SlideShare una empresa de Scribd logo
1 de 72
Descargar para leer sin conexión
Inside  Cisco's  Product  Security  
Incident  Response  Team  (PSIRT)  
Alexey  Lukatsky
Business  Security  Consultant,  Cisco  GSSO
alukatsk@cisco.com
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
На  этом  можно  было  бы  и  закончить
2
«Их  практика  работы  направлена  на  то,  
чтобы  шантажировать  заказчика  и  
покупателя.  Они  вывешивают  в  открытом  
доступе  систему  своих  уязвимостей  и  
говорят  — коллеги,  если  вы  хотите,  чтобы  
эти  уязвимости  не  были  использованы,  
заплатите  нам  за  поддержку  и  мы  их  
устраним»
Помощник  президента  России  Игорь  Щеголев
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Agenda
• Introduction
• PSIRT’s  Mission  Process  and  Engagement
• Vulnerability  Management  Process
• Customer  Expectations
• PSIRT  Publications  and  Triage
• Cisco  Security  Development  Lifecycle  (CSDL)
• New  Trends  in  Vulnerability  Management
• Case  Studies
• Security  Automation  &  Cisco’s  Machine  Readable  Content
• Conclusion
3
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Introduction
4
The  Cisco  PSIRT  is  a  dedicated,  global  team  that  manages  
the  receipt,  investigation,  and  public  reporting  of  security  
vulnerability  information  that  is  related  to  Cisco  products  
and  networks.
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Security  Research  &  Operations  (SR&O)
5
PSIRT
IntelliShield
Applied  
Security  
Research
IPS  Signature  
Team
Applied  Security  
Intelligence
SIO  Portal
Security  Technology  
Assessment  Team  
(STAT)
Security  Blog
ASIG
Talos
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
PSIRT’s  Mission
• Global  team  assisting  customers  with  the  ongoing  security  of  their  networks  
through  identification,  resolution  and  prevention  of  vulnerabilities  in  Cisco  
products  and  industry-­wide  vulnerabilities.
PROTECT  CUSTOMERS  AND  PROTECT  CISCO
6
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
PSIRT’s  Mission  (continued).
Single  point  of  contact  for  receiving  and  resolving  
internal  and  external  reports  of  vulnerabilities  in  all  
Cisco  products  since  1995.
7
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
When  Does  PSIRT  Engage?
• Cisco  products  likely  to  be  affected,  but  
not  always
• Maintenance  contract  not  necessary
• Customer  requests  PSIRT  involvement
• Support  engineer  feels  attack  is  new  or  
unknown  or  escalation  is  required
• Caller  is  a  member  of  external  incident  
response  team
• Law  enforcement  is  already  involved
8
PSIRT’s  PUBLICATIONS
9
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
PSIRT’s  Publications
PSIRT  creates  and  publishes:
Cisco  Security  Advisories,  Notices,  
and  Responses
Fair  public  disclosure:  everyone  notified  
at  the  same  time.
www.cisco.com/go/psirt
www.cisco.com/security
10
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
The  following  table  summarizes  the  methods  used  by  Cisco  to  notify  customers  
about  the  security  vulnerabilities  and  other  security  information.
Email SIO  Portal RSS CNS Bug  Search  Tool
Security  Advisories Yes Yes Yes Yes Yes
Security Notices No Yes Yes No Yes
Security  Response Yes Yes Yes Yes Yes
Cisco  Event  Responses No Yes Yes No No
Threat  Outbreak  Alerts  /  IntelliShield Alerts No Yes Yes No No
Release  Note  Enclosures No No No No Yes
11
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
Cisco  uses  the  following  CVSS  guidelines  when  determining  which  security  
publication  will  include  a  particular  vulnerability:
Publication CVSS  Score
Cisco  Security  Advisory   7.0  – 10.0
Cisco  Security  Notice   4.0  – 6.9
Bug  Release  Note  Enclosure 0.1  – 3.9
Cisco  Security  Responses  address  issues  
that  require  a  response  to  information  
discussed  in  a  public  forum,  such  as  a  blog  or  
discussion  list.  The  responses  are  normally  
published  if  a  third  party  makes  a  public  
statement  about  a  Cisco  product  vulnerability.
12
INDUSTRY  LEADERSHIP  &  
COLLABORATION
13
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
PSIRT’s  Security  Community  Engagement
Coordination  as  required  with  external  agencies  (CERT/CC,  CPNI,  etc.)
14
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
PSIRT’s  Security  Community  Engagement
Represents  Cisco  in  the  incident  response  and  security  communities.
Cisco  is  a  founding  member  of  the  Industry  Consortium  for  
Advancement  of  Security  on  the  Internet  (ICASI)  enhances  
the  global  security  landscape  by  driving  excellence  and  
innovation  in  security  response  practices,  and  by  enabling  its  
members  to  proactively  collaborate  to  analyze,  mitigate,  and  
resolve  multi-­vendor,  global  security  challenges.
15
PSIRT’s  PROCESS
16
PSIRT  Collaborates  With  Experts  Across  Cisco
Many  other  
teams
Technology  Groups
product  experts
Technical  
Assistance  Center
support  experts
Legal  &  Public  
Relations
Advanced  Services
high  touch  support  
experts
Security  Research  &  
Operations
Security  Experts
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
PSIRT  Scope:  More  Than  Vulnerability  Handling  
• Provide  security  expertise  to  Cisco’s  product  development  and  testing  
organizations
• Deliver  security  training  and  education,  internally  and  externally
• Share  best  practices  in  industry  through  customer  forums,  executive  briefings,  
security  conferences,  and  cisco.com  content  
• Mentor  others  building  vulnerability  handling  capabilities  to  strengthen  collective  
response
19
Cisco  Security  Development  Lifecycle  (CSDL)
20
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Cisco  Secure  Development  Lifecycle  (CSDL)
Why  Security  is  Good  Business  Sense:
• Reduced  cost  of  fixing  bugs
• Remove  expense  and  pain  of  changing  
security  architecture
• Reduces  TTM  (time  to  market)  over  time
• Day-­one  advantage  over  our  less  security  
savvy  competitors
• Improve  customer  satisfaction
• Lower  PSIRT  and  customer  cases
Perform  GAP
Analysis
Prevent
Security
Attacks
Detect
Security
Defects
Validate
Requirements
and   Resiliency
Identify  and
Address
Security
Threats
Register  
and   Update  
3rd
Party
Software
21
CASE  STUDY  1  -­ HEARTBLEED
22
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public 23
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
What  is  Heartbleed?
• If  the  specified  heartbeat  request  length  is  larger  than  its  actual  length,  this  
memcpy()  will  read  memory  past  the  request  buffer  and  store  it  in  the  response  
buffer  which  is  sent  to  the  attacker
• OpenSSL1.0.1  – 1.0.1f  are  vulnerable
• Bug  was  introduced  in  December  2011 but  not  found/disclosed  until  April  
2014
– OpenSSL  is  used  by  2/3  of  Internet  web  servers  and  many  products
• Approximate  534,156  services  are  vulnerable
• Cisco  was  one  of  the  first  security  companies  to  provide  IPS  coverage
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Background
• Exploitation  Allows  Access  to  Device  Memory  Contents
• Attackers  could  potentially  extract  sensitive  information
• Cryptographic  keys  and  certificates  are  of  particular  concern
• Impact  of  Exploitation  Depends  on  Multiple  Factors
• Role  of  affected  device  in  the  network
• How  OpenSSL  is  used  on  the  device
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Cisco’s  Response
• Announced  Publicly  on  April  7th  2014
• No  industry  coordination;;  vulnerability  was  disclosed  before  
vendors  were  informed
• Cisco  PSIRT  Coordinating  Response  and  Investigation
• Cisco  Security  Advisory  published  April  9th
• Cisco  among  the  first  vendors  to  respond
• Initial  focus  on  accurate  listing  of  Cisco  products  and  services
• Updated  daily  as  new  information  is  discovered
• Detection  and  Mitigation  Strategies  Include:
• Cisco  Sourcefire  and  Cisco  IPS  signatures  are  available
• Technology-­specific  guidance  and  best  practices
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Security  Impact
• Bigger  than  443
• Any  SSL  service  is  being  targeted  
• Most  prominent  sites  have  already  patched
• Many,  many,  smaller  sites  are  not  patched…
• Worst  case:  Private  keys,  credentials  and  more  leaked
• Hijacked  accounts  -­>  more  exploit  kits
• Embedded  devices  are  unlikely  to  patch
• May  enable  lateral  movement
• Without  security  monitoring  there  is  no  real  way  to  know  if  you  were  exploited
• The  client  side  attack  is  also  concerning
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Services  Being  Targeted
Destination  Port/ICMP  Code
465  (smtps)/tcp
995  (pop3s)/tcp
993  (imaps)/tcp
443  (https)/tcp
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Cisco  Product  Impact
• Cisco  Impact  Varies  per  Product/Service
• PSIRT  assumes  worst-­case  in  product  assessment
• Deployment  architecture  may  significantly  reduce  “real”  risk
• Potential  Exposure  of  Critical  Data
• Remediation  Steps
• Upgrade  to  a  fixed  version  of  software
• Reissue  cryptographic  keys  and  certificates
• Force  password  resets
• Detection
• IPS  can  detect  and  block  attack  attempts
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
High-­Level  Assessment  of  Potential  Exposure
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Step  1:  
Identify  the  vulnerable  SSL/TLS  product  or  software  
• One  method  of  determining  vulnerable  devices  is  through  vendor  security  
advisories.  For  example,  Cisco’s  OpenSSL  Heartbeat  Extension  Vulnerability  in  
Multiple  Cisco  Products  security  advisory
• An  alternate  method  of  identifying  vulnerabilities  is  through  the  utilization  of  
specifically  designed  tools.  Examples:
• Clients:  pacemaker  https://github.com/Lekensteyn/pacemaker
• Web-­based  tools:  https://filippo.io/Heartbleed/
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Step  2:  
Identify  the affected  features
• It  is  important  to  know  which  product  feature  is  impacted.  
• If  a  product  were  only  vulnerable  when  using  feature  X,  it  would  mean  that  
it  is  not  vulnerable  when  the  feature  is  not  in  use.  
• Note:  Administrators  should  note  that  devices  that  have  SSH  (not  a  TLS  
feature)  enabled  are  not  affected  by  this  vulnerability.
BUG
FEATURE
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Additional  Steps
• Is  the  client  connecting  to  pre-­determined/trusted  or  unpredictable/untrusted  
servers?
• Pre-­determined/trusted  servers
• Unpredictable/untrusted  servers
(i.e.,  a  browser  which  is  connecting  to  any  random  website)
• Can  you  verify  with  certainty  that  the  vulnerable  product  is  using  process  
memory  separation?
• Is  the  client  authenticated  by  the  server?
• Is  the  vulnerable  server  feature  accessible  from  untrusted  networks?
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Vulnerable  Server  Remediation  Options
• Apply  patch  from  software  vendor
• To  protect  against  the  Heartbleed  vulnerability,  the  vulnerable  server  would  
need  to  be  upgraded  or  recompiled  
• The  latest  OpenSSL  fixed  version  1.0.1g  or  newer  should  be  used  
• If  it  is  not  possible  to  upgrade  to  the  fixed  release  of  OpenSSL,  vulnerable  
software  can  be  recompiled  linking  to  OpenSSL  with  the  handshake  removed  from  
the  code  by  compile  time  option  
-­DOPENSSL_NO_HEARTBEATS
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Coverage
• Sourcefire  IPS
• 30510  -­ 30513  inbound  connection  attempts  beyond  a  normal  threshold
