SlideShare a Scribd company logo
GOOD OLD DREAD
FOR A STARTUP
AMANDEEP MIDHA
ERNIT APS
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
WHAT IS YOUR WHY?
▸ Why are you here ?
▸ Why you care for security ?
▸ After all what is there for secure ?
▸ What the fuss it is all about ?
▸ Is it really needed ?
▸ What is net yield of my efforts to secure ?
ASSESSMENT ≠ ACTIONS
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
DREAD
▸ Damage Potential
▸ Reproducibility
▸ Exploitability
▸ Affected Users
▸ Discoverability
Risk = (Reproducibility + Exploitability) x (Damage Potential + Affected Users + Discoverability)
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
INTRODUCTION TO ERNIT (Q2, ’17 OFFERING)
▸ Physical IoT PiggyBank connected to Internet
▸ App available on Appstore with Parent Profile as Primary
user, and Child login as sub-account accessible with PIN
▸ App user profile optionally connected to Bank Account
APPLYING DREAD AT ERNIT
▸ Application Threat Modelling
▸ Entry Points i.e. each HTTP / HTTPS endpoint
▸ Assets i.e. Kid, Adult, Goal images
▸ Trust Levels i.e. Parent, Patron, Kid
▸ External Dependencies
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
1. THREAT RANKING
▸ Threat Ranking
Type Security Aspect
Spoofing Authentication
Tampering Data Integrity
Repudiation Non-repudiation
Inf Disclosure Confidentiality
Denial of Service Availability
Elevation of
Privilege
Authorization
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
2. AUTHENTICATION & CORRECTIVE ACTIONS
▸ Log every attempt
▸ Log every 401
▸ Implement Blockout Strategy
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
3. ACCESS CONTROL - CORRECTIVE ACTIONS
▸ All POST / PUT /PATCH API calls to server must define the
span of control of such operations limited to User’s data
graph (and no more for users and kids he is not associated
with )
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
4. COMMAND INJECTION CORRECTIVE ACTIONS
▸ Mostly a cloud service provider makes the claim to prevent
▸ Having appropriate ORM and avoiding raw SQL as much
as possible
▸ Define your “Known bad inputs”
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
5. SESSION MANAGEMENT & CORRECTIVE ACTIONS
▸ Alert: UX versus Security Fights Expected Most Here
▸ Define
▸ when to invalidate app user session
▸ when to block user access
▸ checks to verify token abuse attempt
▸ when forced token invalidation should happen
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
6. SECURE DATA TRANSMISSION & CORRECTIVE ACTIONS
▸ Identify Data to Encrypt
▸ Proper Encryption Implementation
▸ Pig-Server Communication
▸ App-Server Communication
▸ Server-GW-Bank Communication
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
SOME OTHER COUNTER MEASURES
▸ TAMPERING
▸ All PUT/PATCH API call implementations to check if action is valid on set
of data, before making the action
▸ Goes hand-in-hand with “Elevation of Privilege” threat
▸ INFORMATION DISCLOSURE
▸ Have your invitation module, not send out excessive inviting user
information, and invitee to begin from “apply to access”
▸ DENIAL OF SERVICE
▸ Appropriate Rate Limiting of your Backend APIs as part of Implementation
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
ERNIT Q3, 2017
AES
COPPA Compliant
Image store
GOOD OLD DREAD FOR A STARTUP - ERNIT APS
ERNIT SECURITY - ROAD AHEAD
▸ UL2900-1 being studied by
consortium of ERNIT, Delta
Systems, Eficode, and Alexandra
Institute
▸ Vulnerability Assessment & Port
Scanning Completed
▸ Audit-ability of each PI item as
digital audit of GET endpoints
(GDPR Compliance)
▸ More Details by Q4, 2017

More Related Content

What's hot

Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk
 
Splunk Discovery Day Dubai 2017 - Keynote
Splunk Discovery Day Dubai 2017 - KeynoteSplunk Discovery Day Dubai 2017 - Keynote
Splunk Discovery Day Dubai 2017 - Keynote
Splunk
 
The sooner the better but never too late
The sooner the better but never too lateThe sooner the better but never too late
The sooner the better but never too late
Vlad Styran
 
QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...
QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...
QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...
QAFest
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
Splunk
 

What's hot (6)

Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
 
Splunk Discovery Day Dubai 2017 - Keynote
Splunk Discovery Day Dubai 2017 - KeynoteSplunk Discovery Day Dubai 2017 - Keynote
Splunk Discovery Day Dubai 2017 - Keynote
 
The sooner the better but never too late
The sooner the better but never too lateThe sooner the better but never too late
The sooner the better but never too late
 
QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...
QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...
QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 

Similar to DREAD for a Startup - Ernit Architecture Example

Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
Christian Have
 
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
NowSecure
 
ProActive Security
ProActive SecurityProActive Security
ProActive Security
Ibnisina Sina
 
