How can you deliver a secure product

How can you deliver a secure product?
Michael Furman, Security Architect
The Legend of SDL
● Steve Lipner
 Senior Director of Security Engineering Strategy for Microsoft
 Key person for the Microsoft SDL
What will we cover
today?
What is an SDL?
Why is an SDL important?
Sample: Tufin SDL
How can you deliver a secure product?
About Me
● >12 years in application security
● >8 years with Tufin – Lead Security Architect
● >20 years in software engineering
● www.linkedin.com/in/furmanmichael/
● ultimatesecpro@gmail.com
● Read my blog
https://ultimatesecurity.pro/tags/presentation/
● Follow me on twitter @ultimatesecpro
● I like to travel, read books and listen to music
About
● Market Leader in Security Policy Automation
● Tufin is used by >2000 enterprises
 To segment networks and connect applications
 On-prem networks, firewalls, cloud and K8S
● We are the Security Policy Company!
Journey to our SDL
● Resolving security issues? Easy for me!
● Creating a “security” process? Brand new for me!
● Soooo many things to manage ....
 Vulnerabilities discovered by customers
 CVEs
 Upgrading 3rd-party software
 Pen tests
 ... and all the other stuff I did not yet even know about
● Saved by the SDL!
● No need to reinvent the wheel
Picture is from the “Journey to the Center of the Earth” movie.
What is an SDL?
● SDL is the process for developing secure software
● Adds security controls in each development phase
SDL = Security Development Lifecycle
History of SDL
● Mail of Bill Gates
 From: Bill Gates
 To: to every full-time employee at Microsoft
 Sent: Tuesday, January 15, 2002 5:22 PM
 Subject: Trustworthy computing
● Microsoft shutdown Windows development to handle the security issues
● Microsoft SDL
 v 1.0 - 2004 (internal)
 v 3.2 - 2008 (public)
 v 5.2 - 2012 (recent)
…
Security: The data our software and services store on behalf of our customers
should be protected from harm and used or modified only in appropriate ways.
Security models should be easy for developers to understand and build into their applications.
Photo from yahoo.com
Why is an SDL important?
Why
SDL?
• Helps developers build secure software
• Ensures security is enabled out of the box
• Defines how to respond to discovered vulnerabilities
SolarWinds Attack - 2020
● First disclosure on December 8th by FireEye – first discovered SolarWinds customer
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-
chain-compromises-with-sunburst-backdoor.html
● Other SolarWinds customers breached: FireEye, U.S. Departments, Microsoft, Cisco, …
https://www.theverge.com/2020/12/21/22194183/intel-nvidia-cisco-government-infected-solarwinds-hack
● Hackers viewed Microsoft source code
https://msrc-blog.microsoft.com/2020/12/31/microsoft-internal-solorigate-investigation-update/
● Joint Statement by the FBI, the CISA, and the ODNI: This work indicates that a Threat,
likely Russian in origin, is responsible for most or all of the recently discovered, ongoing
cyber compromises of both government and non-governmental networks
https://www.fbi.gov/news/pressrel/press-releases/joint-statement-by-the-federal-bureau-of-investigation-
fbi-the-cybersecurity-and-infrastructure-security-agency-cisa-and-the-office-of-the-director-of-national-
intelligence-odni
SolarWinds Attack - Solorigate
● Microsoft’s analysis of the attack
https://www.microsoft.com/security/blog/2020/12/18/analyzing-
solorigate-the-compromised-dll-file-that-started-a-sophisticated-
cyberattack-and-how-microsoft-defender-helps-protect/
● The attackers inserted malicious code into DLL
● SolarWinds Orion Platform installed
● The backdoor activates
 Randomly between 12 to 14 days after installation
● Attackers ping the backdoor
● Gathering and sending info
● The backdoor runs commands from attackers
Image from microsoft.com
SolarWinds Attack - Solorigate
● > 18,000 SolarWinds customers received the malicious update
● > 1,000 experienced the backdoor ping
● > 200 were hacked
https://www.businessinsider.com/list-of-companies-agencies-at-risk-after-solarwinds-hack-2020-12
● US agencies
 The Office of the President of the United States
 The Department of Defense
 The US Army
 The Federal Reserve
 NASA
 The NSA
 The CDC
 The Department of Justice
● Major companies
 Visa
 AT&T
 PwC
 Lockheed Martin
 CBS
 Cisco
 Comcast
 Ernst & Young
 Hertz
 The New York Times
Software Development Life Cycle (SDLC)
Implementation
Requirements Design Verification Release
SDL - Shift Left
Implementation
Requirements Design Verification Release
Tufin SDL
Implementation
Training Requirements Design Verification Release Response
Security
Design
Security
Classroom
Sessions
Security
Champions
Security
Requirements
SAST
Software
Updates
Peer Reviews
Internal
Security
Scans
DAST
External
Security
Tests
Vulnerabil
ity
Response
Policy
Tufin SDL
Implementation
Training Requirements Design Verification Release Response
Security
Design
Security
Classroom
Sessions
Security
Champions
Security
Requirements
SAST
Software
Updates
Peer Reviews
Internal
Security
Scans
DAST
External
Security
Tests
Vulnerabil
ity
Response
Policy
Security Training
● Security awareness training for the
Development and QA teams
 The latest security threats, mitigations,
and technologies
 OWASP Top 10 best practices
● Security Champions
Security Training
● Q: How can a Security
Champion be successful?
● Tip: Identify and resolve
specific security issues
● Examples of investigations:
 Best way for us to handle
Content Security Policy (CSP)?
 Best way for us to prevent
