Fostering Maturity Through a Security Lifecycle: An OSS Case Study

34
@roobixx #POSSCON Fostering Maturity Through a Security Lifecycle: An OSS Case Study Slide 1 of 412

Transcript of Fostering Maturity Through a Security Lifecycle: An OSS Case Study

@roobixx#POSSCON

Fostering Maturity Through a Security Lifecycle:An OSS Case Study

Slide 1 of 412

@roobixx#POSSCON

@roobixx#POSSCON

Info:

● Tim Fowler - OSWP

● Security Consultant, mountainsec, LLC

● Asheville, NC

● Open Source Developer & Practitioner

● @roobixx

@roobixx#POSSCON

Before we get ramped up let's get a few things straight...

@roobixx#POSSCON

COMPLIENCE != SECURITY

@roobixx#POSSCON

IT != SECURITY

@roobixx#POSSCON

IT != SECURITYBut IT is part of Security

@roobixx#POSSCON

State of Security 2015

@roobixx#POSSCON

Security is hard*

@roobixx#POSSCON

THIS IS PART OF REASON THIS IS PART OF REASON SECURITY IS HARD!SECURITY IS HARD!

@roobixx#POSSCON

Many of us are failing epically

Doesn't matter because it is Doesn't matter because it is already opened...already opened...

@roobixx#POSSCON

@roobixx#POSSCON

@roobixx#POSSCON

RESULTS…

@roobixx#POSSCON

@roobixx#POSSCON

It doesn't have to be this way

@roobixx#POSSCON

Time to ask some questions

● How are “they” doing security?

● What do “they” have that we don't?

● What do “they” know that we really should?

● How can we reduce the gap?

@roobixx#POSSCON

The #1 difference we found between enterprise security

operations and everyone else was INSIGHT

@roobixx#POSSCON

Open Source can help you and your organization gain the INSIGHT you

are lacking

@roobixx#POSSCON

Insight starts with knowing what you have.Do an inventory of everything. Machines,

software ...and people.

@roobixx#POSSCON

You can't protect that which you do not you are charged with

protecting.

@roobixx#POSSCON

Security starts at Layer 0. Not the physical layer but it starts with your people.

People > Things

@roobixx#POSSCON

Insight

● Inventory (Everything)

● Know how it all fits together

● Know your business

● Know your risk

● Know the impact

● Determine your baseline

@roobixx#POSSCON

What is suspicious on your network?

@roobixx#POSSCON

You can't determine what is suspicious until you know what normal is.

@roobixx#POSSCON

Security is never done. Once you start, you never will stop. You just

need to get started

@roobixx#POSSCON

Security Lifecycle

@roobixx#POSSCON

@roobixx#POSSCON

@roobixx#POSSCON

It will take time to make it through a cycle.

@roobixx#POSSCON

We did not make it past Insight.

@roobixx#POSSCON

@roobixx#POSSCON

These Open Source tools and platforms allows organizations to

go from ZERO to INSIGHT without breaking the bank or

disrupting business

@roobixx#POSSCON

Utilizing the power of open source, you can finally answer

the question...”What is normal?”