SlideShare a Scribd company logo
1 of 31
Download to read offline
Building Security at Scale
P R E S E N T E D B Y A l e x S t a m o s B l a c k H a t U S A 2 0 1 4 | A u g u s t 7 , 2 0 1 4
Agenda
▪ The Security Industry and Web Scale Problems
!
▪ Combating Security Nihilism
!
▪ What is Yahoo doing about it?
2
Theses
3
▪ The security industry has failed to consider the needs of
scale, including diversity of user base
!
▪ A post-Snowden nihilism is affecting our industry’s
approach to securing users
!
▪ Enterprise security teams need to evolve to proactively
gain trust
The Security Industry and Web
Scale Problems
5
What do I mean by scale?
Amount of
!
› Data
› Systems
› Users
Diversity of
!
› Users
› Threat Models
Who is the prototypical customer of security products?
6
7
Big Banks Web Scale
Customers x 10 x 10
Concurrent Users x 10 x 10
Front-End Servers x 10 x 10
Total Servers x 10 x 10
Customer Value $100’s $.01s
Cust Stickiness High Low-Medium
Meat-Space Identity Strong Weak
Post-Facto Action? Yes Rarely
8
Most security companies
are aiming for this
Our reality is more like this
[1]
[1] Flickr user Kevin Gebhart CC BY-NC-SA 2.0
[2] Flickr user Dan Buczynski CC BY-NC-ND 2.0
[2]
Things People Try to Sell Us
What they try to sell us:
10
Super smart pizza boxes
Software sensors with
centralized intelligence
What we would buy:
[1]
[1] Flickr user ms.akr CC BY 2.0
[2] Flickr user Mike Fleming CC BY SA 2.0
[2]
11
Arista 7508E
1152 x 10GbE
30Tbps backplane
5kW
Palo Alto 7050
120Gbps throughput
2.4kW
12
5kW
600kW
What they try to sell us:
Databased back SIEM
Hadoop based
anomaly detection
What we would buy:
[1]
[1] Flickr user Bob Mical CC BY 2.0
What they try to sell us:
14
Windows Anti-APT
Virtualization or
Kernel Firewall
Docker HIDS
What we would buy:
[1]
[1] Flickr user broterham CC BY NC 2.0
!
Free Business Ideas
15
▪ Freemium Key Management System
› Bootstrap via manual approval, trust in network, or remote attestation
› Create master cert, view into corporate keyspace with lazy security checks
!
▪ Freemium Overlay Network
› Goes great with key manager!
› Allow for easy IP management across public/private cloud
› Could be IPv6 only. Terminate inside of containers?
!
▪ Bug Bounty with Automatic Verification
› We’re building this ourselves with Selenium
More Free Ideas
16
▪ ARM CoreOS Servers with Lightweight Remote Attestation
› ARM is going to be big in Big Data environments
› At scale building systems remotely is currently terrifying
› Any scale organization does not have 100% physical control
!
▪ OpenSSL with Remotable Handshake
› Why are we putting private keys on the most exposed systems?
› Need to remote the handshake to an HSM or TXT backed key server
› Should get 20:1 ratio
Breaking through the excuses
Security Nihilism
18
Ve believe zat nothing…
ist secure enough vor ze real world, Lebowski!
Flickr user Joe Goldberg CC BY-SA 2.0
[1]
[1]
19
“Your system is not secure against this [advanced attack|unlikely
scenario] therefore it shouldn’t exist”
“That’s just security through obscurity!”
We need to build systems for all levels of user and adversary
Non-obvious protections can increase the chance of catching
an attacker in time, especially for interactive systems
20
“The [NSA|FSB|PLA] will just own up the user’s system and get the
data that way”
“Users are idiots and will screw this up”
Forcing an adversary to expend resources and
risk detection is a valid goal
A system is only secure if it is safe, by default,
for the 25th percentile user
What are we doing about it?
The New Yahoo Paranoids
22
CISO
Corp Security
Operations and
Monitoring
Product Security
Engineering
Paranoid Labs PenetrationTesting
Intelligence,
Investigations and
Response
Risk and
Vulnerability
Management
Privacy Engineering
Chief of Staff
New Yahoo Paranoids
23
Chris Rohlf Doug DePerry Yan Zhu
24
Transport Encryption
Complete
!
› TLS 1.2
› ECDH(E)
› AES-GCM
› RSA 2048
Next up
!
› HSTS and pre-load
› ECDSA certificates
› Certificate Transparency
› ChaCha20 and Poly1305
› STARTTLS Pinning
Backbone Encryption
25
Self-Service Security
26
▪ Our scaling challenges in providing app sec services:
› Breadth: 80+ products in 60+ countries
› Speed: multiple daily web pushes and weekly mobile
!
▪ Any large org needs to create self-service options
› Mobile libraries
• Authentication and device identity
• TLS with pinning
› Mobile code scanning portal
› CI/CD Scanner integration
• Open-source coming!
Bug Bounty
27
Bug Bankruptcy
28
▪ Important factors in getting bugs closed:
› Detailed descriptions and mitigation instructions
› Accurate prioritization
› Consistent follow-up and real-time reporting
› Executive visibility
› Convincing company that you are a madman
Works well for me
29
The Future is Bright
30
▪ Our profession has never been so impactful on…
› Individuals
› Nation-States
› History
!
▪ With great power…
› It is impossible to work in this field without being a moral actor
!
▪ Remember that trust is more than security!
!
▪ Take this opportunity to do something that you will remember with
pride
Thank you
!
stamos@yahoo-inc.com