XML External Entity (XXE) attack?
● Tufin success: OWASP meetup lecture
https://ultimatesecurity.pro/post/xxe-meetup/
Tufin SDL
Implementation
Training Requirements Design Verification Release Response
Security
Design
Security
Classroom
Sessions
Security
Champions
Security
Requirements
SAST
Software
Updates
Peer Reviews
Internal
Security
Scans
DAST
External
Security
Tests
Vulnerabil
ity
Response
Policy
Security Requirements
● Incorporated into the requirements stage of S/W development
● Why do we want to handle security early?
 Allows us to design a feature and to write test plans which incorporate security requirements
up front
 Saves time for all of us – developer time, QA time, documentation time
Design
● Designs of new features are done jointly by both development and security
teams
Security Requirements & Design
● Q: How can you ensure Dev & QA handle security?
● Tip: Make it easy - create a security checklist
● Examples
 New API?
• Make sure the API has proper authentication
• Make sure the API has proper authorization
• Implement input validation
 Confidential info not stored as plain text
• Use appropriate encryption or hash algorithms
 Confidential info not stored on a client side
 Confidential info not sent via HTTP GET method
 …
Tufin SDL
Implementation
Training Requirements Design Verification Release Response
Security
Design
Security
Classroom
Sessions
Security
Champions
Security
Requirements
SAST
Software
Updates
Peer Reviews
Internal
Security
Scans
DAST
External
Security
Tests
Vulnerabil
ity
Response
Policy
Static Application Security Testing (SAST)
● What is SAST?
● Q: Any benefit to scan on each commit?
● Tip: Scan at least weekly
 Daily is the best option
● Your goal: Fix High issues immediately!
Software Updates
● All 3rd-party software is regularly updated
● Q: Can I ensure all 3rd-party software is
kept up-to-date without a tool?
 Open-source 3rd-party software
 Commercial 3rd-party software
● Tip: check that recommended upgrades
don’t introduce new vulnerabilities
● Your goal: upgrade to a version without
High or Critical issues!
Peer Reviews
● Mandatory for every code change
● Tip: ensure all code changes adhere
to security requirements
 Passwords are not stored in plain text
 Passwords are not stored on client side
 …
Tufin SDL
Implementation
Training Requirements Design Verification Release Response
Security
Design
Security
Classroom
Sessions
Security
Champions
Security
Requirements
SAST
Software
Updates
Peer Reviews
Internal
Security
Scans
DAST
External
Security
Tests
Vulnerabil
ity
Response
Policy
Internal Security Scans
● What are Internal Security Scans?
● Q: Any benefit to scan on each commit?
● Tip: Scan at least monthly
 Depends on your release cycle
● Your goal: Fix High issues immediately!
Internal Security Scans
● Qualys SSL Labs Report – free service
https://www.ssllabs.com/ssltest/
● Tip: Ensure you check the “Do not show the results on the boards”
checkbox
Internal Security Scans
Dynamic Application Security Testing (DAST)
● What is DAST?
● Q: Any benefit to scan on each commit?
● Tip: Scan at least monthly
 Depends on your release cycle
● Your goal: Fix High issues immediately!
Tufin SDL
Implementation
Training Requirements Design Verification Release Response
Security
Design
Security
Classroom
Sessions
Security
Champions
Security
Requirements
SAST
Software
Updates
Peer Reviews
Internal
Security
Scans
DAST
External
Security
Tests
Vulnerabil
ity
Response
Policy
External Security Tests
● Why External Security Tests?
● Tips:
 Scan at least annually
• Best each major release
 Ensure to create a valid test scope that covers all areas
• Web UI
• Infrastructure
 Ensure an External Test is added into R&D calendar
● Your goal: fix High issues immediately!
 Coordinate retest after your fixes
Tufin SDL
Implementation
Training Requirements Design Verification Release Response
Security
Design
Security
Classroom
Sessions
Security
Champions
Security
Requirements
SAST
Software
Updates
Peer Reviews
Internal
Security
Scans
DAST
External
Security
Tests
Vulnerabil
ity
Response
Policy
Vulnerability Response Policy
• A patch will be made available as soon as possible
CRITICAL
HIGH
MEDIUM
LOW
NOT
VULNERABLE
• A fix will be included in the upcoming release
• A fix will be included in a future release
• A fix may be included in a future release
• Nothing to fix
Vulnerability Response Policy
● Define a vulnerability response policy
 Document it
● Tip: the policy should be approved on the corporate level
 Affect sales, support, development
Rolling out an SDL
● First phase (minimal SDL)
 Vulnerability Response Policy
 Internal Security Scans
• Qualys SSL Labs Report
 Software Updates
• Using a tool
● Second Phase
 External Security Tests
● Third phase
 SAST
● Fourth phase
 DAST
Rolling out an SDL
● Ongoing
 Security Requirements & Design
 Security Training
 Security Champions
 Peer Reviews
● Further improvements
 https://www.microsoft.com/en-us/securityengineering/sdl/practices
 …
Selecting a tool for any SDL phase
● Perform POC
 Define requirements very well before the POC
● Tools can be commercial or open source
● Tools from the same provider is not essential
How can you deliver a secure product?
● Start to roll out an SDL in your organization
● Improve SDL on a regular basis
Take Aways
SDL - the framework that ensures secure
software
Roll out an SDL
... And follow it!!!
You will deliver a secure product!
Thank You
Contact me
www.linkedin.com/in/furmanmichael/
ultimatesecpro@gmail.com
https://ultimatesecurity.pro/
@ultimatesecpro
1 of 42