• 30514  -­ 30517  large  outbound  heartbeat  responses  (successful  exploitation)
• 30520  -­ 30525  outbound  vulnerable  client  traffic
• Cisco  Legacy  IPS
• 4187-­3  -­ inbound  connection  attempts  beyond  a  normal  threshold
• 4187-­4  -­ large  outbound  heartbeat  responses  (successful  exploitation)/outbound  
vulnerable  client  traffic
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Online  Resources
Cisco  Security  Portal:
• Security  Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-­sa-­20140409-­
heartbleed
• Event  Response  Page
http://www.cisco.com/web/about/security/intelligence/ERP-­Heartbleed.html
• IntelliShield   Alert
http://tools.cisco.com/security/center/viewThreatOutbreakAlert.x?alertId=33695
Blog  Posts  including  Mitigation,  Detection  and  Best  Practices:
• http://blogs.cisco.com/security/openssl-­heartbleed-­vulnerability-­cve-­2014-­0160-­cisco-­products-­and-­
mitigations
• http://vrt-­blog.snort.org/2014/04/heartbleed-­memory-­disclosure-­upgrade.html
• http://blogs.cisco.com/security/heartbleed-­transparency-­for-­our-­customers/
Cisco  Security  and  Services:
• http://www.cisco.com/go/security
• http://www.cisco.com/c/en/us/products/security/service-­listing.html
CASE  STUDY  2  – SPECIALIZED  &  CUSTOM  
MALWARE  IN  INFRASTRUCTURE  DEVICES
37
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
New  Threat  Landscape
• Targeted  attacks  and  custom  malware  against  infrastructure  devices  (routers,  
switches,  etc.)
• These  attacks  go  undetected  for  a  longer  time  than  traditional  attacks  
Infrastructure  Devices
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
History
• Theoretical  Research  in  2005-­2006  (FX  &  Mike  Lynn)
• Recent  incidents  (2013  &  2014)
– Custom  malware  to  change  infrastructure  device  configurations
– Remote  code  execution
– Persistent  attacks
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Custom  Malware
• Malware  is  software  created  to  modify  a  device's  behavior  for  the  benefit  of  a  
malicious  third  party  (attacker).  
• One  of  the  characteristics  of  effective  malware  is  that  it  can  run  on  a  device  
stealthily  in  privileged  mode.  
• Malware  is  usually  designed  to  monitor  and  exfiltrate information  from  the  
operating  system  on  which  it  is  running  without  being  detected.  
• Potentially  sophisticated  Cisco  IOS  malware  would  attempt  to  hide  its  presence  
by  modifying  Cisco  IOS  command  output  that  would  reveal  information  about  it.
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Context:  Malware  seen  targeting  IOS  Classic
http://blogs.cisco.com/security/evolution-­of-­attacks-­on-­cisco-­ios-­devices
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Infrastructure  Device  Infection
On  Cisco  devices  running  Cisco  IOS  Software,  a  limited  number  of  infection  
methods  are  available  to  malware.  Malicious  software  in  Cisco  IOS  Software  may  
be  introduced  in  the  following  ways:
• By  altering  the  software  image  stored  on  the  onboard  device  file  system.  These  
types  of  malware  would  be  persistent  and  would  remain  after  a  reboot.
• By  tampering  with  Cisco  IOS  memory  during  run  time.  In  this  case,  the  malware  
is  not  persistent  and  a  reload  will  restore  the  Cisco  IOS  device  to  a  clean  state  
booted  from  the  image  stored  in  the  flash.
• By  modifying  the  ROM  monitor  on  systems  with  flash-­based  ROM  monitor  
storage.
• By  a  combination  of  some  or  all  of  the  preceding  mechanisms
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Attack  Methods
• Some  Cisco  IOS  devices  offer  a  limited  set  of  commands  that  are  intended  to  be  
used  by  Cisco  Technical  Assistance  Center  (TAC)  engineers  during  the  process  
of  troubleshooting  a  technical  problem.  Such  advanced  troubleshooting  and  
diagnostic  commands  require  privileged  EXEC  level  and  require  valid  
credentials  to  execute.  Thus,  these  commands  could  be  an  area  that  attackers  
can  focus  on  to  identify  ways  to  run  malicious  software  in  Cisco  IOS.
• It  is  important  to  note  that  not  all  Cisco  IOS  platforms  offer  advanced  diagnostic  
commands.  Of  the  platforms  that  do,  only  a  very  limited  set  of  such  commands  
is  usually  available.  Additionally,  to  run  these  commands,  a  user  needs  
administrative  access  to  the  device.  Thus,  following  common  authentication  and  
command  authorization  security  best  practices  will  help  prevent  a  malicious  user  
from  even  attempting  to  install  malicious  software  in  Cisco  IOS  Software.  
Commands
43
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Attack  Methods  (cont.)
• It  is  possible  that  an  attacker  could  insert  malicious  code  into  a  Cisco  IOS  
Software  image  and  load  it  onto  a  Cisco  device  that  supports  the  image.  
• This  attack  scenario  applies  to  any  computing  device  that  loads  its  operating  
system  from  an  external,  writable  device.  
• Even  though  such  a  scenario  is  not  impossible,  there  are  image  verification  
techniques,  discussed  in  the  Cisco  IOS  Image  File  Verification  section  of  this  
document  that  could  prevent  the  router  from  loading  such  an  image.
Manipulating  Cisco  IOS  Images
44
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Attack  Methods  (cont.)
• As  with  every  operating  system,  there  is  a  possibility  that  a  vulnerability  could  
exist  in  Cisco  IOS  Software  that,  under  certain  conditions,  could  allow  malicious  
code  execution.  
• An  attacker  who  exploited  the  vulnerability  would  install  or  run  malicious  code  in  
Cisco  IOS  Software,  which  could  then  be  used  to  take  malicious  action,  such  as  
modifying  device  behaviors  or  exfiltrating information.  
• PSIRT  identifies,  manages,  and  releases  all  vulnerabilities  in  and  fixes  for  Cisco  
products.  
• Any  vulnerability  that  Cisco  is  made  aware  of  is  investigated  and  released  in  
accordance  with  the  Cisco  vulnerability  disclosure  policy.
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
Vulnerabilities
45
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Identification  Techniques
MD5  hash  calculation  and  verification  using  the  
MD5  File  Validation  feature  can  be  accomplished  
using  the  following  command:
verify /md5 filesystem:filename [md5-hash]
Network  administrators  can  use  the  verify  /md5  
privileged  EXEC  command  to  verify  the  integrity  of  
image  files  that  are  stored  on  the  Cisco  IOS  file  
system  of  a  device.  The  following  example  shows  
how  to  use  the  verify  /md5  command  on  a  Cisco  
IOS  device:
R1# verify /md5 sup-bootdisk:c7600rsp72043-
advipservicesk9-mz.151-3.S3
.....<output truncated>.....Done!
verify /md5 (sup-bootdisk:c7600rsp72043-
advipservicesk9-mz.151-3.S3) =
e383bf779e137367839593efa8f0f725
Using  the  Message  Digest  5  File  Validation  Feature
46
Network  administrators  can  also  provide  an  MD5  hash  to  
the  verify  command.  If  the  hash  is  provided,  the  verify  
command  will  compare  the  calculated  and  provided  MD5  
hashes  as  illustrated  in  the  following  example:
R1# verify /md5 sup-bootdisk:c7600rsp72043-
advipservicesk9-mz.151-3.S3
e383bf779e137367839593efa8f0f725
.....<output truncated>.....Done!
Verified (sup-bootdisk:c7600rsp72043-
advipservicesk9-mz.151-3.S3) =
e383bf779e137367839593efa8f0f725
router#
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Identification  Techniques
Cisco  IOS  Software  image  file  verification  using  this  feature  can  be  accomplished  using  the  following  
commands:
file verify auto
copy [/erase] [/verify | /noverify] source-url destination-url
reload [warm] [/verify | /noverify] [text | in time [text] | at time [text] | cancel
The  following  example  shows  how  to  configure  the  file  verify  auto  Cisco  IOS  feature:
router# configure terminal
router(config)# file verify auto
router(config)# exit
router#
Using  the  Image  Verification  Feature
47
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Identification  Techniques
Network  administrators  can  also  verify  the  integrity  of  the  run-­time  memory  of  Cisco  IOS.  
The  best  way  to  verify  the  integrity  of  run-­time  memory  for  IOS  is  to  analyze  the  region  of  memory  
called  “main:text.”
The  main:text section  contains  the  actual  executable  code  for  Cisco  IOS  Software  after  it  is  loaded  in  
memory.  As  such,  verifying  its  integrity  is  particularly  relevant  for  detecting  in-­memory  tampering.  This  
region  of  memory  should  not  change  during  normal  Cisco  IOS  Software  operation,  and  should  be  the  
same  across  reloads.
Because  this  region  of  memory  holds  the  actual  operating  system  code,  it  should  not  change  between  
devices  as  long  as  they  are  the  same  model  and  running  the  same  release  number  and  feature  set.  
However,  if  the  Cisco  IOS  release  in  use  is  ASLR  enabled,  these  assumptions  become  invalid.  A  side  
effect  of  ASLR  is  changing  some  parts  of  the  operating  system  code.  This  means  the  memory  contents  
will  be  different  across  devices,  even  if  they  are  running  the  same  operating  system  release  and  feature  
set.  
http://www.cisco.com/web/about/security/intelligence/integrity-­assurance.html
Cisco  IOS  Run-­Time  Memory  Integrity  Verification
48
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Additional  Indicators  of  Compromise
The  presence  of  the  following  commands  should  trigger  further  investigation.  The  asterisk  symbol  *  
indicates  any  text  that  follows  the  command  itself.
gdb *
test *
tlcsh *
service internal
attach *
remote *
ipc-con *
if-con *
execute-on *
show region
show memory *
show platform *
do-exec version of any of the above
Check  logs  for  the  presence  of  “unusual”  commands
49
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Additional  Indicators  of  Compromise  (cont.)
Cisco  IOS  devices  support  exporting  the  contents  of  the  running  memory.  After  the  export,  comparisons  
between  the  running  memory  dump,  also  called  core  dump,  and  the  associated  sections  in  the  Cisco  IOS  
image  file  can  be  performed  to  detect  modification  of  the  run-­time  memory  contents.
Most  Cisco  IOS  releases  support  a  memory  dump  via  the  write  core  command.  
The  following  example  shows  how  to  search  suspicious  commands  captured  in  a  core  dump  file  by  
using  the  Linux  utility  string:
$ strings <CORE> |grep ^CMD:
CMD: 'verify /md5 system:memory/text' 06:59:50 UTC Wed Jan 15 2014
CMD: 'service internal | i exce' 07:02:41 UTC Wed Jan 15 2014
CMD: 'conf t' 07:02:45 UTC Wed Jan 15 2014
CMD: 'exception flash procmem bootflash:' 07:02:54 UTC Wed Jan 15 2014
CMD: 'exception core-file CORE compress ' 07:03:31 UTC Wed Jan 15 2014
Checking  Command  History  in  the  Cisco  IOS  Core  Dump
50
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Resources
• This  document  analyzes  injection  of  malicious  software  in  Cisco  IOS  Software  
and  describes  ways  to  verify  that  the  software  on  a  Cisco  router,  both  in  device  
storage  and  in  running  memory,  has  not  been  modified.  
• Additionally,  the  document  presents  common  best  practices  that  can  aid  in  
protecting  against  attempts  to  inject  malicious  software  (also  referred  to  as  
malware)  in  a  Cisco  IOS  device.  
http://www.cisco.com/web/about/security/intelligence/integrity-­assurance.html
SECURITY  AUTOMATION  &  CISCO  
MACHINE  READABLE  CONTENT
52
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Robust	
  support	
  for	
  relevant	
  
