SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Bug Bounties and
the Path to Secure Software
Scott	Crawford	– Research	Director,	Information	Security
What’s a Bug Bounty? (And why should you care?)
• Non-software	products	must	often	
face	rigorous	testing	against	real-
world	conditions	to	demonstrate	their	
safety	and	reliability
• But	what	about	software?
4
“Hacker-powered security”
• Testing	is	only	as	good	as	the	experts	
applying	their	knowledge
• …and	“users”	are	infinitely	creative
• Bugs	aren’t	just	about	security
• …but	security	is	a	top	concern
• …and	success	in	finding	&	fixing	is	a	race	
against	the	clock
• Why	not	engage	the	same	researchers	
that	find	bugs,	to	help	fix	them?
5
An	early	(and	
literal)	“bug	
bounty”:	OS	
company	(and	
aptly	named)	
Hunter	&	
Ready,	1983
Photo:
https://twitter.com/senorarroz/status/783
093421204393985
Bug Bounty Programs: From concept to maturity
• From	(a	sometimes	contentious)	opportunity	to	
formalized	field	– and	for	good	reason
• The	difference	between	discovering	what	others	
know	or	could	find	out,	and	remaining	in	the	
dark
• “Everyone	gets	a	free	penetration	test	–
whether	or	not	they	get	a	copy	of	the	report	is	
up	to	them.”
6
At	Black	Hat	US	2017,	Facebook	CSO	Alex	
Stamos	highlighted	a	conference	– and	an	
industry	– that	has	grown	from	hacking	to	
an	emphasis	on	mature	and	integrated	
defense.	BBPs	align	both.
Seeing results
• Facebook,	Feb	2016:	38%	YOY	increase	in	high-
impact	submissions1
• Google,	June	2016:	Up	to	50%	increase	in	
amounts	paid	for	high-quality	vulnerability	
reports2
• Positive	impact	on	safety	and	life-critical	
issues,	particularly	with	growth	of	IoT	and	
“smart”	systems
7
1 https://www.facebook.com/notes/facebook-bug-
bounty/2015-highlights-less-low-hanging-
fruit/1225168744164016
2 https://security.googleblog.com/2016/06/one-year-of-
android-security-rewards.html
Is a BBP for you?
• Chief	concern:	From	bug	to	bad	outcome
• Not	just	security
• Safety,	proper	operation,	(re)liability,	
customer	confidence… even	cheating!
• 3	key	considerations:
• Visibility
• Criticality
• Notoriety
• No	longer	just	for	tech	companies
• HackerOne:	41%	of	bug	bounties	launched	
in	2016	from	non-tech	industries3
8
3 https://www.hackerone.com/resources/hacker-powered-
security-report
Where to begin?
• If	your	digital	assets	have	any exposure	to	inquisitive	
minds…
• You	may	find	that	someone	has	discovered	a	bug	or	
vulnerability
• How	will	you	handle	it?
• 94% of	the	Forbes	Global	2000	do	not	have	known	
vulnerability	disclosure	policies4
• Every organization	with	a	pubic	digital	footprint	
already has	a	stake	in	hacker-powered	security
• Why	not	do	it	right	from	the	outset?
9
4 https://www.hackerone.com/resources/hacker-powered-security-report
7 steps toward
“hacker-powered” security
1: Create a VDP (and make it easy to find!)
• A	vulnerability	disclosure	policy	needs	to	be	
table	stakes for	any	organization	with	any
public	footprint
• Ensures	a	clear	process	for	communicating	
issues
• Enables	the	many	who	are	well	motivated	to	
help!
• Need	not	be	limited	to	bugs
• Config	errors	or	other	detectable	exposures
• Can	be	as	simple	as	specifying	an	email	
address
• But	more	detail	would	be	ideal
Key elements of a VDP
1. Contact	information
2. Clear	description	of	reportable	issue	types
3. Rules	for	finding	and	reporting	bugs
4. List	of	systems	available	on	which	to	report	bugs
5. Communication	expectations:	When	to	expect	to	hear	back	
after	first	contact
6. Rules	of	engagement:	How	much	is	OK,	and	how	much	is	
going	too	far	(i.e.	potentially	breaking	the	law)
