SlideShare une entreprise Scribd logo
1  sur  44
Télécharger pour lire hors ligne
Ins & Outs of Blockchain Security
Pete Lindstrom, VP Security Strategies
▪ Blockchain technology is being touted as the
Next Big Thing, seemingly capable of great feats
of strength and perhaps even curing the
common cold. But what exactly is it and how
could it contribute to a security program? This
session will describe how blockchain works,
define its value proposition, and identify specific
use cases where blockchain makes sense and
some where it doesn't. Along the way, we will
discuss similar capabilities and technologies that
accomplish the objectives.
Ins and Outs of Blockchain Security
2
• Over 25 years in InfoSec, IT, Finance
• Tech Risk Pro performing reading, writing, ‘rithmetic on
risk and security matters
• Former Marine (Gulf War veteran), ‘Big Six’ IT Auditor
(PwC), Internal Auditor (GMAC Mortgage), Security
Architect & Director (Wyeth)
• BBA Finance, University of Notre Dame; reformed
CISA and CISSP
Pete Lindstrom
Vice President, Security Strategies
IT Executive Program, IDC
3
A blockchain is a collection
of event records that are
hashed and signed to link
them together.
What is a blockchain
4
Blockchain objectives are
changing right before our
eyes!
Key Takeaway
5
Blockchain Process
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Step 0: “Hey, let’s work together!”
6
Blockchain Process
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Step 1: “I have a new [signed, hashed] transaction!”
7
Blockchain Process
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Step 2: “Thanks for the work!”
8
Blockchain Process
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Step 3: “I have a new [signed, hashed] transaction, too!”
9
Blockchain Process
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Step 4: “Thanks for the work!”
10
Blockchain Process
Node
App
Work
Step 5: Let’s create a [signed, hashed] block! “work…work…work!”
Node
App
DataWork
Data
Node
App
DataWork
Node
App
DataWork
11
Blockchain Process
Node
App
Work
Step 6: Consensus: “Eureka! We agree!”
Node
App
DataWork
Data
Node
App
DataWork
Node
App
DataWork
12
Blockchain Process
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Node
App
DataWork
Step n: “I have a new [signed, hashed] transaction!”
13
Blockchain Process
Node
App
Work
Step n+1: “Let’s do this again!”
Node
App
DataWork
Data
Node
App
DataWork
Node
App
DataWork
14
Blockchain is a record of
activity / transactions /
events / state changes
(it is not the data itself)
Key Takeaway
15
How the heck did they
create that [signed,
hashed] transaction?
Key Question
16
Satoshi’s Blockchain
Source: Nakamoto, S. “Bitcoin: A Peer-to-Peer Electronic Cash System”
17
The Bitcoin Transaction
Source: Felten, et.al. “Bitcoin and Cryptocurrency Technologies”
18
The blockchain often
contains a “payload”
(script)!
Key Takeaway
19
• Nodes: listen, validate, work, offer blocks to
blockchain
• Aided by wallet/app and data store
• Protected by public/private keys
• Transactions: core records of assets to transfer
• Blocks: groups of transactions
• Blockchain: distributed ledger maintained by the
nodes
Key Blockchain Terms
20
1. Event/transaction occurrence (incl. physical)
2. Event write to data store (data record)
3. Event report to blockchain nodes (tx creation)
4. Event broadcast to nodes
5. Block creation on nodes (tx aggregation)
6. Consensus protocol agreement (block validation)
7. Block propagation to blockchain nodes (block
distribution)
8. Event trigger (smart contracts)
9. Script execution and outcome
Blockchain Process
21
• Decentralized processing (sometimes
democratic)
• Transparency (at least within the environment)
• Immutability (can’t be changed – integrity)
• Resilience (hard to disrupt)
Common Blockchain Benefits
22
Immutability can be a
double-edged sword!
Key Takeaway
23
▪ Soft forks are
changes that are
forward compatible so
old software (nodes)
can validate new
transactions.
▪ Hard forks are
changes that are not
forward compatible so
old software (nodes)
can not validate new
transactions.
Enter Soft and Hard Forks
OLD NEW
NEW OLD
https://bitcoin.stackexchange.com/questions/30817/what-is-a-soft-fork
24
Get the
fork out!
25
• Proof of work - CPU
• Proof of stake - assets
• Proof of activity - transactions
• Proof of burn - sacrifice
• Proof of capacity – resource allocation
• Proof of elapsed time – traffic cop
• https://www.coindesk.com/short-guide-
blockchain-consensus-protocols/
Consensus Protocols
26
▪ Public blockchains,
such as bitcoin and
many other crypto-
currencies, are
accessible by anyone
with the appropriate
technical resources.
• Private permissioned
blockchains have
access restrictions that
must be addressed
prior to gaining access
to the blockchain /
network.
Public vs. Private (Permissioned)
27
• Public / private key pair
• Wallet / data store / client-side program
• Nodes
• Transactions
• Blocks
• Hashes
• Distributed ledger (blockchain)
• Scripts [Executable code]
Blockchain APP Components
28
Blockchain is like a check register;
you still need to reconcile the bank
account.
Blockchain is like a system log; you
still need a registry / file system.
