HACKERS & ATTACK ANATOMY Ted Harrington, Executive Partner | Ted.Harrington@securityevaluators.com ISE Proprietary Why is this important? ISE Proprietary Attacks About ISE III. Security vs. Functionality I. Assets vs. Perimeters IV. Build In vs. Bolt On II. Black Box vs. White Box V. Ongoing vs. Periodic ISE Confidential - not for distribution ISE Proprietary ISE Proprietary ISE Proprietary About ISE Perspective • White box Analysts • Hackers; Cryptographers; RE Exploits • iPhone; Android; Ford; Exxon; Diebold Research • Routers; NAS; Healthcare Customers • Companies w/ valuable assets to protect ISE Proprietary ISE Proprietary ISE Proprietary I. Secure Assets, Not Just Perimeters ISE Proprietary I. Secure Assets, Not Just Perimeters Traditional Attacks Traditional Defenses ISE Proprietary 1 1 I. Secure Assets, Not Just Perimeters ISE Proprietary 1 2 I. Secure Assets, Not Just Perimeters ISE Proprietary 1 3 ISE Proprietary II. Black Box Penetration Tests == Good ISE Proprietary II. Black Box Penetration Tests == Good White box vulnerability assessment == GOOD! ISE Proprietary II. Black Box vs. White Box • Access Level • Black Box • White Box • Evaluation Types • Penetration Test • Vulnerability Assessment ISE Proprietary II. Black Box vs. White Box Black Box Perspective ISE Proprietary II. Black Box vs. White Box White Box Perspective ISE Proprietary II. Black Box vs. White Box ISE Proprietary II. Black Box vs. White Box Black Box White Box Time/cost 2 mo. / 200 hrs. 2 mo. / 200 hrs. Severe issues 4 potential issues 1 confirmed 11 confirmed Other issues none 10 confirmed no recommendations 21+ mitigation strategies Completeness/Confidence very low high Cost/issue 200+ hrs. ~9 hrs. 8 ~9 hrs. Results Cost/solution ISE Proprietary ISE Proprietary SOHO Routers: Outcomes Models Attacks Compromise Goals 10 Any Results 13 Remote, Local, Both >30% 100% Broken ISE Proprietary ISE Proprietary ISE Proprietary ISE Proprietary III. Security vs. Functionality ISE Proprietary III. Security vs. Functionality EMBARRASSINGLY OVERSIMPLIFIED CORPORATE STRUCTURE SALES IT FUNCTIONALITY IT HR IT SECURITY ISE Proprietary ... III. Security vs. Functionality EMBARRASSINGLY OVERSIMPLIFIED CORPORATE STRUCTURE SALES IT FUNCTIONALITY IT HR IT SECURITY ISE Proprietary SECURITY … III. Security vs. Functionality CONFLICT IS GOOD! ISE Proprietary III. Security vs. Functionality ISE Proprietary I. Security Separated From Functionality ISE Confidential - not for distribution I. Security Separated From Functionality ISE Confidential - not for distribution I. Security Separated From Functionality ISE Confidential - not for distribution ISE Proprietary ISE Proprietary ISE Confidential - not for distribution ISE Confidential - not for distribution IV. “Build It In,” Not “Bolt It On” ISE Proprietary IV. “Build It In,” Not “Bolt It On” ISE Proprietary IV. “Build It In,” Not “Bolt It On” Determine business & user needs Develop threat model Define architecture Design defense in depth Coding Audit code System testing White box vulnerability assessment DEPLOYMENT Customer roll-out Configuration Guidance MAINTENANCE Resolve bugs Iteration Hardening REQUIREMENTS DESIGN IMPLEMENTATION TESTING ISE Proprietary IV. “Build It In,” Not “Bolt It On” Built In Bolted On Assessment cost 90% 100% Assessment overhead --- --- Mitigation cost / issue 1x 25x : application 300x : infrastructure ISE Proprietary ISE Proprietary ISE Confidential - not for distribution V. Security as Ongoing Process ISE Proprietary V. Security as Ongoing Process ISE Proprietary V. Security as Ongoing Process ISE Proprietary V. Security as Ongoing Process ISE Proprietary V. Security as Ongoing Process Initial assessment cost Full scope reassessment cost Full assessments / year Cost / year Yearly Bi-yearly Quarterly X X X 90-95% 35-45% 20-30% 1 2 4 X (0.9) X (0.7) X (0.8) ISE Proprietary Actionable Guidance Do: • Protect assets • Get 3rd party security assessments • Have a security person/team • Build security in • Perform security ongoing Don’t: • Focus just on perimeter • Rely on black box • Have security & IT as same • Bolt security on • Assess longer than biannually ISE Proprietary Get Involved ISE Proprietary Ted Harrington Executive Partner ted.harrington@securityevaluators.com ISE Proprietary