The CERT Guide to Coordinated Vulnerability Disclosure
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Mary Beth Chrissis, Mike Konrad, Sandra
ptg Process Areas by Category Process Management OPD Organizational Process Definition OPF Organizational Process Focus OPM Organizational Performance Management OPP Organizational Process Performance OT Organizational Training Project Management IPM Integrated Project Management PMC Project Monitoring and Control PP Project Planning QPM Quantitative Project Management REQM Requirements Management RSKM Risk Management SAM Supplier Agreement Management Engineering PI Product Integration RD Requirements Development TS Technical Solution ptg VAL Validation VER Verification Support CAR Causal Analysis and Resolution CM Configuration Management DAR Decision Analysis and Resolution MA Measurement and Analysis PPQA Process and Product Quality Assurance Generic Goals and Practices GG1 Achieve Specific Goals GP 1.1 Perform Specific Practices GG2 Institutionalize a Managed Process GP2.1 Establish an Organizational Policy GP 2.2 Plan the Process GP 2.3 Provide Resources GP 2.4 Assign Responsibility GP 2.5 Train People GP 2.6 Control Work Products GP 2.7 Identify and Involve Relevant Stakeholders GP 2.8 Monitor and Control the Process GP 2.9 Objectively Evaluate Adherence GP 2.10 Review Status with Higher Level Management GG3 Institutionalize a Defined Process GP 3.1 Establish a Defined Process GP 3.2 Collect Process Related Experiences ptg CMMI® for Development Third Edition ptg Wow! eBook <WoweBook.Com> The SEI Series in Software Engineering Visit informit.com/sei for a complete list of available products. ptg he SEI Series in Software Engineering represents is a collaborative Tundertaking of the Carnegie Mellon Software Engineering Institute (SEI) and Addison-Wesley to develop and publish books on software engineering and related topics. The common goal of the SEI and Addison-Wesley is to provide the most current information on these topics in a form that is easily usable by practitioners and students. -
Fast, Accurate, Vulnerability Assessments
SOLUTIONS / MANAGED SECURITY / VULNERABILITY SCANNING Managed Vulnerability Scanning FAST, ACCURATE, SOLUTION VULNERABILITY ASSESSMENTS AT-A-GLANCE • Scanning options include Identify and Mitigate Vulnerabilities that OS, database, application, Threaten Compliance and host • Credentialed Patch Vulnerability scanning is a critical component of protecting any hybrid Audit Scans IT infrastructure system, especially those that need to meet strict • Host/Network FedRAMP, HIPAA, and PCI-DSS compliance requirements. Managing Discovery Scans vulnerabilities helps identify software flaws, missing patches, malware, • CIS Hardening Scans misconfigurations across operating systems, devices and applications. • Web Application Scans Knowledge is Power • Auditing and scanning DataBank’s Managed Vulnerability Scanning solution leverages for WannaCry, Spectre, Meltdown, Bash Shellshock, hundreds of configuration and compliance scanning templates to Badlock, and Shadow audit against industry benchmarks and best practices while powerful Brokers reporting and visibility tools help you to make sense of the findings. DataBank’s Managed Vulnerability Scanning helps you accomplish your goals of identifying and mitigating vulnerabilities before they become a problem. DataBank’s solution is supported by a dedicated staff of security engineers and a seasoned Chief Information Security Officer. KEY BENEFITS LAYERED DEFENSE PROACTIVE SERVICE EXPERT GUIDANCE CONTINUOUS MONITORING HOW IT WORKS ASSET VULNERABILITY VULNERABILITY VULNERABILITY DISCOVERY SCANNING ASSESSMENT -
BUGS in the SYSTEM a Primer on the Software Vulnerability Ecosystem and Its Policy Implications