Recommended

Passwords are passé. WebAuthn is simpler, stronger and ready to go by
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goMichael Furman
1.4K views50 slides
Top 3 tips for security documentation by
Top 3 tips for security documentationTop 3 tips for security documentation
Top 3 tips for security documentationMichael Furman
618 views15 slides
Istio Security Overview by
Istio Security OverviewIstio Security Overview
Istio Security OverviewMichael Furman
929 views34 slides
OWASP A4 XML External Entities (XXE) by
OWASP A4 XML External Entities (XXE)OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)Michael Furman
1.7K views24 slides
[OPD 2019] AST Platform and the importance of multi-layered application secu... by
[OPD 2019]  AST Platform and the importance of multi-layered application secu...[OPD 2019]  AST Platform and the importance of multi-layered application secu...
[OPD 2019] AST Platform and the importance of multi-layered application secu...OWASP
212 views16 slides
Secure coding practices by
Secure coding practicesSecure coding practices
Secure coding practicesMohammed Danish Amber
4.6K views12 slides

More Related Content

What's hot

OpenId Connect Protocol by
OpenId Connect ProtocolOpenId Connect Protocol
OpenId Connect ProtocolMichael Furman
2.9K views43 slides
Jason Kent - AppSec Without Additional Tools by
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Toolscentralohioissa
861 views23 slides
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui by
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-MelhaouiCSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-MelhaouiNCCOMMS
59 views29 slides
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho by
CSF18 - Moving from Reactive to Proactive Security - Sami LaihoCSF18 - Moving from Reactive to Proactive Security - Sami Laiho
CSF18 - Moving from Reactive to Proactive Security - Sami LaihoNCCOMMS
161 views53 slides
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection by
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionAnant Shrivastava
40.5K views21 slides
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems by
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systemscentralohioissa
2.2K views67 slides

What's hot(20)