More Related Content

What's hot

DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019 Elizabeth Ayer
 
Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Priyanka Aash
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOpJames Wickett
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019James Wickett
 
DevSecOps - Building continuous security into it and app infrastructures
DevSecOps - Building continuous security into it and app infrastructuresDevSecOps - Building continuous security into it and app infrastructures
DevSecOps - Building continuous security into it and app infrastructuresPriyanka Aash
 
Building an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineBuilding an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineMatt Tesauro
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Adrian Sanabria
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonDevSecCon
 
Failure is inevitable but it isn't permanent
Failure is inevitable but it isn't permanentFailure is inevitable but it isn't permanent
Failure is inevitable but it isn't permanentTom Stiehm
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps OverviewAdrian Sanabria
 
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world casesDevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world casesDevSecCon
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Nick Galbreath
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
Attacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryAttacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryJames Wickett
 
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSecAppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSecJames Wickett
 
The Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpThe Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpJames Wickett
 
How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security peoplePriyanka Aash
 
CSA Raleigh application security and deception in the cloud
CSA Raleigh   application security and deception in the cloudCSA Raleigh   application security and deception in the cloud
CSA Raleigh application security and deception in the cloudPhillip Maddux
 

What's hot (20)

The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019
 
Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOp
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019
 
DevSecOps - Building continuous security into it and app infrastructures
DevSecOps - Building continuous security into it and app infrastructuresDevSecOps - Building continuous security into it and app infrastructures
DevSecOps - Building continuous security into it and app infrastructures
 
Building an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineBuilding an Open Source AppSec Pipeline
Building an Open Source AppSec Pipeline
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
 
Failure is inevitable but it isn't permanent
Failure is inevitable but it isn't permanentFailure is inevitable but it isn't permanent
Failure is inevitable but it isn't permanent
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
 
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world casesDevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Attacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryAttacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous Delivery
 
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSecAppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
 
The Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpThe Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOp
 
How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security people
 
CSA Raleigh application security and deception in the cloud
CSA Raleigh   application security and deception in the cloudCSA Raleigh   application security and deception in the cloud
CSA Raleigh application security and deception in the cloud
 
Defining DevSecOps
Defining DevSecOpsDefining DevSecOps
Defining DevSecOps
 

Similar to Security at Scale - Lessons from Six Months at Yahoo

Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...Bruno Caseiro
 
Cloud Security and OSI layer 2 - the layer oft forgotten
Cloud Security and OSI layer 2 - the layer oft forgottenCloud Security and OSI layer 2 - the layer oft forgotten
Cloud Security and OSI layer 2 - the layer oft forgottenRoderick Commerell
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon usJonathan Sinclair
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP securityERPScan
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity nado-web
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"Aaron Rinehart
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012DaveEdwards12
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...Amazon Web Services
 
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfPhilSmith165
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
Web 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with SchellmanWeb 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with Schellmansaastr
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 

Similar to Security at Scale - Lessons from Six Months at Yahoo (20)

Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
 
Cloud Security and OSI layer 2 - the layer oft forgotten
Cloud Security and OSI layer 2 - the layer oft forgottenCloud Security and OSI layer 2 - the layer oft forgotten
Cloud Security and OSI layer 2 - the layer oft forgotten
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon us
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
 
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Web 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with SchellmanWeb 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with Schellman
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 

Recently uploaded

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 

Recently uploaded (11)

