38
IBM Internet Security Systems © Copyright IBM Corporation 2008 Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry Joshua Corman Principal Security Strategist Interop Vegas | April 30, 2008

Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

Embed Size (px)

DESCRIPTION

Do you ever feel that your trusted security providers are failing to tell you the whole truth? Would you like to hear what they aren't telling you? It is time for intellectual honesty. We entrust the security industry to protect us from unacceptable risk. However, competing vendor priorities often prevent them from sharing and discussing all security truths. Some "Lies of Omission" merely delay countermeasures. More serious "Dirty Secrets" have created and perpetuated unacceptable blind spots and exposure. First, we expose the 7 Dirty Secrets of the Security Industry. Second, we highlight key security trends deserving your attention. Lastly, we will outline practical ways to command intellectual honesty from your trusted security providers.

Citation preview

Page 1: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

IBM Internet Security Systems

© Copyright IBM Corporation 2008

Unsafe at Any Speed:7 Dirty Secrets of the Security Industry

Joshua Corman

Principal Security Strategist

Interop Vegas | April 30, 2008

Page 2: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

2

IBM Internet Security Systems

© Copyright IBM Corporation 2008

Overview

�Ralph Nader’s Unsafe at Any Speed

�“7” Dirty Secrets of the Security Industry

�Key security trends deserving your attention

�Practical ways to command intellectual honesty from your trusted security providers

�Discussion and Q&A

Page 3: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

3

IBM Internet Security Systems

© Copyright IBM Corporation 2008

Acknowledgements

Other “Dirty Secrets” Sources

� Bruce Potter at DefCon 2007

- http://video.google.com/videoplay?docid=-4408250627226363306

� Rich Mogull’s “11 Truths We Hate to Admit”

- http://www.darkreading.com/document.asp?doc_id=144600

� Chris Hoff [and James McGovern] “Top 10 [20] Mistakes CIOs make”

- http://rationalsecurity.typepad.com/blog/2008/02/mcgoverns-ten-m.html

…and others who wish to remain nameless

Page 4: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

4

IBM Internet Security Systems

© Copyright IBM Corporation 2008

The Obvious…

“But Josh…

…aren’t you part of the Security Industry?”

“Security is both a State and a Feeling”

-Bruce Schneier

“Security is both and Industry and a Sacred Trust”

-Joshua Corman

“security” vs “Security”

Page 5: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

5

IBM Internet Security Systems

© Copyright IBM Corporation 2008

Unsafe at Any Speed - by Ralph Nader

�Published in 1965

�Challenged Automobile Safety

Chapter 1: The sporty Corvair

Chapter 2: Disaster deferred

Chapter 3: The second collision

Chapter 4: The power to pollute

Chapter 5: The engineers

Chapter 6: The stylists

Chapter 7: The traffic safety establishment

Chapter 8: The coming struggle for safety

� http://en.wikipedia.org/wiki/Unsafe_at_Any_Speed

Page 6: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

IBM Internet Security Systems

© Copyright IBM Corporation 2008

7* Dirty Secrets of the Security Industry

#0

You don’t have to swim faster than the shark…

…only faster than your buddy…

Anyone here a Diver?

Page 7: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

IBM Internet Security Systems

© Copyright IBM Corporation 2008

“7” Dirty Secrets of the Security Industry

#0 – Vendors do not need to be Ahead of the Threat

– they only need to be Ahead of the Buyer

Page 8: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

8

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#0 Ahead of the Threat – or Ahead of the Buyer

�Q: What is the GOAL of the Security Market?

�A: The goal of the Security Market is not to secure

- The goal of the Security Market is to make money

“Myth: Security companies are smarter than hackers

Reality: Security companies are smarter than customers”

Robert Graham - CTO - Errata Security

Page 9: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

IBM Internet Security Systems

© Copyright IBM Corporation 2008

“7” Dirty Secrets of the Security Industry

#1 – AV Certification Omissions

Page 10: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

10

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#1 – AV Certifications do not Test/Require Trojans

�Define “Definition”…

- This has been a game of semantics

�Anti-Virus Certifications only test for the detection of “Replicating MalCode”

- This means Viruses and Worms

- This does not include non-replicating MalCode

- This is Primarily the WildList / WildCore

- Over the years – this has become more egregious

- Trojans were once the minority

Page 11: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

11

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#1 – AV Certifications do not Test/Require Trojans

�Is this a big deal…?