ProActive Security
ProActive SecurityProActive Security
ProActive Security
Ibnisina Sina
 
Cloak and Dagger Attacks - Android
Cloak and Dagger Attacks - Android Cloak and Dagger Attacks - Android
Cloak and Dagger Attacks - Android
Sudara Fernando
 
Mobile app development | CHOICE OF TECHNOLOGY
Mobile app development | CHOICE OF TECHNOLOGYMobile app development | CHOICE OF TECHNOLOGY
Mobile app development | CHOICE OF TECHNOLOGY
rsha12
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
NowSecure
 
Practical iOS App Security
Practical iOS App SecurityPractical iOS App Security
Practical iOS App Security
Totem_Training
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
Beau Christensen
 
How Allegiant Air Solved Their PCI Problem and Got a Whole Lot Better Securit...
How Allegiant Air Solved Their PCI Problem and Got a Whole Lot Better Securit...How Allegiant Air Solved Their PCI Problem and Got a Whole Lot Better Securit...
How Allegiant Air Solved Their PCI Problem and Got a Whole Lot Better Securit...
Dana Gardner
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
NowSecure
 
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
Huntsman Security
 
Healthcare fraud detection
Healthcare fraud detectionHealthcare fraud detection
Healthcare fraud detection
Mahdi Esmailoghli
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
Jose L. Quiñones-Borrero
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
NowSecure
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
MarketingArrowECS_CZ
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
FraudBusters
 
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskMobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
NowSecure
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
IJNSA Journal
 
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationSplunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
Georg Knon
 

Similar to DREAD for a Startup - Ernit Architecture Example (20)

Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
 
ProActive Security
ProActive SecurityProActive Security
ProActive Security
 
ProActive Security
ProActive SecurityProActive Security
ProActive Security
 
Cloak and Dagger Attacks - Android
Cloak and Dagger Attacks - Android Cloak and Dagger Attacks - Android
Cloak and Dagger Attacks - Android
 
Mobile app development | CHOICE OF TECHNOLOGY
Mobile app development | CHOICE OF TECHNOLOGYMobile app development | CHOICE OF TECHNOLOGY
Mobile app development | CHOICE OF TECHNOLOGY
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
 
Practical iOS App Security
Practical iOS App SecurityPractical iOS App Security
Practical iOS App Security
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
 
How Allegiant Air Solved Their PCI Problem and Got a Whole Lot Better Securit...
How Allegiant Air Solved Their PCI Problem and Got a Whole Lot Better Securit...How Allegiant Air Solved Their PCI Problem and Got a Whole Lot Better Securit...
How Allegiant Air Solved Their PCI Problem and Got a Whole Lot Better Securit...
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
 
Healthcare fraud detection
Healthcare fraud detectionHealthcare fraud detection
Healthcare fraud detection
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskMobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationSplunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
 

More from Amandeep Midha

RFC 7807 - Communicating the Problem
RFC 7807 - Communicating the ProblemRFC 7807 - Communicating the Problem
RFC 7807 - Communicating the Problem
Amandeep Midha
 
Ernit Product Introduction
Ernit Product IntroductionErnit Product Introduction
Ernit Product Introduction
Amandeep Midha
 
Finding IT-job in Denmark as an Expat
Finding IT-job in Denmark as an ExpatFinding IT-job in Denmark as an Expat
Finding IT-job in Denmark as an Expat
Amandeep Midha
 
La hiTapiola-31.10. Avanto (1)
La hiTapiola-31.10. Avanto (1)La hiTapiola-31.10. Avanto (1)
La hiTapiola-31.10. Avanto (1)
Amandeep Midha
 
Barclays Final Lookbook Edited 8_31
Barclays Final Lookbook Edited 8_31Barclays Final Lookbook Edited 8_31
Barclays Final Lookbook Edited 8_31
Amandeep Midha
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
Amandeep Midha
 
Business Ethics International Perspective
Business Ethics   International PerspectiveBusiness Ethics   International Perspective
Business Ethics International Perspective
Amandeep Midha
 

More from Amandeep Midha (7)

RFC 7807 - Communicating the Problem
RFC 7807 - Communicating the ProblemRFC 7807 - Communicating the Problem
RFC 7807 - Communicating the Problem
 
Ernit Product Introduction
Ernit Product IntroductionErnit Product Introduction
Ernit Product Introduction
 
Finding IT-job in Denmark as an Expat
Finding IT-job in Denmark as an ExpatFinding IT-job in Denmark as an Expat
Finding IT-job in Denmark as an Expat
 
La hiTapiola-31.10. Avanto (1)
La hiTapiola-31.10. Avanto (1)La hiTapiola-31.10. Avanto (1)
La hiTapiola-31.10. Avanto (1)
 
Barclays Final Lookbook Edited 8_31
Barclays Final Lookbook Edited 8_31Barclays Final Lookbook Edited 8_31
Barclays Final Lookbook Edited 8_31
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
 
