SlideShare a Scribd company logo
1 of 28
+
BUG BOUNTY - ONE YEAR LATER
2
ABOUT US
Alejandro Iacobelli
Application Security Manager at MELI and
OWASP Buenos Aires Chapter Leader
Appsec Profesor
alejandro.iacobelli@owasp.org
linkedin.com/in/aiacobellisec
twitter: @aiacobelli_sec
Pablo Garbossa
Information Security Manager at MELI and
OWASP Buenos Aires Chapter Leader
pablo.garbossa@owasp.org
ar.linkedin.com/in/pgarbossa
twitter: @pgarbossa
3
DISCLOSURE
Las opiniones expresadas en la presentación y/o en los slides
siguientes son solamente nuestras y no necesariamente de
nuestro empleador.
4
We will
talk about...
■ What is a bug bounty program?
■ Why it is important?
■ Company’s perspective
5
Crowdsourced
Security
+
6
2016
2017
2018
2020
2019
THE BEGINNINGS
Pre-work
Identify
Learning
Growth
7
HALL OF FAME
8
LESSONS
LEARNED
failing
to
prepare
prepare
to
fail
=
9
LESSONS LEARNED
Make your
pre-work
Not a
Silver Bullet
Defense
in Depth Scope
Show me
the MONEY
Quality and
Quantity
Response
Time
Community
10
PRE-WORK
SLA
11
PRE-WORK
SLA
BACKLOG
12
PRE-WORK
SLA
BACKLOG
SECURITY TEAM CAPACITY
13
PRE-WORK
SLA
BACKLOG
SECURITY TEAM CAPACITY
KNOW YOURSELF
14
PRE-WORK
SLA
BACKLOG
SECURITY TEAM CAPACITY
KNOW YOURSELF
CHOOSE PARTNER
15
PRE-WORK
SLA
BACKLOG
SECURITY TEAM CAPACITY
KNOW YOURSELF
CHOOSE PARTNER
MAKE A POLICY
16
NOT A SILVER BULLET
Security Requirements
Engineering
Threat modeling
Attack surface analysis
Misuse case analysis
SasT
Software Composition Analysis
Secure coding standards
DasT
Vulnerability Assessment
Peer Code Review
Security Culture
Software acceptance
Bug Bounty Program
Penetration testing
Vulnerability Assessments
Vulnerability
Management
Monitoring
Anomaly detection
Configuration
Management
Avoid Penetrate and Patch Model
17
NOT A SILVER BULLET
Do not only use it as vulnerability detector
Tactic / Reactive Strategic / Proactive
Appsec program
MATURITY
● Celebrate findings
● Set objectives in order
to increase findings
● Generic Policy
● Every finding is seen as a fail
on some stage of the SDLC
● Root cause analysis per
finding
● Analice bounty information
to set new OKR’s
18
DEFENSE IN DEPTH
Bug Bounty is not a replacement for pentesting
Vulnerability
Assessment
Penetration
Testing
19
RESPONSE TIME
Measure times and analyze effect on researchers
First Response Time
Average time to triage
Average time to bounty
Average time to resolution
Managed programs
20
TIME TO BOUNTY
Bounty time matters
Cum hoc ergo propter hoc!!
21
RESPONSE TIME
Pay for risk reduction (> Mature) -> Resolution time and
internal SLA are important -> If not, angry community
Pay on valid report (< Mature) -> Careful with Dupi! ->
Angry community
Define your strategy: Pay for fix or pay for valid
report
22
BUDGET
More money more interest
Pay a lot for trivial findings & Up
SHOW ME
THE MONEY
MATURITY
Money should go up according to maturity
¿How to choose how much to pay?
23
SCOPE
Prudence to the unknown is good but too much prudence is not
● Makes recon and
learning curve
more complicated
● Products do not
depend of a single
domain
● Accepting 3 times
of vulnerabilities
makes first report
barrier very
difficult
24
SCOPE
Prudence to the unknown is good but too much prudence is not
Cum hoc ergo propter hoc!!
25
QUALITY OVER QUANTITY
More knowledge, better vulnerabilities
- More accurate documentation (Cards,Users,api’s)
- Announce new features
- Challenge researchers into specific targets
- Organize events to bond with the community
26
COMMUNITY
Gamification
27
Conclusions
- Before anything else, preparation is the key to success (make your pre-work)
- Un programa maduro de seguridad aplicativa no puede depender únicamente de este tipo de
iniciativas para detectar fallas en sus aplicaciones - (Not a silver bullet)
- Un programa de bug bounty no es un reemplazo a los ejercicios de pentest tradicionales, sino un
complemento” (Defense in depth)
- “Un hunter desmotivado genera un efecto avalancha en la comunidad y los tiempos de respuesta son
un factor influyente” (Response Time)
- “Del total de invitaciones rechazadas, el 20% son debidas a scope acotado ” (Scope)
- “Los montos a pagar deben tener relación a la madurez de los productos a testear, el presupuesto
disponible y lo riesgoso que puede ser ese producto para la empresa.”(Show me the money)
- “Por lo general, las vulnerabilidades de mayor impacto se detectan una vez que se logra entender las
funcionalidades de una aplicación a fondo.”(Quality and Quantity)
- Focus on making community.
28
Q&A

