SlideShare a Scribd company logo
1 of 25
Download to read offline
STOP THAT RELEASE,
THERE'S A VULNERABILITY!
Christine Gadsby
Director - Product Security Operations
Diahann Gooden
Senior Operations Program Manager
Simran Sidhu
Social Media Specialist
Tyler Townes
Manager – Product Security Response
Meet Lucy the Whoodle
• Service for Dog Autism
Lucy needs maintenance
You are either here........... OR you are here......................
Why are software releases important?
Why is this important to BlackBerry?
Enterprise-scale
Vulnerability Management
• 100s products to manage
• 100s of sources of threat intel
• 1000s of vulnerabilities to investigate
• ..and many strained relationships
Requirements Design Development Testing Deployment
What DEV teams think ......
Threat Modeling+
Design Review
Secure
Architecture
and Hardening
requirements
Security
Testing + Code
Review
Static Analysis Guidance
What Product and Software Security Does …...
That’s it, right?.
SDLC – Bringing a secure product to market
AND then....
Open hunting
season begins
It's Launch Day, YAY!
What should we be doing?
Software Readiness Review Program
Adding security review to release criteria
• Mitigating risk on behalf of your customers
• Multiple software versions of the same product are in market concurrently
• Know the security posture of your products
• Customers don't like upgrading! It's expensive and time consuming and is often a
double-edged sword
• Ensure you have a ship vehicle for all your patches!
A FIX IN THE BUILD IS BETTER THAN TWO IN THE REPOSITORY!!!!!!!
So now
what?
¯_( )_/¯
Step ONE: GET SUPPORT
Step TWO: define a vulnerability
• Define based on risk to your
customers, stakeholders, partners
and brand.
• Assess risk level definitions – Agree
on what "critical" really means.
• Ensure security and development are
able to agree with prioritization to
fixes... and what happens when they
don’t. (We fail them....!)
Identify a Common language
Create your own Software Readiness
Review
Step THREE: Create standards
• Establish leadership support to use a SRR program
as a security control
• Understand the security posture of each software
release
• Tag vulnerabilities for ease of identification and
tracking
• Define your risk threshold (SRR pass/fail criteria)
• Outline exception process (waiver)
• You need templates and standardization!
SWSI Calculator (Should We Ship
It?)Case #: 2896478 Scoring Rating
Base CVSS Score: 5.2
SWSI Score
REVENUE IMPACT
Tier 1 (< $100,000)
Tier 2 ($100,000 - $9999,999)
Tier 3 ($1MM+)
1 2 3 2 .52
EASE OF DISCOVERY
Tier 1 (Hard - Requires complex reverse engineering)
Tier 2 (Moderate – Pen tester would find during an audit)
Tier 3 (Easy – Automated tools could find)
1 2 3 1 1.04
MEDIA / PUBLICITY
Tier 1 (obscure blog/ twitter user)
Tier 2 (industry website)
Tier 3 (MSM, Direct inquiry)
1 2 3 1 2.08
IMPACT TO THE BUSINESS
Tier 1 (customer loses confidence in the business)
Tier 2 (Frustrates customer with high value contract)
Tier 3 (Prevents deal from closing)
1 2 3 2 1.04
RESEARCH TRENDS
Tier 1 (New focus on a subsystem that hasn’t faced rigorous testing)
Tier 2 (new platform with research expected)
Tier 3 (new area of research w/ high likelihood of further discovery)
1 2 3 2 1.04
Total SWSI Rating 5.2
SWSI Calculator (Should We Ship
It?)Case #: 2896478 Scoring Rating
Base CVSS Score: 5.2
SWSI Score
REVENUE IMPACT
Tier 1 (< $100,000)
Tier 2 ($100,000 - $9999,999)
Tier 3 ($1MM+)
1 2 3 2 .52
EASE OF DISCOVERY
Tier 1 (Hard - Requires complex reverse engineering)
Tier 2 (Moderate – Pen tester would find during an audit)
Tier 3 (Easy – Automated tools could find)
1 2 3 1 1.04
MEDIA / PUBLICITY
Tier 1 (obscure blog/ twitter user)
Tier 2 (industry website)
Tier 3 (MSM, Direct inquiry)
1 2 3 1 2.08
IMPACT TO THE BUSINESS
Tier 1 (customer loses confidence in the business)
Tier 2 (Frustrates customer with high value contract)
Tier 3 (Prevents deal from closing)
1 2 3 2 1.04
RESEARCH TRENDS
Tier 1 (New focus on a subsystem that hasn’t faced rigorous testing)
Tier 2 (new platform with research expected)
Tier 3 (new area of research w/ high likelihood of further discovery)
1 2 3 2 1.04
Total SWSI Rating 5.2
It's not that easy...!
• Threat landscape is unpredictable – There's no Patch Tuesday for
OSS!
• Difficulties with multi-party disclosure
• Weighing business priorities and technical risk
• Who will own the liability?
• Tracking fix commitments – keeping business units honest
• Standardized Process between business units
• Managing relationships
So, what happens when you don't agree on what to release?
We need a plan to escalate!
Technical Assessment
- Escalation -
Issue ID Date created Severity Public (Y/N) Remediation
schedule
Missed release
vehicles
Risk level Additional
details
Issue backlog characteristics
1. List unresolved issues by severity.
2. Highlight lingering issues based on issue filing date (making sure to flag any publicly known issue)
3. Provide details causing delays in mitigation.
Technical reviews and recommendations
1. Provide remediation schedule as documented in the defect management system.
2. Highlight all missed release opportunities.
3. Summarize technical assessment findings and release recommendations.
Release Escalation
Things to
Remember!
But it's worth it.
Risk landscape is ALWAYS changing
Numbers from 2017:
ü On average, 8 potential vulnerabilities investigated against our product
versions daily
ü Reviewed a total of 515 releases
• Discovery rate / public announcements are unpredictable
• This is an on-going process; don't get hung up on each release not
being perfect
• Focus on making progress
• Be a good partner, you're here to support the business
Thanks for listening!
Christine Gadsby
• cgadsby@blackberry.com
• @BBSIRT
BlackBerry Careers - blackberry.com/company/careers
Github - https://github.com/ProductSecurity
BBSIRT - blackberry.com/enterprise/security/incident-response-team
Questions?