Key Analogies
29
Blockchain is an enabling
component of a distributed
application architecture
Key Takeaway
30
• 51% Attack – the Byzantine General’s Problem
• Double Spend Attack
• Finney Attack
• Sybil Attack
• Ponzi Attacks
• Known attacks
• Mt. Gox
• The DAO – Ethereum
• …and so on
Attacks against blockchain
31
Byzantine Generals Problem
32
Ethereum Vuln Taxonomy
Source: Atzei, et.al. “A survey of attacks on Ethereum smart contracts”
33
Blockchain Threat Model: Start
Confidentiality
Integrity
Availability
Productivity
propriety
Data/InformationData/InformationResources
34
Threat Modeling the ‘Ginsu’ Way!
Confidentiality
Integrity
Availability
Productivity
propriety
Data/InformationData/InformationResources
Inbound
(In-Transit)
Stored
(At-Rest)
Outbound
(In-Transit)
Sniff Copy (“steal”) Leak
Spoof, Replay, Insert Modify Redirect
Overload Delete Overload
Overload Distract Consume
Relay/Bounce Abuse (illegal) Propagate
Attacks Compromises
35
▪ Can an attacker interrogate a component of the Blockchain app and collect
data or content? (confidentiality)
▪ Can an attacker intercept the traffic between or among components of the
blockchain app? (confidentiality)
▪ Can an attacker modify the data or binary files of a component? (integrity)
▪ Can an attacker modify communications between or among two
components? (integrity)
▪ Can an attacker insert or inject inappropriate packets into a transmission
either directly or by impersonating the transmitting component of the
architecture? (integrity)
▪ Can an attacker corrupt a component or one of its key parts to render it
unusable? (availability, productivity)
▪ Can an attacker disrupt communications to render the system unusable?
(productivity)
▪ Can the components of the system be abused for other purposes?
(propriety)
Key Threat Model
36
▪ Ensure control objectives for the components:
• Public / private key pair
• Wallet / data store / client-side program
• Nodes
• Transactions
• Blocks
• Hashes
• Distributed ledger (blockchain)
• Scripts [Executable code]
Reviewing the Components
37
1. Event/transaction occurrence (incl. physical)
2. Event write to data store (data record)
3. Event report to blockchain nodes (tx creation)
4. Event broadcast to nodes
5. Block creation on nodes (tx aggregation)
6. Consensus protocol agreement (block validation)
7. Block propagation to blockchain nodes (block
distribution)
8. Event trigger (smart contracts)
9. Script execution and outcome
Review the Process
38
• How will you identify, validate, manage individual
nodes? (node lifecycle, incl. wallet apps, certs)
• How will you assess/update the current protection
level of individual nodes? (node security posture)
• Patch (ugh)
• App Control / Whitelisting
• Encryption (hash, sig, comm)
• How will you manage node roles/permissions
relative to the blockchain application? (node access
mgt)
• Creating transactions / types
• Validating other transactions
Key Control Questions
39
• Integrity of the data that ultimately ends up in
the blockchain
• Resilience of the blockchain (multiple nodes
with consensus creation and reconciliation
process)
• No single point of failure for the chain itself
• We get a lot of the “I” integrity, a bit of the “A”
availability and the “C” is likely to be moot in the
chain but crucial elsewhere
Blockchain Really DOES Help
40
• Verify the entire system
• Many traditional attacks and vulns still exist
• Validate the link between the asset and its
digital identity
• Build in an exception management process
• It’s a messy, complex, human world…
• This stuff is new…
• Blockchains are (sort of) immutable… mostly…
probably
Recommendations
41
• gathering the pertinent parties (“herding the cats”)
is challenging (e.g. due to geography, time, etc.)
• consensus is generally straightforward (disputes
are rare)
• there is consistent, simple logic
• The digital representation (hash) can be directly
tied to asset (preferably digital assets)
• The transactions are low frequency, high value
• The transactions are discrete - difficult to split or
join
Most likely to succeed, when…
42
Thanks!
Pete Lindstrom
Vice President, Security Strategies
IT Executive Program, IDC
plindstrom@idc.com
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 43
44
IDC is the premier global provider of market intelligence, advisory services, and events
for the information technology, telecommunications, and consumer technology
markets. IDC helps IT professionals, business executives, and the investment
community make fact-based decisions on technology purchases and business
strategy. More than 1,100 IDC analysts provide global, regional, and local expertise on
technology and industry opportunities and trends in over 110 countries worldwide. For
more than 50 years, IDC has provided strategic insights to help our clients achieve
their key business objectives. IDC is a subsidiary of IDG, the world's leading
technology media, research, and events company.
Terms of Use: Except as otherwise noted, the information enclosed is the intellectual
property of IDC, copyright 2016. Reproduction is forbidden unless authorized; contact
permissions@idc.com for information. All rights reserved.

