Lean Security - OWASP Austin March 2016

64
#LEAN SECURITY @ERNESTMUELLER // THEAGILEADMIN.COM // OWASP AUSTIN MARCH 2016

Transcript of Lean Security - OWASP Austin March 2016

Page 1: Lean Security - OWASP Austin March 2016

#LEANSECURITY

@ERNESTMUELLER // THEAGILEADMIN.COM // OWASP AUSTIN MARCH 2016

Page 2: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

THEAGILEADMIN.COM

ERNEST MUELLER

JAMES WICKETT@wickett

@ernestmueller

Page 3: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

THE PRESENTATION THAT JUST MIGHT

CHANGE YOUR LIFE…

Page 4: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

COMPANIES ARE SPENDING A GREAT DEAL ON SECURITY, BUT WE READ OF MASSIVE COMPUTER-RELATED ATTACKS. CLEARLY SOMETHING IS

WRONG.

THE ROOT OF THE PROBLEM IS TWOFOLD: WE’RE PROTECTING

(AND SPENDING MONEY ON PROTECTING) THE WRONG THINGS, AND WE’RE HURTING PRODUCTIVITY

IN THE PROCESS.Source: Thinking Security (2005), Steven M. Bellovin

Page 5: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

Page 6: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

AGILE

Page 7: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

WHAT IS AGILE?• INDIVIDUALS AND INTERACTIONS OVER PROCESSES AND TOOLS

• WORKING SOFTWARE OVER COMPREHENSIVE DOCUMENTATION

• CUSTOMER COLLABORATION OVER CONTRACT NEGOTIATION

• RESPONDING TO CHANGE OVER FOLLOWING A PLAN

SOURCE: THE AGILE MANIFESTO (HTTP://WWW.AGILEMANIFESTO.ORG/)

Page 8: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

WHY AGILE?• 45% OF ORGANIZATIONS ARE USING AGILE ON A MAJORITY OF

THEIR TEAMSONLY 5% ARE NOT USING IT AT ALL

• AGILE RESULTS:• ACCELERATE PRODUCT DELIVERY - 59% • ENHANCE ABILITY TO MANAGE CHANGING PRIORITIES - 56% • INCREASE PRODUCTIVITY - 53% • ENHANCE SOFTWARE QUALITY - 46% • ENHANCE DELIVERY PREDICTABILITY - 44%

SOURCE: VERSIONONE NINTH ANNUAL STATE OF AGILE SURVEY (HTTPS://WWW.VERSIONONE.COM/PDF/STATE-OF-AGILE-DEVELOPMENT-SURVEY-NINTH.PDF)

Page 9: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

Page 10: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

Page 11: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

WHAT IS DEVOPS?DEVOPS IS THE PRACTICE OF OPERATIONS AND DEVELOPMENT ENGINEERS PARTICIPATING TOGETHER IN THE ENTIRE SERVICE LIFECYCLE, FROM DESIGN THROUGH THE DEVELOPMENT PROCESS TO PRODUCTION SUPPORT.

DEVOPS IS ALSO CHARACTERIZED BY OPERATIONS STAFF MAKING USE MANY OF THE SAME TECHNIQUES AS DEVELOPERS FOR THEIR SYSTEMS WORK.

SOURCE: THE AGILE ADMIN: WHAT IS DEVOPS? HTTP://THEAGILEADMIN.COM/WHAT-IS-DEVOPS/

Page 12: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

WHY DEVOPS?• BY 2016 “DEVOPS WILL EVOLVE FROM A NICHE TO A MAINSTREAM STRATEGY EMPLOYED BY 25% OF GLOBAL 2000 ORGANIZATIONS” - GARTNER, MARCH 2015

• BENEFITS OF DEVOPS:• NEW SOFTWARE/SERVICES THAT WOULD OTHERWISE NOT BE

POSSIBLE - 21%• A REDUCTION IN TIME SPENT FIXING AND MAINTAINING

APPLICATIONS - 21%• INCREASED COLLABORATION BETWEEN DEPARTMENTS - 21%• AN INCREASE IN REVENUE - 19%• IMPROVED QUALITY AND PERFORMANCE OF OUR DEPLOYED