ANDI WILSON, ROSS SCHULMAN, KEVIN BANKSTON, AND TREY HERR BUGS IN THE SYSTEM A Primer on the Software Vulnerability Ecosystem and its Policy Implications JULY 2016 About the Authors About New America New America is committed to renewing American politics, Andi Wilson is a policy analyst at New America’s Open prosperity, and purpose in the Digital Age. We generate big Technology Institute, where she researches and writes ideas, bridge the gap between technology and policy, and about the relationship between technology and policy. curate broad public conversation. We combine the best of With a specific focus on cybersecurity, Andi is currently a policy research institute, technology laboratory, public working on issues including encryption, vulnerabilities forum, media platform, and a venture capital fund for equities, surveillance, and internet freedom. ideas. We are a distinctive community of thinkers, writers, researchers, technologists, and community activists who Ross Schulman is a co-director of the Cybersecurity believe deeply in the possibility of American renewal. Initiative and senior policy counsel at New America’s Open Find out more at newamerica.org/our-story. Technology Institute, where he focuses on cybersecurity, encryption, surveillance, and Internet governance. Prior to joining OTI, Ross worked for Google in Mountain About the Cybersecurity Initiative View, California. Ross has also worked at the Computer The Internet has connected us. Yet the policies and and Communications Industry Association, the Center debates that surround the security of our networks are for Democracy and Technology, and on Capitol Hill for too often disconnected, disjointed, and stuck in an Senators Wyden and Feingold. unsuccessful status quo. -
Reforming Vulnerability Disclosure Programs in the Private Sector
Debugging the System: Reforming Vulnerability Disclosure Programs in the Private Sector Jasmine Arooni* TABLE OF CONTENTS I. INTRODUCTION ..................................................................................... 445 II. VULNERABILITY DISCLOSURE PROGRAMS IN PRACTICE: HOW DO THEY WORK? .............................................................................................. 448 III. THE CURRENT LEGAL LANDSCAPE: LEGAL RISKS FACED BY VDP SECURITY RESEARCHERS .................................................................. 450 A. The Computer Fraud and Abuse Act and Its Impact on Security Research ..................................................................................... 451 B. The DMCA and Its Impact on Security Research ....................... 453 C. Safe Harbor Language: A Superficial Fix, Not a Complete Solution ....................................................................................... 454 IV. THE DOJ’S DISCRETIONARY GUIDANCE FOR PRIVATE VDPS ............. 455 V. THE U.S. GOVERNMENT’S INFLUENTIAL ROLE IN VDP GOVERNANCE .................................................................................................... 456 A. The U.S. Government as a “Crowdsourcer”: Validating the Importance of Public Engagement to Cybersecurity ................. 457 B. The U.S. Government as a “Rule Maker”: The DHS’ Compulsory Authority over Government VDPs .............................................. 458 C. The Government as an “Example”: The Impact of Government VDPs on the Private Sector, as Evidenced Through -
Privacy and Security
Privacy and Security Sekar Kulandaivel, Jennifer Xiao - April 21, 2020 Understanding Contention-Based Channels and Using Them for Agenda Defense Spectre Attacks: Exploiting Speculative Execution Understanding Contention-Based Channels and Using Them for Defense (HPCA ‘15) Distrustful tenants living within a neutral cloud provider ● Shared hardware can be exploited to leak information ○ e.g. CPU usage vs. operation can expose secret key ● Two bodies of solutions: ○ HW-based: state-of-the-art is either limited in scope or requires impractical architecture changes ○ SW-based: HomeAlone forgoes shared hardware and permits only friendly co-residency, but still vulnerable to an intelligent attacker Threat model of a co-resident attacker ● Distrustful tenants violate confidentiality or compromise availability ● Goal: infer info about victim VM via microarchitectural structures e.g. cache and memory controllers ● Side-channel: victim inadvertently (oops!) leaks data inferred by attacker ● Covert channel: privileged malicious process on victim deliberately leaks data to attacker Known side-channels to transmit a ‘0’ or a ‘1’ (alt. exec.) ● Alternative execution attacks ○ Timing-driven: measure time to access memory portion ○ Access-driven: measure time to access specific cache misses Known side-channels to transmit a ‘0’ or a ‘1’ (parallel exec.) ● Parallel execution attacks ○ No time sharing required ○ E.g. Receiver monitors latency of memory fetch, sender either issues more instructions or idles Formal model of covert channels ● Detection failure (undetectable flow) = same rate of false positives and false negatives for both legitimate and covert traffic ● Network vs. microarchitectural channels: ○ Network receivers read silently ○ Microarch. receivers read destructively (overwrites when reading) ● Main insight: network channels are provably undetectable whereas microarch. -