standards	
  to	
  ensure	
  multi-­‐layer	
  
interoperability
EMERGING	
  TECHNOLOGIES
Completely	
  closed	
  solutions
EVOLVING	
  MATURITY MATURE	
  IMPLEMENTATIONS
Adoption	
  of	
  basic	
  interoperability	
  
standards
Security  Automation  Evolution
Industry’s  perception  of  the  security  automation  evolution
WE  ARE  HERE
PAST FUTURE
53
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
OVAL:	
  Cisco	
  IOS	
  Vulnerability	
  Assessment
• Cisco	
  PSIRT	
  is	
  including	
  Open	
  Vulnerability	
  and	
  
Assessment	
  Language	
  (OVAL)	
  definitions	
  in	
  
Cisco	
  IOS	
  security	
  advisories.
• OVAL	
  provides	
  a	
  structured	
  and	
  standard	
  
machine-­‐readable	
  content	
  that	
  allows	
  
customers	
  to	
  quickly	
  consume	
  security	
  
vulnerability	
  information	
  and	
  identify	
  affected	
  
devices.	
  
• OVAL	
  can	
  also	
  be	
  used	
  to	
  verify	
  that	
  the	
  
patches	
  or	
  fixes	
  that	
  resolve	
  such	
  vulnerabilities	
  
were	
  successfully	
  installed.
• OVAL	
  content	
  can	
  be	
  downloaded	
  from	
  each	
  
Cisco	
  IOS	
  security	
  advisories
Common	
  Vulnerability	
  Reporting	
  Framework	
  
(CVRF)
• In	
  addition	
  to	
  OVAL	
  definitions,	
  PSIRT	
  is	
  
also	
  publishing	
  CVRF	
  content	
  for	
  all	
  Cisco	
  
security	
  advisories.
• CVRF	
  allows	
  vendors	
  to	
  publish	
  security	
  
advisories	
  in	
  an	
  XML	
  (machine-­‐readable)	
  
format.	
  
• CVRF	
  has	
  been	
  designed	
  by	
  the	
  Industry	
  
Consortium	
  for	
  Advancement	
  of	
  Security	
  
on	
  the	
  Internet	
  (ICASI),	
  of	
  which	
  Cisco	
  is	
  a	
  
member	
  and	
  took	
  a	
  major	
  role	
  in	
  its	
  
development.
Vulnerability  Machine  Readable  Content
Cisco  is  committed  to  protect  customers  by  sharing  critical  
security-­related  information  in  different  formats.
54
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
CISCO  PSIRT  -­ PROTECTING  CISCO  CUSTOMERS
Cisco  is  committed  to  protect  customers  by  sharing  critical  
security-­related  information  in  different  formats.
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
More  information  at:  http://oval.mitre.org
Cisco  OVAL  White  Paper:  http://cs.co/90035hJ3
Introduction  to  OVAL
Open	
  Vulnerability	
  and	
  Assessment	
  Language	
  (OVAL)	
  -­‐ an	
  
international	
  community	
  standard	
  to	
  promote	
  open	
  and	
  
publicly	
  available	
  security	
  content	
  and	
  to	
  standardize	
  the	
  
transfer	
  of	
  this	
  information	
  in	
  security	
  tools	
  and	
  services.
OVAL	
  provides	
  a	
  structured	
  and	
  standard machine-­‐
readable	
  content	
  that	
  allows	
  customers	
  to	
  quickly	
  
consume	
  security	
  vulnerability	
  information	
  and	
  identify	
  
affected	
  devices.	
  
OVAL	
  can	
  also	
  be	
  used	
  to	
  verify	
  that	
  the	
  patches	
  or	
  fixes	
  
that	
  resolve	
  such	
  vulnerabilities	
  were	
  successfully	
  
installed.
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
CISCO  PSIRT  -­ PROTECTING  CISCO  CUSTOMERS
Security  Automation:  Cisco  IOS  OVAL  Content
• Cisco	
  PSIRT	
  is	
  creating	
  OVAL	
  content	
  
(“definitions”)	
  for	
  Cisco	
  IOS	
  security	
  
advisories.
• OVAL	
  content	
  can	
  be	
  downloaded	
  
from	
  each	
  Cisco	
  IOS	
  security	
  
advisory;	
  Cisco	
  Security	
  Event	
  
Response	
  Pages and	
  from	
  the	
  
following	
  link/repository:
http://tools.cisco.com/security/center/ovalListing.x
57
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
What  is  OVAL?
What  are  the  use  cases?
There  are  four  main  use  cases,  also  called  “classes,”  of  OVAL  definitions:
• Vulnerability: Determine  if  the  device  is  affected  by  a  given  vulnerability
• Compliance: Validate  a  device  configuration  against  a  known  or  approved  
valid  configurations  (i.e.,  best  practices)
• Inventory: Check  for  a  specific  version  of  software  installed  on  the  system
• Patches: Find  a  specific  patch  on  the  system
58
59
OVAL  Components
OVAL  
Definitions
•XML  files  that  are  
used  to  check  the  
presence  of  a  
vulnerability  or  a  
configuration  best  
practice.
OVAL  Schemas
•OVAL  definitions   are  
XML  documents;;  
thus  they  need  
schemas.
•The  purpose  of  an  
XML  Schema  is  to  
define  the  building  
blocks  of  an  XML  
document
•OVAL  XML  Schemas  
define  elements,  
attributes,  and  data  
types  that  are  part  of  
an  OVAL  definition
•Example:  how  OVAL  
checks  for  affected  
versions;;  different  
configurations  (i.e.,  
ACLs,  Interfaces,  
Routing  Protocols,  
etc.)
Authoring  Tool
•Cisco  created  
internal  tools  to  
support  the  creation  
of  IOS  vulnerability  
definitions
System  
Characteristics  
Producer
•Generates  and  
keeps  details  of  the  
system  being  
evaluated
•Examples:  jOVAL  
Definition   Interpreter,  
McAfee  Policy  
Auditor,  etc.
Definition  
Repository
•A  repository  of  OVAL  
Definitions  made  
available  to  the  
community  (free  or  
pay).
•Cisco  publishes  
OVAL  definitions   that  
can  be  downloaded  
from  each  IOS  
security  advisories.
Definition  
Evaluator
•A  product  that  uses  
an  OVAL  Definition  
to  guide  evaluation  
and  produces  OVAL  
Results  (full  results)  
as  output.
•Examples:  jOVAL
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Authoring  Tool
Definition  
Evaluator/Scanner
(openscap/jOVAL)
Definition  
Repository
OVAL  
Definition
OVAL  
Definition
OVAL    System  
Characteristics
OVAL  
Definition
Results
Consumer
OVAL  
Results
How  Everything  Works  Together…
High-­level
60
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Additional  OVAL  Schemas
Enhancements  and  New  Schemas
61
Cisco  Security  Research  and  Operations  (SR&O)  recently  
numerous  enhancements  to  the  Cisco IOS  OVAL  Schemata  and  
created  new  schemas  for:
• IOS-­XE
• Cisco  ASA
Example:  Assessing  an  IOS  device  using  
OVAL
62
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Topology
63
Machine  with  
jOVAL (OVAL  
Scanner)
R1:
172.18.122.246
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Technical  Details
Vulnerability  details  and  router  configuration
64
• CVE-­2012-­0381 addresses  a  vulnerability  that  affects  the  Cisco  IOS  
Software  Internet  Key  Exchange  (IKE)  implementation.  
• R1 is  configured  for  IPsec  and  it  is  running  an  affected  version.  
• The  following  is  an  excerpt  of  the  IPsec/IKE  configuration  of  R1:  
crypto isakmp policy 10
encr aes 256
authentication pre-share
!
crypto map test 10 ipsec-isakmp
set peer 10.10.10.10
match address 101
!
interface FastEthernet0/1
ip address 14.4.1.126 255.255.255.0
crypto map test
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
jOVAL Example
jOVAL Configuration  and  OVAL  Definition  Information
65
The  OVAL  definition  filename  is  cisco-­sa-­20120328-­ike-­CVE-­2012-­
0381_oval.xml and  it  resides  in  a  directory  called  DEFINITIONS.  
To  scan  R1,  the  jovaldi.bat  utility  was  used,  as  shown  in  the  following  example:
D:joval>jovaldi.bat -plugin remote -m -o DEFINITIONScisco-
sa-20120328-ike-CVE-2012-0381.xml
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
jOVAL Example
jOVAL Output
66
D:joval>jovaldi.bat -plugin remote -m -o DEFINITIONScisco-sa-20120328-ike-CVE-2012-0381.xml
… <output omitted for brevity>
** parsing D:jovalDEFINITIONScisco-sa-20120328-ike-CVE-2012-0381.xml
- validating xml schema.
** checking schema version
- Schema version - 5.10
** skipping Schematron validation
** creating a new OVAL System Characteristics file.
** gathering data for the OVAL definitions.
Collecting object: FINISHED
** saving data model to system-characteristics.xml.
** skipping Schematron validation
** running the OVAL Definition analysis.
Analyzing definition: FINISHED
** OVAL definition results.
OVAL Id Result
-------------------------------------------------------
oval:cisco.oval:def:13 true
-------------------------------------------------------
** finished evaluating OVAL definitions.
** saving OVAL results to results.xml.
** skipping Schematron validation
** running OVAL Results xsl: xmlresults_to_html.xsl.
True  =  device  is  vulnerable
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
HTML  Report
jOVAL Report  Example
67
True  =  device  is  vulnerable
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
HTML  Report
jOVAL Report  Example
68
In  the  following  example,  IPsec  was  
disabled  on  R1.  After  this  change,  the  
device  was  not  vulnerable.
False  =  device  is  not  vulnerable
©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public
Resources
Cisco’s  OVAL  and  CVRF  Resources
69
Resource Description Link
White Paper Details  of  the  SCAP  components,  as  well  as  step-­by-­step  
instructions  on  how  to  use  OVAL  content  with  available   open  
source  tools.
http://cs.co/9001V4vP
FAQ Published   to  help  answer  common  questions  related  to  Cisco’s  
OVAL  adoption.
http://cs.co/9004V4vr
Cisco  SIO
Portal
Early-­warning  intelligence,   threat  and  vulnerability  information,  
and  proven  Cisco  mitigation   solutions  to  help  customers  
protect  their  networks.
http://cisco.com/security
Security  Blog Cisco  Security  Blog   posts  providing information  about  OVAL,  
CVRF  and  security  automation.
http://cs.co/9000V4vE
http://cs.co/9009V4vD
Cisco’s  Security
Vulnerability  
Policy
Cisco’s  public  security  vulnerability  policy  including   information  
about  OVAL  and  CVRF  content.
http://cs.co/9008V4vM
Q&A
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алексей Лукацкий, бизнес-консультант по безопасности, Cisco Systems
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алексей Лукацкий, бизнес-консультант по безопасности, Cisco Systems