Jason Kent - AppSec Without Additional Tools by centralohioissa
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Tools
centralohioissa861 views
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui by NCCOMMS
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-MelhaouiCSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
NCCOMMS59 views
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho by NCCOMMS
CSF18 - Moving from Reactive to Proactive Security - Sami LaihoCSF18 - Moving from Reactive to Proactive Security - Sami Laiho
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
NCCOMMS161 views
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection by Anant Shrivastava
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava40.5K views
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems by centralohioissa
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
centralohioissa2.2K views
Securing Microservices with Spring Cloud Security by Will Tran
Securing Microservices with Spring Cloud SecuritySecuring Microservices with Spring Cloud Security
Securing Microservices with Spring Cloud Security
Will Tran1.7K views
Continuous and Visible Security Testing with BDD-Security by Stephen de Vries
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-Security
Stephen de Vries4.3K views
Threat modeling with architectural risk patterns by Stephen de Vries
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patterns
Stephen de Vries3K views
The cyber house of horrors - securing the expanding attack surface by Jason Bloomberg
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
Jason Bloomberg1.3K views
[OPD 2019] Top 10 Security Facts of 2020 by OWASP
[OPD 2019] Top 10 Security Facts of 2020[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020
OWASP240 views
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S... by Ajin Abraham
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham10K views
Why current security solutions fail by DaveEdwards12
Why current security solutions failWhy current security solutions fail
Why current security solutions fail
DaveEdwards12418 views
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015 by Ajin Abraham
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham8K views
[OPD 2019] Inter-application vulnerabilities by OWASP
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities
OWASP207 views
OWASP API Security Top 10 Examples by 42Crunch
OWASP API Security Top 10 ExamplesOWASP API Security Top 10 Examples
OWASP API Security Top 10 Examples
42Crunch1.4K views
CSF18 - GDPR - Sami Laiho by NCCOMMS
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
NCCOMMS222 views

Similar to How can you deliver a secure product

Agile Secure Development by
Agile Secure DevelopmentAgile Secure Development
Agile Secure DevelopmentBosnia Agile
829 views30 slides
Application security meetup 27012021 by
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
76 views103 slides
Year Zero by
Year ZeroYear Zero
Year Zeroleifdreizler
146 views59 slides
Sumeet Mandloi: Robust Security Testing Framework by
Sumeet Mandloi: Robust Security Testing FrameworkSumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkAnna Royzman
78 views14 slides
Becoming Secure By Design: Questions You Should Ask Your Software Vendors by
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsSolarWinds
280 views16 slides
Sécuriser Docker - Utilisation du CIS Docker 1.12 by @guytalbot by
Sécuriser Docker - Utilisation du CIS Docker 1.12 by @guytalbotSécuriser Docker - Utilisation du CIS Docker 1.12 by @guytalbot
Sécuriser Docker - Utilisation du CIS Docker 1.12 by @guytalbotJulien Maitrehenry
380 views35 slides

Similar to How can you deliver a secure product(20)

Agile Secure Development by Bosnia Agile
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
Bosnia Agile829 views
Application security meetup 27012021 by lior mazor
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
lior mazor76 views
Sumeet Mandloi: Robust Security Testing Framework by Anna Royzman
Sumeet Mandloi: Robust Security Testing FrameworkSumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing Framework
Anna Royzman78 views
Becoming Secure By Design: Questions You Should Ask Your Software Vendors by SolarWinds
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
SolarWinds280 views
Sécuriser Docker - Utilisation du CIS Docker 1.12 by @guytalbot by Julien Maitrehenry
Sécuriser Docker - Utilisation du CIS Docker 1.12 by @guytalbotSécuriser Docker - Utilisation du CIS Docker 1.12 by @guytalbot
Sécuriser Docker - Utilisation du CIS Docker 1.12 by @guytalbot
Julien Maitrehenry380 views
Secure Software Development Lifecycle by 1&1
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
1&14K views
Managing Application Security Risk in Enterprises - Thoughts and recommendations by Thierry Zoller
Managing Application Security Risk in Enterprises - Thoughts and recommendationsManaging Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Thierry Zoller200 views
Create code confidence for better application security by Rogue Wave Software
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
Open source iam value, benefits, and risks by WSO2
Open source iam  value, benefits, and risksOpen source iam  value, benefits, and risks
Open source iam value, benefits, and risks
WSO2285 views
Application Security - Dont leave your AppSec for the last moment Meetup 2104... by lior mazor
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
lior mazor150 views
How to Perform Continuous Vulnerability Management by Ivanti
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
Ivanti263 views
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu... by Simone Onofri
OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
Simone Onofri970 views
AWS live hack: Atlassian + Snyk OSS on AWS by Eric Smalling
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWS
Eric Smalling248 views
Ab cs of software security by David Klassen
Ab cs of software securityAb cs of software security
Ab cs of software security
David Klassen438 views
Дмитро Терещенко, "How to secure your application with Secure SDLC" by Sigma Software
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Sigma Software137 views
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre... by Manoj Purandare ☁
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre... by Manoj Purandare ☁
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre... by Manoj Purandare ☁
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...

