nazira omuralieva - susan kaufman - improving application security - vulnerability response in the...

22
1 © Copyright 2011 EMC Corporation. All rights reserved. Nazira Omuralieva Susan Kaufman RSA, The Security Division of EMC Improving Application Security – Vulnerability Response in the ISV World SourceBoston 2011

Upload: source-conference

Post on 05-Dec-2014

1.471 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

1© Copyright 2011 EMC Corporation. All rights reserved.

Nazira OmuralievaSusan Kaufman

RSA, The Security Division of EMC

Improving Application Security – Vulnerability

Response in the ISV World

SourceBoston 2011

Page 2: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

2© Copyright 2011 EMC Corporation. All rights reserved.

Session Objectives

• Vulnerability response ecosystem and guiding principles for effective vulnerability response

• Important roles & responsibilities in a software vendor organization for vulnerability response

• Typical vulnerability response process• Tips on how you can create an effective

vulnerability response program in your organizations including resources in the public domain

2

Page 3: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

3© Copyright 2011 EMC Corporation. All rights reserved.

Vulnerability Response Ecosystem

Page 4: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

4© Copyright 2011 EMC Corporation. All rights reserved.

Source: Counterpane

time

risk

Vulnerabilitydiscovered

Vulnerabilityreported

Vendorpatches

vulnerability

Usersinstallpatch

Minimize time between patch availability and patch installation

(Customer)

Minimize time between vulnerability report and patch availability (Vendor & Finder)

Key actors: Finder Vendor

Customer

Key actors: Finder Vendor

Customer

Critical Components of a Successful Vulnerability Management Approach

Page 5: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

5© Copyright 2011 EMC Corporation. All rights reserved.

Vulnerability Response: Guiding Principles • Drive towards simultaneously

publishing the vulnerability and the remedy

– Maintain a good relationship with the finder

– Ensure prompt response, updates and resolution

• Protect company’s reputation & shareholders

– Avoid bad press– Enforce legal review

• Align with customer best practices

– Proactive notification of security patch availability

– Continuous evaluation of public vulnerability impact on products

– Efficient response to customers’ scan reports

• Enable customers to evaluate related risk

– Provide enough information to evaluate ease of exploitation and impact

Product SProduct Securityecurity R ResponseesponseProduct SProduct Securityecurity R Responseesponse

Page 6: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

6© Copyright 2011 EMC Corporation. All rights reserved.

Vulnerability Response: EMC’s Guiding Principles • Drive towards simultaneously

publishing the vulnerability and the remedy

– Maintain a good relationship with the finder

– Ensure prompt response, updates and resolution

• Protect company’s reputation & shareholders

– Avoid bad press– Enforce legal review

• Align with customers best practices

– Proactive notification of security patch availability

– Continuous evaluation of public vulnerability impact on products

– Efficient response to customers’ scan reports

• Enable customers to evaluate related risk

– Provide enough information to evaluate ease of exploitation and impact

EMC Product SEMC Product Securityecurity R Response Center*esponse Center*EMC Product SEMC Product Securityecurity R Response Center*esponse Center*

*EMC PSRC is a direct function of the EMC Product Security Office

Page 7: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

7© Copyright 2011 EMC Corporation. All rights reserved.

EMC PSRC Leverages Industry Resources and Relationships• Supports industry standards:

– Common Vulnerability & Exposure (CVE)• Unique definition of vulnerabilities

maintained by MITRE

– Common Vulnerability Scoring System (CVSS)

• Severity rating defined by FIRST

– Common Weakness Enumeration (CWE)• a list of software weakness types

maintained by MITRE

• Relationships with researchers, reporting organizations & other industry bodies

– Tipping Point’s Zero Day Initiative (ZDI)– Computer Emergency Response Team (CERT)– Fortinet's FortiGuard– Secunia– Member of FIRST

Page 8: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

8© Copyright 2011 EMC Corporation. All rights reserved.

