Immune IT: Moving from Security to Immunity
-
Upload
amiableindian -
Category
Technology
-
view
1.503 -
download
0
Transcript of Immune IT: Moving from Security to Immunity
![Page 1: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/1.jpg)
Immune ITMoving from Security to Immunity...
-Ajit Hatti
ClubHack 2008 Presentation
![Page 2: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/2.jpg)
Contents - I
Security : What is it?
Security : Why we need it?
Security : How we see it?
Security : What does it cost?
Security : Do we own it?
Security : How much is adequate?
![Page 3: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/3.jpg)
Contents II
Immunity : What is it?
Immunity : How much does it cost?
Immunity : Who is responsible?
Immunity : How to get it?
![Page 4: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/4.jpg)
Contents III
Requirement Gathering & Analysis
Designing a Solution
Coding & Reviews
Testing
Documentation/User Guide
Deployment
Maintenance
![Page 5: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/5.jpg)
Security : What is it?
![Page 6: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/6.jpg)
Security: Why do we need it?
![Page 7: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/7.jpg)
Security: How we see it?
![Page 8: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/8.jpg)
Security : What does it cost?
An average annual Security Overheads incurred at prime organizations
Expense incurred on security system - 20%
Computational resources engaged in security operations - 15%
Each person spending time on securing personal assets - 21%
Latency introduced due to security operations per connection - 2 sec / MB.
Data transfer only for security updates - 17 %
And these figures are bound to increase. (http://www.itbusinessedge.com/blogs/top/?p=207)
![Page 9: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/9.jpg)
Security : Do we own it?
![Page 10: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/10.jpg)
Security: How much is adequate?
![Page 11: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/11.jpg)
Immunity: What is it?
![Page 12: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/12.jpg)
Immunity: How much does it costs?
![Page 13: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/13.jpg)
Immunity: Who is Responsible?
![Page 14: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/14.jpg)
Immunity: How to achieve it?
Embedding Security in each and every steps of our engineering process.
Practice Security; integrate it in all operations.
Greater awareness.
![Page 15: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/15.jpg)
Requirement Gathering & AnalysisImplicit Security ConsiderationsExplicit Security Considerations
![Page 16: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/16.jpg)
Designing a Solution Confidentiality
Enforcing access privileges. Encryption & Leakage prevention.
Integrity Defining the limits Backup and Recovery
Availability Business Continuity Plan. Troubleshooting & Failure recovery support
![Page 17: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/17.jpg)
Coding and Reviews Code Should be :
Less Clear Secure
Review for : Validations Possible memory corruptions Initializations
![Page 18: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/18.jpg)
Testing
Sanity Checks Challenging Access control Fuzzing Vulnerability and Pen-Testing Dog fooding
![Page 19: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/19.jpg)
Documentation/User Guides
Enforcing access control & encryption. Changing the default configurations, settings
and passwords. Methods of backup and recovery etc. Advisory on best practices, do’s and don’ts. Known issues and workarounds.
![Page 20: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/20.jpg)
Deployment & Maintanance
Deploy the solutions with feasibly best & secure configuration.
Follow best practices. Apply security updates, patches provided by
vendors. Conduct security audits for the system
![Page 21: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/21.jpg)
Security is defined by CIA. Addressing CIA at each phases of engineering
results in Immunity. Security must be integrated in our thoughts,
process and operations. Immunity comes through ownership of security.
Conclusion
![Page 22: Immune IT: Moving from Security to Immunity](https://reader036.fdocuments.in/reader036/viewer/2022070603/54bc2fd84a79592a738b45b8/html5/thumbnails/22.jpg)