Contenu connexe

Tendances

An Overview of Stablecoin
An Overview of StablecoinAn Overview of Stablecoin
An Overview of Stablecoin
101 Blockchains
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Blockchain Digital Transformation Presentation
Blockchain Digital Transformation PresentationBlockchain Digital Transformation Presentation
Blockchain Digital Transformation Presentation
101 Blockchains
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
Ross Wolf
 

Tendances (20)

Threat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star WarsThreat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star Wars
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
 
An Overview of Stablecoin
An Overview of StablecoinAn Overview of Stablecoin
An Overview of Stablecoin
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architecture
 
Les grands principes de la Blockchain
Les grands principes de la BlockchainLes grands principes de la Blockchain
Les grands principes de la Blockchain
 
Onchain Decentralized Governance.pptx
Onchain Decentralized Governance.pptxOnchain Decentralized Governance.pptx
Onchain Decentralized Governance.pptx
 
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
 
Realex.io sto-architecture-v2
Realex.io sto-architecture-v2Realex.io sto-architecture-v2
Realex.io sto-architecture-v2
 
Blockchain Digital Transformation Presentation
Blockchain Digital Transformation PresentationBlockchain Digital Transformation Presentation
Blockchain Digital Transformation Presentation
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
What is a blockchain?
What is a blockchain?What is a blockchain?
What is a blockchain?
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
An Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / BlockchainAn Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / Blockchain
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
 
Blockchain HyperLedger Fabric Internals - Clavent
Blockchain HyperLedger Fabric Internals - ClaventBlockchain HyperLedger Fabric Internals - Clavent
Blockchain HyperLedger Fabric Internals - Clavent
 
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation Journey
 

Similaire à IDC - Blockchain Threat Model

Similaire à IDC - Blockchain Threat Model (20)

Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and Privacy
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital Transformation
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
New Business Models enabled by Blockchain
New Business Models enabled by BlockchainNew Business Models enabled by Blockchain
New Business Models enabled by Blockchain
 
Blockchain e mercato
Blockchain e mercatoBlockchain e mercato
Blockchain e mercato
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Blockchain intro: The end of the middleman
Blockchain intro: The end of the middlemanBlockchain intro: The end of the middleman
Blockchain intro: The end of the middleman
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Blockchain Technology and its Business Application
Blockchain Technology and  its Business ApplicationBlockchain Technology and  its Business Application
Blockchain Technology and its Business Application
 
A technical Introduction to Blockchain.
A technical Introduction to Blockchain.A technical Introduction to Blockchain.
A technical Introduction to Blockchain.
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 
A Breathless Tour of Blockchain
A Breathless Tour of BlockchainA Breathless Tour of Blockchain
A Breathless Tour of Blockchain
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBM
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBM
 
Blockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your businessBlockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your business
 

Dernier

( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
nilamkumrai
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 

Dernier (20)

Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 

IDC - Blockchain Threat Model

  • 1. Ins & Outs of Blockchain Security Pete Lindstrom, VP Security Strategies
  • 2. ▪ Blockchain technology is being touted as the Next Big Thing, seemingly capable of great feats of strength and perhaps even curing the common cold. But what exactly is it and how could it contribute to a security program? This session will describe how blockchain works, define its value proposition, and identify specific use cases where blockchain makes sense and some where it doesn't. Along the way, we will discuss similar capabilities and technologies that accomplish the objectives. Ins and Outs of Blockchain Security 2
  • 3. • Over 25 years in InfoSec, IT, Finance • Tech Risk Pro performing reading, writing, ‘rithmetic on risk and security matters • Former Marine (Gulf War veteran), ‘Big Six’ IT Auditor (PwC), Internal Auditor (GMAC Mortgage), Security Architect & Director (Wyeth) • BBA Finance, University of Notre Dame; reformed CISA and CISSP Pete Lindstrom Vice President, Security Strategies IT Executive Program, IDC 3
  • 4. A blockchain is a collection of event records that are hashed and signed to link them together. What is a blockchain 4
  • 5. Blockchain objectives are changing right before our eyes! Key Takeaway 5
  • 11. Blockchain Process Node App Work Step 5: Let’s create a [signed, hashed] block! “work…work…work!” Node App DataWork Data Node App DataWork Node App DataWork 11
  • 12. Blockchain Process Node App Work Step 6: Consensus: “Eureka! We agree!” Node App DataWork Data Node App DataWork Node App DataWork 12
  • 14. Blockchain Process Node App Work Step n+1: “Let’s do this again!” Node App DataWork Data Node App DataWork Node App DataWork 14
  • 15. Blockchain is a record of activity / transactions / events / state changes (it is not the data itself) Key Takeaway 15
  • 16. How the heck did they create that [signed, hashed] transaction? Key Question 16
  • 17. Satoshi’s Blockchain Source: Nakamoto, S. “Bitcoin: A Peer-to-Peer Electronic Cash System” 17
  • 18. The Bitcoin Transaction Source: Felten, et.al. “Bitcoin and Cryptocurrency Technologies” 18
  • 19. The blockchain often contains a “payload” (script)! Key Takeaway 19
  • 20. • Nodes: listen, validate, work, offer blocks to blockchain • Aided by wallet/app and data store • Protected by public/private keys • Transactions: core records of assets to transfer • Blocks: groups of transactions • Blockchain: distributed ledger maintained by the nodes Key Blockchain Terms 20
  • 21. 1. Event/transaction occurrence (incl. physical) 2. Event write to data store (data record) 3. Event report to blockchain nodes (tx creation) 4. Event broadcast to nodes 5. Block creation on nodes (tx aggregation) 6. Consensus protocol agreement (block validation) 7. Block propagation to blockchain nodes (block distribution) 8. Event trigger (smart contracts) 9. Script execution and outcome Blockchain Process 21
  • 22. • Decentralized processing (sometimes democratic) • Transparency (at least within the environment) • Immutability (can’t be changed – integrity) • Resilience (hard to disrupt) Common Blockchain Benefits 22
  • 23. Immutability can be a double-edged sword! Key Takeaway 23
  • 24. ▪ Soft forks are changes that are forward compatible so old software (nodes) can validate new transactions. ▪ Hard forks are changes that are not forward compatible so old software (nodes) can not validate new transactions. Enter Soft and Hard Forks OLD NEW NEW OLD https://bitcoin.stackexchange.com/questions/30817/what-is-a-soft-fork 24
  • 26. • Proof of work - CPU • Proof of stake - assets • Proof of activity - transactions • Proof of burn - sacrifice • Proof of capacity – resource allocation • Proof of elapsed time – traffic cop • https://www.coindesk.com/short-guide- blockchain-consensus-protocols/ Consensus Protocols 26
  • 27. ▪ Public blockchains, such as bitcoin and many other crypto- currencies, are accessible by anyone with the appropriate technical resources. • Private permissioned blockchains have access restrictions that must be addressed prior to gaining access to the blockchain / network. Public vs. Private (Permissioned) 27
  • 28. • Public / private key pair • Wallet / data store / client-side program • Nodes • Transactions • Blocks • Hashes • Distributed ledger (blockchain) • Scripts [Executable code] Blockchain APP Components 28
  • 29. Blockchain is like a check register; you still need to reconcile the bank account. Blockchain is like a system log; you still need a registry / file system. Key Analogies 29
  • 30. Blockchain is an enabling component of a distributed application architecture Key Takeaway 30
  • 31. • 51% Attack – the Byzantine General’s Problem • Double Spend Attack • Finney Attack • Sybil Attack • Ponzi Attacks • Known attacks • Mt. Gox • The DAO – Ethereum • …and so on Attacks against blockchain 31
