SlideShare a Scribd company logo
The Myth of the Iron
Triangle in Cybersecurity
Sherif Mansour
Bio
• OWASP Foundation Board Member - Treasurer

• OWASP Foundation London Chapter Leader

• Product Management - Cyber Security @ a Financial Services
Company

• Previously - Application Security Lead @ Expedia 



NOTE: This presentation does not reflect the views of my current or
previous employers.

Introduction
The iron triangle idea was first introduced in 1956
regarding US politics by Gordon Adams and the concept
eventually made its way to security.
The Iron Triangle
The Iron triangle was initially about the policy making
relationships in US politics fixed relationships between
congressional committees, bureaucracy & interest groups.

In security it became a short hand for the relationship
between ease of use, performance and security.

Unfortunately this had a negative impact on the industry
as it lead to the belief that you had a fixed trade off
between security, ease of use and performance.
What are some of the impacts?
• Is there a fixed relationship between security and
ease of use?

• Is there a fixed relationship between security and
performance?
Why is this a Myth?
Albert Einstein: The definition of insanity is doing the
same thing over and over and expecting different
results.
Why is this a Myth?
What is possible?
• Can we have better privacy without an impact on ease
of use?

• Can we have better security without impacting
performance?

• Can we have better security without an impact on
cost?
The Answer is….
Yes!

But there are other trade-offs…
Examples
• The Signal Protocol
• Let’s Encrypt
• The Rust Programming Language
• Universal 2 Factor Tokens
The Signal Protocol
• End to End Encryption Protocol

• Initially designed for TextSecure based on OTR

• Moved to Axolotol Ratchet (now known as the
signal protocol).

• Provides end to end encryption to messaging
services such as Skype & WhatsApp with easy of
use and functionality.
What is the current challenge?
Alic
AliceBob
Unauthorised Intercept
How does signal work?
Keys {

Ratchet {
Deliver {
1) Phone asks for next public pre-key for recipient
2) server sends back identify key and prekey
5) phone sends encrypted message for server to pass along
6) server responds with status
3) phone generates an ephemeral key
4) phone does EDHE to derive master key
The Result?
An easy to use end to end encryption messaging
protocol.
Let’s Encrypt
Significantly increasing the use of the encryption on
the internet by making TLS certificates free.
The Challenge
• If you needed your website to use HTTPS, you
needed to pay a vendor.
• There was a cost for the adoption of encryption
on the web.
• This also led to many complex security designs on
many sites (secure.example.com).
• Also - if certificates expire - browsers would load
a large error screen.
Solution
• Make Certificates free!
• Automate the process of certificate renewal
The Rust Programming Language
• Firefox’s move to a more secure and easy
to use language to make it’s browser safer
and after to use than ever before.
The Challenge
• A study from Microsoft showed across all
their software - memory safety is the
cause of roughly 70% of the security issues
in their software.
• Programming languages which minimise
these issues often have a large runtime,
and performance issues (java, python
etc..).
The Solution
• A programming language with a small
runtime, high performance and memory
safety.
• Rust is currently being used at Mozzilla,
Facebook, Google and many others.
What is the tradeoff?
• Long compile time.
• A more complex language
Universal 2 Factor Tokens
Google’s efforts to limit the impact of
phishing attack through the use of usable &
functional 2 factor tokens.
The Challenge
• MFA does not have a simple user experience.

• These MFA codes can still be still phished/
social engineered.

• There isn’t a vendor neutral approach to MFA.

• There isn’t an agreed web interface on the
browser for MFA.
Initially Vendor Specific
The FIDO Alliance
• Fast IDentity Online

• Universal Authentication Framework (UAF)
• Universal 2nd Factor (U2F)
• Client to Authenticator Protocol (CTAP)
• WebAuthn (Web Authentication) published by(W3C). 



WebAuthn is a core component of the FIDO2 Project
under the guidance of the FIDO Alliance.
The Result
• An easy to use MFA solution which has all
but eliminated employee account phishing
attacks at Google.

• A standardised MFA solution across the
web

• More to come…. (delegated recovery)
Other Interesting Solutions In Progress
• OWASP - Software Component Verification
Standard (SCVS)

• NIST - SCAP 2.0

• ISO - SW-ID Tags

• IETF - SACM
Final Thoughts
• It’s important to understand root cause of security
problems (and not current solutions).

• Investigate new paradigms & approaches (take
inspiration from the wider technology industry).

• All these challenges are eco-system wide and will
require multi stakeholder collaboration. 

Q&A

More Related Content

Similar to The Myth of The Iron Triangle in Security

Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
lior mazor
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
Tryzens
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
Jason Bloomberg
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
Felipe Prado
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
Andris Soroka
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
Christopher Grayson
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
OnBoard Security, Inc. - a Qualcomm Company
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
CASCouncil
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
eightbit
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
SolarWinds
 
IBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's StandpointIBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's Standpoint
Luis Grangeia
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?
Daniel Appelquist
 
Rust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesRust and the coming age of high integrity languages
Rust and the coming age of high integrity languages
AdaCore
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
Leonardo De Moura Rocha Lima
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
Lexume1
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
Lexume1
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
WSO2
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Cloud Security Alliance Lviv Chapter
 

Similar to The Myth of The Iron Triangle in Security (20)

Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
 
Luis Grangeia IBWAS
Luis Grangeia IBWASLuis Grangeia IBWAS
Luis Grangeia IBWAS
 
IBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's StandpointIBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's Standpoint
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?
 
