 
Maturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOpsMaturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOpsAmazon Web Services
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsAmazon Web Services
 

Similar a Threat modeling the security of the enterprise (20)

PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security Knowledge
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application Security
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
5 step plan to securing your APIs
5 step plan to securing your APIs5 step plan to securing your APIs
5 step plan to securing your APIs
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis PresentationGRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
How to produce more secure web apps
How to produce more secure web appsHow to produce more secure web apps
How to produce more secure web apps
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computing
 
Maturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOpsMaturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOps
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 

Más de Rafal Los

The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfThe 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfRafal Los
 
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityIrrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityRafal Los
 
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)Rafal Los
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Rafal Los
 
Lies, Fables and Security Metrics
Lies, Fables and Security MetricsLies, Fables and Security Metrics
Lies, Fables and Security MetricsRafal Los
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning warsRafal Los
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013Rafal Los
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Rafal Los
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Rafal Los
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rafal Los
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Rafal Los
 
Making Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessMaking Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessRafal Los
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationRafal Los
 
Ultimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelUltimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelRafal Los
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Rafal Los
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Rafal Los
 
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2Rafal Los
 
Sans Feb 2010 - When Web 2 0 Attacks v3.3
Sans Feb 2010 - When Web 2 0 Attacks v3.3Sans Feb 2010 - When Web 2 0 Attacks v3.3
Sans Feb 2010 - When Web 2 0 Attacks v3.3Rafal Los
 
StarWest 2009 - Detective Work For Testers: Finding Workflow Based Defects
StarWest 2009 - Detective Work For Testers: Finding Workflow Based DefectsStarWest 2009 - Detective Work For Testers: Finding Workflow Based Defects
StarWest 2009 - Detective Work For Testers: Finding Workflow Based DefectsRafal Los
 
SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!Rafal Los
 

Más de Rafal Los (20)

The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfThe 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
 
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityIrrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
 
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
 
Lies, Fables and Security Metrics
Lies, Fables and Security MetricsLies, Fables and Security Metrics
Lies, Fables and Security Metrics
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning wars
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
 
Making Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessMaking Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in Business
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with Automation
 
Ultimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelUltimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI Model
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)
 
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
Magic Numbers - 5 KPIs for Measuring SSA Program Success v1.3.2
 
Sans Feb 2010 - When Web 2 0 Attacks v3.3
Sans Feb 2010 - When Web 2 0 Attacks v3.3Sans Feb 2010 - When Web 2 0 Attacks v3.3
Sans Feb 2010 - When Web 2 0 Attacks v3.3
 
StarWest 2009 - Detective Work For Testers: Finding Workflow Based Defects
StarWest 2009 - Detective Work For Testers: Finding Workflow Based DefectsStarWest 2009 - Detective Work For Testers: Finding Workflow Based Defects
StarWest 2009 - Detective Work For Testers: Finding Workflow Based Defects
 
SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!
 

Último

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Threat modeling the security of the enterprise