Más contenido relacionado

La actualidad más candente

Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshopArpan Raval
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise SecuritySplunk
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?manoharparakh
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Comment réussir un projet de supervision de sécurité #SIEM #Succès
Comment réussir un projet de supervision de sécurité #SIEM #SuccèsComment réussir un projet de supervision de sécurité #SIEM #Succès
Comment réussir un projet de supervision de sécurité #SIEM #SuccèsDavid Maillard
 

La actualidad más candente (20)

Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshop
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise Security
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Comment réussir un projet de supervision de sécurité #SIEM #Succès
Comment réussir un projet de supervision de sécurité #SIEM #SuccèsComment réussir un projet de supervision de sécurité #SIEM #Succès
Comment réussir un projet de supervision de sécurité #SIEM #Succès
 

Destacado

[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...bugcrowd
 
«Идентификация, аутентификация, авторизация – встроенные функции приложений и...
«Идентификация, аутентификация, авторизация – встроенные функции приложений и...«Идентификация, аутентификация, авторизация – встроенные функции приложений и...
«Идентификация, аутентификация, авторизация – встроенные функции приложений и...Mail.ru Group
 
«Практика Software Security в Сбертех», Дмитрий Янченко и Юрий Шабалин, экспе...
«Практика Software Security в Сбертех», Дмитрий Янченко и Юрий Шабалин, экспе...«Практика Software Security в Сбертех», Дмитрий Янченко и Юрий Шабалин, экспе...
«Практика Software Security в Сбертех», Дмитрий Янченко и Юрий Шабалин, экспе...Mail.ru Group
 
«Статический анализ: гордость и предубеждения», Алексей Кузьменко, аналитик И...
«Статический анализ: гордость и предубеждения», Алексей Кузьменко, аналитик И...«Статический анализ: гордость и предубеждения», Алексей Кузьменко, аналитик И...
«Статический анализ: гордость и предубеждения», Алексей Кузьменко, аналитик И...Mail.ru Group
 
NTXISSACSC2 - Software Security - My Other Marathon by Harold Toomey
NTXISSACSC2 - Software Security - My Other Marathon by Harold ToomeyNTXISSACSC2 - Software Security - My Other Marathon by Harold Toomey
NTXISSACSC2 - Software Security - My Other Marathon by Harold ToomeyNorth Texas Chapter of the ISSA
 
Building better product security
Building better product securityBuilding better product security
Building better product securityBohdan Serednytskyi
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfAdrian Sanabria
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security FrameworksMarco Morana
 
ネットワーク家電と脆弱性 by 堀部 千壽
ネットワーク家電と脆弱性 by 堀部 千壽ネットワーク家電と脆弱性 by 堀部 千壽
ネットワーク家電と脆弱性 by 堀部 千壽CODE BLUE
 
Security Vulnerabilities in Third Party Code - Fix All the Things!
Security Vulnerabilities in Third Party Code - Fix All the Things! Security Vulnerabilities in Third Party Code - Fix All the Things!
Security Vulnerabilities in Third Party Code - Fix All the Things! Kymberlee Price
 
とある脆弱性の永い議論
とある脆弱性の永い議論とある脆弱性の永い議論
とある脆弱性の永い議論Mtikutea
 
Security in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learnedSecurity in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learnedBoaz Shunami
 
Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLCTjylen Veselyj
 
Management for Security Life Cycle (日本語版)
Management for Security Life Cycle (日本語版)Management for Security Life Cycle (日本語版)
Management for Security Life Cycle (日本語版)Akitsugu Ito
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMarco Morana
 
DIGA向けサービスを実現するAPIと新たなサービス活性化構想
DIGA向けサービスを実現するAPIと新たなサービス活性化構想DIGA向けサービスを実現するAPIと新たなサービス活性化構想
DIGA向けサービスを実現するAPIと新たなサービス活性化構想API Meetup
 
Cisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-oneCisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-oneDefconRussia
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesTripwire
 
Splunk for Security-Hands On
Splunk for Security-Hands OnSplunk for Security-Hands On
Splunk for Security-Hands OnSplunk
 

Destacado (20)

[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
 
«Идентификация, аутентификация, авторизация – встроенные функции приложений и...
«Идентификация, аутентификация, авторизация – встроенные функции приложений и...«Идентификация, аутентификация, авторизация – встроенные функции приложений и...
«Идентификация, аутентификация, авторизация – встроенные функции приложений и...
 
«Практика Software Security в Сбертех», Дмитрий Янченко и Юрий Шабалин, экспе...
«Практика Software Security в Сбертех», Дмитрий Янченко и Юрий Шабалин, экспе...«Практика Software Security в Сбертех», Дмитрий Янченко и Юрий Шабалин, экспе...
«Практика Software Security в Сбертех», Дмитрий Янченко и Юрий Шабалин, экспе...
 
«Статический анализ: гордость и предубеждения», Алексей Кузьменко, аналитик И...
«Статический анализ: гордость и предубеждения», Алексей Кузьменко, аналитик И...«Статический анализ: гордость и предубеждения», Алексей Кузьменко, аналитик И...
«Статический анализ: гордость и предубеждения», Алексей Кузьменко, аналитик И...
 
NTXISSACSC2 - Software Security - My Other Marathon by Harold Toomey
NTXISSACSC2 - Software Security - My Other Marathon by Harold ToomeyNTXISSACSC2 - Software Security - My Other Marathon by Harold Toomey
NTXISSACSC2 - Software Security - My Other Marathon by Harold Toomey
 
Building better product security
Building better product securityBuilding better product security
Building better product security
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
 
ネットワーク家電と脆弱性 by 堀部 千壽
ネットワーク家電と脆弱性 by 堀部 千壽ネットワーク家電と脆弱性 by 堀部 千壽
ネットワーク家電と脆弱性 by 堀部 千壽
 
Security Vulnerabilities in Third Party Code - Fix All the Things!
Security Vulnerabilities in Third Party Code - Fix All the Things! Security Vulnerabilities in Third Party Code - Fix All the Things!
Security Vulnerabilities in Third Party Code - Fix All the Things!
 
とある脆弱性の永い議論
とある脆弱性の永い議論とある脆弱性の永い議論
とある脆弱性の永い議論
 
Security in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learnedSecurity in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learned
 
Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLC
 
Management for Security Life Cycle (日本語版)
Management for Security Life Cycle (日本語版)Management for Security Life Cycle (日本語版)
Management for Security Life Cycle (日本語版)
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
DIGA向けサービスを実現するAPIと新たなサービス活性化構想
DIGA向けサービスを実現するAPIと新たなサービス活性化構想DIGA向けサービスを実現するAPIと新たなサービス活性化構想
DIGA向けサービスを実現するAPIと新たなサービス活性化構想
 
Cisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-oneCisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-one
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Splunk for Security-Hands On
Splunk for Security-Hands OnSplunk for Security-Hands On
Splunk for Security-Hands On
 

Similar a «Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алексей Лукацкий, бизнес-консультант по безопасности, Cisco Systems

Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy NetworkCollaborators
 
Mid market collaboration architecture presentation
Mid market collaboration architecture presentationMid market collaboration architecture presentation
Mid market collaboration architecture presentationTrinny Chacko
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...Synopsys Software Integrity Group
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecurityThomas Malmberg
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre EuclidesTI Safe
 
OpenChain Monthly Meeting North America - Europe - 2023-02-07
OpenChain Monthly Meeting North America - Europe - 2023-02-07OpenChain Monthly Meeting North America - Europe - 2023-02-07
OpenChain Monthly Meeting North America - Europe - 2023-02-07Shane Coughlan
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)Shane Coughlan
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...Synopsys Software Integrity Group
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaCisco do Brasil
 

Similar a «Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алексей Лукацкий, бизнес-консультант по безопасности, Cisco Systems (20)

Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Mid market collaboration architecture presentation
Mid market collaboration architecture presentationMid market collaboration architecture presentation
Mid market collaboration architecture presentation
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring Security
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides
 
OpenChain Monthly Meeting North America - Europe - 2023-02-07
OpenChain Monthly Meeting North America - Europe - 2023-02-07OpenChain Monthly Meeting North America - Europe - 2023-02-07
OpenChain Monthly Meeting North America - Europe - 2023-02-07
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 

Más de Mail.ru Group

Автоматизация без тест-инженеров по автоматизации, Мария Терехина и Владислав...
Автоматизация без тест-инженеров по автоматизации, Мария Терехина и Владислав...Автоматизация без тест-инженеров по автоматизации, Мария Терехина и Владислав...
Автоматизация без тест-инженеров по автоматизации, Мария Терехина и Владислав...Mail.ru Group
 
BDD для фронтенда. Автоматизация тестирования с Cucumber, Cypress и Jenkins, ...
BDD для фронтенда. Автоматизация тестирования с Cucumber, Cypress и Jenkins, ...BDD для фронтенда. Автоматизация тестирования с Cucumber, Cypress и Jenkins, ...
BDD для фронтенда. Автоматизация тестирования с Cucumber, Cypress и Jenkins, ...Mail.ru Group
 
Другая сторона баг-баунти-программ: как это выглядит изнутри, Владимир Дубровин
Другая сторона баг-баунти-программ: как это выглядит изнутри, Владимир ДубровинДругая сторона баг-баунти-программ: как это выглядит изнутри, Владимир Дубровин
Другая сторона баг-баунти-программ: как это выглядит изнутри, Владимир ДубровинMail.ru Group
 
Использование Fiddler и Charles при тестировании фронтенда проекта pulse.mail...
Использование Fiddler и Charles при тестировании фронтенда проекта pulse.mail...Использование Fiddler и Charles при тестировании фронтенда проекта pulse.mail...
Использование Fiddler и Charles при тестировании фронтенда проекта pulse.mail...Mail.ru Group
 
Управление инцидентами в Почте Mail.ru, Антон Викторов
Управление инцидентами в Почте Mail.ru, Антон ВикторовУправление инцидентами в Почте Mail.ru, Антон Викторов
Управление инцидентами в Почте Mail.ru, Антон ВикторовMail.ru Group
 
