The Magic of Symbiotic Security

42
THE MAGIC OF SYMBIOTIC SECURITY Creating an Ecosystem of Security Systems
  • date post

    19-Oct-2014
  • Category

    Technology

  • view

    5.405
  • download

    2

description

Throw out everything that you know about security tools today. No more six-figure appliances that only do one thing marginally well. No more proprietary protocols. We deserve better and we demand better. Envision a world where your security tools talk with eachother. They communicate and share data in order to leverage eachothers strengths and and help compensate for their weaknesses. They work together to solve problems. Envision "Symbiotic Security".Symbiotic Security is a new term that was coined to describe the ability of a tool to consume data from other tools or provide data to other tools. As part of our research, we have examined various classes of tools on the market and identified these abilities in each of them resulting in a label of "Consumer", "Provider", or "Symbiotic". As a consumer of security tools, this completely revolutionizes the way that we make purchases.As an example, let's pretend that you are purchasing a new Intrusion Prevention System for your enterprise. As you begin to evaluate the various tools from the Gartner Magic Quadrant, you quickly realize that they almost all have the same primary feature set. The key differentiator at this point aren't the rules or the hardware, but rather, the ability for the system to send and receive data with other systems. The IPS itself has some signatures and blocking abilities, but has zero relevancy data. Now, we give the IPS the ability to pull in vulnerability data and system configuration information from network and host scans and we gain relevancy. Add in some additional data on where the potential threat is coming from and now you have the data necessary to take a decisive action on threats. This new system is a "Consumer". Now, if you give the IPS the ability to send information to other devices on things like the source of relevant threats, those devices, like a firewall or HIPS, can now make intelligent blocking decisions as well. Our IPS now has "Provider" abilities. Since our IPS is labeled as both a "Provider" and "Consumer" it is deemed "Symbiotic". This convention can now be used both by the manufacturer to market the value-add of the device as well as a way for the purchasers to differentiate between otherwise similar devices.In order to demonstrate the true powers of being symbiotic, we are releasing a free tool that epitomizes this concept. The tool, named ThreadFix, has been labeled as a "Consumer" because of it's abilities to pull vulnerability data from static and dynamic scanning tools, threat modeling, and manual penetration tests as well as alert logs and vulnerability details from IDS, IPS, and WAF products. ThreadFix has also been labeled as a "Provider" because of it's abilities to normalize the data consumed and pass it along to IDS, IPS, and WAF for action as well as to your bug tracking system for remediation tracking. Because it can serve both a consumer and provider role, we designate it as a "Symbiotic" tool.

Transcript of The Magic of Symbiotic Security

Page 1: The Magic of Symbiotic Security

THE MAGIC OF SYMBIOTIC SECURITY Creating an Ecosystem of Security Systems

Page 2: The Magic of Symbiotic Security

DAN CORNELL

¢ Founder and CTO of Denim Group

¢ Software developer by background (Java, .NET, etc)

¢ OWASP San Antonio, Global Membership Committee

2

Page 3: The Magic of Symbiotic Security

JOSH SOKOL

¢  Information Security Program Owner at National Instruments

¢ Chair of the OWASP Global Chapters Committee

¢ Co-Chair of OWASP AppSec USA 2012 (October 23-26 in Austin, TX)

Page 4: The Magic of Symbiotic Security

BUSINESS REQUIREMENTS

¢ We need an Intrusion Prevention System (IPS). ¢ We’ve budgeted $50,000 for it. ¢ Get us the best tool for our money.

How would you evaluate for purchase?

Page 5: The Magic of Symbiotic Security

3RD PARTY REVIEWS

¢ Overall Ranking from SC Magazine Feb. 2011

1)  McAfee – 5 stars 2)  NitroGuard – 5 stars 3)  Top Layer Security – 5 stars 4)  Sourcefire – 4 stars 5)  CounterSnipe – 4 stars

Page 6: The Magic of Symbiotic Security

INDUSTRY RANKINGS

1) McAfee 2) Sourcefire 3) HP 4) Cisco 5) IBM

Page 7: The Magic of Symbiotic Security

COST

¢ Lowest cost from SC Magazine Feb. 2011

1)  CounterSnipe - $500/site 2)  NitroGuard - $6,495 3)  Sourcefire - $8,995 4)  McAfee - $10,995 5)  Top Layer Security - $12,495

