How to Use Hacker Persona's to Successfully Build Devsecops

How to Use Hacker Persona's to Successfully Build Devsecops

How to use hacker persona’s to successfully build DevSecOps Pipeline • Robin Yeman • Lockheed Martin Sr. Fellow • Lockheed Martin • twitter @robinyeman Agenda • DevOps and Pipeline • Securing the pipeline • Apply the practices 2 DevOps and delivery pipeline DevOps DevOps is “a cross-disciplinary community of practice dedicated to the study of building, evolving and operating rapidly-changing resilient systems at scale.” - Jez Humble Why DevOps Forsgren, Nicole. “DevOps Solutions | Google Cloud.” Google, Google, 22 Aug. 2019, https://cloud.google.com/devops/state-of- devops/. DevOps Pipeline Requirements / Design Version Control Build Tool(s) Continuous Integration Test Framework(s) API Library End to End Security Commit & Build Validate Deploy D Application Code & Build Application a s Integration Acceptance Production h Version Control Test Test Deploy b Environment o Commit & Build Validate Deploy Infrastructure Automation Package Infrastructure a Development Integrated r d API Library Configuration Environments Monitoring Artifact Repository Product Backlog Management Schedule Securing the delivery pipeline Threat Modeling • Identify Assets • Using IDDIL-ATC Methodology • Define the Attack Surface – Gain understanding • Decompose the System – Assess risk • Identify Attack Vectors – Justify security controls • List Threat Actors • Analysis & Assessment • Triage • Controls DevOps Pipeline Threat Model Attack Surfaces in the pipeline Requirements / Design Version Control Build Tool(s) Continuous Integration Test Framework(s) API Library End to End Security APT Commit & Build Validate Deploy D Application Code & Build Application a s Integration Acceptance Production h Version Control Test Test Deploy b Environment o Commit & Build Validate Deploy Infrastructure Automation Package Infrastructure Integrated Development Integrated a Careless r Dev Insider d API Library Configuration Environments Monitoring Artifact Repository Product Backlog Management Schedule Defining Persona’s • Alan Cooper’s the Inmates are Running the Asylum – Hypothetical Archetypes – Precise & Specific Description of the User – Define user’s objectives • Lene Nielson’s 4 Perspectives – Goal Directed – Role-based – Engaging – Fictional Why Hacker Personas? • Culture & Awareness. Understand adversary tactics & drivers • Prioritize security risks • Communicate generalized attacker profiles that identify common black hat hacker motives and desires – What does the attacker like to see – identifies exploitable weaknesses • Justify Security Control Selection – What does the attacker not like to see – identifies effective security controls How do we “discover” hacker personas? Threat Types (analogous to User Roles) – Advanced Attackers (APTs, Military, Industrial) • Comment Crew, Lazarus Group, Oilrig – Hacktivists • Anonymous, Chaos Computer Club, LulzSec, OurMine – Insider • Spy, Compromised employee, disgruntled employee – Lone Wolf • Iceman, Robert Morris, Julian Assange, Edward Snowden Sources: anonymous, attack.mitre.org, apt.threattracking.com Intelligence Sources Near Range Threats: • Internal Intelligence • Partner Intelligence Mid Range Threats: • Open Source Intelligence (OSINT) • Industry Intelligence Long Range Threats: Global attacks require • Homeland Intelligence • Ally Intelligence global intelligence Ministry of State Security (MSS) People's Liberation Army (PLA) Main Directorate of the General FBI cyber most wanted Staff of the Armed Forces of the Russian Federation (GRU) Hacker Persona Examples Careless Developer Chuck Careless Developer As a Developer I want check-in features Skillset: quickly so that I can go move on to Degree in computer science with less than five years experience. Explores something else. the latest technology at home with the ability to code in multiple languages As a Developer I want avoid Identification: administrative work so that I can code Real Name: Charles Diavol Alias: Charles 123 which is more fun! Motivations: Wants to maximize delivery of software As a Developer I want try the latest Wants access to use the latest tech and libraries Reduce workload of perceived overhead work technology available so that I can keep Frustrations: my skills current. Governance and compliance that slows him down Ever-growing technical debt Legacy technology 17 Malicious Developer Marty Malicious Developer As a Malicious Developer I want inject Skillset: malicious code so that I can see what Extensive coding experience at OS & happens. Kernel level. Develops cyber attack tools. Wants to get paid by his employer as well as his dark web As a Malicious Developer I want associates. Identification: increasing privilege so that I can view Real Name: Martin Smith data that has not been shared with me. Handles: KRNL KON Motivations: Appear aboveboard and ethical ( follows rules) As a Malicious Developer I want crash Ensure nobody notices I am injecting malicious logic Take full advantage of weak process to remain undetected the server so that I can deny service to my co-workers. Frustrations: Security controls that limit, block or monitor code changes Inline automated security tools that detect malicious code Automated / manual testing that discover malicious code 18 Advanced Persistent Threat (APT) Annie APT As a Annie APT I want to eavesdrop on Skillset: company X and obtain sensitive Highly trained and skilled in cyber information that can be sold. attacks of all kinds. Effective social engineer. Skilled at evading detection. As a Annie APT I want to upload Identification: malware on your computer so that I can Real Name: Annie Alvarez obtain personal information. Handles: Triple Pez, 3Pez, Pez Motivations: Use highly effective attacks, including social engineering As a Annie APT I want to upload Gain Trust, Develop relationships through social media After compromise, remain undetected to meet objectives ransomware so that I can extort victims Frustrations: to further my political agenda. When I exploit a target without enough privilege to move forward with my objectives Security controls that block outbound communication 19 Application and Benefits USING PERSONAS Is Annie capable? Annie Recon Actor Connection Exploit Evaluate Visibility User Awareness Detection/Prioritization Least Priv / Zero Trust Personalized Target Creates Position of Falsified Alias Escalate to malicious Engagement Trust content or co-opt behavior Hacker Persona Benefits “Spatial” (visual) Understanding Identify effective countermeasures Prioritize defenses Measure effectiveness Chuck Coding Build Integrate Deploy Code Bashing Automated SAST Automated DAST Continuous Test Flaw injected into Code security flaw Flaw passes integration Exposure in Production build Positive Shifts “Lessons” on Personas • Change culture “Put on the Black Hoodie” • Build and Socialize Personas • Agile Security Game – Shostack • The Phantom Hacker 24 Future DevOpsSec: Seamlessly integrate security into the implementation pipeline; ensuring everyone takes responsibility while continuing to shorten feedback loops Feed Back highway Security Security Team Community Intelligence highway Security Testing & Data Platform .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    26 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us