Recently uploaded

Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...ShapeBlue
117 views25 slides
DRBD Deep Dive - Philipp Reisner - LINBIT by
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
140 views21 slides
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
163 views54 slides
Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
90 views46 slides
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
153 views59 slides
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
50 views35 slides

Recently uploaded(20)

Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue117 views
DRBD Deep Dive - Philipp Reisner - LINBIT by ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue163 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash153 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue166 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue144 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays53 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue98 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu365 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue79 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE69 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue120 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue222 views

How can you deliver a secure product

  • 1. How can you deliver a secure product? Michael Furman, Security Architect
  • 2. The Legend of SDL ● Steve Lipner  Senior Director of Security Engineering Strategy for Microsoft  Key person for the Microsoft SDL
  • 3. What will we cover today? What is an SDL? Why is an SDL important? Sample: Tufin SDL How can you deliver a secure product?
  • 4. About Me ● >12 years in application security ● >8 years with Tufin – Lead Security Architect ● >20 years in software engineering ● www.linkedin.com/in/furmanmichael/ ● ultimatesecpro@gmail.com ● Read my blog https://ultimatesecurity.pro/tags/presentation/ ● Follow me on twitter @ultimatesecpro ● I like to travel, read books and listen to music
  • 5. About ● Market Leader in Security Policy Automation ● Tufin is used by >2000 enterprises  To segment networks and connect applications  On-prem networks, firewalls, cloud and K8S ● We are the Security Policy Company!
  • 6. Journey to our SDL ● Resolving security issues? Easy for me! ● Creating a “security” process? Brand new for me! ● Soooo many things to manage ....  Vulnerabilities discovered by customers  CVEs  Upgrading 3rd-party software  Pen tests  ... and all the other stuff I did not yet even know about ● Saved by the SDL! ● No need to reinvent the wheel Picture is from the “Journey to the Center of the Earth” movie.
  • 7. What is an SDL? ● SDL is the process for developing secure software ● Adds security controls in each development phase SDL = Security Development Lifecycle
  • 8. History of SDL ● Mail of Bill Gates  From: Bill Gates  To: to every full-time employee at Microsoft  Sent: Tuesday, January 15, 2002 5:22 PM  Subject: Trustworthy computing ● Microsoft shutdown Windows development to handle the security issues ● Microsoft SDL  v 1.0 - 2004 (internal)  v 3.2 - 2008 (public)  v 5.2 - 2012 (recent) … Security: The data our software and services store on behalf of our customers should be protected from harm and used or modified only in appropriate ways. Security models should be easy for developers to understand and build into their applications. Photo from yahoo.com
  • 9. Why is an SDL important? Why SDL? • Helps developers build secure software • Ensures security is enabled out of the box • Defines how to respond to discovered vulnerabilities
  • 10. SolarWinds Attack - 2020 ● First disclosure on December 8th by FireEye – first discovered SolarWinds customer https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply- chain-compromises-with-sunburst-backdoor.html ● Other SolarWinds customers breached: FireEye, U.S. Departments, Microsoft, Cisco, … https://www.theverge.com/2020/12/21/22194183/intel-nvidia-cisco-government-infected-solarwinds-hack ● Hackers viewed Microsoft source code https://msrc-blog.microsoft.com/2020/12/31/microsoft-internal-solorigate-investigation-update/ ● Joint Statement by the FBI, the CISA, and the ODNI: This work indicates that a Threat, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks https://www.fbi.gov/news/pressrel/press-releases/joint-statement-by-the-federal-bureau-of-investigation- fbi-the-cybersecurity-and-infrastructure-security-agency-cisa-and-the-office-of-the-director-of-national- intelligence-odni