Roles & Responsibilities: Vulnerability Response Process

Page 9: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

9© Copyright 2011 EMC Corporation. All rights reserved.9

Finder

•Disclose vulnerability information to EMC privately

Product Engineering

•Appoint vulnerability response team members

•Create inventory of embedded components and subscribe to security alerts

•Validate vulnerability reports

•Create timeline for response

Security Response Taskforce

•Includes trained members from Engineering, Legal, Marketing, Public Relations, Investor Relations, Customer Service

•Review and approve the remediation and communication plans

Customers

•Receive security advisories and keep up to date with patches

Roles & Responsibilities for an Effective Vulnerability Response Program (EMC example)

Page 10: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

10© Copyright 2011 EMC Corporation. All rights reserved.

Typical Vulnerability Response Process Flow

Page 11: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

11© Copyright 2011 EMC Corporation. All rights reserved.11

Important Steps After the Remedy Release

• Root Cause Analysis– Analyze the root cause of product

vulnerabilities to detect and eliminate similar vulnerabilities that may already exist in the product

– Adjust development practices to prevent similar vulnerabilities in the future

• Vulnerability Regression Testing– Add tests to the regression test suite to

prevent reintroduction of the vulnerability

Page 12: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

12© Copyright 2011 EMC Corporation. All rights reserved.

Examples of how to publicly share information on your vulnerability

response program

Page 13: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

13© Copyright 2011 EMC Corporation. All rights reserved.

www.emc.com/security

13

Make it easy to report a security vulnerability

Page 14: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

14© Copyright 2011 EMC Corporation. All rights reserved.

Detailed Process on Reporting a Security Vulnerability

14

•Monitored mailbox•PGP key for communication

Page 15: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

15© Copyright 2011 EMC Corporation. All rights reserved.

Example of a Security Advisory

15

•CVE Identifier•Severity Rating•Details•Resolution steps

Page 16: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

16© Copyright 2011 EMC Corporation. All rights reserved.

EMC Response Examples

Page 17: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

17© Copyright 2011 EMC Corporation. All rights reserved.

No One Size Fits All 1. Coordinated Disclosure – researcher and vendor working in

harmony– EMC Celerra vulnerability publicly disclosed at Black Hat

2. Industry wide impact and cooperation on a vulnerability in a widely used protocol

– SSL TLS protocol vulnerability

3. Researcher/ customer publicly discloses information about a vulnerability not giving time for the vendor to respond

– Vulnerability in EMC product publicly posted in an industry forum

Model your process on industry best practices but expect surprises

Page 18: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

18© Copyright 2011 EMC Corporation. All rights reserved.

Questions to consider and tips

Page 19: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

19© Copyright 2011 EMC Corporation. All rights reserved.

Tricky Questions That The PSRC Comes Across Regularly

• Responsible disclosure vs. coordinated disclosure vs. full disclosure vs…….

• When to release a security patch vs. remediating the vulnerability in the next maintenance pack?

• When to publicly disclose security vulnerabilities vs. just fixing them in product releases?

• How to coordinate remediation and release of vulnerabilities found in common components developed by your company to take care of internal dependencies?

• How to keep third party/ open source embedded components up to date?

• Many more….

Page 20: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

20© Copyright 2011 EMC Corporation. All rights reserved.

Steps to Creating a Vulnerability Response Program• Create a company wide Vulnerability Response Policy and Process

including roles and responsibilities and timelines for response – Do not wait till a vulnerability gets publicly reported

• Get executive acceptance and buy-in• Train internal employees on their roles and responsibilities• Set up a monitored mailbox that researchers can use to send

vulnerability reports and make it available on your website• Create a way to deliver security patches and send security

advisories to customers (public facing website, subscribed email lists)

• Establish disclosure practices (choose your poison – responsible/coordinated…)

• Maintain good relationships with finders – give them credit for finding vulnerabilities

20

Do not reinvent the wheel but customize it to your unique needs

Do not reinvent the wheel but customize it to your unique needs

Page 21: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

21© Copyright 2011 EMC Corporation. All rights reserved.

• Resources in the public domain– Forum for Incident Response and Security Teams – Organization for Internet Safety: Security

Vulnerability Reporting and Response Guidelines– National Infrastructure Advisory Council:

Disclosing and Managing Vulnerability Guidelines– Common Vulnerabilities and Exposure (CVE)– Common Vulnerability Scoring System– National Vulnerability Database

21

Speaking of Not Reinventing the Wheel…

Page 22: Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World

22© Copyright 2011 EMC Corporation. All rights reserved.

THANKYOU