APPLICATIONS - 19%SOURCE: CA RESEARCH REPORT—DEVOPS: THE WORST-KEPT SECRET TO WINNING IN THE

APPLICATION ECONOMY (HTTP://REWRITE.CA.COM/US/ARTICLES/DEVOPS/RESEARCH-REPORT--DEVOPS-THE-WORST-KEPT-SECRET-TO-WINNING-IN-THE-APPLICATION-ECONOMY.HTML)

Page 13: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

HIGH-PERFORMING IT ORGANIZATIONS EXPERIENCE 60X FEWER FAILURES AND RECOVER FROM FAILURE 168X FASTER THAN THEIR LOWER-PERFORMING PEERS. THEY ALSO DEPLOY 30X MORE FREQUENTLY WITH 200X SHORTER LEAD TIMES.

Page 14: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

LEAN

Page 15: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

LEAN SOFTWARE DEVELOPMENTSEVEN PRINCIPLES:

• ELIMINATE WASTE

• AMPLIFY LEARNING

• DECIDE AS LATE AS POSSIBLE

• DELIVER AS FAST AS POSSIBLE

• EMPOWER THE TEAM

• BUILD INTEGRITY IN• SEE THE WHOLE

SOURCE: LEAN SOFTWARE DEVELOPMENT: AN AGILE TOOLKIT (2003), MARY AND TOM POPPENDIECK

Page 16: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

LEAN PRODUCT DEVELOPMENT

• BUILD-MEASURE-LEARN• BUILD – MINIMUM VIABLE PRODUCT• MEASURE – THE OUTCOME AND INTERNAL

METRICS• LEARN – ABOUT YOUR PROBLEM AND YOUR

SOLUTION• REPEAT – GO DEEPER WHERE IT’S NEEDED

SOURCE: LEAN STARTUP (2011), ERIC RIES

Page 17: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

WHY LEAN?• BOTH DEVOPS AND AGILE BORROW KEY

CONCEPTS FROM LEAN MANUFACTURING, SO IT'S ALL ABOUT COMMUNICATION AND OPENNESS." -INFORMATIONWEEK

Page 18: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

WHAT ARE THE CHALLENGES THATAGILE / DEVOPS /

LEAN POSE TO INFOSEC?

Page 19: Lean Security - OWASP Austin March 2016

WRONG QUESTION!

Page 20: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

INSTEAD, EXAMINE HOW ADOPTING THESE

STRATEGIES CAN HELP YOU WIN

Page 21: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

LEAN SECURITY IS FOR WINNERS

Page 22: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

THE SIX-FOLD PATH OF LEAN SECURITY (AND HOW TO WIN)

Page 23: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

#1 SECURITY IS JUST BEANCOUNTING

Page 24: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

“[RISK ASSESSMENT] INTRODUCES A DANGEROUS FALLACY: THAT STRUCTURED INADEQUACY IS ALMOST AS GOOD AS ADEQUACY AND

THAT UNDERFUNDED SECURITY EFFORTS PLUS RISK MANAGEMENT ARE ABOUT AS GOOD AS PROPERLY FUNDED

SECURITY WORK” SOURCE: THE TANGLED WEB (2011), MICHAEL ZALEWSI

Page 25: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

WE TRADED ENGINEERING FOR ACTUARIAL DUTIES

Page 26: Lean Security - OWASP Austin March 2016
Page 27: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

A SECURITY MANAGEMENT SYSTEM PROVIDES OPTIMAL VALUE TO THE ORGANIZATION IF IT:

• ACTIVELY SUPPORTS ACHIEVING THE BUSINESS AND COMPLIANCE OBJECTIVES OF THE ORGANIZATION (THE VARIABLE PART)