  • 11. SolarWinds Attack - Solorigate ● Microsoft’s analysis of the attack https://www.microsoft.com/security/blog/2020/12/18/analyzing- solorigate-the-compromised-dll-file-that-started-a-sophisticated- cyberattack-and-how-microsoft-defender-helps-protect/ ● The attackers inserted malicious code into DLL ● SolarWinds Orion Platform installed ● The backdoor activates  Randomly between 12 to 14 days after installation ● Attackers ping the backdoor ● Gathering and sending info ● The backdoor runs commands from attackers Image from microsoft.com
  • 12. SolarWinds Attack - Solorigate ● > 18,000 SolarWinds customers received the malicious update ● > 1,000 experienced the backdoor ping ● > 200 were hacked https://www.businessinsider.com/list-of-companies-agencies-at-risk-after-solarwinds-hack-2020-12 ● US agencies  The Office of the President of the United States  The Department of Defense  The US Army  The Federal Reserve  NASA  The NSA  The CDC  The Department of Justice ● Major companies  Visa  AT&T  PwC  Lockheed Martin  CBS  Cisco  Comcast  Ernst & Young  Hertz  The New York Times
  • 13. Software Development Life Cycle (SDLC) Implementation Requirements Design Verification Release
  • 14. SDL - Shift Left Implementation Requirements Design Verification Release
  • 15. Tufin SDL Implementation Training Requirements Design Verification Release Response Security Design Security Classroom Sessions Security Champions Security Requirements SAST Software Updates Peer Reviews Internal Security Scans DAST External Security Tests Vulnerabil ity Response Policy
  • 16. Tufin SDL Implementation Training Requirements Design Verification Release Response Security Design Security Classroom Sessions Security Champions Security Requirements SAST Software Updates Peer Reviews Internal Security Scans DAST External Security Tests Vulnerabil ity Response Policy
  • 17. Security Training ● Security awareness training for the Development and QA teams  The latest security threats, mitigations, and technologies  OWASP Top 10 best practices ● Security Champions
  • 18. Security Training ● Q: How can a Security Champion be successful? ● Tip: Identify and resolve specific security issues ● Examples of investigations:  Best way for us to handle Content Security Policy (CSP)?  Best way for us to prevent XML External Entity (XXE) attack? ● Tufin success: OWASP meetup lecture https://ultimatesecurity.pro/post/xxe-meetup/
  • 19. Tufin SDL Implementation Training Requirements Design Verification Release Response Security Design Security Classroom Sessions Security Champions Security Requirements SAST Software Updates Peer Reviews Internal Security Scans DAST External Security Tests Vulnerabil ity Response Policy
  • 20. Security Requirements ● Incorporated into the requirements stage of S/W development ● Why do we want to handle security early?  Allows us to design a feature and to write test plans which incorporate security requirements up front  Saves time for all of us – developer time, QA time, documentation time
  • 21. Design ● Designs of new features are done jointly by both development and security teams
  • 22. Security Requirements & Design ● Q: How can you ensure Dev & QA handle security? ● Tip: Make it easy - create a security checklist ● Examples  New API? • Make sure the API has proper authentication • Make sure the API has proper authorization • Implement input validation  Confidential info not stored as plain text • Use appropriate encryption or hash algorithms  Confidential info not stored on a client side  Confidential info not sent via HTTP GET method  …
  • 23. Tufin SDL Implementation Training Requirements Design Verification Release Response Security Design Security Classroom Sessions Security Champions Security Requirements SAST Software Updates Peer Reviews Internal Security Scans DAST External Security Tests Vulnerabil ity Response Policy
  • 24. Static Application Security Testing (SAST) ● What is SAST? ● Q: Any benefit to scan on each commit? ● Tip: Scan at least weekly  Daily is the best option ● Your goal: Fix High issues immediately!
  • 25. Software Updates ● All 3rd-party software is regularly updated ● Q: Can I ensure all 3rd-party software is kept up-to-date without a tool?  Open-source 3rd-party software  Commercial 3rd-party software ● Tip: check that recommended upgrades don’t introduce new vulnerabilities ● Your goal: upgrade to a version without High or Critical issues!