7. Guidance	on	how	to	test	may	also	be	provided,	such	as	providing	a	detailed	
summary	of	the	issue,	including	the
8. Target,	steps,	tools	and	artifacts	used	in	discovery	(helps	the	subject	org	reproduce	
the	issue)
An international standard
• ISO/IEC	29147:	Guidelines	for	the	
vulnerability	disclosure	process
• Freely available	at	
http://standards.iso.org/ittf/PubliclyAv
ailableStandards/c045170_ISO_IEC_291
47_2014.zip
• Related:	ISO/IEC	30111:	Guidelines	for	
vulnerability	handling	processes	(more	
on	that	shortly)
13
An NTIA template for VDP
• Brand	promise	("The	safety	and	security	of	
our	customers	is	important	to	us…")
• Initial	program	and	scope:	Which	systems	and	
capabilities	are	‘fair	game’	vs.	‘off	limits’
• "We	will	not	take	legal	action	if…":	Clear,	
statements	to	guide	good-faith	efforts
• Communication	mechanisms	and	process
• Non-binding	submission	preferences	and	
prioritizations
• Versioning	of	the	policy
14
https://www.ntia.doc.gov/other-
publication/2016/multistakeholder-process-
cybersecurity-vulnerabilities
2: Corporate comms must know how to handle
• Transparence and	responsiveness	can	go	a	
long	way	toward	making	the	best	of	an	
incident	or	report
• Ensure	that	corporate	communications	
staff	understand	how	to	recognize	and	
handle	a	disclosure
• What	not to	do
• Automated	emails	with	no	follow	up
• Cases	of	Win:
• Buffer	breach
• CloudBleed
• GitLab	DB	incident
15
3: Document and practice vulnerability handling
16
ISO/IEC 29147 – Vulnerability disclosure process
ISO/IEC 30111 – Vulnerability handling process
A vulnerability handling process overview
17
Critical:
• A clear,
common set of
rules and
expectations
• Easy to locate
Ready to take that next step?
18
4: Select a Bug Bounty Platform Provider
A	BBPP	can	help	shoulder	the	burden	– or	completely	offload	– many	processes	critical	
to	BBP	success:
• Help	with	design	of	BBPs
• Provide	a	software	solution	to	manage	submissions
• Expert	guidance	and	implementation	of	processes	vital	to	BBP	success
• Response	to	reports
• Triage
• Disclosure	assistance
• Community	support
• Access	to	the	talent	pool
19
• Management	platform	features
• Workflow	integration
• Automation	and	orchestration
• Flexible	programs
• Metrics	for	success
BBPPs: Automation and orchestration
• So	you’re	going	to	accept	incoming	bug	reports.	
Maybe	a	lot of	them
• Think	fixing	issues	will	be	your	biggest	problem?
• How	about	sorting	through	the	noise	to	triage	
duplicates,	false	positives,	or	reports	out	of	scope?
• Yelp:	First	100	days	of	a	public	BBP:
• 564	reports
• 322	duplicates	(57%)
• 525	not	actionable	- That’s	93% of	reports	that	
people	would	have	had	to	sort	through	without	the	
support	of	triage	and	workflow	automation
20
Measuring success: BBP metrics
• What	to	measure?	Bug	severity	or	
quantity?	Number	fixed?
• How	about	reducing	the	number	found	in	a	
bounty	in	the	first	place?
• Some	examples	that	might	help	measure	
improvements	in	software	quality:
• Number	of	issues	per	1000	lines	of	code	
(LOC)
• Number	of	critical	flaws	per	development	
cycle
• Time	to	resolve
21
5: Start conservative, with a private BBP, then
6: Go public when comfortable
• Advantages	of	a	private	program
• Ability	to	control	all	constraints
• Choose	testers,	limit	their	number,	improve	
processes	in	private
• Finding	and	fixing	flaws	before	production	
release
• Quality	and	relevance	of	submissions
• Advantages	of	a	public	program
• Actionable	results	potentially	more	quickly
• Positive	public	image
22
7: Refine and expand your program
23
Thank you!