�AV has a legacy of “Omission”…

They nearly DOUBLED the prior 21 years to >200,000

Trojans are now 75-80% of

the new MalCode

Source: sophos-security-report-jun06-srus.pdf

Jan - Feb 2008

1.1 MILLION unique samples

Page 12: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

12

IBM Internet Security Systems

© Copyright IBM Corporation 2008

RansomwareRootkitDesigner

Malcode

Spear

PhishingBotSpywareSPAMTrojanWormVirus

Signature

AV

Behavioral

Virus

Prevention

System

Content

Filtering

Anti-

Spyware

Page 13: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

13

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#1 – AV Certifications do not Test/Require Trojans

� NOTE: This may change

� AMTSO is attempting to address AV Certifications

- ANTI-MALWARE TESTING STANDARDS ORGANIZATION

- http://www.amtso.org/

- Charter Meeting was in January of 2008

� Success will require scrutiny and accountability from YOU

- Their customers

- Vendors are financially motivated

� Will we Evolve? Or will History Repeat itself?

� “Quis custodiet ipsos custodes”- Juvenal, Satires, VI, 347

Page 14: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

IBM Internet Security Systems

© Copyright IBM Corporation 2008

“7” Dirty Secrets of the Security Industry

#2 – There is no Perimeter…

[aka “Santa Claus, the Easter Bunny, the Perimeter, and other fairy tales”]

Page 15: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

15

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#2 – There is no Perimeter…

�If you still believe in “The Perimeter”, you may as well believe in Santa Claus…

Page 16: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

16

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#2 – There is no Perimeter…

�Redefining the Perimeter

- The Endpoint is the Perimeter

- The User is the Perimeter

- The Business Process is the Perimeter

- The Data is the Perimeter

�The Jericho Forum

- http://www.opengroup.org/jericho/

“8. Network security is the result of a mistake, not an industry worth perpetuating.If it weren't for poor host security, insecure protocols, and no concept of data security besides the occasional encryption, we wouldn't need network security. It should be the goal of every security professional to make network security irrelevant. It will take generations, if it's even possible. But we should never forget that network security only exists because we've screwed up everything else. ”

Rich Mogull “11 Truths We Hate to Admit” http://www.darkreading.com/document.asp?doc_id=144600

Page 17: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

IBM Internet Security Systems

© Copyright IBM Corporation 2008

“7” Dirty Secrets of the Security Industry

#3 – Risk Management Threatens Vendors

Page 18: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

18

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#3 – Risk Management Threatens Vendors

�Vendors want you

focused on the trees, so

you will continue to miss

the forest.

�Your Risk Priorities may

not align with their

product offerings

�Untapped Resources:

- Education and Awareness

- Hardening Configurations

�Who has had a failed

security project?

Page 19: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

IBM Internet Security Systems

© Copyright IBM Corporation 2008

“7” Dirty Secrets of the Security Industry

#4 – Psst… There is more to Risk than

Weak Software

Page 20: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

20

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#4 – Psst… There is more to Risk than Weak Software

�The lion’s share of Security Market is focused on Software Vulnerabilities

- Research the Vulnerabilities

- Scan for the Vulnerabilities

- Shield the Vulnerabilities

- Patch the Vulnerabilities

- Report against the Vulnerabilities

�What if the software was PERFECT?

- Would we be secure?

Page 21: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

21

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#4 – Psst… There is more to Risk than Weak Software

The Hackers compromise 3 ways:

1. Weak Software

• Buffer Overflows

• OS/Application Vulnerabilities

2. Weak Configuration

• Default Configurations

• Weak Passwds

• Failure to Harden

3. Weak People

• Malicious CODE

• Social Engineering

• Insider Threat

Page 22: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

22

IBM Internet Security Systems

© Copyright IBM Corporation 2008

The shift to Malicious CODE…

Page 23: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

23

IBM Internet Security Systems

© Copyright IBM Corporation 2008

MalCode does not NEED vulnerabilities

An explosion of innovation in Malicious Code…

Page 24: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

IBM Internet Security Systems

© Copyright IBM Corporation 2008

“7” Dirty Secrets of the Security Industry

#5 – Compliance Threatens Security…

Page 25: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

25

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#5 – Compliance Threatens Security…

�NOTE: Compliance in and of itself is not a bad thing

- Compliance in and of itself is not a good thing

�Resource/Budget Conflict

- Split Focus

�Did Raising the Bar, lower it?