DAST в CI/CD, Ольга Свиридова
DAST в CI/CD, Ольга СвиридоваDAST в CI/CD, Ольга Свиридова
DAST в CI/CD, Ольга СвиридоваMail.ru Group
 
Почему вам стоит использовать свой велосипед и почему не стоит Александр Бел...
Почему вам стоит использовать свой велосипед и почему не стоит  Александр Бел...Почему вам стоит использовать свой велосипед и почему не стоит  Александр Бел...
Почему вам стоит использовать свой велосипед и почему не стоит Александр Бел...Mail.ru Group
 
CV в пайплайне распознавания ценников товаров: трюки и хитрости Николай Масл...
CV в пайплайне распознавания ценников товаров: трюки и хитрости  Николай Масл...CV в пайплайне распознавания ценников товаров: трюки и хитрости  Николай Масл...
CV в пайплайне распознавания ценников товаров: трюки и хитрости Николай Масл...Mail.ru Group
 
RAPIDS: ускоряем Pandas и scikit-learn на GPU Павел Клеменков, NVidia
RAPIDS: ускоряем Pandas и scikit-learn на GPU  Павел Клеменков, NVidiaRAPIDS: ускоряем Pandas и scikit-learn на GPU  Павел Клеменков, NVidia
RAPIDS: ускоряем Pandas и scikit-learn на GPU Павел Клеменков, NVidiaMail.ru Group
 
WebAuthn в реальной жизни, Анатолий Остапенко
WebAuthn в реальной жизни, Анатолий ОстапенкоWebAuthn в реальной жизни, Анатолий Остапенко
WebAuthn в реальной жизни, Анатолий ОстапенкоMail.ru Group
 
AMP для электронной почты, Сергей Пешков
AMP для электронной почты, Сергей ПешковAMP для электронной почты, Сергей Пешков
AMP для электронной почты, Сергей ПешковMail.ru Group
 
Как мы захотели TWA и сделали его без мобильных разработчиков, Данила Стрелков
Как мы захотели TWA и сделали его без мобильных разработчиков, Данила СтрелковКак мы захотели TWA и сделали его без мобильных разработчиков, Данила Стрелков
Как мы захотели TWA и сделали его без мобильных разработчиков, Данила СтрелковMail.ru Group
 
Кейсы использования PWA для партнерских предложений в Delivery Club, Никита Б...
Кейсы использования PWA для партнерских предложений в Delivery Club, Никита Б...Кейсы использования PWA для партнерских предложений в Delivery Club, Никита Б...
Кейсы использования PWA для партнерских предложений в Delivery Club, Никита Б...Mail.ru Group
 
Метапрограммирование: строим конечный автомат, Сергей Федоров, Яндекс.Такси
Метапрограммирование: строим конечный автомат, Сергей Федоров, Яндекс.ТаксиМетапрограммирование: строим конечный автомат, Сергей Федоров, Яндекс.Такси
Метапрограммирование: строим конечный автомат, Сергей Федоров, Яндекс.ТаксиMail.ru Group
 
Как не сделать врагами архитектуру и оптимизацию, Кирилл Березин, Mail.ru Group
Как не сделать врагами архитектуру и оптимизацию, Кирилл Березин, Mail.ru GroupКак не сделать врагами архитектуру и оптимизацию, Кирилл Березин, Mail.ru Group
Как не сделать врагами архитектуру и оптимизацию, Кирилл Березин, Mail.ru GroupMail.ru Group
 
Этика искусственного интеллекта, Александр Кармаев (AI Journey)
Этика искусственного интеллекта, Александр Кармаев (AI Journey)Этика искусственного интеллекта, Александр Кармаев (AI Journey)
Этика искусственного интеллекта, Александр Кармаев (AI Journey)Mail.ru Group
 
Нейро-машинный перевод в вопросно-ответных системах, Федор Федоренко (AI Jour...
Нейро-машинный перевод в вопросно-ответных системах, Федор Федоренко (AI Jour...Нейро-машинный перевод в вопросно-ответных системах, Федор Федоренко (AI Jour...
Нейро-машинный перевод в вопросно-ответных системах, Федор Федоренко (AI Jour...Mail.ru Group
 
Конвергенция технологий как тренд развития искусственного интеллекта, Владими...
Конвергенция технологий как тренд развития искусственного интеллекта, Владими...Конвергенция технологий как тренд развития искусственного интеллекта, Владими...
Конвергенция технологий как тренд развития искусственного интеллекта, Владими...Mail.ru Group
 
Обзор трендов рекомендательных систем от Пульса, Андрей Мурашев (AI Journey)
Обзор трендов рекомендательных систем от Пульса, Андрей Мурашев (AI Journey)Обзор трендов рекомендательных систем от Пульса, Андрей Мурашев (AI Journey)
Обзор трендов рекомендательных систем от Пульса, Андрей Мурашев (AI Journey)Mail.ru Group
 
Мир глазами нейросетей, Данила Байгушев, Александр Сноркин ()
Мир глазами нейросетей, Данила Байгушев, Александр Сноркин ()Мир глазами нейросетей, Данила Байгушев, Александр Сноркин ()
Мир глазами нейросетей, Данила Байгушев, Александр Сноркин ()Mail.ru Group
 

Más de Mail.ru Group (20)

Автоматизация без тест-инженеров по автоматизации, Мария Терехина и Владислав...
Автоматизация без тест-инженеров по автоматизации, Мария Терехина и Владислав...Автоматизация без тест-инженеров по автоматизации, Мария Терехина и Владислав...
Автоматизация без тест-инженеров по автоматизации, Мария Терехина и Владислав...
 
BDD для фронтенда. Автоматизация тестирования с Cucumber, Cypress и Jenkins, ...
BDD для фронтенда. Автоматизация тестирования с Cucumber, Cypress и Jenkins, ...BDD для фронтенда. Автоматизация тестирования с Cucumber, Cypress и Jenkins, ...
BDD для фронтенда. Автоматизация тестирования с Cucumber, Cypress и Jenkins, ...
 
Другая сторона баг-баунти-программ: как это выглядит изнутри, Владимир Дубровин
Другая сторона баг-баунти-программ: как это выглядит изнутри, Владимир ДубровинДругая сторона баг-баунти-программ: как это выглядит изнутри, Владимир Дубровин
Другая сторона баг-баунти-программ: как это выглядит изнутри, Владимир Дубровин
 
Использование Fiddler и Charles при тестировании фронтенда проекта pulse.mail...
Использование Fiddler и Charles при тестировании фронтенда проекта pulse.mail...Использование Fiddler и Charles при тестировании фронтенда проекта pulse.mail...
Использование Fiddler и Charles при тестировании фронтенда проекта pulse.mail...
 
Управление инцидентами в Почте Mail.ru, Антон Викторов
Управление инцидентами в Почте Mail.ru, Антон ВикторовУправление инцидентами в Почте Mail.ru, Антон Викторов
Управление инцидентами в Почте Mail.ru, Антон Викторов
 
DAST в CI/CD, Ольга Свиридова
DAST в CI/CD, Ольга СвиридоваDAST в CI/CD, Ольга Свиридова
DAST в CI/CD, Ольга Свиридова
 
Почему вам стоит использовать свой велосипед и почему не стоит Александр Бел...
Почему вам стоит использовать свой велосипед и почему не стоит  Александр Бел...Почему вам стоит использовать свой велосипед и почему не стоит  Александр Бел...
Почему вам стоит использовать свой велосипед и почему не стоит Александр Бел...
 
CV в пайплайне распознавания ценников товаров: трюки и хитрости Николай Масл...
CV в пайплайне распознавания ценников товаров: трюки и хитрости  Николай Масл...CV в пайплайне распознавания ценников товаров: трюки и хитрости  Николай Масл...
CV в пайплайне распознавания ценников товаров: трюки и хитрости Николай Масл...
 
RAPIDS: ускоряем Pandas и scikit-learn на GPU Павел Клеменков, NVidia
RAPIDS: ускоряем Pandas и scikit-learn на GPU  Павел Клеменков, NVidiaRAPIDS: ускоряем Pandas и scikit-learn на GPU  Павел Клеменков, NVidia
RAPIDS: ускоряем Pandas и scikit-learn на GPU Павел Клеменков, NVidia
 
WebAuthn в реальной жизни, Анатолий Остапенко
WebAuthn в реальной жизни, Анатолий ОстапенкоWebAuthn в реальной жизни, Анатолий Остапенко
WebAuthn в реальной жизни, Анатолий Остапенко
 
AMP для электронной почты, Сергей Пешков
AMP для электронной почты, Сергей ПешковAMP для электронной почты, Сергей Пешков
AMP для электронной почты, Сергей Пешков
 
Как мы захотели TWA и сделали его без мобильных разработчиков, Данила Стрелков
Как мы захотели TWA и сделали его без мобильных разработчиков, Данила СтрелковКак мы захотели TWA и сделали его без мобильных разработчиков, Данила Стрелков
Как мы захотели TWA и сделали его без мобильных разработчиков, Данила Стрелков
 
Кейсы использования PWA для партнерских предложений в Delivery Club, Никита Б...
Кейсы использования PWA для партнерских предложений в Delivery Club, Никита Б...Кейсы использования PWA для партнерских предложений в Delivery Club, Никита Б...
Кейсы использования PWA для партнерских предложений в Delivery Club, Никита Б...
 
Метапрограммирование: строим конечный автомат, Сергей Федоров, Яндекс.Такси
Метапрограммирование: строим конечный автомат, Сергей Федоров, Яндекс.ТаксиМетапрограммирование: строим конечный автомат, Сергей Федоров, Яндекс.Такси
Метапрограммирование: строим конечный автомат, Сергей Федоров, Яндекс.Такси
 
Как не сделать врагами архитектуру и оптимизацию, Кирилл Березин, Mail.ru Group
Как не сделать врагами архитектуру и оптимизацию, Кирилл Березин, Mail.ru GroupКак не сделать врагами архитектуру и оптимизацию, Кирилл Березин, Mail.ru Group
Как не сделать врагами архитектуру и оптимизацию, Кирилл Березин, Mail.ru Group
 
Этика искусственного интеллекта, Александр Кармаев (AI Journey)
Этика искусственного интеллекта, Александр Кармаев (AI Journey)Этика искусственного интеллекта, Александр Кармаев (AI Journey)
Этика искусственного интеллекта, Александр Кармаев (AI Journey)
 
Нейро-машинный перевод в вопросно-ответных системах, Федор Федоренко (AI Jour...
Нейро-машинный перевод в вопросно-ответных системах, Федор Федоренко (AI Jour...Нейро-машинный перевод в вопросно-ответных системах, Федор Федоренко (AI Jour...
Нейро-машинный перевод в вопросно-ответных системах, Федор Федоренко (AI Jour...
 
Конвергенция технологий как тренд развития искусственного интеллекта, Владими...
Конвергенция технологий как тренд развития искусственного интеллекта, Владими...Конвергенция технологий как тренд развития искусственного интеллекта, Владими...
Конвергенция технологий как тренд развития искусственного интеллекта, Владими...
 