More Related Content

Similar to Stop that Release, There's a Vulnerability!

325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
Ryan Faircloth
 
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsxIntroduction to the Microsoft Security Development Lifecycle (SDL).ppsx
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
MardhaniAR
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
gealehegn
 

Similar to Stop that Release, There's a Vulnerability! (20)

Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsxIntroduction to the Microsoft Security Development Lifecycle (SDL).ppsx
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
How can a successful SOC2-compliant ISMS be built without power, money and a...
How can a successful SOC2-compliant ISMS be built without power, money and a...How can a successful SOC2-compliant ISMS be built without power, money and a...
How can a successful SOC2-compliant ISMS be built without power, money and a...
 
Root Cause and Corrective Action (RCCA) Workshop
Root Cause and Corrective Action (RCCA) WorkshopRoot Cause and Corrective Action (RCCA) Workshop
Root Cause and Corrective Action (RCCA) Workshop
 
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
 
Technology Strategy for Early Stage Companies
Technology Strategy for Early Stage CompaniesTechnology Strategy for Early Stage Companies
Technology Strategy for Early Stage Companies
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Applicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit ProgramApplicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit Program
 
Webinar: Traceability Over the Entire Lifecycle in codeBeamer
Webinar: Traceability Over the Entire Lifecycle in codeBeamerWebinar: Traceability Over the Entire Lifecycle in codeBeamer
Webinar: Traceability Over the Entire Lifecycle in codeBeamer
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
 
Vulnerability Management Whitepaper PowerPoint Presentation Slides
Vulnerability Management Whitepaper PowerPoint Presentation SlidesVulnerability Management Whitepaper PowerPoint Presentation Slides
Vulnerability Management Whitepaper PowerPoint Presentation Slides
 
How can you deliver a secure product
How can you deliver a secure productHow can you deliver a secure product
How can you deliver a secure product
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

Stop that Release, There's a Vulnerability!

