mapping from tools automating vulnerability

22
FIRST - PSIRT Technical Colloquium 2020 - March 4-5 Automating Vulnerability Mapping from Tools

Upload: others

Post on 14-Nov-2021

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mapping from Tools Automating Vulnerability

FIRST - PSIRT Technical Colloquium 2020 - March 4-5

Automating VulnerabilityMapping from Tools

Page 2: Mapping from Tools Automating Vulnerability

2

About UsNVIDIA Product Security Tools

Jessica ButlerNVIDIA Product Security

Tools [email protected]

Dee AnnachhatreNVIDIA Product Security

Tools [email protected]

Page 3: Mapping from Tools Automating Vulnerability

3

IntroMoving the Ball Forward

Pitfalls of manual process

All the Data - Oh My!

Cataloging Portfolio

Self-Service Registration tool

Mapping the Data - Oh Yeah!

Notifications

Issue Management - Yes, Please!

Calculating Risk

Page 4: Mapping from Tools Automating Vulnerability

4

Page 5: Mapping from Tools Automating Vulnerability

5

All the Data - OH MY!

WHITESOURCE

COVERITY

CHECKMARX

Page 6: Mapping from Tools Automating Vulnerability

6

•Top level•Shippable or deployable•Executive ownership•Versioning and EOL

PRODUCTS

•Logical segregation of product•1:n source code projects•n:n products•Build level ownership•1:n developer teams

COMPONENTS

• Internal components•External open source software•External third-party software•Nestable

DEPENDENCIES

•Versioning detection•Vulnerability mapping•Fix recommendations•Fix verification

OPEN SOURCE SOFTWARE

Defining the

PORTFOLIO

Page 7: Mapping from Tools Automating Vulnerability

7

Page 8: Mapping from Tools Automating Vulnerability

8

Page 9: Mapping from Tools Automating Vulnerability

9

Page 10: Mapping from Tools Automating Vulnerability

10

Page 11: Mapping from Tools Automating Vulnerability

11

Page 12: Mapping from Tools Automating Vulnerability

12

Page 13: Mapping from Tools Automating Vulnerability

13

SELF-SERVICE REGISTRATION DEMO

Page 14: Mapping from Tools Automating Vulnerability

14

TOOL 1: Open Source Scan

TOOL 3: DAST

TOOL 2: SAST

Reporting Tool

Portfolio DB

Mapping the Data

reporting

micro-service

reporting

micro-service

reporting

micro-service

Page 15: Mapping from Tools Automating Vulnerability

15

Notifications

Description Use Case User Type

Initial ReportDashboard of OSS vulnerability distribution and other details including recommended fix

Triggered the morning after successful registration

Owner, PSIRT Lead

Weekly Report Updated dashboard for scan results Triggered every Monday morning Owner, PSIRT Lead

New CVE Report Dashboard with newly discovered CVEs for packages in Portfolio

Triggered when a new CVE is introduced for an OSS package in Portfolio

Owner, PSIRT Lead

Package Discovery alertEmail about a new undisclosed vulnerability associated with an OSS package

Triggered manually by PSIRT team about an undisclosed vulnerability associated with a particular OSS package

Owner, PSIRT Lead

Portfolio Notification Notifications regarding updates to the product catalog hierarchy

Registered build has been deleted/modified Underlying repositories have been deleted, Registered owners are invalidated

Owner, PSIRT Lead

OSS Scanning Service

Page 16: Mapping from Tools Automating Vulnerability

16

Issue Management

1. Customize based on product types2. Slowly increase strength for priority3. Automate scan setup and configure

Tool Policies1. Define filters for bug system2. Reporting MSAs detect issue(s)3. Portfolio DB determines owner(s)4. Issue MSA validates new bug (and

opens)

De-duplicate Bugs

1. Portfolio DB detects code reuse2. OSS Reporting MSA maps vulns3. Report dashboard pinpoints biggest ROI

Prioritization1. Define format and location for list2. Use team processes for approval3. Require approval based on time4. Synch to Reporting for validation

Whitelisting

Page 17: Mapping from Tools Automating Vulnerability

17

REPORT DEMO

Page 18: Mapping from Tools Automating Vulnerability

18

ReportsOverall Security Risk Profile

Page 19: Mapping from Tools Automating Vulnerability

19

ReportsSecurity Risk Profile Details

Page 20: Mapping from Tools Automating Vulnerability

20

Calculating Risk

- Number of issues should be normalized- more source code- more open source in use

- Risk should incorporate multiple factors- severity- count- type- disclosure date- publicity- higher risk products

- Risk should be easily visualized- ie. a product with 3 Med issues should look different than product with 10 Med issues, etc

Things to THINK on...

Page 21: Mapping from Tools Automating Vulnerability

21

THANK YOU!

We love chatting with other Security Tools developers to knowledge share. Please contact us if you’re interested in learning more or sharing!!

[email protected]

[email protected]

Comments, Questions, Follow-UP!

Page 22: Mapping from Tools Automating Vulnerability