Обзор трендов рекомендательных систем от Пульса, Андрей Мурашев (AI Journey)
Обзор трендов рекомендательных систем от Пульса, Андрей Мурашев (AI Journey)Обзор трендов рекомендательных систем от Пульса, Андрей Мурашев (AI Journey)
Обзор трендов рекомендательных систем от Пульса, Андрей Мурашев (AI Journey)
 
Мир глазами нейросетей, Данила Байгушев, Александр Сноркин ()
Мир глазами нейросетей, Данила Байгушев, Александр Сноркин ()Мир глазами нейросетей, Данила Байгушев, Александр Сноркин ()
Мир глазами нейросетей, Данила Байгушев, Александр Сноркин ()
 

Último

Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 

Último (20)

Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 

«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алексей Лукацкий, бизнес-консультант по безопасности, Cisco Systems

  • 1. Inside  Cisco's  Product  Security   Incident  Response  Team  (PSIRT)   Alexey  Lukatsky Business  Security  Consultant,  Cisco  GSSO alukatsk@cisco.com
  • 2. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public На  этом  можно  было  бы  и  закончить 2 «Их  практика  работы  направлена  на  то,   чтобы  шантажировать  заказчика  и   покупателя.  Они  вывешивают  в  открытом   доступе  систему  своих  уязвимостей  и   говорят  — коллеги,  если  вы  хотите,  чтобы   эти  уязвимости  не  были  использованы,   заплатите  нам  за  поддержку  и  мы  их   устраним» Помощник  президента  России  Игорь  Щеголев
  • 3. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Agenda • Introduction • PSIRT’s  Mission  Process  and  Engagement • Vulnerability  Management  Process • Customer  Expectations • PSIRT  Publications  and  Triage • Cisco  Security  Development  Lifecycle  (CSDL) • New  Trends  in  Vulnerability  Management • Case  Studies • Security  Automation  &  Cisco’s  Machine  Readable  Content • Conclusion 3
  • 4. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Introduction 4 The  Cisco  PSIRT  is  a  dedicated,  global  team  that  manages   the  receipt,  investigation,  and  public  reporting  of  security   vulnerability  information  that  is  related  to  Cisco  products   and  networks.
  • 5. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Security  Research  &  Operations  (SR&O) 5 PSIRT IntelliShield Applied   Security   Research IPS  Signature   Team Applied  Security   Intelligence SIO  Portal Security  Technology   Assessment  Team   (STAT) Security  Blog ASIG Talos
  • 6. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public PSIRT’s  Mission • Global  team  assisting  customers  with  the  ongoing  security  of  their  networks   through  identification,  resolution  and  prevention  of  vulnerabilities  in  Cisco   products  and  industry-­wide  vulnerabilities. PROTECT  CUSTOMERS  AND  PROTECT  CISCO 6
  • 7. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public PSIRT’s  Mission  (continued). Single  point  of  contact  for  receiving  and  resolving   internal  and  external  reports  of  vulnerabilities  in  all   Cisco  products  since  1995. 7
  • 8. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public When  Does  PSIRT  Engage? • Cisco  products  likely  to  be  affected,  but   not  always • Maintenance  contract  not  necessary • Customer  requests  PSIRT  involvement • Support  engineer  feels  attack  is  new  or   unknown  or  escalation  is  required • Caller  is  a  member  of  external  incident   response  team • Law  enforcement  is  already  involved 8
  • 10. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public PSIRT’s  Publications PSIRT  creates  and  publishes: Cisco  Security  Advisories,  Notices,   and  Responses Fair  public  disclosure:  everyone  notified   at  the  same  time. www.cisco.com/go/psirt www.cisco.com/security 10
  • 11. http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html The  following  table  summarizes  the  methods  used  by  Cisco  to  notify  customers   about  the  security  vulnerabilities  and  other  security  information. Email SIO  Portal RSS CNS Bug  Search  Tool Security  Advisories Yes Yes Yes Yes Yes Security Notices No Yes Yes No Yes Security  Response Yes Yes Yes Yes Yes Cisco  Event  Responses No Yes Yes No No Threat  Outbreak  Alerts  /  IntelliShield Alerts No Yes Yes No No Release  Note  Enclosures No No No No Yes 11
  • 12. http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html Cisco  uses  the  following  CVSS  guidelines  when  determining  which  security   publication  will  include  a  particular  vulnerability: Publication CVSS  Score Cisco  Security  Advisory   7.0  – 10.0 Cisco  Security  Notice   4.0  – 6.9 Bug  Release  Note  Enclosure 0.1  – 3.9 Cisco  Security  Responses  address  issues   that  require  a  response  to  information   discussed  in  a  public  forum,  such  as  a  blog  or   discussion  list.  The  responses  are  normally   published  if  a  third  party  makes  a  public   statement  about  a  Cisco  product  vulnerability. 12
  • 13. INDUSTRY  LEADERSHIP  &   COLLABORATION 13
  • 14. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public PSIRT’s  Security  Community  Engagement Coordination  as  required  with  external  agencies  (CERT/CC,  CPNI,  etc.) 14
  • 15. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public PSIRT’s  Security  Community  Engagement Represents  Cisco  in  the  incident  response  and  security  communities. Cisco  is  a  founding  member  of  the  Industry  Consortium  for   Advancement  of  Security  on  the  Internet  (ICASI)  enhances   the  global  security  landscape  by  driving  excellence  and   innovation  in  security  response  practices,  and  by  enabling  its   members  to  proactively  collaborate  to  analyze,  mitigate,  and   resolve  multi-­vendor,  global  security  challenges. 15
  • 17.
  • 18. PSIRT  Collaborates  With  Experts  Across  Cisco Many  other   teams Technology  Groups product  experts Technical   Assistance  Center support  experts Legal  &  Public   Relations Advanced  Services high  touch  support   experts Security  Research  &   Operations Security  Experts
  • 19. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public PSIRT  Scope:  More  Than  Vulnerability  Handling   • Provide  security  expertise  to  Cisco’s  product  development  and  testing   organizations • Deliver  security  training  and  education,  internally  and  externally • Share  best  practices  in  industry  through  customer  forums,  executive  briefings,   security  conferences,  and  cisco.com  content   • Mentor  others  building  vulnerability  handling  capabilities  to  strengthen  collective   response 19
  • 20. Cisco  Security  Development  Lifecycle  (CSDL) 20
  • 21. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Cisco  Secure  Development  Lifecycle  (CSDL) Why  Security  is  Good  Business  Sense: • Reduced  cost  of  fixing  bugs • Remove  expense  and  pain  of  changing   security  architecture • Reduces  TTM  (time  to  market)  over  time • Day-­one  advantage  over  our  less  security   savvy  competitors • Improve  customer  satisfaction • Lower  PSIRT  and  customer  cases Perform  GAP Analysis Prevent Security Attacks Detect Security Defects Validate Requirements and   Resiliency Identify  and Address Security Threats Register   and   Update   3rd Party Software 21
  • 22. CASE  STUDY  1  -­ HEARTBLEED 22
  • 23. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public 23
  • 24. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public What  is  Heartbleed? • If  the  specified  heartbeat  request  length  is  larger  than  its  actual  length,  this   memcpy()  will  read  memory  past  the  request  buffer  and  store  it  in  the  response   buffer  which  is  sent  to  the  attacker • OpenSSL1.0.1  – 1.0.1f  are  vulnerable • Bug  was  introduced  in  December  2011 but  not  found/disclosed  until  April   2014 – OpenSSL  is  used  by  2/3  of  Internet  web  servers  and  many  products • Approximate  534,156  services  are  vulnerable • Cisco  was  one  of  the  first  security  companies  to  provide  IPS  coverage
  • 25. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Background • Exploitation  Allows  Access  to  Device  Memory  Contents • Attackers  could  potentially  extract  sensitive  information • Cryptographic  keys  and  certificates  are  of  particular  concern • Impact  of  Exploitation  Depends  on  Multiple  Factors • Role  of  affected  device  in  the  network • How  OpenSSL  is  used  on  the  device
  • 26. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Cisco’s  Response • Announced  Publicly  on  April  7th  2014 • No  industry  coordination;;  vulnerability  was  disclosed  before   vendors  were  informed • Cisco  PSIRT  Coordinating  Response  and  Investigation • Cisco  Security  Advisory  published  April  9th • Cisco  among  the  first  vendors  to  respond • Initial  focus  on  accurate  listing  of  Cisco  products  and  services • Updated  daily  as  new  information  is  discovered • Detection  and  Mitigation  Strategies  Include: • Cisco  Sourcefire  and  Cisco  IPS  signatures  are  available • Technology-­specific  guidance  and  best  practices
  • 27. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Security  Impact • Bigger  than  443 • Any  SSL  service  is  being  targeted   • Most  prominent  sites  have  already  patched • Many,  many,  smaller  sites  are  not  patched… • Worst  case:  Private  keys,  credentials  and  more  leaked • Hijacked  accounts  -­>  more  exploit  kits • Embedded  devices  are  unlikely  to  patch • May  enable  lateral  movement • Without  security  monitoring  there  is  no  real  way  to  know  if  you  were  exploited • The  client  side  attack  is  also  concerning
  • 28. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Services  Being  Targeted Destination  Port/ICMP  Code 465  (smtps)/tcp 995  (pop3s)/tcp 993  (imaps)/tcp 443  (https)/tcp
  • 29. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Cisco  Product  Impact • Cisco  Impact  Varies  per  Product/Service • PSIRT  assumes  worst-­case  in  product  assessment • Deployment  architecture  may  significantly  reduce  “real”  risk • Potential  Exposure  of  Critical  Data • Remediation  Steps • Upgrade  to  a  fixed  version  of  software • Reissue  cryptographic  keys  and  certificates • Force  password  resets • Detection • IPS  can  detect  and  block  attack  attempts
  • 30. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public High-­Level  Assessment  of  Potential  Exposure
  • 31. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Step  1:   Identify  the  vulnerable  SSL/TLS  product  or  software   • One  method  of  determining  vulnerable  devices  is  through  vendor  security   advisories.  For  example,  Cisco’s  OpenSSL  Heartbeat  Extension  Vulnerability  in   Multiple  Cisco  Products  security  advisory • An  alternate  method  of  identifying  vulnerabilities  is  through  the  utilization  of   specifically  designed  tools.  Examples: • Clients:  pacemaker  https://github.com/Lekensteyn/pacemaker • Web-­based  tools:  https://filippo.io/Heartbleed/
  • 32. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Step  2:   Identify  the affected  features • It  is  important  to  know  which  product  feature  is  impacted.   • If  a  product  were  only  vulnerable  when  using  feature  X,  it  would  mean  that   it  is  not  vulnerable  when  the  feature  is  not  in  use.   • Note:  Administrators  should  note  that  devices  that  have  SSH  (not  a  TLS   feature)  enabled  are  not  affected  by  this  vulnerability. BUG FEATURE