More Related Content

Similar to OWASP LATAM@home 2020

2009 10 28 The Lean Startup In Paris
2009 10 28 The Lean Startup In Paris2009 10 28 The Lean Startup In Paris
2009 10 28 The Lean Startup In ParisEric Ries
 
2010 03 09 the lean startup - gdc
2010 03 09 the lean startup - gdc2010 03 09 the lean startup - gdc
2010 03 09 the lean startup - gdcEric Ries
 
E learning software risk response plan
E learning software risk response planE learning software risk response plan
E learning software risk response planPrince Bertrand
 
Product Wizard for Your Site
Product Wizard for Your SiteProduct Wizard for Your Site
Product Wizard for Your SiteDarya Bushmakin
 
2018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 32018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 3FRSecure
 
RSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsRSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsAdrian Sanabria
 
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
2010 04 28 The Lean Startup webinar for the Lean Enterprise InstituteEric Ries
 
Maximizing Virtual Productivity in Times of COVID.pptx
Maximizing Virtual Productivity in Times of COVID.pptxMaximizing Virtual Productivity in Times of COVID.pptx
Maximizing Virtual Productivity in Times of COVID.pptxJerry Manas
 
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...Kaseya
 
Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Eturnti Consulting Pvt Ltd
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24
 
Practical Insurance On-boarding and Training
Practical Insurance On-boarding and TrainingPractical Insurance On-boarding and Training
Practical Insurance On-boarding and TrainingJustin Goodman
 
Quant + Qual + Iteration for Great Products
Quant + Qual + Iteration for Great ProductsQuant + Qual + Iteration for Great Products
Quant + Qual + Iteration for Great ProductsBen Carey
 
insert narrationTitleCMIT 421 Section #Student Na
insert narrationTitleCMIT 421 Section #Student Nainsert narrationTitleCMIT 421 Section #Student Na
insert narrationTitleCMIT 421 Section #Student NaTatianaMajor22
 
insert narrationTitleCMIT 421 Section #Student Na
insert narrationTitleCMIT 421 Section #Student Nainsert narrationTitleCMIT 421 Section #Student Na
insert narrationTitleCMIT 421 Section #Student NaLaticiaGrissomzz
 
Product Vs Craft
Product Vs CraftProduct Vs Craft
Product Vs CraftMagenTys
 
How to Build a Business Case for Online Employee Training - Webinar 09.04.14
How to Build a Business Case for Online Employee Training - Webinar 09.04.14How to Build a Business Case for Online Employee Training - Webinar 09.04.14
How to Build a Business Case for Online Employee Training - Webinar 09.04.14BizLibrary
 

Similar to OWASP LATAM@home 2020 (20)

2009 10 28 The Lean Startup In Paris
2009 10 28 The Lean Startup In Paris2009 10 28 The Lean Startup In Paris
2009 10 28 The Lean Startup In Paris
 
2010 03 09 the lean startup - gdc
2010 03 09 the lean startup - gdc2010 03 09 the lean startup - gdc
2010 03 09 the lean startup - gdc
 
E learning software risk response plan
E learning software risk response planE learning software risk response plan
E learning software risk response plan
 
Product Wizard for Your Site
Product Wizard for Your SiteProduct Wizard for Your Site
Product Wizard for Your Site
 
2018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 32018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 3
 
RSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsRSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to Startups
 
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
2010 04 28 The Lean Startup webinar for the Lean Enterprise Institute
 
Maximizing Virtual Productivity in Times of COVID.pptx
Maximizing Virtual Productivity in Times of COVID.pptxMaximizing Virtual Productivity in Times of COVID.pptx
Maximizing Virtual Productivity in Times of COVID.pptx
 
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
 
Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....
 
Quality myths
Quality mythsQuality myths
Quality myths
 
Agile Development
Agile DevelopmentAgile Development
Agile Development
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...
 
Practical Insurance On-boarding and Training
Practical Insurance On-boarding and TrainingPractical Insurance On-boarding and Training
Practical Insurance On-boarding and Training
 
Quant + Qual + Iteration for Great Products
Quant + Qual + Iteration for Great ProductsQuant + Qual + Iteration for Great Products
Quant + Qual + Iteration for Great Products
 
In-Market Experiments: The Science of Placing Small Bets Fast
In-Market Experiments: The Science of Placing Small Bets Fast In-Market Experiments: The Science of Placing Small Bets Fast
In-Market Experiments: The Science of Placing Small Bets Fast
 
insert narrationTitleCMIT 421 Section #Student Na
insert narrationTitleCMIT 421 Section #Student Nainsert narrationTitleCMIT 421 Section #Student Na
insert narrationTitleCMIT 421 Section #Student Na
 
insert narrationTitleCMIT 421 Section #Student Na
insert narrationTitleCMIT 421 Section #Student Nainsert narrationTitleCMIT 421 Section #Student Na
insert narrationTitleCMIT 421 Section #Student Na
 