  • 26. Peer Reviews ● Mandatory for every code change ● Tip: ensure all code changes adhere to security requirements  Passwords are not stored in plain text  Passwords are not stored on client side  …
  • 27. Tufin SDL Implementation Training Requirements Design Verification Release Response Security Design Security Classroom Sessions Security Champions Security Requirements SAST Software Updates Peer Reviews Internal Security Scans DAST External Security Tests Vulnerabil ity Response Policy
  • 28. Internal Security Scans ● What are Internal Security Scans? ● Q: Any benefit to scan on each commit? ● Tip: Scan at least monthly  Depends on your release cycle ● Your goal: Fix High issues immediately!
  • 29. Internal Security Scans ● Qualys SSL Labs Report – free service https://www.ssllabs.com/ssltest/ ● Tip: Ensure you check the “Do not show the results on the boards” checkbox
  • 31. Dynamic Application Security Testing (DAST) ● What is DAST? ● Q: Any benefit to scan on each commit? ● Tip: Scan at least monthly  Depends on your release cycle ● Your goal: Fix High issues immediately!
  • 32. Tufin SDL Implementation Training Requirements Design Verification Release Response Security Design Security Classroom Sessions Security Champions Security Requirements SAST Software Updates Peer Reviews Internal Security Scans DAST External Security Tests Vulnerabil ity Response Policy
  • 33. External Security Tests ● Why External Security Tests? ● Tips:  Scan at least annually • Best each major release  Ensure to create a valid test scope that covers all areas • Web UI • Infrastructure  Ensure an External Test is added into R&D calendar ● Your goal: fix High issues immediately!  Coordinate retest after your fixes
  • 34. Tufin SDL Implementation Training Requirements Design Verification Release Response Security Design Security Classroom Sessions Security Champions Security Requirements SAST Software Updates Peer Reviews Internal Security Scans DAST External Security Tests Vulnerabil ity Response Policy
  • 35. Vulnerability Response Policy • A patch will be made available as soon as possible CRITICAL HIGH MEDIUM LOW NOT VULNERABLE • A fix will be included in the upcoming release • A fix will be included in a future release • A fix may be included in a future release • Nothing to fix
  • 36. Vulnerability Response Policy ● Define a vulnerability response policy  Document it ● Tip: the policy should be approved on the corporate level  Affect sales, support, development
  • 37. Rolling out an SDL ● First phase (minimal SDL)  Vulnerability Response Policy  Internal Security Scans • Qualys SSL Labs Report  Software Updates • Using a tool ● Second Phase  External Security Tests ● Third phase  SAST ● Fourth phase  DAST
  • 38. Rolling out an SDL ● Ongoing  Security Requirements & Design  Security Training  Security Champions  Peer Reviews ● Further improvements  https://www.microsoft.com/en-us/securityengineering/sdl/practices  …
  • 39. Selecting a tool for any SDL phase ● Perform POC  Define requirements very well before the POC ● Tools can be commercial or open source ● Tools from the same provider is not essential
  • 40. How can you deliver a secure product? ● Start to roll out an SDL in your organization ● Improve SDL on a regular basis
  • 41. Take Aways SDL - the framework that ensures secure software Roll out an SDL ... And follow it!!! You will deliver a secure product!

Editor's Notes

  1. Welcome to the session.
  2. Steve was elected to the National Cybersecurity Hall of Fame in 2015 and to the National Academy of Engineering in 2017.
  3. The story https://en.wikipedia.org/wiki/Microsoft_Security_Development_Lifecycle
  4. Many other companies, including Cisco, Adobe, and Aetna, have since adopted Microsoft's SDL processes or created their own https://www.microsoft.com/en-us/securityengineering/sdl/about
  5. https://www.govtech.com/security/List-of-Hacked-Organizations-Tops-200-in-SolarWinds-Case.html The elimination of the attack can be very complicated task. Not enough to update the SolarWinds Orion Platform. Not enough to isolate the SolarWinds Orion Platform. Need to instigate entire network. Not clear what was added via the backdoor.
  6. Who does not know your security champion?
  7. Example: You use Spring 4.1 A provider discovers 3 high CVEs and recommends to upgrade to 4.2 You upgraded to 4.2 and discover 2 other high CVEs You have invested a lot of efforts but still have high CVEs! After additional check you discover 4.3 is without high CVEs You should be able to check CVE list before the upgrade and to be able to select 4.3