  • 33. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Additional  Steps • Is  the  client  connecting  to  pre-­determined/trusted  or  unpredictable/untrusted   servers? • Pre-­determined/trusted  servers • Unpredictable/untrusted  servers (i.e.,  a  browser  which  is  connecting  to  any  random  website) • Can  you  verify  with  certainty  that  the  vulnerable  product  is  using  process   memory  separation? • Is  the  client  authenticated  by  the  server? • Is  the  vulnerable  server  feature  accessible  from  untrusted  networks?
  • 34. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Vulnerable  Server  Remediation  Options • Apply  patch  from  software  vendor • To  protect  against  the  Heartbleed  vulnerability,  the  vulnerable  server  would   need  to  be  upgraded  or  recompiled   • The  latest  OpenSSL  fixed  version  1.0.1g  or  newer  should  be  used   • If  it  is  not  possible  to  upgrade  to  the  fixed  release  of  OpenSSL,  vulnerable   software  can  be  recompiled  linking  to  OpenSSL  with  the  handshake  removed  from   the  code  by  compile  time  option   -­DOPENSSL_NO_HEARTBEATS
  • 35. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Coverage • Sourcefire  IPS • 30510  -­ 30513  inbound  connection  attempts  beyond  a  normal  threshold • 30514  -­ 30517  large  outbound  heartbeat  responses  (successful  exploitation) • 30520  -­ 30525  outbound  vulnerable  client  traffic • Cisco  Legacy  IPS • 4187-­3  -­ inbound  connection  attempts  beyond  a  normal  threshold • 4187-­4  -­ large  outbound  heartbeat  responses  (successful  exploitation)/outbound   vulnerable  client  traffic
  • 36. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Online  Resources Cisco  Security  Portal: • Security  Advisory http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-­sa-­20140409-­ heartbleed • Event  Response  Page http://www.cisco.com/web/about/security/intelligence/ERP-­Heartbleed.html • IntelliShield   Alert http://tools.cisco.com/security/center/viewThreatOutbreakAlert.x?alertId=33695 Blog  Posts  including  Mitigation,  Detection  and  Best  Practices: • http://blogs.cisco.com/security/openssl-­heartbleed-­vulnerability-­cve-­2014-­0160-­cisco-­products-­and-­ mitigations • http://vrt-­blog.snort.org/2014/04/heartbleed-­memory-­disclosure-­upgrade.html • http://blogs.cisco.com/security/heartbleed-­transparency-­for-­our-­customers/ Cisco  Security  and  Services: • http://www.cisco.com/go/security • http://www.cisco.com/c/en/us/products/security/service-­listing.html
  • 37. CASE  STUDY  2  – SPECIALIZED  &  CUSTOM   MALWARE  IN  INFRASTRUCTURE  DEVICES 37
  • 38. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public New  Threat  Landscape • Targeted  attacks  and  custom  malware  against  infrastructure  devices  (routers,   switches,  etc.) • These  attacks  go  undetected  for  a  longer  time  than  traditional  attacks   Infrastructure  Devices
  • 39. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public History • Theoretical  Research  in  2005-­2006  (FX  &  Mike  Lynn) • Recent  incidents  (2013  &  2014) – Custom  malware  to  change  infrastructure  device  configurations – Remote  code  execution – Persistent  attacks
  • 40. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Custom  Malware • Malware  is  software  created  to  modify  a  device's  behavior  for  the  benefit  of  a   malicious  third  party  (attacker).   • One  of  the  characteristics  of  effective  malware  is  that  it  can  run  on  a  device   stealthily  in  privileged  mode.   • Malware  is  usually  designed  to  monitor  and  exfiltrate information  from  the   operating  system  on  which  it  is  running  without  being  detected.   • Potentially  sophisticated  Cisco  IOS  malware  would  attempt  to  hide  its  presence   by  modifying  Cisco  IOS  command  output  that  would  reveal  information  about  it.
  • 41. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Context:  Malware  seen  targeting  IOS  Classic http://blogs.cisco.com/security/evolution-­of-­attacks-­on-­cisco-­ios-­devices
  • 42. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Infrastructure  Device  Infection On  Cisco  devices  running  Cisco  IOS  Software,  a  limited  number  of  infection   methods  are  available  to  malware.  Malicious  software  in  Cisco  IOS  Software  may   be  introduced  in  the  following  ways: • By  altering  the  software  image  stored  on  the  onboard  device  file  system.  These   types  of  malware  would  be  persistent  and  would  remain  after  a  reboot. • By  tampering  with  Cisco  IOS  memory  during  run  time.  In  this  case,  the  malware   is  not  persistent  and  a  reload  will  restore  the  Cisco  IOS  device  to  a  clean  state   booted  from  the  image  stored  in  the  flash. • By  modifying  the  ROM  monitor  on  systems  with  flash-­based  ROM  monitor   storage. • By  a  combination  of  some  or  all  of  the  preceding  mechanisms
  • 43. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Attack  Methods • Some  Cisco  IOS  devices  offer  a  limited  set  of  commands  that  are  intended  to  be   used  by  Cisco  Technical  Assistance  Center  (TAC)  engineers  during  the  process   of  troubleshooting  a  technical  problem.  Such  advanced  troubleshooting  and   diagnostic  commands  require  privileged  EXEC  level  and  require  valid   credentials  to  execute.  Thus,  these  commands  could  be  an  area  that  attackers   can  focus  on  to  identify  ways  to  run  malicious  software  in  Cisco  IOS. • It  is  important  to  note  that  not  all  Cisco  IOS  platforms  offer  advanced  diagnostic   commands.  Of  the  platforms  that  do,  only  a  very  limited  set  of  such  commands   is  usually  available.  Additionally,  to  run  these  commands,  a  user  needs   administrative  access  to  the  device.  Thus,  following  common  authentication  and   command  authorization  security  best  practices  will  help  prevent  a  malicious  user   from  even  attempting  to  install  malicious  software  in  Cisco  IOS  Software.   Commands 43
  • 44. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Attack  Methods  (cont.) • It  is  possible  that  an  attacker  could  insert  malicious  code  into  a  Cisco  IOS   Software  image  and  load  it  onto  a  Cisco  device  that  supports  the  image.   • This  attack  scenario  applies  to  any  computing  device  that  loads  its  operating   system  from  an  external,  writable  device.   • Even  though  such  a  scenario  is  not  impossible,  there  are  image  verification   techniques,  discussed  in  the  Cisco  IOS  Image  File  Verification  section  of  this   document  that  could  prevent  the  router  from  loading  such  an  image. Manipulating  Cisco  IOS  Images 44
  • 45. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Attack  Methods  (cont.) • As  with  every  operating  system,  there  is  a  possibility  that  a  vulnerability  could   exist  in  Cisco  IOS  Software  that,  under  certain  conditions,  could  allow  malicious   code  execution.   • An  attacker  who  exploited  the  vulnerability  would  install  or  run  malicious  code  in   Cisco  IOS  Software,  which  could  then  be  used  to  take  malicious  action,  such  as   modifying  device  behaviors  or  exfiltrating information.   • PSIRT  identifies,  manages,  and  releases  all  vulnerabilities  in  and  fixes  for  Cisco   products.   • Any  vulnerability  that  Cisco  is  made  aware  of  is  investigated  and  released  in   accordance  with  the  Cisco  vulnerability  disclosure  policy. http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html Vulnerabilities 45
  • 46. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Identification  Techniques MD5  hash  calculation  and  verification  using  the   MD5  File  Validation  feature  can  be  accomplished   using  the  following  command: verify /md5 filesystem:filename [md5-hash] Network  administrators  can  use  the  verify  /md5   privileged  EXEC  command  to  verify  the  integrity  of   image  files  that  are  stored  on  the  Cisco  IOS  file   system  of  a  device.  The  following  example  shows   how  to  use  the  verify  /md5  command  on  a  Cisco   IOS  device: R1# verify /md5 sup-bootdisk:c7600rsp72043- advipservicesk9-mz.151-3.S3 .....<output truncated>.....Done! verify /md5 (sup-bootdisk:c7600rsp72043- advipservicesk9-mz.151-3.S3) = e383bf779e137367839593efa8f0f725 Using  the  Message  Digest  5  File  Validation  Feature 46 Network  administrators  can  also  provide  an  MD5  hash  to   the  verify  command.  If  the  hash  is  provided,  the  verify   command  will  compare  the  calculated  and  provided  MD5   hashes  as  illustrated  in  the  following  example: R1# verify /md5 sup-bootdisk:c7600rsp72043- advipservicesk9-mz.151-3.S3 e383bf779e137367839593efa8f0f725 .....<output truncated>.....Done! Verified (sup-bootdisk:c7600rsp72043- advipservicesk9-mz.151-3.S3) = e383bf779e137367839593efa8f0f725 router#
  • 47. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Identification  Techniques Cisco  IOS  Software  image  file  verification  using  this  feature  can  be  accomplished  using  the  following   commands: file verify auto copy [/erase] [/verify | /noverify] source-url destination-url reload [warm] [/verify | /noverify] [text | in time [text] | at time [text] | cancel The  following  example  shows  how  to  configure  the  file  verify  auto  Cisco  IOS  feature: router# configure terminal router(config)# file verify auto router(config)# exit router# Using  the  Image  Verification  Feature 47
  • 48. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Identification  Techniques Network  administrators  can  also  verify  the  integrity  of  the  run-­time  memory  of  Cisco  IOS.   The  best  way  to  verify  the  integrity  of  run-­time  memory  for  IOS  is  to  analyze  the  region  of  memory   called  “main:text.” The  main:text section  contains  the  actual  executable  code  for  Cisco  IOS  Software  after  it  is  loaded  in   memory.  As  such,  verifying  its  integrity  is  particularly  relevant  for  detecting  in-­memory  tampering.  This   region  of  memory  should  not  change  during  normal  Cisco  IOS  Software  operation,  and  should  be  the   same  across  reloads. Because  this  region  of  memory  holds  the  actual  operating  system  code,  it  should  not  change  between   devices  as  long  as  they  are  the  same  model  and  running  the  same  release  number  and  feature  set.   However,  if  the  Cisco  IOS  release  in  use  is  ASLR  enabled,  these  assumptions  become  invalid.  A  side   effect  of  ASLR  is  changing  some  parts  of  the  operating  system  code.  This  means  the  memory  contents   will  be  different  across  devices,  even  if  they  are  running  the  same  operating  system  release  and  feature   set.   http://www.cisco.com/web/about/security/intelligence/integrity-­assurance.html Cisco  IOS  Run-­Time  Memory  Integrity  Verification 48
  • 49. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Additional  Indicators  of  Compromise The  presence  of  the  following  commands  should  trigger  further  investigation.  The  asterisk  symbol  *   indicates  any  text  that  follows  the  command  itself. gdb * test * tlcsh * service internal attach * remote * ipc-con * if-con * execute-on * show region show memory * show platform * do-exec version of any of the above Check  logs  for  the  presence  of  “unusual”  commands 49