Page 8: The Magic of Symbiotic Security

FEATURES

ü  Zero-day threat protection ü  Inline protecting ü  Passive monitoring ü  Support for custom policies ü  Real-time alerting ü  Central management ü  Compliance grade reporting ü  High availability

Page 9: The Magic of Symbiotic Security

THE INHERENT PROBLEM

¢  3rd Party Bias ¢  Incomplete Industry Rankings ¢ Cost is ALWAYS Negotiable ¢ Features are commodity

Page 10: The Magic of Symbiotic Security

TOOLS ARE EVALUATED BASED ON CLASS FEATURES; NOT ON ENTERPRISE VALUE.

Fir

ewal

l

IPS

NA

C

Mal

war

e A

nal

ysis

Vu

lner

abil

ity

Mgm

t

ü Proprietary Protocols

ü “Greedy” Platforms

ü Tools Working in Silos

ü Duplication of Functionality

Page 11: The Magic of Symbiotic Security

GAUGING ENTERPRISE VALUE Separating the Wheat from the Chaff

Page 12: The Magic of Symbiotic Security

CONSUMER CAPABILITIES ü Events ü Alerts ü SNMP ü Syslog

Page 13: The Magic of Symbiotic Security

CONSUMERS CAN BE “GREEDY”

Exploitation – Parasitism. The leech gains food and nutrients, but the host gains nothing from having a leech suck its blood.

Page 14: The Magic of Symbiotic Security

PROVIDER CAPABILITIES ü Open API ü Open DB ü Data Export

Page 15: The Magic of Symbiotic Security

SYMBIOTIC SECURITY

You can assemble an arsenal of best-in-breed tools that work together. Even smaller purchases can have a large impact.

Page 16: The Magic of Symbiotic Security

SYMBIOTIC SECURITY IS NOT

¢ A piece of hardware or software you can purchase.

¢ A ranking system for vendors.

¢ A label you can slap on your new product.

Page 17: The Magic of Symbiotic Security

SYMBIOTIC SECURITY IS

¢ A philosophy on how you evaluate purchases.

¢ A concept for creating an ecosystem of security systems.

¢ A means of making the tools we invest in more valuable to us.

Page 18: The Magic of Symbiotic Security

BEWARE OF PSEUDO-SYMBIOSIS

¢ Single vendor with multiple product offerings that work together.

¢ Gives symbiotic functionality, but only within that vendors tool set.

¢ True Symbiotic Security is about being able to hand-pick your toolset and have them work together regardless of brand.

Page 19: The Magic of Symbiotic Security

SECURITY TOOLS And Their Classifications

Page 20: The Magic of Symbiotic Security

DATA IN SILOS

¢ Reputation data: Do I trust the source? ¢ Attack data: How am I being attacked? ¢ Vulnerability data: What attacks are my systems

vulnerable to? ¢ Asset data: What versions of O/S and software

am I running? ¢  Identity data: Who is using my systems? ¢ Data classification: Who should have access to

what?

Page 21: The Magic of Symbiotic Security

DATA IN SILOS (CONT)

¢ Trust hierarchy: Who do I trust and who trusts me?

¢ Authentication data: Do I have access? ¢ Authorization data: What can I access? ¢ QA data: What has been tested? ¢ Trust boundaries: Is data crossing between two

trust levels?

Page 22: The Magic of Symbiotic Security

MAGIC HAPPENS

¢ Should I accept packets from random IP X?

�  Reputation data �  Attack data �  Vulnerability data �  Asset data �  Trust boundaries

Page 23: The Magic of Symbiotic Security

MORE MAGIC

¢ Should I allow random person X to download a file Y?

�  Data classification �  Reputation data �  Authentication data �  Authorization data �  Trust boundaries

Page 24: The Magic of Symbiotic Security

EVEN MORE MAGIC

¢ With Symbiotic Security the possibilities are limited only by the security ecosystem you’ve put in place.

�  Creation of WAF rules based on attack data. �  Is a targeted exploit actually going to affect the

system? �  Should I allow a system on my network?

Page 25: The Magic of Symbiotic Security

DEMAND SYMBIOTIC SECURITY

¢ Let vendors know up front that you will be evaluating the effectiveness of their tool based on: 1.  Other tools in your environment their tool can

consume data from. 2.  Other tools in your environment their tool can

provide data to. 3.  The net increase in security for your entire tool

ecosystem and not just their tools siloed functionality.