  • 1. STOP THAT RELEASE, THERE'S A VULNERABILITY!
  • 2. Christine Gadsby Director - Product Security Operations Diahann Gooden Senior Operations Program Manager Simran Sidhu Social Media Specialist Tyler Townes Manager – Product Security Response
  • 3.
  • 4. Meet Lucy the Whoodle • Service for Dog Autism
  • 6. You are either here........... OR you are here...................... Why are software releases important?
  • 7. Why is this important to BlackBerry?
  • 8. Enterprise-scale Vulnerability Management • 100s products to manage • 100s of sources of threat intel • 1000s of vulnerabilities to investigate • ..and many strained relationships
  • 9. Requirements Design Development Testing Deployment What DEV teams think ...... Threat Modeling+ Design Review Secure Architecture and Hardening requirements Security Testing + Code Review Static Analysis Guidance What Product and Software Security Does …... That’s it, right?. SDLC – Bringing a secure product to market
  • 10. AND then.... Open hunting season begins It's Launch Day, YAY!
  • 11. What should we be doing? Software Readiness Review Program Adding security review to release criteria • Mitigating risk on behalf of your customers • Multiple software versions of the same product are in market concurrently • Know the security posture of your products • Customers don't like upgrading! It's expensive and time consuming and is often a double-edged sword • Ensure you have a ship vehicle for all your patches! A FIX IN THE BUILD IS BETTER THAN TWO IN THE REPOSITORY!!!!!!!
  • 13. Step ONE: GET SUPPORT Step TWO: define a vulnerability • Define based on risk to your customers, stakeholders, partners and brand. • Assess risk level definitions – Agree on what "critical" really means. • Ensure security and development are able to agree with prioritization to fixes... and what happens when they don’t. (We fail them....!) Identify a Common language
  • 14. Create your own Software Readiness Review Step THREE: Create standards • Establish leadership support to use a SRR program as a security control • Understand the security posture of each software release • Tag vulnerabilities for ease of identification and tracking • Define your risk threshold (SRR pass/fail criteria) • Outline exception process (waiver) • You need templates and standardization!
  • 15.
  • 16. SWSI Calculator (Should We Ship It?)Case #: 2896478 Scoring Rating Base CVSS Score: 5.2 SWSI Score REVENUE IMPACT Tier 1 (< $100,000) Tier 2 ($100,000 - $9999,999) Tier 3 ($1MM+) 1 2 3 2 .52 EASE OF DISCOVERY Tier 1 (Hard - Requires complex reverse engineering) Tier 2 (Moderate – Pen tester would find during an audit) Tier 3 (Easy – Automated tools could find) 1 2 3 1 1.04 MEDIA / PUBLICITY Tier 1 (obscure blog/ twitter user) Tier 2 (industry website) Tier 3 (MSM, Direct inquiry) 1 2 3 1 2.08 IMPACT TO THE BUSINESS Tier 1 (customer loses confidence in the business) Tier 2 (Frustrates customer with high value contract) Tier 3 (Prevents deal from closing) 1 2 3 2 1.04 RESEARCH TRENDS Tier 1 (New focus on a subsystem that hasn’t faced rigorous testing) Tier 2 (new platform with research expected) Tier 3 (new area of research w/ high likelihood of further discovery) 1 2 3 2 1.04 Total SWSI Rating 5.2
  • 17. SWSI Calculator (Should We Ship It?)Case #: 2896478 Scoring Rating Base CVSS Score: 5.2 SWSI Score REVENUE IMPACT Tier 1 (< $100,000) Tier 2 ($100,000 - $9999,999) Tier 3 ($1MM+) 1 2 3 2 .52 EASE OF DISCOVERY Tier 1 (Hard - Requires complex reverse engineering) Tier 2 (Moderate – Pen tester would find during an audit) Tier 3 (Easy – Automated tools could find) 1 2 3 1 1.04 MEDIA / PUBLICITY Tier 1 (obscure blog/ twitter user) Tier 2 (industry website) Tier 3 (MSM, Direct inquiry) 1 2 3 1 2.08 IMPACT TO THE BUSINESS Tier 1 (customer loses confidence in the business) Tier 2 (Frustrates customer with high value contract) Tier 3 (Prevents deal from closing) 1 2 3 2 1.04 RESEARCH TRENDS Tier 1 (New focus on a subsystem that hasn’t faced rigorous testing) Tier 2 (new platform with research expected) Tier 3 (new area of research w/ high likelihood of further discovery) 1 2 3 2 1.04 Total SWSI Rating 5.2
  • 18. It's not that easy...! • Threat landscape is unpredictable – There's no Patch Tuesday for OSS! • Difficulties with multi-party disclosure • Weighing business priorities and technical risk • Who will own the liability? • Tracking fix commitments – keeping business units honest • Standardized Process between business units • Managing relationships So, what happens when you don't agree on what to release?
  • 19. We need a plan to escalate!
  • 20. Technical Assessment - Escalation - Issue ID Date created Severity Public (Y/N) Remediation schedule Missed release vehicles Risk level Additional details
  • 21. Issue backlog characteristics 1. List unresolved issues by severity. 2. Highlight lingering issues based on issue filing date (making sure to flag any publicly known issue) 3. Provide details causing delays in mitigation. Technical reviews and recommendations 1. Provide remediation schedule as documented in the defect management system. 2. Highlight all missed release opportunities. 3. Summarize technical assessment findings and release recommendations. Release Escalation
  • 23. But it's worth it. Risk landscape is ALWAYS changing Numbers from 2017: ü On average, 8 potential vulnerabilities investigated against our product versions daily ü Reviewed a total of 515 releases • Discovery rate / public announcements are unpredictable • This is an on-going process; don't get hung up on each release not being perfect • Focus on making progress • Be a good partner, you're here to support the business
  • 24. Thanks for listening! Christine Gadsby • cgadsby@blackberry.com • @BBSIRT BlackBerry Careers - blackberry.com/company/careers Github - https://github.com/ProductSecurity BBSIRT - blackberry.com/enterprise/security/incident-response-team