Top Banner
How much security is too much? Dr. Karsten Nohl <[email protected]>
29

[CB16] Keynote: How much security is too much? by Karsten Nohl

Jan 12, 2017

Download

Technology

CODE BLUE
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: [CB16] Keynote: How much security is too much? by Karsten Nohl

SRLabsTemplatev12

Howmuchsecurityistoomuch?

Dr.KarstenNohl<[email protected]>

Page 2: [CB16] Keynote: How much security is too much? by Karsten Nohl

Whatyouwilltakeawayfromthiskeynote

2

1. Hearfromasecurityresearcherandpractitioneraboutwhichprotectionsworkandwhichareunnecessary

2. Abetterunderstandingofthesecurity-innovationtrade-off

3. Someideasfordeployingeffective(butneverperfect!)securitymeasures

Page 3: [CB16] Keynote: How much security is too much? by Karsten Nohl

Howsecurityprosviewthemselves

3

vs.

Page 4: [CB16] Keynote: How much security is too much? by Karsten Nohl

4

Productsecurity Informationsecurity

Removehackingrisksforyourcustomers

Protectyourownsystemsfromhacking

WeaskthequestionHowmuchsecurityistoomuch?intwoareas

A B

Page 5: [CB16] Keynote: How much security is too much? by Karsten Nohl

Agenda

5

1 Securityresearchers*takeextremepositions

2 Manycompaniesonlyreacttoextremepositions

3 Thesecuritycommunityisfightingvulnerabilities,notrisks

Informationsecurity

Productsecurity

*Asreportedinthemedia

A

B

Page 6: [CB16] Keynote: How much security is too much? by Karsten Nohl

TerribleyearforiOSsecurity,right?

6

Pegasusmalware

FBI-stylehardwarehacking

Page 7: [CB16] Keynote: How much security is too much? by Karsten Nohl

YouriPhonegettinghackedisratherunlikely

7

Pegasusmalware

FBI-stylehardwarehacking

- 1billioniOSdevicespossiblyvulnerable

+ Onlyone(!)attemptedinfection

+ Applepatchedthevulnerabilitywithin10days

- Hackisnowpubliclyavailableatlowcost

+ Onlypossiblewithhardwareaccess

+ Onlyworksagainsttheoldest22%ofiPhones(5candolder,March2016)

Sourceforgraph:http://info.localytics.com/blog/how-will-apples-newest-iphone-impact-mobile-engagement

iPhonemarketbreak-down[Apr2016]

65S6S6Plus6SPlus55C4S4

Page 8: [CB16] Keynote: How much security is too much? by Karsten Nohl

Agenda

8

1 Securityresearcherstakeextremepositions

2 Manycompaniesonlyreacttoextremepositions

3 Thesecuritycommunityisfightingvulnerabilities,notrisks

ProductsecurityA

Page 9: [CB16] Keynote: How much security is too much? by Karsten Nohl

9

Android 654.44.3(andolder)

Hackeddevices vs.marketbreak-down(%)

0 50 100

Marketbreak-down

Hackedphones

~2%hacked

Nothacked

FewAndroidphonesgethacked;thosethatdoareoutdated

Source:developer.android.com/about/dashboards/index.html ,https://blog.checkpoint.com/wp-content/uploads/2016/07/HummingBad-Research-report_FINAL-62916.pdf,

Page 10: [CB16] Keynote: How much security is too much? by Karsten Nohl

Shouldmobilereallybeachiefsecurityconcern?

10

<0.1%~2%

(<0.2%forcurrentdevices) 20-40%

iOSinfectionrate Androidinfectionrate Windowsinfectionrate

http://www.pandasecurity.com/mediacenter/src/uploads/2016/05/Pandalabs-2016-T1-EN-LR.pdf

Page 11: [CB16] Keynote: How much security is too much? by Karsten Nohl

CompaniesInfoSecprioritiesarenotalignedwithactualincidents

11

vs.