• IS AN EFFICIENT, AGILE AND INTEGRATED PROCESS, CAPABLE OF DEALING WITH A DYNAMIC THREAT ENVIRONMENT

• CONSUMES MINIMAL TIME AND RESOURCES• RESULTS IN ADEQUATELY MANAGED SECURITY RISK,

IN LINE WITH THE RISK APPETITE OF THE ORGANIZATION

• PROVIDES ONLY THE NECESSARY, YET ADEQUATE, USER FRIENDLY, EFFICIENT AND MEASURABLE SECURITY CONTROLS

SOURCE: JOHAN BAKKER, LEAN SECURITY MANAGEMENT WHITE PAPER

Page 28: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

UNDERSTAND THE VALUE YOUR

ORGANIZATION NEEDS FROM YOU

Page 29: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

#2SECURITY IS A BOTTLENECK

Page 30: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

THE AVERAGE TIME TO DELIVER CORPORATE IT

PROJECTS HAS INCREASED FROM ~8.5 MONTHS TO OVER

10 MONTHS IN THE LAST 5 YEARS

Revving up your Corporate RPMs, Fortune Magazine, Feb 1, 2016

Page 31: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

WHY ARE COMPANIES SO SLOW?

THE GROWTH OF CONTROL AND RISK MANAGEMENT FUNCTIONS WHICH IS TOO OFTEN POORLY

COORDINATED… RESULTING IN] A PROLIFERATION OF NEW TASKS IN

THE AREAS OF COMPLIANCE, PRIVACY AND DATA PROTECTION.

Revving up your Corporate RPMs, Fortune Magazine, Feb 1, 2016

Page 32: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

Page 33: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

THE THREE WASTES• MUDA - WORK WHICH ABSORBS RESOURCE

BUT ADDS NO VALUE• MURI - UNREASONABLE WORK THAT IS

IMPOSED ON WORKERS AND MACHINES• MURA - WORK COMING IN DRIBS AND

DRABS WITH SUDDEN PERIODS OF RUSH RATHER THAN A CONSTANT OR REGULAR FLOW, UNEVENNESS.

Page 34: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

SECURITY WASTEMUDA COMES IN SEVEN FORMS:• EXCESS INVENTORY - DUMPING YOUR THOUSAND

PAGE PDF OF VULNERABILITIES ON A BUSY TEAM. PRIORITIZE AND LIMIT WORK IN PROGRESS (WIP)

• OVERPRODUCTION - SECURITY CONTROLS STEMMING FROM FUD OR MISALIGNMENT WITH BUSINESS NEEDS (NOT DEMANDED BY ACTUAL CUSTOMERS) - CF. PHOENIX PROJECT

• EXTRA PROCESSING - FOR EXAMPLE, RELYING ON COMPLIANCE TESTING RATHER THAN DESIGNING THE PROCESS TO ELIMINATE PROBLEMS - HELP IT GET BUILT RIGHT FIRST

Page 35: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

SECURITY WASTE• HANDOFFS - LEVERAGE THE KNOWLEDGE OF THE TEAMS

DOING THE WORK AND COLLABORATE WITH THEM TO BUILD SECURITY IN, INSTEAD OF THAT BEING SOME OTHER TEAM’S JOB

• WAITING - LAG BETWEEN VALUE STEPS WAITING FOR APPROVALS OR ANALYSES OR TICKET HANDLING - USE SELF SERVICE AUTOMATION INSTEAD