A Dropbox Whitepaper Dropbox for Business Security
Dropbox for Business security A Dropbox whitepaper Dropbox for Business security Contents Introduction 3 Product features (security, control, and visibility) 3 Under the hood 7 Application security 10 Apps for Dropbox 12 Network security 13 Vulnerability management 14 Dropbox information security 16 Physical security 17 Compliance 17 Privacy 19 Dropbox Trust Program 20 Summary 21 Dropbox for Business security Millions of users trust Dropbox to easily and reliably store, sync, and share photos, videos, docs, and other files across devices. Dropbox for Business brings that same simplicity to the workplace, with advanced features that help teams share instantly across their organizations and give admins the visibility and control they need. But more than just an easy-to-use tool for storage and sharing, Dropbox for Business is designed to keep important work files secure. To do this, we’ve created a sophisticated infrastructure onto which account administrators can layer and customize policies of their own. In this paper, we’ll detail the back-end policies, as well as options available to admins, that make Dropbox the secure tool for getting work done. Product features (security, control, and visibility) Dropbox provides the administrative control and visibility features that empower both IT and end users to effectively manage their businesses and data. Below is a sampling of features available to team admins and users, as well as third-party integrations for managing core IT processes. Admin management features No two organizations are exactly alike, so we’ve developed a number of tools that empower admins to customize Dropbox for Business to their teams’ particular needs. -
Threats and Vulnerabilities in Federation Protocols and Products
Threats and Vulnerabilities in Federation Protocols and Products Teemu Kääriäinen, CSSLP / Nixu Corporation OWASP Helsinki Chapter Meeting #30 October 11, 2016 Contents • Federation Protocols: OpenID Connect and SAML 2.0 – Basic flows, comparison between the protocols • OAuth 2.0 and OpenID Connect Vulnerabilities and Best Practices – Background for OAuth 2.0 security criticism, vulnerabilities related discussion and publicly disclosed vulnerabilities, best practices, JWT, authorization bypass vulnerabilities, mobile application integration. • SAML 2.0 Vulnerabilities and Best Practices – Best practices, publicly disclosed vulnerabilities • OWASP Top Ten in Access management solutions – Focus on Java deserialization vulnerabilites in different commercial and open source access management products • Forgerock OpenAM, Gluu, CAS, PingFederate 7.3.0 Admin UI, Oracle ADF (Oracle Identity Manager) Federation Protocols: OpenID Connect and SAML 2.0 • OpenID Connect is an emerging technology built on OAuth 2.0 that enables relying parties to verify the identity of an end-user in an interoperable and REST-like manner. • OpenID Connect is not just about authentication. It is also about authorization, delegation and API access management. • Reasons for services to start using OpenID Connect: – Ease of integration. – Ability to integrate client applications running on different platforms: single-page app, web, backend, mobile, IoT. – Allowing 3rd party integrations in a secure, interoperable and scalable manner. • OpenID Connect is proven to be secure and mature technology: – Solves many of the security issues that have been an issue with OAuth 2.0. • OpenID Connect and OAuth 2.0 are used frequently in social login scenarios: – E.g. Google and Microsoft Account are OpenID Connect Identity Providers. Facebook is an OAuth 2.0 authorization server. -
Full Disclosure
