weeping angels of site reliability

21
The Weeping Angels of Site Reliability Tuesday 2015-03-17 11:30-12:30

Upload: kurt-andersen

Post on 16-Jul-2015

228 views

Category:

Technology


5 download

TRANSCRIPT

Page 1: Weeping Angels of Site Reliability

The Weeping Angels of Site ReliabilityTuesday 2015-03-17 11:30-12:30

Page 2: Weeping Angels of Site Reliability
Page 3: Weeping Angels of Site Reliability

Abuse Vectors

1) Shadow or

Reputational

2) Reflection

3) Bad Content

4) Intra-service Attacks

5) Outbound Abuse

6) Third Party Compromise

Page 4: Weeping Angels of Site Reliability

Why DMARC?

Page 5: Weeping Angels of Site Reliability
Page 6: Weeping Angels of Site Reliability

The Data

Page 7: Weeping Angels of Site Reliability

Blocked

Page 8: Weeping Angels of Site Reliability

Abuse Vectors

1) Shadow or

Reputational

2) Reflection

3) Bad Content

4) Intra-service Attacks

5) Outbound Abuse

6) Third Party Compromise

Page 9: Weeping Angels of Site Reliability

Amplification/Reflection Attacks

● Open[SMTP|DNS|NTP|other]

reflectiono http://openNTPproject.org/

o http://openRESOLVERproject.org/

o ISOC Amplification Hell

● Spoofed traffic bounce “back” against victims

Page 10: Weeping Angels of Site Reliability

Can your service be an oracle?

Page 11: Weeping Angels of Site Reliability

Abuse Vectors

1) Shadow or

Reputational

2) Reflection

3) Bad Content

4) Intra-service Attacks

5) Outbound Abuse

6) Third Party Compromise

Page 12: Weeping Angels of Site Reliability

Anti-Abuse Cloud Best Practices

Page 13: Weeping Angels of Site Reliability

Abuse Vectors

1) Shadow or

Reputational

2) Reflection

3) Bad Content

4) Intra-service Attacks

5) Outbound Abuse

6) Third Party Compromise

Page 14: Weeping Angels of Site Reliability

Intra-service defenses

● Protect credentials

● Watch tunnels / weak endpoint-security

● Watch out for unauthenticated

connections

● Logs can be your friend, but also your

enemy

Page 15: Weeping Angels of Site Reliability

Abuse Vectors

1) Shadow or

Reputational

2) Reflection

3) Bad Content

4) Intra-service Attacks

5) Outbound Abuse

6) Third Party Compromise

Page 16: Weeping Angels of Site Reliability

If you build it. . .

. . .it will be abused.

Page 17: Weeping Angels of Site Reliability

Abuse Vectors

1) Shadow or

Reputational

2) Reflection

3) Bad Content

4) Intra-service Attacks

5) Outbound Abuse

6) Third Party Compromise

Page 18: Weeping Angels of Site Reliability

Third-party services: Common issues

Examples: Source code repositories,

monitoring, crash analytics, user analytics

● Account provisioning and permissioning

● Authentication and account recovery

● Excessive sharing of user data or sensitive

info

● Lack of sufficient audit trails

Page 19: Weeping Angels of Site Reliability

Another take on third parties

Page 20: Weeping Angels of Site Reliability

Take-away points1. Get paranoid about any social/communications features

2. Limit payloads; do you really need a custom message including

arbitrary links?

a. Beware of all user-generated content (UGC)

3. Rate limits, quotas, and metrics

4. Trust but verify, verify, verify

5. Encrypt everything, everywhere, all the time (in motion and at rest)

6. Be mindful of how international users utilize your platform

7. Both users and attackers will use/abuse your platforms in ways you

would never expect

Page 21: Weeping Angels of Site Reliability