1. BuyiOS securitysoftware

2. BanorlockdownAndroiddevices

10. DosomethinguncreativeaboutWindows security,likeupgradingantivirussoftware

1. Windows

2. Windows

3. Socialengineering

4. Windows

100.Android

ILLUSTRATIVE

TypicalcorporateInfoSecpriorities Actualendpointhackingincidents

Page 12: [CB16] Keynote: How much security is too much? by Karsten Nohl

Agenda

12

1 Securityresearcherstakeextremepositions

2 Manycompaniesonlyreacttoextremepositions

3 Thesecuritycommunityisfightingvulnerabilities,notrisks

ProductsecurityA

Page 13: [CB16] Keynote: How much security is too much? by Karsten Nohl

Yourtimeisbestspentprotectingfrommostlikelythreats

13

Low Medium High

Vulnerability/Hackingease Hackerincentive Damage Risk

Don’tbotherprotectingyourInternet-connectedcomputersfromBadUSBbeforeyousolvedthemalwarechallenge

InfectcomputersfromUSBfirmwares

Localattackpropagation

(Variesbysystem)

InfectWindowsthroughe-mailattachmentsormaliciouswebsites

Remoteinfection (Variesbysystem)

BadUSB

Targetedmalware

ILLUSTRATIVE

Page 14: [CB16] Keynote: How much security is too much? by Karsten Nohl

Nextbighackingfrontier:Cars?

14

Page 15: [CB16] Keynote: How much security is too much? by Karsten Nohl

Securitycautioncandelaysafety,andultimatelykillpeople

15

0

1

2

3

4

5

1970 1980 1990 2000 2010 2020

Carfatalitiesper100millionmiles[US]

Autonomouscars?Airbags

Adaptivecruisecontrol

ABS

ESC

§ Ifwetestallnewcarcomponentsforhackingrisks,wedelaytheirintroduction

§ Adelayof3monthsduetosecuritydesignandtestingmeansmorepeoplegetkilledontheroad

§ 200.000 morepeoplediewithinthenext10years

SOURCE:https://en.m.wikipedia.org/wiki/List_of_motor_vehicle_deaths_in_U.S._by_year

Page 16: [CB16] Keynote: How much security is too much? by Karsten Nohl

Agenda

16

1 Everybodybreakssecurityrules(butwedon’tusuallytalkaboutit)

2 Unpopularsecuritycontrolsarenoteffective,andworse:theyinhibitinnovation

3 Forsecurityor innovationtowork,weneeduser-friendlysolutions

4 Threatmonitoringisuser-friendly.Itincreasesmotivation,productivity,innovationand security

Productsecurity

InformationsecurityB

A

Page 17: [CB16] Keynote: How much security is too much? by Karsten Nohl

Restrictiveprotectionsareeasilyandoftencircumvented

17

Standardcircumvention

Skypetunnelsitstrafficthroughwebproxiesandregularlychangesitsserveraddresses

Standard“protection”practice

Blockeverythingelseatfirewall

Corporateuser

Internet

Funnelwebbrowsingthroughproxyserver

Page 18: [CB16] Keynote: How much security is too much? by Karsten Nohl

Largehacksareoftentheresultofprotectionscircumventedbypeoplewho“needtodotheirjob”

18

Hackingcase

Target lostcreditcarddatafor300millioncustomers

Rootcause

ATargetsupplierinstalledaremoteaccesstooltotunnelintotargetnetworkformaintenance

Target’s CEO Steps Down Following The Massive Data Breach

Page 19: [CB16] Keynote: How much security is too much? by Karsten Nohl

Agenda

19

1 Everybodybreakssecurityrules

2 Unpopularsecuritycontrolsarenoteffective,andworse:theyinhibitinnovation

3 Forsecurityor innovationtowork,weneeduser-friendlysolutions

4 Threatmonitoringisuser-friendly.Itincreasesmotivation,productivity,innovationand security

InformationsecurityB

Page 20: [CB16] Keynote: How much security is too much? by Karsten Nohl

20

Page 21: [CB16] Keynote: How much security is too much? by Karsten Nohl

Casestudy– typicalEnterprise/SOA busevadesclassicnetworksecuritytechniques

21

Low-levelprotectionsthatdonotpreventapplevelhacksarenotshown:firewalls,IPS,proxies,andSSLgateways

Servicebus

Authenticationserver

Criticaldatabases

Userrequestsareoftenpassedonallthewaytocriticalservicesonthebus

Externalandinternalusers

Webapplicationfirewall

(unmanaged)