Product Vs Craft
Product Vs CraftProduct Vs Craft
Product Vs Craft
 
How to Build a Business Case for Online Employee Training - Webinar 09.04.14
How to Build a Business Case for Online Employee Training - Webinar 09.04.14How to Build a Business Case for Online Employee Training - Webinar 09.04.14
How to Build a Business Case for Online Employee Training - Webinar 09.04.14
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 

Recently uploaded (20)

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 

OWASP LATAM@home 2020

  • 1. + BUG BOUNTY - ONE YEAR LATER
  • 2. 2 ABOUT US Alejandro Iacobelli Application Security Manager at MELI and OWASP Buenos Aires Chapter Leader Appsec Profesor alejandro.iacobelli@owasp.org linkedin.com/in/aiacobellisec twitter: @aiacobelli_sec Pablo Garbossa Information Security Manager at MELI and OWASP Buenos Aires Chapter Leader pablo.garbossa@owasp.org ar.linkedin.com/in/pgarbossa twitter: @pgarbossa
  • 3. 3 DISCLOSURE Las opiniones expresadas en la presentación y/o en los slides siguientes son solamente nuestras y no necesariamente de nuestro empleador.
  • 4. 4 We will talk about... ■ What is a bug bounty program? ■ Why it is important? ■ Company’s perspective
  • 9. 9 LESSONS LEARNED Make your pre-work Not a Silver Bullet Defense in Depth Scope Show me the MONEY Quality and Quantity Response Time Community
  • 15. 15 PRE-WORK SLA BACKLOG SECURITY TEAM CAPACITY KNOW YOURSELF CHOOSE PARTNER MAKE A POLICY
  • 16. 16 NOT A SILVER BULLET Security Requirements Engineering Threat modeling Attack surface analysis Misuse case analysis SasT Software Composition Analysis Secure coding standards DasT Vulnerability Assessment Peer Code Review Security Culture Software acceptance Bug Bounty Program Penetration testing Vulnerability Assessments Vulnerability Management Monitoring Anomaly detection Configuration Management Avoid Penetrate and Patch Model
  • 17. 17 NOT A SILVER BULLET Do not only use it as vulnerability detector Tactic / Reactive Strategic / Proactive Appsec program MATURITY ● Celebrate findings ● Set objectives in order to increase findings ● Generic Policy ● Every finding is seen as a fail on some stage of the SDLC ● Root cause analysis per finding ● Analice bounty information to set new OKR’s
  • 18. 18 DEFENSE IN DEPTH Bug Bounty is not a replacement for pentesting Vulnerability Assessment Penetration Testing
  • 19. 19 RESPONSE TIME Measure times and analyze effect on researchers First Response Time Average time to triage Average time to bounty Average time to resolution Managed programs
  • 20. 20 TIME TO BOUNTY Bounty time matters Cum hoc ergo propter hoc!!
  • 21. 21 RESPONSE TIME Pay for risk reduction (> Mature) -> Resolution time and internal SLA are important -> If not, angry community Pay on valid report (< Mature) -> Careful with Dupi! -> Angry community Define your strategy: Pay for fix or pay for valid report
  • 22. 22 BUDGET More money more interest Pay a lot for trivial findings & Up SHOW ME THE MONEY MATURITY Money should go up according to maturity ¿How to choose how much to pay?
  • 23. 23 SCOPE Prudence to the unknown is good but too much prudence is not ● Makes recon and learning curve more complicated ● Products do not depend of a single domain ● Accepting 3 times of vulnerabilities makes first report barrier very difficult
  • 24. 24 SCOPE Prudence to the unknown is good but too much prudence is not Cum hoc ergo propter hoc!!
  • 25. 25 QUALITY OVER QUANTITY More knowledge, better vulnerabilities - More accurate documentation (Cards,Users,api’s) - Announce new features - Challenge researchers into specific targets - Organize events to bond with the community
  • 27. 27 Conclusions - Before anything else, preparation is the key to success (make your pre-work) - Un programa maduro de seguridad aplicativa no puede depender únicamente de este tipo de iniciativas para detectar fallas en sus aplicaciones - (Not a silver bullet) - Un programa de bug bounty no es un reemplazo a los ejercicios de pentest tradicionales, sino un complemento” (Defense in depth) - “Un hunter desmotivado genera un efecto avalancha en la comunidad y los tiempos de respuesta son un factor influyente” (Response Time) - “Del total de invitaciones rechazadas, el 20% son debidas a scope acotado ” (Scope) - “Los montos a pagar deben tener relación a la madurez de los productos a testear, el presupuesto disponible y lo riesgoso que puede ser ese producto para la empresa.”(Show me the money) - “Por lo general, las vulnerabilidades de mayor impacto se detectan una vez que se logra entender las funcionalidades de una aplicación a fondo.”(Quality and Quantity) - Focus on making community.