  • 1. Threat Modeling the Security of Your Enterprise How not to panic all the time Rafal M. Los Enterprise & Cloud Security Strategist ©2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
  • 4. What is threat modeling? “Threat modeling is a procedure for optimizing security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system.” -- http://searchsecurity.techtarget.com/definition/threat-modeling
  • 5. What is threat modeling? What is this asset? What are all the ways that it can be attacked? …how can I effectively protect it from exploit? …and if it gets successfully exploited, what does that …and how does it affect mean? these other assets?
  • 6. Why learn threat modeling? In order to enact effective strategies to protect the most critical assets and systems, we first need to understand how they will be potentially abused, or attacked. If you cannot understand a system, you cannot defend it.
  • 7. The Problem Poor visibility • Where are logically and physically critical processes, data, and systems? • How are critical systems, networks, and applications connected? 7 Enterprise Security – HP Confidential
  • 8. The Problem Limited insight • What is the difference between a legitimate transaction, and an attack … or fraud? • How does an event in one system impact others? 8 Enterprise Security – HP Confidential
  • 9. Benefits of Threat Modeling • Gain understanding of real attack surface of enterprise assets • Identify inter-connectedness of systems, applications, etc • Plot attack scenarios based on probability, impact, connectedness • Gain comprehensive understanding of real exploit impact 9 Enterprise Security – HP Confidential
  • 11. When to Use Threat Modeling • designing a threat mitigation for a system, application, or asset • desire to understand how a compromised component can impact others • security testing a component with limited time • demonstrating inter-dependence of various enterprise components • comprehending failure modes and risk scoring 11 Enterprise Security – HP Confidential
  • 12. Approaches to Threat Modeling • Attacker-centric – Start with attacker, evaluate their goals, methods and means – Completely centered around the „actor‟ in the attack • System-centric – Start with a system, architecture, or software and define ways in which it can be attacked – Build out system (or software, etc) map then define exposures, ways to attack system • Asset-centric – Start with assets entrusted to a system such as data – Understand how assets relate to a system, move within a system Source: Wikipedia[1] 12 Enterprise Security – HP Confidential
  • 13. High Level Threat Modeling Steps 1. Understand the target 2. Model the target 3. Identify threats to the target 4. Determine exploit impact 5. Perform risk-based scoring 6. Determine counter-measures, re-model 13 Enterprise Security – HP Confidential
  • 14. The Basic Threat Model Threat: Target: Vector: The attack System or The method agent or asset under of the attack potential attack risk 14 Enterprise Security – HP Confidential
  • 15. 3 Things to Remember Things you must remember when threat modeling 1. Spend enough time understanding your target – Be thorough in evaluating the target‟s requirements and goals – Evaluate how your target is connected to other potential pieces 2. Don‟t miss relationships – Systems, applications, threats all have relationships which may be relevant – Follow processes, data flows, to their logical „dead end‟ 3. Dig deep into the details – The more details present the more complete, accurate the threat model is – Balance completeness vs. getting lost in the details 15 Enterprise Security – HP Confidential
  • 17. Important Preparation Select the appropriate approach Attacker-Centric System-Centric Asset-Centric Ideal for: Ideal for: Ideal for: • understanding an attacker • modeling complex system • defending specific assets • setting up penetration test • modeling applications • assessing public systems • when threat actor is known • attacking business with private data processes Strengths: Strengths: Strengths: • motivations often drive attack • ability to see complex • focuses on the most basic strategy at all levels relationships in system component, the asset Weaknesses: Weaknesses: Weaknesses: • often impossible to fully • requires a tremendous • potential to miss system- understand attacker amount of effort level mitigations, defenses 17 Enterprise Security – HP Confidential
