Why do developers make insecure decisions? • Di ff erent motivations • Our goal is improved functionality, security is just a constraint • Cognitive Limitations • We move fast, and sometimes break things - including security • Lack of Expertise • We often don’t understand the security implications of our decisions @guypod
Developers are also Over Confident @guypod
“I find training developers, actually to be much harder than regular employees” Masha Sedova (@modMasha) @guypod https://www.heavybit.com/library/podcasts/the-secure-developer/ep-16-security-training-with-elevates-masha-sedova/
“there's a certain amount of arrogance associated with, "I already know this,"or "I'm smarter than this." ” Masha Sedova (@modMasha) @guypod https://www.heavybit.com/library/podcasts/the-secure-developer/ep-16-security-training-with-elevates-masha-sedova/
“Most developers that I talk to, specifically, don't actually believe security is an issue that happens at their company” Masha Sedova (@modMasha) @guypod https://www.heavybit.com/library/podcasts/the-secure-developer/ep-16-security-training-with-elevates-masha-sedova/
Security breaches Can happen to You @guypod
You are Trustworthy but Not Infallible @guypod
How can we Mitigate this risk? @guypod
Learn lessons from Past Incidents @guypod
Automate Security Controls • Apple : Malware detection in app store • npm : Malicious package detection in registry • FT : 2FA on SSO Page • Uber : 2FA on GitHub.com, then move to self hosted git @guypod
Make it Easy to be Secure • Apple : Stand up fast local Xcode download mirrors • FT : “Reducing and removing privileges more aggressively” • Uber : Auto-expire AWS tokens • npm/PyPi/Docker : Flag/block malicious packages @guypod
Developer Education • Apple : Encourage dev to validate Xcode Download • npm : Blog about malicious packages & typosquatting • FT : “set clearer expectations of security standards” • Angular : Require 2 expert reviewers for sensitive code @guypod
Ease Caring of being secure about security @guypod
Manage Access Like a Tech Giant @guypod
Google BeyondCorp @guypod https://cloud.google.com/beyondcorp/
BeyondCorp in a nutshell • All access done via a corporate proxy Eliminates trusted network • • Proxy grants access per user & device No more static credentials • • Access is logged and monitored Anomalies can be detected during or after actions • @guypod https://www.slideshare.net/fortyfivan/beyondcorp-sf-meetup-closing-the-adherence-gap
https://cloud.google.com/beyondcorp/ @guypod
Microsoft Privileged Access Workstations (PAW) @guypod
PAWs in a nutshell • Access to production requires a secure machine With strict controls and no further internet access • • Your “Desktop” runs as a VM on the machine Running a secure VM in an insecure host isn’t enough • • Optionally a “Guarded Host” can host both VMs Allows more flexibility and routine updates to the PAW • @guypod https://blogs.technet.microsoft.com/datacentersecurity/2017/10/13/privileged-access-workstationpaw/
Detailed PAW Guidance (windows centric) • PAW deployment guide • Why use shielded VM for PAW? • How to deploy VM template for PAW • Building VM template for PAW • Connect to VMs on PAW • Shielded VM local mode vs HGS mode • How to build the PAW host @guypod https://blogs.technet.microsoft.com/datacentersecurity/2017/10/13/privileged-access-workstationpaw/
Recommend
More recommend