- Meeting Minimum Standards

- “Security by Compliance”

-John Pironti

�That which is easy to measure…

Page 26: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

26

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#5 – Compliance Threatens Security…

�Coach’s Secret Playbook?

�Your Security Blueprint?

Coach’s

TOP SECRETFootball Plays

Page 27: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

IBM Internet Security Systems

© Copyright IBM Corporation 2008

“7” Dirty Secrets of the Security Industry

#6 – Vendor Blind Spots Allowed for Storm

Page 28: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

28

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#6 – Vendor Blind Spots Allowed for Storm

� Storm thrives in the “leper colony”

� Storm eats AV for breakfast

� Storm MalCode does not need Vulnerabilities

� Storm leverages outstanding social engineering

� Storm is Self-Defending and Resilient

� It has been over a year

- The Industry has still not evolved at the required rate

- nor in the required ways

� More on Storm Strategies:

- http://www.news.com/2324-12640_3-6230874.html?tag=podIndex

- http://www.forbes.com/home/technology/2007/10/29/zombies-cybercrime-viruses-tech-security-cx_ag_1030zombies.html

Page 29: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

IBM Internet Security Systems

© Copyright IBM Corporation 2008

“7” Dirty Secrets of the Security Industry

#7 – Security has grown well past

“Do it yourself”

Page 30: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

30

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#7 – Security has grown well past “Do it yourself”

“Technology without Strategy is Chaos”

�Who here has children?

- Car Seat Installation

Page 31: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

31

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#7 – Security has grown well past “Do it yourself”

� Let’s look at CoBIT

� Historically…

� Horizontal Issues

- PCI

- Data Security

� Business Process

1. Cost

2. Complexity

3. Change Rates

Page 32: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

32

IBM Internet Security Systems

© Copyright IBM Corporation 2008

COST COMPLEXITY

SIMPLIFICATION

Responsible? Or?

RESPONSIBLE SIMPLIFICATION

Thoughts

Page 33: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

33

IBM Internet Security Systems

© Copyright IBM Corporation 2008

EVOLVING THREAT COMPLIANCE

Risk

AGILITY

Countermeasures

Thoughts

Rates of Change

Page 34: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

34

IBM Internet Security Systems

© Copyright IBM Corporation 2008

#7 – Security has grown well past “Do it yourself”

Example: Network DLP

�Solves the Majority

�All Network Leaks

� “Stopping Stupid”

People

Process

Technology

Page 35: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

35

IBM Internet Security Systems

© Copyright IBM Corporation 2008

Hot Topics and Trends

� Massive Security Market Convergence

- Impact of Choice

- Impact of Complexity

� Data Security vs Technology Security

� Server Virtualization

� Web 2.0 and SOA

� Security vs Information Risk Management

� Acceleration of Threat Evolution (3 Ps)

- Prestige

- Profit

- Politics

Page 36: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

36

IBM Internet Security Systems

© Copyright IBM Corporation 2008

“7” Dirty Secrets of the Security Industry

0) Vendors do not need to be Ahead of the Threat – they only need to be

Ahead of the Buyer

1) AV Certification Omissions

� No accountability for Trojans

� Not keeping pace with relevant Evolving Threats

2) There is no Perimeter… [or Santa Claus]

3) Risk Management Threatens Vendors

4) Psst… There is more to Risk than Weak Software

5) Compliance Threatens Security…

6) Vendor Blind Spots Allowed for Storm

7) Security has grown well past “Do it yourself”

Page 37: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

37

IBM Internet Security Systems

© Copyright IBM Corporation 2008

Discussion

Page 38: Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry

IBM Internet Security Systems

© Copyright IBM Corporation 2008

Thank youJoshua CormanPrincipal Security Strategist

[email protected]