25
Cyber Security And Open Source Managing Expectations, Reducing Fears and Understanding Reality Chad Cravens Open Source Systems www.ossys.com

Cyber Security and Open Source

  • Upload
    posscon

  • View
    49

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Cyber Security and Open Source

Cyber SecurityAnd Open Source

Managing Expectations, Reducing Fears and Understanding Reality

Chad CravensOpen Source Systems

www.ossys.com

Page 2: Cyber Security and Open Source

About The Speaker

1Open Source Systems – www.ossys.com

2007 - Graduate of New Mexico Institute of Mining and Technology(Scholarship for Service Recipient)

2007 – 2011 Federal Employee at SPAWAR(Space and Naval Warfare Systems Center)

2012 – Software Engineer at Small Wall St Firm2014 – Founded Open Source Systems

Chad CravensCharleston, SC

Software Fanatic

Stickler for Software Quality and Security!

Page 3: Cyber Security and Open Source

What Is Cyber Security?

2Open Source Systems – www.ossys.com

The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.

- Confidentiality- Availability- Integrity

Page 4: Cyber Security and Open Source

Life in the day of a Program Manager

3Open Source Systems – www.ossys.com

Walk a day in her shoes…..

People

Personalities

Customers

Burn Rates

Teams

Processes

Budgets

Implementation

IntegrationHiringStakeholders

DeadlinesVendors

Technology

Page 5: Cyber Security and Open Source

What is the Issue with Open Source?

3Open Source Systems – www.ossys.com

Who’s afraid of theBoogey Man?

False

Expectations

Appearing

Real

What is this “Open Source” thing?-- A FEAR of the unknown --

Page 6: Cyber Security and Open Source

Let’s Use this Open Source Tool!

3Open Source Systems – www.ossys.com

Billy Bob from dev team 6 suggestsWe use this open source product

What is the license?Is it supported?

Who developed it?What’s the cost?Is it accredited?

Page 7: Cyber Security and Open Source

We are your Super-Vendor!

3Open Source Systems – www.ossys.com

Mr. Big-Name Vendor in a suit sayswe should use their product instead

What is the license?Is it supported?

Who developed it?What’s the cost?Is it accredited?

YESYES

YES

YES

YES

YES

YESYES

YES

YES

YES

YES

YES YES

Page 8: Cyber Security and Open Source

Turn FEAR into Knowledge

3Open Source Systems – www.ossys.com

The Right Tool for the Right Job

Page 9: Cyber Security and Open Source

First, What are the threats?

3Open Source Systems – www.ossys.com

• Zero-day Exploits• Web-Based Attacks• Ransomware• Social Media Scams• Phishing• Internet of Things• Mobile Attacks

http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf

Page 10: Cyber Security and Open Source

Second, Debunk the Myths

3Open Source Systems – www.ossys.com

First thing, “Open Source” is BIG:

Operating Systems

Enterprise Libraries

Message Brokering

Encryption

Embedded SystemsProgramming Languages

Front-End Development

MVC FrameworksNetwork Devices

Mobile

Page 11: Cyber Security and Open Source

“Big Guys” Going Open Source

3Open Source Systems – www.ossys.com

Tesla released all patents as open source

Netflix custom software released as open source

.NET Core is now open source

Oracle acquired Sun, giving it Java and MySQL

Page 12: Cyber Security and Open Source

Open Source in the Government

3Open Source Systems – www.ossys.com

http://www.data.gov/

https://government.github.com/community/

http://mil-oss.org/

http://code.nasa.gov/

April, 2009 Whitehouse Report

Page 13: Cyber Security and Open Source

Debunking Myths

3Open Source Systems – www.ossys.com

“Open Source is Insecure”Reality:- Source code is not needed to circumvent security- Licensing has little effect on the security of software

“Open Source is More Secure”Reality:- Open-sourcing bad / insecure code will not make it secure- Only good coding practices will create secure code- Having more reviewers may benefit the security of a project

Page 14: Cyber Security and Open Source

Debunking Myths

3Open Source Systems – www.ossys.com

“Anyone Can Contribute Malicious Code”Reality:- Projects have a core team of contributors- Additions to the code are analyzed before merged

“Hackers Can More Easily Exploit”Reality:- Tools allow tracing of binaries, the exploit is in the binary not

the code- Hackers do not need source code to exploit

Page 15: Cyber Security and Open Source

Exploit Example!

23Open Source Systems – www.ossys.com

Human Ingenuity Knows No Bounds

<div style="background:url('javascript:alert(1)')">

The MySpace Worm – Samy Is My Hero

<div id="mycode" expr="alert('hah!')" style="background:url('javascript:eval(document.all.mycode.expr)')">

JavaScript in a background CSS attribute in a <div> tag:

Putting javascript in an expr attribute

<div id="mycode" expr="alert('hah!')" style="background:url('javascript:eval(document.all.mycode.expr)')">

Putting javascript in an expr attribute

<div id="mycode" expr="alert('hah!')" style="background:url('javascript:eval(document.all.mycode.expr)')">

Using newlines to bypass filtering of “javascript”

Page 16: Cyber Security and Open Source

Security is About Management

23Open Source Systems – www.ossys.com

Program Defensively!

1. Injection Flaws2. Broken Authentication / Session Management3. Cross-Site Scripting4. Insecure Direct Object References5. Security Misconfiguration6. Sensitive Data Exposure7. Missing Function Level Control Access8. Cross-Site Request Forgery9. Using Components with Vulnerabilities10. Unvalidated Redirects and Forwards

Page 17: Cyber Security and Open Source

Security is About Knowledge

23Open Source Systems – www.ossys.com

Page 18: Cyber Security and Open Source

Security is About Processes

23Open Source Systems – www.ossys.com

Embrace Agile!

What Agile Is Not:• A Buzzword for Companies• A Fad• A JIRA Account

What Agile Is:• A Suite of Processes,

Methodologies and Tools

• Testing• Metrics• Automation

Page 19: Cyber Security and Open Source

Use Open Source Effectively

23Open Source Systems – www.ossys.com

Use ORM tools to help mitigate SQL injection

Use unit testing to build test suites against your code

Use Jenkins for testing and build automation

Use SonarQube for code quality testing (PMD / FindBugs)

Page 20: Cyber Security and Open Source

Use Open Source Effectively

23Open Source Systems – www.ossys.com

Use OWASP Zap to dynamically scan web-based software

Use picketlink for XACML policy enforcement

Use OpenSSL for Cryptographic functions

Use AspectJ for Logging and configuration management

Page 21: Cyber Security and Open Source

Use Open Security Standards

23Open Source Systems – www.ossys.com

Page 22: Cyber Security and Open Source

Use Mature Open Source Projects

23Open Source Systems – www.ossys.com

Page 23: Cyber Security and Open Source

Roots in Open Source

23Open Source Systems – www.ossys.com

Cyber Security has roots in Open Source

Page 24: Cyber Security and Open Source

Open Source Cyber Lab

23Open Source Systems – www.ossys.com

Page 25: Cyber Security and Open Source

Thank you!

23Open Source Systems – www.ossys.com