• TASK SWITCHING - THE THOUSAND PAGE PDF AGAIN - WORK WITH THEIR WORK INTAKE PROCESS NOT AGAINST IT

• DEFECTS - FALSE POSITIVES AND FALSE NEGATIVES AND JUST PLAIN UNIMPORTANT FINDINGS YOU REPORT CAUSING ZERO-VALUE REWORK

Page 36: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

UNDERSTAND THE WASTE THAT YOU

GENERATE

Page 37: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

#3SECURITY IS

INVISIBLE

Page 38: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

SECURITY PROFESSIONALS

ARE QUICK TO SAY SECURITY IS

EVERYONE’S JOB

Page 39: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

SECURITY COULD LEARN FROM WEB PERFORMANCE

CIRCA 2008

Page 40: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

PERFORMANCE• BROWSER EXTENSIONS FOR DEVS TO

UNDERSTAND PERFORMANCE PROBLEMS• RESEARCH SHOWING PERFORMANCE TO

REVENUE CORRELATION • SEARCHABLE LOGS EMITTING STATSD METRICS• CONFERENCES COMBINING FRONT END DEVS

AND SYS ADMINS• COMMITMENT TO INSTRUMENT AND GRAPH ALL

THE THINGS

Page 41: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

SECURITY• BROWSER EXTENSIONS FOR DEVS TO

UNDERSTAND SECURITY PROBLEMS• RESEARCH SHOWING SECURITY TO REVENUE

CORRELATION • SEARCHABLE LOGS EMITTING STATSD METRICS• CONFERENCES COMBINING DEVS OPS AND

SECURITY• COMMITMENT TO INSTRUMENT AND GRAPH ALL

THE THINGS

Page 42: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

SEE THE WHOLE• KEEP MEANINGFUL METRICS, MAKE THOSE

METRICS VISIBLE - IN CONTEXT OF WORKERS’ TOOLCHAIN

• “LEAST PRIVILEGE” NEEDS TO BE UNLEARNED SOMEWHAT IN MODERN ORGANIZATIONS TO ALLOW EFFECTIVE INFORMATION SHARING

• GET IN BUSINESS OF SHARING AND ADDING VISIBILITY TO DEV AND TO OPS.

Page 43: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

VISUALIZE SECURITY SO

EVERYONE CAN SEE

Page 44: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

#4SECURITY IS ALWAYS

TOO LATE

Page 45: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

– W. EDWARDS DEMING

“CEASE DEPENDENCE ON MASS INSPECTION TO ACHIEVE QUALITY. IMPROVE THE PROCESS AND BUILD QUALITY INTO THE PRODUCT IN THE

FIRST PLACE."

Page 46: Lean Security - OWASP Austin March 2016

SOURCE: THE THREE WAYS OF DEVOPS, GENE KIM

Page 47: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

BE MEAN TO YOUR CODE

EARLIER IN THE DEVELOPMENT

PROCESSENTER GAUNTLT…

Page 48: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

@slow @finalFeature: Look for cross site scripting (xss) using arachni against a URL

Scenario: Using arachni, look for cross site scripting and verify no issues are found Given "arachni" is installed And the following profile: | name | value | | url | http://localhost:8008 | When I launch an "arachni" attack with: """ arachni —check=xss* <url> """ Then the output should contain "0 issues were detected."

Given

When

Then

What?

AN ATTACK LANGUAGE FOR DEVOPS

Page 49: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

Page 50: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

Page 51: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

http://theagileadmin.com/2015/06/09/pragmatic-security-and-rugged-devops/

Page 52: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

GENERATE SECURITY FEEDBACK IN EACH STEP IN THE VALUE

STREAM

Page 53: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

#5 SECURITY IS ALWAYS IN

THE WAY

Page 54: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

ARE YOU “THAT GUY?”• YOU ALREADY KNOW

YOU CAN’T MAKE THINGS SECURE BY YOURSELF

• YOU NEED EVERYONE ELSE TO COOPERATE WITH YOU

• BUT DOES IT SEEM LIKE THE THINGS YOU DO JUST ANGER THEM?

Page 55: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

EMPOWER THE TEAM• UNDERSTAND HUMAN

MOTIVATION• NETFLIX AUTOMATION

CREATED SAFE PATHS AS THE DEFAULT

• AUTOMATING PROCESS REMOVES EMOTIONAL CHARGE

Page 56: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

SELF SERVICE AUTOMATION

Page 57: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

#6SECURITY IS PERFECTIONIST

AND IS THEREFORE UNREALISTIC

Page 58: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

SECURITY IS YOUR PRODUCT

Page 59: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

Page 60: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

BUILD-MEASURE-LEARN• DELIVER MINIMAL VIABLE SECURITY ACROSS

EVERYTHING • FOCUS ON DETECTION/METRIC GATHERING• ITERATE FROM THERE• REMEMBER THE WEAKEST LINK WINS• OVERLAP SMALLER SOLUTIONS - SEE JOSH

MORE’S OWASP 2012 “LEAN SECURITY 101” PRESENTATION

Page 61: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

MANAGE YOUR PRODUCT

Page 62: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

WE’VE BEEN THERE

Page 63: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

QUESTIONS?

Page 64: Lean Security - OWASP Austin March 2016

@ERNESTMUELLER // THEAGILEADMIN.COM // #LEANSECURITY

THEAGILEADMIN.COM

ERNEST MUELLER

JAMES WICKETT@wickett

@ernestmueller