22
Immune IT Moving from Security to Immunity... -Ajit Hatti ClubHack 2008 Presentation

Immune IT: Moving from Security to Immunity

Embed Size (px)

Citation preview

Page 1: Immune IT: Moving from Security to Immunity

Immune ITMoving from Security to Immunity...

-Ajit Hatti

ClubHack 2008 Presentation

Page 2: Immune IT: Moving from Security to Immunity

Contents - I

Security : What is it?

Security : Why we need it?

Security : How we see it?

Security : What does it cost?

Security : Do we own it?

Security : How much is adequate?

Page 3: Immune IT: Moving from Security to Immunity

Contents II

Immunity : What is it?

Immunity : How much does it cost?

Immunity : Who is responsible?

Immunity : How to get it?

Page 4: Immune IT: Moving from Security to Immunity

Contents III

Requirement Gathering & Analysis

Designing a Solution

Coding & Reviews

Testing

Documentation/User Guide

Deployment

Maintenance

Page 5: Immune IT: Moving from Security to Immunity

Security : What is it?

Page 6: Immune IT: Moving from Security to Immunity

Security: Why do we need it?

Page 7: Immune IT: Moving from Security to Immunity

Security: How we see it?

Page 8: Immune IT: Moving from Security to Immunity

Security : What does it cost?

An average annual Security Overheads incurred at prime organizations

Expense incurred on security system - 20%

Computational resources engaged in security operations - 15%

Each person spending time on securing personal assets - 21%

Latency introduced due to security operations per connection - 2 sec / MB.

Data transfer only for security updates - 17 %

And these figures are bound to increase. (http://www.itbusinessedge.com/blogs/top/?p=207)

Page 9: Immune IT: Moving from Security to Immunity

Security : Do we own it?

Page 10: Immune IT: Moving from Security to Immunity

Security: How much is adequate?

Page 11: Immune IT: Moving from Security to Immunity

Immunity: What is it?

Page 12: Immune IT: Moving from Security to Immunity

Immunity: How much does it costs?

Page 13: Immune IT: Moving from Security to Immunity

Immunity: Who is Responsible?

Page 14: Immune IT: Moving from Security to Immunity

Immunity: How to achieve it?

Embedding Security in each and every steps of our engineering process.

Practice Security; integrate it in all operations.

Greater awareness.

Page 15: Immune IT: Moving from Security to Immunity

Requirement Gathering & AnalysisImplicit Security ConsiderationsExplicit Security Considerations

Page 16: Immune IT: Moving from Security to Immunity

Designing a Solution Confidentiality

Enforcing access privileges. Encryption & Leakage prevention.

Integrity Defining the limits Backup and Recovery

Availability Business Continuity Plan. Troubleshooting & Failure recovery support

Page 17: Immune IT: Moving from Security to Immunity

Coding and Reviews Code Should be :

Less Clear Secure

Review for : Validations Possible memory corruptions Initializations

Page 18: Immune IT: Moving from Security to Immunity

Testing

Sanity Checks Challenging Access control Fuzzing Vulnerability and Pen-Testing Dog fooding

Page 19: Immune IT: Moving from Security to Immunity

Documentation/User Guides

Enforcing access control & encryption. Changing the default configurations, settings

and passwords. Methods of backup and recovery etc. Advisory on best practices, do’s and don’ts. Known issues and workarounds.

Page 20: Immune IT: Moving from Security to Immunity

Deployment & Maintanance

Deploy the solutions with feasibly best & secure configuration.

Follow best practices. Apply security updates, patches provided by

vendors. Conduct security audits for the system

Page 21: Immune IT: Moving from Security to Immunity

Security is defined by CIA. Addressing CIA at each phases of engineering

results in Immunity. Security must be integrated in our thoughts,

process and operations. Immunity comes through ownership of security.

Conclusion

Page 22: Immune IT: Moving from Security to Immunity