Applicationservers

App

App

Page 22: [CB16] Keynote: How much security is too much? by Karsten Nohl

Circumventingrestrictivecontrolsoftenisnetpositive

22

Area Incidentexample Cost

Destructivedamage

§ Scadahackdamagesfactory 10m 2%

Lostrevenue § Majorgovernmentcontractdoesnotclose

50m 1%

Imageimpact

§ Majormarketingcampaignneededtooffsethackingimpact

§ Smallercampaignneededtooffsetsmallerhackingimpact

15m

1.5m

1%

10%

Competitivedamage

§ TheftofmajorIP(patentapplication,designdocument)

§ Negotiationdetailsstolen(M&A,long-termcontracts)

5m

2m

10%

10%

Effectivetotalcostperyear <2m

Likelihoodperyear

Trade-offfunction. Investuntildamageelasticity=incrementalprotectioneffort

Securitycansavemillions vs.

§ “Billiondollarideas”mostlygrowfromcreativepeoplefreelyplayingwithinnovativetechnology,whichistheoppositeofwhatsecurityoftenaimsfor

§ MicrosoftpaidUSD9billiontobuySkype,atechnologytheMicrosoftpolicieswouldnotallow

§ German“Datenschutz”vs.SiliconValleyprofits

Trade-offfunction.Protectuntilandaslongasinnovationcanflourish

Restrictivesecuritycandestroybillions invalue

Page 23: [CB16] Keynote: How much security is too much? by Karsten Nohl

Toolittleandtoomuchprotectionhindersinnovation

23

Damage Protectioneffort Innovationpotential

Incidentsspreadfear

Restrictions killinnovationenergy

Page 24: [CB16] Keynote: How much security is too much? by Karsten Nohl

Agenda

24

1 Everybodybreakssecurityrules

2 Unpopularsecuritycontrolsarenoteffective,andworse:theyinhibitinnovation

3 Forsecurityor innovationtowork,weneeduser-friendlysolutions

4 Threatmonitoringisuser-friendly.Itincreasesmotivation,productivity,innovationand security

InformationsecurityB

Page 25: [CB16] Keynote: How much security is too much? by Karsten Nohl

Less-restrictiveprotectionalternativesoftenexist

25

§ Manycomplexpasswords

§ Webproxyblocklists

§ Noadminrightsforusers

§ Corporatephones(Blackberrys)

§ Endlesspentesting

§ Securitypolicy

§ DLP

Restrictiveprotections

§ Single-sign-onusingsmartphones

§ SSLterminationandmonitoring

§ Processmonitoring

§ BYODwithActiveSyncandVPN

§ Bugbounties

§ Awarenesscampaigns

§ Awareness;orsimplymoretrust

Innovation-friendlyalternatives

Wherenorestrictivealternativeexists,closeriskmonitoringmayallowyoutokeeprestrictiveprotectionswitchedoffuntilariskbecomesreal

Page 26: [CB16] Keynote: How much security is too much? by Karsten Nohl

Agenda

26

1 Everybodybreakssecurityrules

2 Unpopularsecuritycontrolsarenoteffective,andworse:theyinhibitinnovation

3 Forsecurityorinnovationtowork,weneeduser-friendlysolutions

4 Threatmonitoringisuser-friendly.Itincreasesmotivation,productivity,innovationand security

InformationsecurityB

Page 27: [CB16] Keynote: How much security is too much? by Karsten Nohl

ForestorTrees?(SecurityMonitoringishard!)

27

Page 28: [CB16] Keynote: How much security is too much? by Karsten Nohl

SOCramp-updeliversfastresultsonlyintop-downmanner

Bottom-up – Start with data Top-down – Start with threats

18 months Days per use case

Forensically investigate incidents

Start with most relevant threats

Create tailored use cases

Collect only data needed for current use case

§ Add advanced use cases§ Generate alarms

§ Become familiar with data§ Integrate more sources

§ Collect available data sources§ Create simple use cases

28

vs

Page 29: [CB16] Keynote: How much security is too much? by Karsten Nohl

Takeaways

29

Questions?Karsten Nohl <[email protected]>

2

3

4

Thelargestrisk-costtrade-offisbetweenrestrictionsandinnovation potential

Often,innovation-friendlyalternativesexistthatcanreplacerestrictivechoices

Risks needtobemonitored andmanaged:“Protectionfromeverything”killsinnovation,therebykillstheverythingsyouwanttoprotect

1 Wechaseaftervulnerabilitiesinsteadofrisks byforgettingabouthackers’incentives