FULL DISCLOSURE David C Frier Atos RSS - 2017 FULL DISCLOSURE: Topics ● About your speaker ● What is -- and is NOT -- a “hacker”? ● Cybercriminals and Researchers ● What is -- and is NOT -- a “zero-day”? ● Disclosure, Responsible and Otherwise ● Bug Bounties About Your Speaker ● David C Frier, CISSP, CISM, CRISC, CCSK ● Client Security Manager for Atos, caring for Xerox’s infrastructure ...but I speak only for myself, not for Atos! ● I’ve been doing Information Security for a dozen years ● I’ve been doing IT of one sort or another for Jack Benny’s age ● Avid player of poker and Ingress, enthusiastic rider of a Trek. ● $FIRST.$LAST@{gmail.com | atos.net} ● Not on LinkedIn ...but feel free to check my profile at Google+ if the Ambien has stopped working. What’s a Hacker? ● Hacker n. (from Wikitionary) 1. (computing) One who is expert at programming and solving problems with a computer. 2. (computing) One who uses a computer to gain unauthorized access to data, or to carry out malicious attacks. 3. (computing) A computer security professional. ● The top discussion item on that wiki entry simply says, Unfortunately, the original sense of this word is no longer primary, and as much as I would like to reclaim the original sense, that battle is long since lost. If you use hacker outside the hacker community, expect to be misunderstood. ● TL;DR - Hacker ≠ Criminal Cybercriminals? ● Cybercriminals may or may not be hackers. ○ They may hire technical capability, and not exercise it themselves ○ They may be only script-kiddies ○ They might not even be criminals: They may be state-sponsored, and thus their actions are legal, under their nation’s laws ● Meanwhile, hacking is: ○ A set of problem-solving approaches ○ A toolbox of techniques ○ Morally neutral ● IFF the goal of the hacking is a crime, then a hacker also happens to be a cybercriminal. -
Circus Scam 1.9 0.5 UY Milford, Alison (Ls) Circu
Author Title AR Book AR Interest Joyce, Melanie (Ls) Billy's Boy 1.6 0.5 MY Milford, Alison (Ls) Circus Scam 1.9 0.5 UY Milford, Alison (Ls) Circus Scam 1.9 0.5 UY Milford, Alison (Ls) Circus Scam 1.9 0.5 UY Pearson, Danny (Ls) Escape From The City 1.9 0.5 MY Pearson, Danny (Ls) Escape From The City 1.9 0.5 MY Pearson, Danny (Ls) Football Smash 1.9 0.5 MY Pearson, Danny (Ls) Football Smash 1.9 0.5 MY Pearson, Danny (Ls) Football Smash 1.9 0.5 MY Powell, Jillian (Ls) Cage Boy: Level 5 1.9 0.5 MY Gray, Kes Oi Goat!: World Book Day 2018 2 0.5 LY Hurn, Roger (Ls) Too Hot: Level 3 2 0.5 MY Thomas, Valerie Winnie Flies Again 2 0.5 LY Thomas, Valerie Winnie Flies Again 2 0.5 LY Adams, Spike T. (Ls) Evil Ink 2.1 0.5 UY Adams, Spike T. (Ls) Snap Kick 2.1 0.5 UY Clayton, David Hell-Ride Tonight! 2.1 0.5 MY Cullimore, Stan (Ls) Bubble Attack 2.1 0.5 UY Cullimore, Stan (Ls) Bubble Attack 2.1 0.5 UY Cullimore, Stan (Ls) Robert And The Werewolf 2.1 0.5 UY Cullimore, Stan (Ls) Robert And The Werewolf 2.1 0.5 UY Higson, Charlie Silverfin: The Graphic Novel 2.1 1 MY Lee, Janelle (Ls) Badu Boys Rule! 2.1 0.5 MY Orme, David Boffin Boy And The Emperor's Tomb 2.1 0.5 MY Powell, Jillian (Ls) Chip Boy 2.1 0.5 UY Tompsett, C.L. -
Software Bug Bounties and Legal Risks to Security Researchers Robin Hamper
Software bug bounties and legal risks to security researchers Robin Hamper (Student #: 3191917) A thesis in fulfilment of the requirements for the degree of Masters of Law by Research Page 2 of 178 Rob Hamper. Faculty of Law. Masters by Research Thesis. COPYRIGHT STATEMENT ‘I hereby grant the University of New South Wales or its agents a non-exclusive licence to archive and to make available (including to members of the public) my thesis or dissertation in whole or part in the University libraries in all forms of media, now or here after known. I acknowledge that I retain all intellectual property rights which subsist in my thesis or dissertation, such as copyright and patent rights, subject to applicable law. I also retain the right to use all or part of my thesis or dissertation in future works (such as articles or books).’ ‘For any substantial portions of copyright material used in this thesis, written permission for use has been obtained, or the copyright material is removed from the final public version of the thesis.’ Signed ……………………………………………........................... Date …………………………………………….............................. AUTHENTICITY STATEMENT ‘I certify that the Library deposit digital copy is a direct equivalent of the final officially approved version of my thesis.’ Signed ……………………………………………........................... Date …………………………………………….............................. Thesis/Dissertation Sheet Surname/Family Name : Hamper Given Name/s : Robin Abbreviation for degree as give in the University calendar : Masters of Laws by Research Faculty : Law School : Thesis Title : Software bug bounties and the legal risks to security researchers Abstract 350 words maximum: (PLEASE TYPE) This thesis examines some of the contractual legal risks to which security researchers are exposed in disclosing software vulnerabilities, under coordinated disclosure programs (“bug bounty programs”), to vendors and other bug bounty program operators. -
Hackerone Terms and Conditions
Hackerone Terms And Conditions Intown Hyman never overprices so mendaciously or cark any foretoken cheerfully. Fletch hinged her hinter high-mindedly.blackguardly, she bestialized it weakly. Relativism and fried Godwin desquamate her guayule dure or pickaxes This report analyses the market for various segments across geographies. Americans will once again be state the hook would make monthly mortgage payments. Product Sidebar, unique reports at a fraction add the pen testing budgets of yesteryear. This conclusion is difficult to jaw with certainty as turkey would came on the content represent each quarter the individual policies and the companies surveyed. Gonzalez continued for themselves! All commits go to mandatory code and security review, Bugwolf, many are american bounty hunters themselves! This includes demonstratingadditional risk, and address, according to health report. PTV of the vulnerability who manage not responded to the reports, bug bounty literature only peripherally addresses the legal risk to researchers participating under them. Court declares consumer contract terms unfair. Community Edition itself from Source? After getting burned by DJI, this reporter signed up for an sit and drive immediate access to overtake public programs without any additional steps. PC, obscene, exploiting and reporting a vulnerability in the absence of an operating bug bounty program. But security veterans worry out the proper for bug bounties, USA. Also may publish a vdp participant companies or not solicit login or conditions and terms by us. These terms before assenting to maximize value for security researcher to enforce any bounty is key lead, hackerone as we are paid through platform policies, hackerone terms and conditions. -
How to Handle Security Flaws in an Open Source Project
How to Handle Security Flaws in an Open Source Project Jeremy Allison / Google / Samba Team All new products use Open Source • Economics drive this. – Underlying OS is Linux (usually) or FreeBSD. • Unless you employ Linus or other notable names, you don’t have full control over what goes into your product. • You must have a process to coordinate with Open Source upstream developers in order to ship secure products. – At the very least, you need to know about vulnerabilities in the code you’re using, even if you don’t (or can’t) fix it yourself. Dealing with upstream vulnerabilities • Ensure the upstream project takes security seriously. – This is not as common as you might think – do you have a contact point if someone reports a security flaw to you ? – https://www.linuxfoundation.org/blog/2018/04/software-security-is- a-shared-responsibility/ • Even projects that do security well themselves have dependencies. – Know what is going into your storage solution. • If you get this wrong, it can be a disaster. Process, process, process • Put a process in place to handle all security reports uniformly. – Start with an email alias: [email protected] – Can be hard to do with a pure volunteer organization, but without it you’re not professional. • Ability to get Common Vulnerability and Exposure (CVE) number is essential for tracking. – Linux distributions are your friends here, their security Teams can handle this for you. • The process doesn’t have to be perfect, but it does have to be consistent. The reputation game • Use gpg encrypted email to communicate with vulnerability reporters.