Top Banner
Make it Fixable Designing for Change Patricia Aas Security Divas 2017
22

Security Divas 2017

Feb 07, 2017

Download

Technology

Patricia Aas
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Divas 2017

Make it FixableDesigning for Change

Patricia AasSecurity Divas 2017

Page 2: Security Divas 2017

Patricia AasProgrammer mainly in C++ and Java

Currently : Vivaldi Technologies

Previously : Cisco Systems, Knowit, Opera Software

Master in Computer Science from UiO

Twitter : @pati_gallardo

Page 3: Security Divas 2017

Security is Hard

Page 4: Security Divas 2017

Just Remember :- You live in the real world- Take one step at a time- Make a Plan

Page 5: Security Divas 2017

● Unable to Roll Out Fixes● No Control over Dependencies● The Team is Gone● It’s in Our Code

Risk Management - Make it Fixable

Page 6: Security Divas 2017

Unable to Roll out Fixes

● Relying on User Updates● Unable to Build● Unable to Deploy● Regression Fear● No Issue Tracking● No Release Tags● No Source● Issue in infrastructure

Page 7: Security Divas 2017

Fix : Ship It!Code● Get the Code● Use Version Control● Keep Build Environment● Write Integration Tests

Holy Grail : Auto Update

Configuration Management● Have Security Contact● Track issues● Make a Deployment Plan● Control Infrastructure

Page 8: Security Divas 2017

No Control overDependencies

● Too Many Dependencies● Frameworks are Abandoned● Libraries Disappear● Insecure Platform APIs● Insecure Tooling● End-of-Life OS (Windows)● Licenses expire/change● Known Issues not Fixed● OS Not Updated (Android)

Page 9: Security Divas 2017

Fix: Control It!

Be conservative● Is it needed?● Do you understand it?

Goal : Dependency Control

Be cautious● Audit your upstream● Avoid forking● Have an upgrade plan● Have someone responsible

Page 10: Security Divas 2017

The Team Is Gone● Team were consultants● They were downsized● The job was outsourced● “Bus factor”● “Binary blob”● Abandonware

Page 11: Security Divas 2017

Fix : Own It!

Take it on yourselves● Build competence in-house● Fork, take control● “Barely Sufficient” Docs● Ship It and Control It

Goal : Regain Control

Outsource● Maintenance Contract● Add Security Clause● Own deployment channel

Page 12: Security Divas 2017

It’s in Our Code● Injection● Exploited crash etc● Debug code in production● Server compromised● Outdated platform● Intercepted traffic● Mined local data● Fake App

Page 13: Security Divas 2017

Fix : Live It!Prevent● Sanitize your input● Send crash reports● Code review + tests● Review server security● Encrypt all traffic● Review local storage● Work around old platform● Sign app and check

Goal : Prevent & Cure

Cure● Ship it!

Page 14: Security Divas 2017

Designing the User Experience of Security

Page 15: Security Divas 2017

Example : The Padlock“You can trust this page”Or? Users don’t understand the meaning of the padlock

“Why do you have a red purse?”The Save icon, the Call icon and the Padlock icon - too old?

“The page has a green padlock”Does the user really notice the context?

Page 16: Security Divas 2017

The Users Won’t ReadError blindnessMost users will mentally erase permanent error notifiers - they won’t read

“Just click next”Most users will accept the defaults - they won’t read

“Make it go away”The user will try to make the error dialog go away - they won’t read

Page 17: Security Divas 2017

Fix : Less is MoreDon’t leave it to the userJust do the right thing, you don’t have to ask

Have good defaultsMake sure that clicking next will leave the user in a good place

Be very explicit when neededIf the user is in a “dangerous” situation - design carefully and if you have to explain : use language the user can understand

Page 18: Security Divas 2017

They Trust YouWith Personal informationThey trust you to protect them from both hackers and governments

With DataThey trust you to protect their pictures, documents, email ...

With MoneyThey trust you to protect their payment information and passwords

Page 19: Security Divas 2017

Fix : Be TrustworthyOnly store what you have toTry to use end-to-end encryption, so that even you don’t have access. Otherwise, encrypt as much as you can

Back up everythingYour users can’t afford to lose their baby pictures

Use third party paymentAvoid having responsibility for their money

Page 20: Security Divas 2017

Ship It, Control It, Own It, Live It

Page 21: Security Divas 2017

Security is HardProtect Your User

Page 22: Security Divas 2017

Make it FixableDesign for ChangePatricia Aas, Vivaldi TechnologiesPhotos from pixabay.com