  • 50. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Additional  Indicators  of  Compromise  (cont.) Cisco  IOS  devices  support  exporting  the  contents  of  the  running  memory.  After  the  export,  comparisons   between  the  running  memory  dump,  also  called  core  dump,  and  the  associated  sections  in  the  Cisco  IOS   image  file  can  be  performed  to  detect  modification  of  the  run-­time  memory  contents. Most  Cisco  IOS  releases  support  a  memory  dump  via  the  write  core  command.   The  following  example  shows  how  to  search  suspicious  commands  captured  in  a  core  dump  file  by   using  the  Linux  utility  string: $ strings <CORE> |grep ^CMD: CMD: 'verify /md5 system:memory/text' 06:59:50 UTC Wed Jan 15 2014 CMD: 'service internal | i exce' 07:02:41 UTC Wed Jan 15 2014 CMD: 'conf t' 07:02:45 UTC Wed Jan 15 2014 CMD: 'exception flash procmem bootflash:' 07:02:54 UTC Wed Jan 15 2014 CMD: 'exception core-file CORE compress ' 07:03:31 UTC Wed Jan 15 2014 Checking  Command  History  in  the  Cisco  IOS  Core  Dump 50
  • 51. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Resources • This  document  analyzes  injection  of  malicious  software  in  Cisco  IOS  Software   and  describes  ways  to  verify  that  the  software  on  a  Cisco  router,  both  in  device   storage  and  in  running  memory,  has  not  been  modified.   • Additionally,  the  document  presents  common  best  practices  that  can  aid  in   protecting  against  attempts  to  inject  malicious  software  (also  referred  to  as   malware)  in  a  Cisco  IOS  device.   http://www.cisco.com/web/about/security/intelligence/integrity-­assurance.html
  • 52. SECURITY  AUTOMATION  &  CISCO   MACHINE  READABLE  CONTENT 52
  • 53. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Robust  support  for  relevant   standards  to  ensure  multi-­‐layer   interoperability EMERGING  TECHNOLOGIES Completely  closed  solutions EVOLVING  MATURITY MATURE  IMPLEMENTATIONS Adoption  of  basic  interoperability   standards Security  Automation  Evolution Industry’s  perception  of  the  security  automation  evolution WE  ARE  HERE PAST FUTURE 53
  • 54. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public OVAL:  Cisco  IOS  Vulnerability  Assessment • Cisco  PSIRT  is  including  Open  Vulnerability  and   Assessment  Language  (OVAL)  definitions  in   Cisco  IOS  security  advisories. • OVAL  provides  a  structured  and  standard   machine-­‐readable  content  that  allows   customers  to  quickly  consume  security   vulnerability  information  and  identify  affected   devices.   • OVAL  can  also  be  used  to  verify  that  the   patches  or  fixes  that  resolve  such  vulnerabilities   were  successfully  installed. • OVAL  content  can  be  downloaded  from  each   Cisco  IOS  security  advisories Common  Vulnerability  Reporting  Framework   (CVRF) • In  addition  to  OVAL  definitions,  PSIRT  is   also  publishing  CVRF  content  for  all  Cisco   security  advisories. • CVRF  allows  vendors  to  publish  security   advisories  in  an  XML  (machine-­‐readable)   format.   • CVRF  has  been  designed  by  the  Industry   Consortium  for  Advancement  of  Security   on  the  Internet  (ICASI),  of  which  Cisco  is  a   member  and  took  a  major  role  in  its   development. Vulnerability  Machine  Readable  Content Cisco  is  committed  to  protect  customers  by  sharing  critical   security-­related  information  in  different  formats. 54
  • 55. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public CISCO  PSIRT  -­ PROTECTING  CISCO  CUSTOMERS Cisco  is  committed  to  protect  customers  by  sharing  critical   security-­related  information  in  different  formats.
  • 56. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public More  information  at:  http://oval.mitre.org Cisco  OVAL  White  Paper:  http://cs.co/90035hJ3 Introduction  to  OVAL Open  Vulnerability  and  Assessment  Language  (OVAL)  -­‐ an   international  community  standard  to  promote  open  and   publicly  available  security  content  and  to  standardize  the   transfer  of  this  information  in  security  tools  and  services. OVAL  provides  a  structured  and  standard machine-­‐ readable  content  that  allows  customers  to  quickly   consume  security  vulnerability  information  and  identify   affected  devices.   OVAL  can  also  be  used  to  verify  that  the  patches  or  fixes   that  resolve  such  vulnerabilities  were  successfully   installed.
  • 57. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public CISCO  PSIRT  -­ PROTECTING  CISCO  CUSTOMERS Security  Automation:  Cisco  IOS  OVAL  Content • Cisco  PSIRT  is  creating  OVAL  content   (“definitions”)  for  Cisco  IOS  security   advisories. • OVAL  content  can  be  downloaded   from  each  Cisco  IOS  security   advisory;  Cisco  Security  Event   Response  Pages and  from  the   following  link/repository: http://tools.cisco.com/security/center/ovalListing.x 57
  • 58. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public What  is  OVAL? What  are  the  use  cases? There  are  four  main  use  cases,  also  called  “classes,”  of  OVAL  definitions: • Vulnerability: Determine  if  the  device  is  affected  by  a  given  vulnerability • Compliance: Validate  a  device  configuration  against  a  known  or  approved   valid  configurations  (i.e.,  best  practices) • Inventory: Check  for  a  specific  version  of  software  installed  on  the  system • Patches: Find  a  specific  patch  on  the  system 58
  • 59. 59 OVAL  Components OVAL   Definitions •XML  files  that  are   used  to  check  the   presence  of  a   vulnerability  or  a   configuration  best   practice. OVAL  Schemas •OVAL  definitions   are   XML  documents;;   thus  they  need   schemas. •The  purpose  of  an   XML  Schema  is  to   define  the  building   blocks  of  an  XML   document •OVAL  XML  Schemas   define  elements,   attributes,  and  data   types  that  are  part  of   an  OVAL  definition •Example:  how  OVAL   checks  for  affected   versions;;  different   configurations  (i.e.,   ACLs,  Interfaces,   Routing  Protocols,   etc.) Authoring  Tool •Cisco  created   internal  tools  to   support  the  creation   of  IOS  vulnerability   definitions System   Characteristics   Producer •Generates  and   keeps  details  of  the   system  being   evaluated •Examples:  jOVAL   Definition   Interpreter,   McAfee  Policy   Auditor,  etc. Definition   Repository •A  repository  of  OVAL   Definitions  made   available  to  the   community  (free  or   pay). •Cisco  publishes   OVAL  definitions   that   can  be  downloaded   from  each  IOS   security  advisories. Definition   Evaluator •A  product  that  uses   an  OVAL  Definition   to  guide  evaluation   and  produces  OVAL   Results  (full  results)   as  output. •Examples:  jOVAL
  • 60. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Authoring  Tool Definition   Evaluator/Scanner (openscap/jOVAL) Definition   Repository OVAL   Definition OVAL   Definition OVAL    System   Characteristics OVAL   Definition Results Consumer OVAL   Results How  Everything  Works  Together… High-­level 60
  • 61. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Additional  OVAL  Schemas Enhancements  and  New  Schemas 61 Cisco  Security  Research  and  Operations  (SR&O)  recently   numerous  enhancements  to  the  Cisco IOS  OVAL  Schemata  and   created  new  schemas  for: • IOS-­XE • Cisco  ASA
  • 62. Example:  Assessing  an  IOS  device  using   OVAL 62
  • 63. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Topology 63 Machine  with   jOVAL (OVAL   Scanner) R1: 172.18.122.246
  • 64. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Technical  Details Vulnerability  details  and  router  configuration 64 • CVE-­2012-­0381 addresses  a  vulnerability  that  affects  the  Cisco  IOS   Software  Internet  Key  Exchange  (IKE)  implementation.   • R1 is  configured  for  IPsec  and  it  is  running  an  affected  version.   • The  following  is  an  excerpt  of  the  IPsec/IKE  configuration  of  R1:   crypto isakmp policy 10 encr aes 256 authentication pre-share ! crypto map test 10 ipsec-isakmp set peer 10.10.10.10 match address 101 ! interface FastEthernet0/1 ip address 14.4.1.126 255.255.255.0 crypto map test
  • 65. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public jOVAL Example jOVAL Configuration  and  OVAL  Definition  Information 65 The  OVAL  definition  filename  is  cisco-­sa-­20120328-­ike-­CVE-­2012-­ 0381_oval.xml and  it  resides  in  a  directory  called  DEFINITIONS.   To  scan  R1,  the  jovaldi.bat  utility  was  used,  as  shown  in  the  following  example: D:joval>jovaldi.bat -plugin remote -m -o DEFINITIONScisco- sa-20120328-ike-CVE-2012-0381.xml
  • 66. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public jOVAL Example jOVAL Output 66 D:joval>jovaldi.bat -plugin remote -m -o DEFINITIONScisco-sa-20120328-ike-CVE-2012-0381.xml … <output omitted for brevity> ** parsing D:jovalDEFINITIONScisco-sa-20120328-ike-CVE-2012-0381.xml - validating xml schema. ** checking schema version - Schema version - 5.10 ** skipping Schematron validation ** creating a new OVAL System Characteristics file. ** gathering data for the OVAL definitions. Collecting object: FINISHED ** saving data model to system-characteristics.xml. ** skipping Schematron validation ** running the OVAL Definition analysis. Analyzing definition: FINISHED ** OVAL definition results. OVAL Id Result ------------------------------------------------------- oval:cisco.oval:def:13 true ------------------------------------------------------- ** finished evaluating OVAL definitions. ** saving OVAL results to results.xml. ** skipping Schematron validation ** running OVAL Results xsl: xmlresults_to_html.xsl. True  =  device  is  vulnerable
  • 67. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public HTML  Report jOVAL Report  Example 67 True  =  device  is  vulnerable
  • 68. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public HTML  Report jOVAL Report  Example 68 In  the  following  example,  IPsec  was   disabled  on  R1.  After  this  change,  the   device  was  not  vulnerable. False  =  device  is  not  vulnerable
  • 69. ©  2014  Cisco  and/or  its  affiliates.  All  rights  reserved.BRKSEC-­2012 Cisco  Public Resources Cisco’s  OVAL  and  CVRF  Resources 69 Resource Description Link White Paper Details  of  the  SCAP  components,  as  well  as  step-­by-­step   instructions  on  how  to  use  OVAL  content  with  available   open   source  tools. http://cs.co/9001V4vP FAQ Published   to  help  answer  common  questions  related  to  Cisco’s   OVAL  adoption. http://cs.co/9004V4vr Cisco  SIO Portal Early-­warning  intelligence,   threat  and  vulnerability  information,   and  proven  Cisco  mitigation   solutions  to  help  customers   protect  their  networks. http://cisco.com/security Security  Blog Cisco  Security  Blog   posts  providing information  about  OVAL,   CVRF  and  security  automation. http://cs.co/9000V4vE http://cs.co/9009V4vD Cisco’s  Security Vulnerability   Policy Cisco’s  public  security  vulnerability  policy  including   information   about  OVAL  and  CVRF  content. http://cs.co/9008V4vM
  • 70. Q&A