  • 18. Practical: Building a Threat Model • Building a threat model against an enterprise application • Taking the most appropriate approach for the requirement • Start with basic information, build knowledge • Utilize failure mode analysis, risk scoring • Derive weaknesses in system, create defensive strategy 18 Enterprise Security – HP Confidential
  • 19. Understanding the Target Component Notes “External” web interface • Exposed to the Internet External • Written in Flash App • Mixed content • SSL-required “Internal” customer • Protected content representative interface • Written in Java • Access multiple customer data Mobile application • Mixed content Mobile • iOS and Android OS App • Encrypted https Automated API for 3rd • REST-based API party access • Access basic sensitive 3rd Party information API • Certificate-based access 19 Enterprise Security – HP Confidential
  • 20. Model the Target – Iteration 1 JavaScrip t Adobe Flash Web MS MQ Browser MS SQL Serve r WebSpher Web e App Server Browser Applet Webkit/ Safari JavaScrip t iOS REST 3rd Party Web Service UNTRUSTED TRUSTED 20 Enterprise Security – HP Confidential
  • 21. Model the Target – Iteration 2 JavaScrip t Adobe Flash Web MS MQ Google Browser MS SQL Serve r Gears WebSpher Web e App Server Browser Applet Webkit/ Safari JavaScrip t iOS Oracle REST 3rd Party Web CS R Service mySQL UNTRUSTED TRUSTED 21 Enterprise Security – HP Confidential
  • 22. Model the Target – Iteration 3 JavaScrip SQLit t e Adobe Flash Web MS MQ Google Browser MS SQL Serve r Gears SQLit e WebSpher Web e App Server Browser Applet SQLit Webkit/ e Safari JavaScrip t iOS Oracle REST 3rd Party Web CS R Service mySQL UNTRUSTED TRUSTED 22 Enterprise Security – HP Confidential
  • 23. Identify Threats to the Target 1 JavaScrip SQLit t e 2 Adobe Flash Web MS MQ Google Browser MS SQL 3 Serve r Attack local Gears 1 database of external SQLit e user WebSpher Web 2 Attack Flash client of e App external user Server Browser Applet Attack main SQLit application db Webkit/ e 3 4 through SQL Safari JavaScrip t iOS injection Oracle Attack secondary application db REST 4 3rd Party through SQL Web CS injection R Service 5 … mySQL UNTRUSTED TRUSTED 23 Enterprise Security – HP Confidential
  • 24. Identify Threats to the Target Item Attack Description Effectiveness Difficulty 1 Attack local cache/database of external user Medium High 2 Exploit flash client of external user High Medium Attack main application database through SQL 3 High Low injection Attack secondary application database through 4 High Low SQL injection 5 … … … 24 Enterprise Security – HP Confidential
  • 25. Determine Exploit Impact JavaScrip t SQLit e Focus on one Adobe Flash Web MS MQ attack at a time. Google Browser MS SQL Serve r Gears SQLit e If #4 is successful WebSpher Web (penetrate secondary e App Server Browser database) what can SQLit Applet the exploit impact be? Webkit/ e 4 Safari JavaScrip t iOS Oracle REST 3rd Party Web CS R Service mySQL UNTRUSTED TRUSTED 25 Enterprise Security – HP Confidential
  • 26. Determine Exploit Impact JavaScrip t SQLit e Relationships Adobe Flash Web MS MQ help us visualize Google Browser MS SQL Serve Gears r the impact of a SQLit e successful exploit WebSpher Web on any given e App Server Browser Applet component. SQLit Webkit/ e 4 Safari JavaScrip t iOS Oracle REST 3rd Party Web CS R Service mySQL UNTRUSTED TRUSTED 26 Enterprise Security – HP Confidential
  • 27. Perform Risk-Based Scoring Score each threat scenario based on – Criticality – Likelihood – Difficulty – Impact Create matrix called a “Failure Mode Analysis” – Assign numerical values to modifiers for analysis – Compute mathematical risk impact for objective analysis 27 Enterprise Security – HP Confidential
  • 28. Sample Failure Mode Analysis Matrix Criticality Likelihood Exploitability Impact Threat Scenario Total Local cache (db) 1 1 1 1 4 Flash client 4 4 9 4 21 High = 9 Medium = 4 Primary SQL Injection 9 9 9 9 36 Low = 1 Secondary SQL 9 9 9 4 31 Injection 28 Enterprise Security – HP Confidential
  • 29. Determine Counter-Measures Mathematical, objective analysis will determine countermeasures Most critical failures modes aren‟t always obvious Most critical failure modes aren‟t always most complex or difficult to protect Counter-measures should be appropriate to the threat criticality …after formulating counter-measures, re-run threat scenario to validate. 29 Enterprise Security – HP Confidential
  • 31. Prior work … 1. Wikipedia - http://en.wikipedia.org/wiki/Threat_model 2. OWASP “Threat Modeling” by Martin Knobloch - https://www.owasp.org/images/c/cf/OWASP-BeNeLux_2010_ThreatModeling.pdf 3. John Steven, Citical (OWASP presentations, various works)