Contenu connexe

Tendances

Nick Drage & Fraser Scott - Epic battle devops vs security
Nick Drage & Fraser Scott - Epic battle devops vs securityNick Drage & Fraser Scott - Epic battle devops vs security
Nick Drage & Fraser Scott - Epic battle devops vs security
DevSecCon
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
Brian Levine
 

Tendances (20)

DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
 
DevOps or DevSecOps
DevOps or DevSecOpsDevOps or DevSecOps
DevOps or DevSecOps
 
DevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CDDevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CD
 
IntroSec Con - Building Your Blue Team Arsenal - glitch
IntroSec Con - Building Your Blue Team Arsenal - glitchIntroSec Con - Building Your Blue Team Arsenal - glitch
IntroSec Con - Building Your Blue Team Arsenal - glitch
 
Nick Drage & Fraser Scott - Epic battle devops vs security
Nick Drage & Fraser Scott - Epic battle devops vs securityNick Drage & Fraser Scott - Epic battle devops vs security
Nick Drage & Fraser Scott - Epic battle devops vs security
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery PipelineDevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
 
Security Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your Organisation
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities
 
DevSecCon London 2017: Shift happens ... by Colin Domoney
DevSecCon London 2017: Shift happens ... by Colin Domoney DevSecCon London 2017: Shift happens ... by Colin Domoney
DevSecCon London 2017: Shift happens ... by Colin Domoney
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon London 2017: How far left do you want to go with security? by Javie...DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon London 2017: How far left do you want to go with security? by Javie...
 
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
 
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world casesDevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
 

Similaire à Bug Bounties and The Path to Secure Software by 451 Research

HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
AdaCore
 

Similaire à Bug Bounties and The Path to Secure Software by 451 Research (20)

Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Web Application Security And Getting Into Bug Bounties
Web Application Security And Getting Into Bug BountiesWeb Application Security And Getting Into Bug Bounties
Web Application Security And Getting Into Bug Bounties
 
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking Stupid
 
DOES15 - Mike Bland - Pain Is Over, If You Want It
DOES15 - Mike Bland - Pain Is Over, If You Want ItDOES15 - Mike Bland - Pain Is Over, If You Want It
DOES15 - Mike Bland - Pain Is Over, If You Want It
 
Crowdsourcing Cyber Security
Crowdsourcing Cyber SecurityCrowdsourcing Cyber Security
Crowdsourcing Cyber Security
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED
 
Penetration Testing
Penetration TestingPenetration Testing
Penetration Testing
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applications
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
YOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS ApplicationsYOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS Applications
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
 
5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software Security
 

Plus de HackerOne

Plus de HackerOne (17)

Top 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty ProgramsTop 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty Programs
 
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
 
Federal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security GuideFederal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security Guide
 
Understanding Information Security Assessment Types
Understanding Information Security Assessment TypesUnderstanding Information Security Assessment Types
Understanding Information Security Assessment Types
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
 
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty Programs
 
Voices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure PolicyVoices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure Policy
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
 
HackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning WangHackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning Wang
 
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered SecurityTapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
 
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
 
Meet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsMeet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programs
 

Dernier

Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 

Dernier (20)

Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 

Bug Bounties and The Path to Secure Software by 451 Research

  • 1. Bug Bounties and the Path to Secure Software Scott Crawford – Research Director, Information Security
  • 2. What’s a Bug Bounty? (And why should you care?) • Non-software products must often face rigorous testing against real- world conditions to demonstrate their safety and reliability • But what about software? 4
  • 3. “Hacker-powered security” • Testing is only as good as the experts applying their knowledge • …and “users” are infinitely creative • Bugs aren’t just about security • …but security is a top concern • …and success in finding & fixing is a race against the clock • Why not engage the same researchers that find bugs, to help fix them? 5 An early (and literal) “bug bounty”: OS company (and aptly named) Hunter & Ready, 1983 Photo: https://twitter.com/senorarroz/status/783 093421204393985
  • 4. Bug Bounty Programs: From concept to maturity • From (a sometimes contentious) opportunity to formalized field – and for good reason • The difference between discovering what others know or could find out, and remaining in the dark • “Everyone gets a free penetration test – whether or not they get a copy of the report is up to them.” 6 At Black Hat US 2017, Facebook CSO Alex Stamos highlighted a conference – and an industry – that has grown from hacking to an emphasis on mature and integrated defense. BBPs align both.
  • 5. Seeing results • Facebook, Feb 2016: 38% YOY increase in high- impact submissions1 • Google, June 2016: Up to 50% increase in amounts paid for high-quality vulnerability reports2 • Positive impact on safety and life-critical issues, particularly with growth of IoT and “smart” systems 7 1 https://www.facebook.com/notes/facebook-bug- bounty/2015-highlights-less-low-hanging- fruit/1225168744164016 2 https://security.googleblog.com/2016/06/one-year-of- android-security-rewards.html
  • 6. Is a BBP for you? • Chief concern: From bug to bad outcome • Not just security • Safety, proper operation, (re)liability, customer confidence… even cheating! • 3 key considerations: • Visibility • Criticality • Notoriety • No longer just for tech companies • HackerOne: 41% of bug bounties launched in 2016 from non-tech industries3 8 3 https://www.hackerone.com/resources/hacker-powered- security-report
  • 7. Where to begin? • If your digital assets have any exposure to inquisitive minds… • You may find that someone has discovered a bug or vulnerability • How will you handle it? • 94% of the Forbes Global 2000 do not have known vulnerability disclosure policies4 • Every organization with a pubic digital footprint already has a stake in hacker-powered security • Why not do it right from the outset? 9 4 https://www.hackerone.com/resources/hacker-powered-security-report
  • 9. 1: Create a VDP (and make it easy to find!) • A vulnerability disclosure policy needs to be table stakes for any organization with any public footprint • Ensures a clear process for communicating issues • Enables the many who are well motivated to help! • Need not be limited to bugs • Config errors or other detectable exposures • Can be as simple as specifying an email address • But more detail would be ideal
  • 10. Key elements of a VDP 1. Contact information 2. Clear description of reportable issue types 3. Rules for finding and reporting bugs 4. List of systems available on which to report bugs 5. Communication expectations: When to expect to hear back after first contact 6. Rules of engagement: How much is OK, and how much is going too far (i.e. potentially breaking the law) 7. Guidance on how to test may also be provided, such as providing a detailed summary of the issue, including the 8. Target, steps, tools and artifacts used in discovery (helps the subject org reproduce the issue)
  • 11. An international standard • ISO/IEC 29147: Guidelines for the vulnerability disclosure process • Freely available at http://standards.iso.org/ittf/PubliclyAv ailableStandards/c045170_ISO_IEC_291 47_2014.zip • Related: ISO/IEC 30111: Guidelines for vulnerability handling processes (more on that shortly) 13
  • 12. An NTIA template for VDP • Brand promise ("The safety and security of our customers is important to us…") • Initial program and scope: Which systems and capabilities are ‘fair game’ vs. ‘off limits’ • "We will not take legal action if…": Clear, statements to guide good-faith efforts • Communication mechanisms and process • Non-binding submission preferences and prioritizations • Versioning of the policy 14 https://www.ntia.doc.gov/other- publication/2016/multistakeholder-process- cybersecurity-vulnerabilities
  • 13. 2: Corporate comms must know how to handle • Transparence and responsiveness can go a long way toward making the best of an incident or report • Ensure that corporate communications staff understand how to recognize and handle a disclosure • What not to do • Automated emails with no follow up • Cases of Win: • Buffer breach • CloudBleed • GitLab DB incident 15
  • 14. 3: Document and practice vulnerability handling 16 ISO/IEC 29147 – Vulnerability disclosure process ISO/IEC 30111 – Vulnerability handling process
  • 15. A vulnerability handling process overview 17 Critical: • A clear, common set of rules and expectations • Easy to locate
  • 16. Ready to take that next step? 18
  • 17. 4: Select a Bug Bounty Platform Provider A BBPP can help shoulder the burden – or completely offload – many processes critical to BBP success: • Help with design of BBPs • Provide a software solution to manage submissions • Expert guidance and implementation of processes vital to BBP success • Response to reports • Triage • Disclosure assistance • Community support • Access to the talent pool 19 • Management platform features • Workflow integration • Automation and orchestration • Flexible programs • Metrics for success
  • 18. BBPPs: Automation and orchestration • So you’re going to accept incoming bug reports. Maybe a lot of them • Think fixing issues will be your biggest problem? • How about sorting through the noise to triage duplicates, false positives, or reports out of scope? • Yelp: First 100 days of a public BBP: • 564 reports • 322 duplicates (57%) • 525 not actionable - That’s 93% of reports that people would have had to sort through without the support of triage and workflow automation 20
  • 19. Measuring success: BBP metrics • What to measure? Bug severity or quantity? Number fixed? • How about reducing the number found in a bounty in the first place? • Some examples that might help measure improvements in software quality: • Number of issues per 1000 lines of code (LOC) • Number of critical flaws per development cycle • Time to resolve 21
  • 20. 5: Start conservative, with a private BBP, then 6: Go public when comfortable • Advantages of a private program • Ability to control all constraints • Choose testers, limit their number, improve processes in private • Finding and fixing flaws before production release • Quality and relevance of submissions • Advantages of a public program • Actionable results potentially more quickly • Positive public image 22
  • 21. 7: Refine and expand your program 23