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 

Security at Scale - Lessons from Six Months at Yahoo

  • 1. Building Security at Scale P R E S E N T E D B Y A l e x S t a m o s B l a c k H a t U S A 2 0 1 4 | A u g u s t 7 , 2 0 1 4
  • 2. Agenda ▪ The Security Industry and Web Scale Problems ! ▪ Combating Security Nihilism ! ▪ What is Yahoo doing about it? 2
  • 3. Theses 3 ▪ The security industry has failed to consider the needs of scale, including diversity of user base ! ▪ A post-Snowden nihilism is affecting our industry’s approach to securing users ! ▪ Enterprise security teams need to evolve to proactively gain trust
  • 4. The Security Industry and Web Scale Problems
  • 5. 5 What do I mean by scale? Amount of ! › Data › Systems › Users Diversity of ! › Users › Threat Models
  • 6. Who is the prototypical customer of security products? 6
  • 7. 7 Big Banks Web Scale Customers x 10 x 10 Concurrent Users x 10 x 10 Front-End Servers x 10 x 10 Total Servers x 10 x 10 Customer Value $100’s $.01s Cust Stickiness High Low-Medium Meat-Space Identity Strong Weak Post-Facto Action? Yes Rarely
  • 8. 8 Most security companies are aiming for this Our reality is more like this [1] [1] Flickr user Kevin Gebhart CC BY-NC-SA 2.0 [2] Flickr user Dan Buczynski CC BY-NC-ND 2.0 [2]
  • 9. Things People Try to Sell Us
  • 10. What they try to sell us: 10 Super smart pizza boxes Software sensors with centralized intelligence What we would buy: [1] [1] Flickr user ms.akr CC BY 2.0 [2] Flickr user Mike Fleming CC BY SA 2.0 [2]
  • 11. 11 Arista 7508E 1152 x 10GbE 30Tbps backplane 5kW Palo Alto 7050 120Gbps throughput 2.4kW
  • 13. What they try to sell us: Databased back SIEM Hadoop based anomaly detection What we would buy: [1] [1] Flickr user Bob Mical CC BY 2.0
  • 14. What they try to sell us: 14 Windows Anti-APT Virtualization or Kernel Firewall Docker HIDS What we would buy: [1] [1] Flickr user broterham CC BY NC 2.0 !
  • 15. Free Business Ideas 15 ▪ Freemium Key Management System › Bootstrap via manual approval, trust in network, or remote attestation › Create master cert, view into corporate keyspace with lazy security checks ! ▪ Freemium Overlay Network › Goes great with key manager! › Allow for easy IP management across public/private cloud › Could be IPv6 only. Terminate inside of containers? ! ▪ Bug Bounty with Automatic Verification › We’re building this ourselves with Selenium
  • 16. More Free Ideas 16 ▪ ARM CoreOS Servers with Lightweight Remote Attestation › ARM is going to be big in Big Data environments › At scale building systems remotely is currently terrifying › Any scale organization does not have 100% physical control ! ▪ OpenSSL with Remotable Handshake › Why are we putting private keys on the most exposed systems? › Need to remote the handshake to an HSM or TXT backed key server › Should get 20:1 ratio
  • 18. Security Nihilism 18 Ve believe zat nothing… ist secure enough vor ze real world, Lebowski! Flickr user Joe Goldberg CC BY-SA 2.0 [1] [1]
  • 19. 19 “Your system is not secure against this [advanced attack|unlikely scenario] therefore it shouldn’t exist” “That’s just security through obscurity!” We need to build systems for all levels of user and adversary Non-obvious protections can increase the chance of catching an attacker in time, especially for interactive systems
  • 20. 20 “The [NSA|FSB|PLA] will just own up the user’s system and get the data that way” “Users are idiots and will screw this up” Forcing an adversary to expend resources and risk detection is a valid goal A system is only secure if it is safe, by default, for the 25th percentile user
  • 21. What are we doing about it?
  • 22. The New Yahoo Paranoids 22 CISO Corp Security Operations and Monitoring Product Security Engineering Paranoid Labs PenetrationTesting Intelligence, Investigations and Response Risk and Vulnerability Management Privacy Engineering Chief of Staff
  • 23. New Yahoo Paranoids 23 Chris Rohlf Doug DePerry Yan Zhu
  • 24. 24 Transport Encryption Complete ! › TLS 1.2 › ECDH(E) › AES-GCM › RSA 2048 Next up ! › HSTS and pre-load › ECDSA certificates › Certificate Transparency › ChaCha20 and Poly1305 › STARTTLS Pinning
  • 26. Self-Service Security 26 ▪ Our scaling challenges in providing app sec services: › Breadth: 80+ products in 60+ countries › Speed: multiple daily web pushes and weekly mobile ! ▪ Any large org needs to create self-service options › Mobile libraries • Authentication and device identity • TLS with pinning › Mobile code scanning portal › CI/CD Scanner integration • Open-source coming!
  • 28. Bug Bankruptcy 28 ▪ Important factors in getting bugs closed: › Detailed descriptions and mitigation instructions › Accurate prioritization › Consistent follow-up and real-time reporting › Executive visibility › Convincing company that you are a madman Works well for me
  • 29. 29
  • 30. The Future is Bright 30 ▪ Our profession has never been so impactful on… › Individuals › Nation-States › History ! ▪ With great power… › It is impossible to work in this field without being a moral actor ! ▪ Remember that trust is more than security! ! ▪ Take this opportunity to do something that you will remember with pride