Business Ethics International Perspective
Business Ethics   International PerspectiveBusiness Ethics   International Perspective
Business Ethics International Perspective
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

DREAD for a Startup - Ernit Architecture Example

  • 1. GOOD OLD DREAD FOR A STARTUP AMANDEEP MIDHA ERNIT APS
  • 2. GOOD OLD DREAD FOR A STARTUP - ERNIT APS WHAT IS YOUR WHY? ▸ Why are you here ? ▸ Why you care for security ? ▸ After all what is there for secure ? ▸ What the fuss it is all about ? ▸ Is it really needed ? ▸ What is net yield of my efforts to secure ?
  • 3. ASSESSMENT ≠ ACTIONS GOOD OLD DREAD FOR A STARTUP - ERNIT APS
  • 4. GOOD OLD DREAD FOR A STARTUP - ERNIT APS DREAD ▸ Damage Potential ▸ Reproducibility ▸ Exploitability ▸ Affected Users ▸ Discoverability Risk = (Reproducibility + Exploitability) x (Damage Potential + Affected Users + Discoverability)
  • 5. GOOD OLD DREAD FOR A STARTUP - ERNIT APS INTRODUCTION TO ERNIT (Q2, ’17 OFFERING) ▸ Physical IoT PiggyBank connected to Internet ▸ App available on Appstore with Parent Profile as Primary user, and Child login as sub-account accessible with PIN ▸ App user profile optionally connected to Bank Account
  • 6. APPLYING DREAD AT ERNIT ▸ Application Threat Modelling ▸ Entry Points i.e. each HTTP / HTTPS endpoint ▸ Assets i.e. Kid, Adult, Goal images ▸ Trust Levels i.e. Parent, Patron, Kid ▸ External Dependencies GOOD OLD DREAD FOR A STARTUP - ERNIT APS
  • 7. GOOD OLD DREAD FOR A STARTUP - ERNIT APS 1. THREAT RANKING ▸ Threat Ranking Type Security Aspect Spoofing Authentication Tampering Data Integrity Repudiation Non-repudiation Inf Disclosure Confidentiality Denial of Service Availability Elevation of Privilege Authorization
  • 8. GOOD OLD DREAD FOR A STARTUP - ERNIT APS 2. AUTHENTICATION & CORRECTIVE ACTIONS ▸ Log every attempt ▸ Log every 401 ▸ Implement Blockout Strategy
  • 9. GOOD OLD DREAD FOR A STARTUP - ERNIT APS 3. ACCESS CONTROL - CORRECTIVE ACTIONS ▸ All POST / PUT /PATCH API calls to server must define the span of control of such operations limited to User’s data graph (and no more for users and kids he is not associated with )
  • 10. GOOD OLD DREAD FOR A STARTUP - ERNIT APS 4. COMMAND INJECTION CORRECTIVE ACTIONS ▸ Mostly a cloud service provider makes the claim to prevent ▸ Having appropriate ORM and avoiding raw SQL as much as possible ▸ Define your “Known bad inputs”
  • 11. GOOD OLD DREAD FOR A STARTUP - ERNIT APS 5. SESSION MANAGEMENT & CORRECTIVE ACTIONS ▸ Alert: UX versus Security Fights Expected Most Here ▸ Define ▸ when to invalidate app user session ▸ when to block user access ▸ checks to verify token abuse attempt ▸ when forced token invalidation should happen
  • 12. GOOD OLD DREAD FOR A STARTUP - ERNIT APS 6. SECURE DATA TRANSMISSION & CORRECTIVE ACTIONS ▸ Identify Data to Encrypt ▸ Proper Encryption Implementation ▸ Pig-Server Communication ▸ App-Server Communication ▸ Server-GW-Bank Communication
  • 13. GOOD OLD DREAD FOR A STARTUP - ERNIT APS SOME OTHER COUNTER MEASURES ▸ TAMPERING ▸ All PUT/PATCH API call implementations to check if action is valid on set of data, before making the action ▸ Goes hand-in-hand with “Elevation of Privilege” threat ▸ INFORMATION DISCLOSURE ▸ Have your invitation module, not send out excessive inviting user information, and invitee to begin from “apply to access” ▸ DENIAL OF SERVICE ▸ Appropriate Rate Limiting of your Backend APIs as part of Implementation
  • 14. GOOD OLD DREAD FOR A STARTUP - ERNIT APS ERNIT Q3, 2017 AES COPPA Compliant Image store
  • 15. GOOD OLD DREAD FOR A STARTUP - ERNIT APS ERNIT SECURITY - ROAD AHEAD ▸ UL2900-1 being studied by consortium of ERNIT, Delta Systems, Eficode, and Alexandra Institute ▸ Vulnerability Assessment & Port Scanning Completed ▸ Audit-ability of each PI item as digital audit of GET endpoints (GDPR Compliance) ▸ More Details by Q4, 2017