Page 26: The Magic of Symbiotic Security

THREADFIX Symbiotic Security In Action

Page 27: The Magic of Symbiotic Security

THREADFIX - OVERVIEW

¢ ThreadFix is a software vulnerability aggregation and management system that helps organizations aggregate vulnerability data, generate virtual patches, and interact with software defect tracking systems.

¢ Freely available under the Mozilla Public License (MPL)

¢ Hosted at Google Code: http://code.google.com/p/threadfix/

27

Page 28: The Magic of Symbiotic Security

28

ThreadFix Consolidates reports so managers can speak intelligently about the status and trends of security within their organization

Page 29: The Magic of Symbiotic Security

29

Vulnerability Import • Pulls in static and dynamic results • Eliminates duplicate results • Allows for results to be grouped

Page 30: The Magic of Symbiotic Security

30

Real-Time Protection Virtual patching helps protect organizations during remediation

Page 31: The Magic of Symbiotic Security

31

Defect Tracking Integration

• ThreadFix can connect to common defect trackers • Defects can be created for developers • Work can continue uninterrupted

Page 32: The Magic of Symbiotic Security

THREADFIX - SYMBIOTIC

¢ Vendor-independent ¢ Ability to consume multiple technologies (SAST,

DAST, IDS/IPS, WAF) ¢ Ability to produce output that can be consumed

by other tools (RESTful API) ¢ Mapping vulnerability data with operational data

in a bi-directional way ¢ Prioritization based on actual attack data rather

than suppositions

Page 33: The Magic of Symbiotic Security

SUBSET OF SECURITY TOOL INTERACTIONS

Page 34: The Magic of Symbiotic Security

DEMO

Page 35: The Magic of Symbiotic Security

VENDORS: PLEASE SUCK LESS

¢ ThreadFix was created to solve a problem that security tool vendors have created. �  Proprietary protocols �  Lack of APIs �  Lack of standards �  Play nice!

¢ Some have been very helpful

�  File format info �  Beta testing �  And so on

Page 36: The Magic of Symbiotic Security

YOU KNOW WHAT WOULD MAKE ALL THIS WAY EASIER? ¢  Common data standards!

�  Scanning tools �  Event logs �  And so on…

¢  Current efforts: �  MITRE Software Assurance Findings

Expression Schema (SAFES) ¢  http://www.mitre.org/work/tech_papers/

2012/11_3671/

�  OWASP Data Exchange Format Project ¢  https://www.owasp.org/index.php/

OWASP_Data_Exchange_Format_Project

36

Page 37: The Magic of Symbiotic Security

SIMPLE SOFTWARE VULNERABILITY LANGUAGE (SSVL) ¢  Common way to represent static and dynamic scanner

findings ¢  Based on our experience building importers for

ThreadFix �  It “works” for real-world applications because we are

essentially using it

¢  Love to hear feedback �  Send me a request and I can share the document for

editing/annotation

¢  Online: �  https://docs.google.com/document/d/

1H5hWUdj925TtoZ7ZvnfHdFABe7hBCGuZtLUas29yBGI/edit?pli=1

�  Or http://tinyurl.com/cslqv47

37

Page 38: The Magic of Symbiotic Security

SIMPLE SOFTWARE VULNERABILITY LANGUAGE (SSVL)

38

Page 39: The Magic of Symbiotic Security

VENDORS WIN TOO

¢  Industry vetted standards for communication ¢ Niche products with enterprise functionality ¢ Maximize R&D time and money ¢ Vendors can excel where it matters the most

Page 40: The Magic of Symbiotic Security

IDEAS TO FURTHER THE CAUSE

¢ Speak with Gartner about adding symbiotic characteristics to their evaluation criteria.

¢ Create a list of tools with symbiotic characteristics.

Page 41: The Magic of Symbiotic Security

HELP US HELP THE COMMUNITY

¢ http://www.symbioticsecurity.com/

Page 42: The Magic of Symbiotic Security

QUESTIONS

42

Josh Sokol [email protected] Twitter: @joshsokol www.joshsokol.com www.webadminblog.com

Dan Cornell [email protected] Twitter: @danielcornell www.denimgroup.com www.denimgroup.com/

threadfix code.google.com/p/

threadfix (210) 572-4400