SlideShare una empresa de Scribd logo
1 de 14
And why the LIR is a key factor
M. Steltman - RIPE79 – 16-10-2019
The compelling case for vulnerability
management
Why are we vulnerable ?
“We are vulnerable, because hard- and software has vulnerabilities.
The bad guys find them and use them for themselves.
So we need good guys to find them too, and then fix those leaks. It’s all
we have”
Bruce Schneier
So, why don’t we just patch?
4
The patching process for companies
explained
5
?
Sounds easy but hard to achieve 100%
6
?
Too much to deal with
7
8
Digital
Infrastructure,
Including LIRs
Companies
with digital
presence Financial servicesManufacturing Logistics Healthcare Retail MobilityGovernment
Digital
Services
Plan B: Coordinated responsible disclosure / Bug bou
Common
approach:
“Motivate”
Add:
Find and
report
Coordinated responsible disclosure
=> towards: CRD on steroids
10
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
networks
Add
performance
information
Collect and
aggregate
Forward
&
Policy
Members & Constituents of:
What can and should LIRs do?
11
** Where does LIR responsibility start and stop **?
-> LIR is NOT responsible, but is (as other intermediaries) a key actor in getting
this going
This goes way beyond ISP abuse mitigation!
-LIR ( as ISP, hoster, CSP) is a key actor , the essential “middle man”:
- Monitor: Which badness is visible in my networks: vulnerabilities and
abuse
- Receive: Subscribe to feeds, receive abuse- and vulnerability
information
- Triage: Who has the actual problem, which user or
cusromer?
- Forward: Who can and should fix this?
- Policy: “motivate” users / customers to act, or act yourself
Questions for RIPE community / LIRs
12
- Do you agree that this “actual vulnerability”approach can be very effective?
- Do you agree that the LIR is a key middleman in this approach?
Concrete actions for such LIRs, what can you already do NOW:
- Start with this mindset
- Update your policies, accept code of conduct NtD and Abuse
- Be reachable !
- Subscribe to offered aggregated feeds
- Forward info and act , to customers / users
- Using standard OSS systems such as Abuse-IO
• If this initiative will start, are YOU prepared to participate ?
13
The current approach : motivate companies to patch 100%, is insufficient
The solution: Find ACTUAL leaks, aggregate, add performance info
Then forward to those who can fix– or who can make someone fix
In NL:
All we need is already there! Just need to go on steroids
Gov: (NCSC): please take the lead, connect the dots
Providers / LIRS: Adopt the CoC , connect to NBIP and start making a
difference
In your country: replicate the model
** It is time to act, now! **
Stichting
Digitale Infrastructuur
Nederland
www.dinl.nl

Más contenido relacionado

Similar a LIR's key role in vulnerability management

TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-LookTomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-LookBrian F. Eddy
 
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...Business Development Institute
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Femke Goedhart
 
If you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoptionIf you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoptionSuzanne Livingston
 
12 Items You Need To Include In Your Mobile Healthcare App Brief
12 Items You Need To Include In Your Mobile Healthcare App Brief12 Items You Need To Include In Your Mobile Healthcare App Brief
12 Items You Need To Include In Your Mobile Healthcare App BriefScott Hague
 
How to sell the vision & value of online community
How to sell the vision & value of online communityHow to sell the vision & value of online community
How to sell the vision & value of online communityGet Satisfaction
 
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)SMASH Summit
 
The 2013 Social Business Benchmark Preliminary Findings
The 2013 Social Business Benchmark Preliminary FindingsThe 2013 Social Business Benchmark Preliminary Findings
The 2013 Social Business Benchmark Preliminary FindingsLeader Networks
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Continuity and Resilience
 
Whitepaper interview with pam morris
Whitepaper  interview with pam morrisWhitepaper  interview with pam morris
Whitepaper interview with pam morrisComputer Aid, Inc
 
Lessons Learned by Social Businesses, 10 June 2014
Lessons Learned by Social Businesses, 10 June 2014Lessons Learned by Social Businesses, 10 June 2014
Lessons Learned by Social Businesses, 10 June 2014CambsChamber
 