Rust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesRust and the coming age of high integrity languages
Rust and the coming age of high integrity languages
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

The Myth of The Iron Triangle in Security

  • 1. The Myth of the Iron Triangle in Cybersecurity Sherif Mansour
  • 2. Bio • OWASP Foundation Board Member - Treasurer
 • OWASP Foundation London Chapter Leader
 • Product Management - Cyber Security @ a Financial Services Company
 • Previously - Application Security Lead @ Expedia 
 
 NOTE: This presentation does not reflect the views of my current or previous employers.

  • 3. Introduction The iron triangle idea was first introduced in 1956 regarding US politics by Gordon Adams and the concept eventually made its way to security.
  • 4. The Iron Triangle The Iron triangle was initially about the policy making relationships in US politics fixed relationships between congressional committees, bureaucracy & interest groups.
 In security it became a short hand for the relationship between ease of use, performance and security.
 Unfortunately this had a negative impact on the industry as it lead to the belief that you had a fixed trade off between security, ease of use and performance.
  • 5. What are some of the impacts? • Is there a fixed relationship between security and ease of use?
 • Is there a fixed relationship between security and performance?
  • 6. Why is this a Myth? Albert Einstein: The definition of insanity is doing the same thing over and over and expecting different results.
  • 7. Why is this a Myth?
  • 8. What is possible? • Can we have better privacy without an impact on ease of use?
 • Can we have better security without impacting performance?
 • Can we have better security without an impact on cost?
  • 9. The Answer is…. Yes!
 But there are other trade-offs…
  • 10. Examples • The Signal Protocol • Let’s Encrypt • The Rust Programming Language • Universal 2 Factor Tokens
  • 11. The Signal Protocol • End to End Encryption Protocol
 • Initially designed for TextSecure based on OTR
 • Moved to Axolotol Ratchet (now known as the signal protocol).
 • Provides end to end encryption to messaging services such as Skype & WhatsApp with easy of use and functionality.
  • 12. What is the current challenge? Alic AliceBob Unauthorised Intercept
  • 13. How does signal work? Keys {
 Ratchet { Deliver { 1) Phone asks for next public pre-key for recipient 2) server sends back identify key and prekey 5) phone sends encrypted message for server to pass along 6) server responds with status 3) phone generates an ephemeral key 4) phone does EDHE to derive master key
  • 14. The Result? An easy to use end to end encryption messaging protocol.
  • 15. Let’s Encrypt Significantly increasing the use of the encryption on the internet by making TLS certificates free.
  • 16. The Challenge • If you needed your website to use HTTPS, you needed to pay a vendor. • There was a cost for the adoption of encryption on the web. • This also led to many complex security designs on many sites (secure.example.com). • Also - if certificates expire - browsers would load a large error screen.
  • 17. Solution • Make Certificates free! • Automate the process of certificate renewal
  • 18. The Rust Programming Language • Firefox’s move to a more secure and easy to use language to make it’s browser safer and after to use than ever before.
  • 19. The Challenge • A study from Microsoft showed across all their software - memory safety is the cause of roughly 70% of the security issues in their software. • Programming languages which minimise these issues often have a large runtime, and performance issues (java, python etc..).
  • 20. The Solution • A programming language with a small runtime, high performance and memory safety. • Rust is currently being used at Mozzilla, Facebook, Google and many others.
  • 21. What is the tradeoff? • Long compile time. • A more complex language
  • 22. Universal 2 Factor Tokens Google’s efforts to limit the impact of phishing attack through the use of usable & functional 2 factor tokens.
  • 23. The Challenge • MFA does not have a simple user experience.
 • These MFA codes can still be still phished/ social engineered.
 • There isn’t a vendor neutral approach to MFA.
 • There isn’t an agreed web interface on the browser for MFA.
  • 25. The FIDO Alliance • Fast IDentity Online
 • Universal Authentication Framework (UAF) • Universal 2nd Factor (U2F) • Client to Authenticator Protocol (CTAP) • WebAuthn (Web Authentication) published by(W3C). 
 
 WebAuthn is a core component of the FIDO2 Project under the guidance of the FIDO Alliance.
  • 26. The Result • An easy to use MFA solution which has all but eliminated employee account phishing attacks at Google.
 • A standardised MFA solution across the web
 • More to come…. (delegated recovery)
  • 27. Other Interesting Solutions In Progress • OWASP - Software Component Verification Standard (SCVS)
 • NIST - SCAP 2.0
 • ISO - SW-ID Tags
 • IETF - SACM
  • 28. Final Thoughts • It’s important to understand root cause of security problems (and not current solutions).
 • Investigate new paradigms & approaches (take inspiration from the wider technology industry).
 • All these challenges are eco-system wide and will require multi stakeholder collaboration. 

  • 29. Q&A