  • 33. Ethereum Vuln Taxonomy Source: Atzei, et.al. “A survey of attacks on Ethereum smart contracts” 33
  • 34. Blockchain Threat Model: Start Confidentiality Integrity Availability Productivity propriety Data/InformationData/InformationResources 34
  • 35. Threat Modeling the ‘Ginsu’ Way! Confidentiality Integrity Availability Productivity propriety Data/InformationData/InformationResources Inbound (In-Transit) Stored (At-Rest) Outbound (In-Transit) Sniff Copy (“steal”) Leak Spoof, Replay, Insert Modify Redirect Overload Delete Overload Overload Distract Consume Relay/Bounce Abuse (illegal) Propagate Attacks Compromises 35
  • 36. ▪ Can an attacker interrogate a component of the Blockchain app and collect data or content? (confidentiality) ▪ Can an attacker intercept the traffic between or among components of the blockchain app? (confidentiality) ▪ Can an attacker modify the data or binary files of a component? (integrity) ▪ Can an attacker modify communications between or among two components? (integrity) ▪ Can an attacker insert or inject inappropriate packets into a transmission either directly or by impersonating the transmitting component of the architecture? (integrity) ▪ Can an attacker corrupt a component or one of its key parts to render it unusable? (availability, productivity) ▪ Can an attacker disrupt communications to render the system unusable? (productivity) ▪ Can the components of the system be abused for other purposes? (propriety) Key Threat Model 36
  • 37. ▪ Ensure control objectives for the components: • Public / private key pair • Wallet / data store / client-side program • Nodes • Transactions • Blocks • Hashes • Distributed ledger (blockchain) • Scripts [Executable code] Reviewing the Components 37
  • 38. 1. Event/transaction occurrence (incl. physical) 2. Event write to data store (data record) 3. Event report to blockchain nodes (tx creation) 4. Event broadcast to nodes 5. Block creation on nodes (tx aggregation) 6. Consensus protocol agreement (block validation) 7. Block propagation to blockchain nodes (block distribution) 8. Event trigger (smart contracts) 9. Script execution and outcome Review the Process 38
  • 39. • How will you identify, validate, manage individual nodes? (node lifecycle, incl. wallet apps, certs) • How will you assess/update the current protection level of individual nodes? (node security posture) • Patch (ugh) • App Control / Whitelisting • Encryption (hash, sig, comm) • How will you manage node roles/permissions relative to the blockchain application? (node access mgt) • Creating transactions / types • Validating other transactions Key Control Questions 39
  • 40. • Integrity of the data that ultimately ends up in the blockchain • Resilience of the blockchain (multiple nodes with consensus creation and reconciliation process) • No single point of failure for the chain itself • We get a lot of the “I” integrity, a bit of the “A” availability and the “C” is likely to be moot in the chain but crucial elsewhere Blockchain Really DOES Help 40
  • 41. • Verify the entire system • Many traditional attacks and vulns still exist • Validate the link between the asset and its digital identity • Build in an exception management process • It’s a messy, complex, human world… • This stuff is new… • Blockchains are (sort of) immutable… mostly… probably Recommendations 41
  • 42. • gathering the pertinent parties (“herding the cats”) is challenging (e.g. due to geography, time, etc.) • consensus is generally straightforward (disputes are rare) • there is consistent, simple logic • The digital representation (hash) can be directly tied to asset (preferably digital assets) • The transactions are low frequency, high value • The transactions are discrete - difficult to split or join Most likely to succeed, when… 42
  • 43. Thanks! Pete Lindstrom Vice President, Security Strategies IT Executive Program, IDC plindstrom@idc.com © IDC Visit us at IDC.com and follow us on Twitter: @IDC 43
  • 44. 44 IDC is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. IDC helps IT professionals, business executives, and the investment community make fact-based decisions on technology purchases and business strategy. More than 1,100 IDC analysts provide global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries worldwide. For more than 50 years, IDC has provided strategic insights to help our clients achieve their key business objectives. IDC is a subsidiary of IDG, the world's leading technology media, research, and events company. Terms of Use: Except as otherwise noted, the information enclosed is the intellectual property of IDC, copyright 2016. Reproduction is forbidden unless authorized; contact permissions@idc.com for information. All rights reserved.