Building a Digital Supply Chain - report - 9 APR 2018
Building a Digital Supply Chain - report - 9 APR 2018Building a Digital Supply Chain - report - 9 APR 2018
Building a Digital Supply Chain - report - 9 APR 2018Lora Cecere
 
Transforming Healthcare: Build vs Buy
Transforming Healthcare: Build vs BuyTransforming Healthcare: Build vs Buy
Transforming Healthcare: Build vs Buyibi
 
Argyle CMO Summit 2015
Argyle CMO Summit 2015 Argyle CMO Summit 2015
Argyle CMO Summit 2015 Mathew Sweezey
 
Collaboration Excellence: Strategies for Enabling a Social Business
Collaboration Excellence: Strategies for Enabling a Social BusinessCollaboration Excellence: Strategies for Enabling a Social Business
Collaboration Excellence: Strategies for Enabling a Social BusinessPerficient, Inc.
 
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...Suma Kamadod
 
Advanced demand supply integration
Advanced demand supply integrationAdvanced demand supply integration
Advanced demand supply integrationarmyguy1994
 
??? (Rutgers Innovation Key Note)
??? (Rutgers Innovation Key Note)??? (Rutgers Innovation Key Note)
??? (Rutgers Innovation Key Note)Bob Prieto
 

Similar a LIR's key role in vulnerability management (20)

TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-LookTomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
 
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
 
Digital disruption – dive in to thrive
Digital disruption – dive in to thriveDigital disruption – dive in to thrive
Digital disruption – dive in to thrive
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!
 
Interview with pam morris
Interview with pam morrisInterview with pam morris
Interview with pam morris
 
If you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoptionIf you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoption
 
12 Items You Need To Include In Your Mobile Healthcare App Brief
12 Items You Need To Include In Your Mobile Healthcare App Brief12 Items You Need To Include In Your Mobile Healthcare App Brief
12 Items You Need To Include In Your Mobile Healthcare App Brief
 
How to sell the vision & value of online community
How to sell the vision & value of online communityHow to sell the vision & value of online community
How to sell the vision & value of online community
 
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
 
The 2013 Social Business Benchmark Preliminary Findings
The 2013 Social Business Benchmark Preliminary FindingsThe 2013 Social Business Benchmark Preliminary Findings
The 2013 Social Business Benchmark Preliminary Findings
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!
 
Whitepaper interview with pam morris
Whitepaper  interview with pam morrisWhitepaper  interview with pam morris
Whitepaper interview with pam morris
 
Lessons Learned by Social Businesses, 10 June 2014
Lessons Learned by Social Businesses, 10 June 2014Lessons Learned by Social Businesses, 10 June 2014
Lessons Learned by Social Businesses, 10 June 2014
 
Building a Digital Supply Chain - report - 9 APR 2018
Building a Digital Supply Chain - report - 9 APR 2018Building a Digital Supply Chain - report - 9 APR 2018
Building a Digital Supply Chain - report - 9 APR 2018
 
Transforming Healthcare: Build vs Buy
Transforming Healthcare: Build vs BuyTransforming Healthcare: Build vs Buy
Transforming Healthcare: Build vs Buy
 
Argyle CMO Summit 2015
Argyle CMO Summit 2015 Argyle CMO Summit 2015
Argyle CMO Summit 2015
 
Collaboration Excellence: Strategies for Enabling a Social Business
Collaboration Excellence: Strategies for Enabling a Social BusinessCollaboration Excellence: Strategies for Enabling a Social Business
Collaboration Excellence: Strategies for Enabling a Social Business
 
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
 
Advanced demand supply integration
Advanced demand supply integrationAdvanced demand supply integration
Advanced demand supply integration
 
??? (Rutgers Innovation Key Note)
??? (Rutgers Innovation Key Note)??? (Rutgers Innovation Key Note)
??? (Rutgers Innovation Key Note)
 

Último

Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goasexy call girls service in goa
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 

Último (20)

Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 

LIR's key role in vulnerability management

  • 1. And why the LIR is a key factor M. Steltman - RIPE79 – 16-10-2019 The compelling case for vulnerability management
  • 2.
  • 3. Why are we vulnerable ? “We are vulnerable, because hard- and software has vulnerabilities. The bad guys find them and use them for themselves. So we need good guys to find them too, and then fix those leaks. It’s all we have” Bruce Schneier
  • 4. So, why don’t we just patch? 4
  • 5. The patching process for companies explained 5 ?
  • 6. Sounds easy but hard to achieve 100% 6 ?
  • 7. Too much to deal with 7
  • 8. 8 Digital Infrastructure, Including LIRs Companies with digital presence Financial servicesManufacturing Logistics Healthcare Retail MobilityGovernment Digital Services Plan B: Coordinated responsible disclosure / Bug bou Common approach: “Motivate” Add: Find and report
  • 10. => towards: CRD on steroids 10 Crawl and scan Crawl and scan Crawl and scan Crawl and scan Crawl and scan Crawl and scan networks Add performance information Collect and aggregate Forward & Policy Members & Constituents of:
  • 11. What can and should LIRs do? 11 ** Where does LIR responsibility start and stop **? -> LIR is NOT responsible, but is (as other intermediaries) a key actor in getting this going This goes way beyond ISP abuse mitigation! -LIR ( as ISP, hoster, CSP) is a key actor , the essential “middle man”: - Monitor: Which badness is visible in my networks: vulnerabilities and abuse - Receive: Subscribe to feeds, receive abuse- and vulnerability information - Triage: Who has the actual problem, which user or cusromer? - Forward: Who can and should fix this? - Policy: “motivate” users / customers to act, or act yourself
  • 12. Questions for RIPE community / LIRs 12 - Do you agree that this “actual vulnerability”approach can be very effective? - Do you agree that the LIR is a key middleman in this approach? Concrete actions for such LIRs, what can you already do NOW: - Start with this mindset - Update your policies, accept code of conduct NtD and Abuse - Be reachable ! - Subscribe to offered aggregated feeds - Forward info and act , to customers / users - Using standard OSS systems such as Abuse-IO • If this initiative will start, are YOU prepared to participate ?
  • 13. 13 The current approach : motivate companies to patch 100%, is insufficient The solution: Find ACTUAL leaks, aggregate, add performance info Then forward to those who can fix– or who can make someone fix In NL: All we need is already there! Just need to go on steroids Gov: (NCSC): please take the lead, connect the dots Providers / LIRS: Adopt the CoC , connect to NBIP and start making a difference In your country: replicate the model ** It is time to act, now! **

Notas del editor

  1. And again: we are vulnerable. Very vulnerable. VPns vulnerabilities: as if your staff entry is open for everybody Our scientific councel has said it: this van lead to diusrutions of society. What is vital and what not. Anything can turn out to be vital if it is donw or compromised long enough It reall, is time to act. But how?
  2. I was on a OECD congres last year, with Nelly, inspired by bruce. He made the matter very simple. Let start with the technology. It is nog the only thing, but if that;s not safe,
  3. Our approach: complain about vulnerabiloiies, strong language: we must patch, whi do;t we do it ? And if you don;t, you are apparently neglicent and lazy. Shame on you? Is it thast simple?
  4. Let take a look at how it works. It sounds easy enough: Know your software Crawl the CVE database Go to your supplier Update and patch your systems done. We are all a lot safer!
  5. But is hard, and cumvbersome,e VCE has 20000 entries, Huge task to know your inventor and know when to patch. Easy to overlook one. vendos don;t always supply patches. And llots of your technologies atre with third parties, your hosters, SaaS providers. They can overloop patches too.
  6. To make things worse, patching breaks things. Lots of outages are caused by patching And then the minister will say “I am going to ibtervene with companies who don’t manage their availability ? There are too many patches to keep up with Patching is a manual, time consuming process Lack of resources Some applications can’t be patched End user resistance Patching breaks things
  7. Plan B: scan for things you see from the Internet. Act as the bad guys do. Then report to the compny who can fix this
  8. So here is the plan: Put RD on steroids. It is a simple formula, that many of you recognize from other problems. Scan Forward and aggregate Add: sticks and carrots Then: send to those who do not have the problemj themselves, but KNOW who hasve the problem. LIR’s, hosters, providers. They KNOW whio is reponsible, understand the technical details, can formulate the right call to action.