Re: [SC-L] [External] Re: Sad state of affairs

2013-09-24 Thread Goertzel, Karen [USA]
I agree that ONE end goal of software security is to safeguard data - but it is 
not the only goal...and may not even be the primary goal, depending on the type 
of system the software is part of. In a safety-critical system, safeguard the 
data takes on a very different meaning from what one thinks of in a typical 
information system. Yes, I may in fact be trying to safeguard input sent from 
logical or physical sensors so that the data can't be tampered with in a way 
that can threaten the safe operation of the system. But safeguarding the data 
in that case is only a means to an end - the main goal is to prevent someone 
from intentionally exploiting a flaw in the software in order to instigate a 
physical failure that could threaten health, lives, the environment, etc. 

===
Karen Mercedes Goertzel, CISSP
Lead Associate
Booz Allen Hamilton
703.698.7454
goertzel_ka...@bah.com

If you're not failing every now and again,
it's a sign you're not doing anything very innovative.
- Woody Allen


From: sc-l-boun...@securecoding.org [sc-l-boun...@securecoding.org] on behalf 
of Jeffrey Walton [noloa...@gmail.com]
Sent: 21 September 2013 00:24
To: Rafal Los
Cc: Secure Coding List; Bobby G. Miller
Subject: [External]  Re: [SC-L] Sad state of affairs

On Fri, Sep 20, 2013 at 11:34 PM, Rafal Los ra...@ishackingyou.com wrote:

 Wait a minute, this relationship is a bit confused I think. Prasad said it 
 well- often the result of a maturing software security program is that the 
 simple and easy bugs disappear and the ones that are left are difficult to 
 find and complex in exploitation.

 This is known as eliminating the low hanging fruit. While this doesn't 
 eliminate ALL bugs, I ultimately believe that's a fools' errand anyway. 
 Making the software as free of bugs as possible necessarily makes the ones 
 left in the system difficult to find and exploit. Then you work in good 
 anomaly detection mechanisms and have a great case for *reasonably* secure 
 software.

Well, the end goal of software security is to safe guard the data. All
a bad guy wants to do is collect, egress and monetize the data (sans
National Security concerns). If the data is not safe, then the
definition of reasonable has problems.

Consider: I was part of two breaches. The one in the 1990's cost me
about $10,000 to fix (I found out after I was sued). The second was in
New York last summer that cost me $75 to fix (have a card re-issued
and shipped next-day service).

If you ask the companies involved if their processes were reasonable,
they would probably say YES. After all, the companies followed best
practices, minimized their losses and maximized their profits. If you
ask me, I would say NO.

Picking low hanging fruit is not enough. Ironically, we're not even
doing that very well (as BM noted). If you don't agree, take some time
to cruise ftp.gnu,org and look at the state of those projects (and its
not just free software). But I consider it a failure of security
professionals since its our job to educate developers and improve
their processes.*

 Of course, this is all predicated on you knowing and being able to define the 
 word reasonable.
:)

 Just my opinion.
And my jaded opinion :)

Jeff

* There's some hand waiving here since some (many?) argue its a waste
of time and money to teach developers; and the money is better spent
on building tools that make it hard/difficult to do things incorrectly
in the first place. I kind of think its a mixture of both.

 - Reply message -
 From: Jeffrey Walton noloa...@gmail.com
 To: Bobby G. Miller b.g.mil...@gmail.com
 Cc: Secure Coding List sc-l@securecoding.org
 Subject: [SC-L] Sad state of affairs
 Date: Fri, Sep 20, 2013 10:01 PM


 On Fri, Sep 20, 2013 at 7:47 PM, Bobby G. Miller b.g.mil...@gmail.com wrote:
 I was just listening to a podcast interviewing a security executive from a
 prominent vendor.  The response to vulnerabilities was to raise the
 cost/complexity of exploiting bugs rather than actually employing secure
 coding practices.  What saddened me most was that the approach was
 apparently effective enough.
 +1. Software security is in a sad state. What I've observed: let the
 developers deliver something, then have it pen tested, and finally fix
 what the pen testers find. I call it catch me if you can security.

 I think the underlying problem is the risk analysis equations. Its
 still cost effective to do little or nothing. Those risk analysis
 equations need to be unbalanced.

 And I don't believe this is the solution:
 http://searchsecurity.techtarget.com/opinion/Congress-should-encourage-bug-fixes-reward-secure-systems.
 Too many carrots and too few sticks means it becomes more profitable
 to continue business as usual.

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - 

Re: [SC-L] [External] Sad state of affairs

2013-09-24 Thread Goertzel, Karen [USA]
On the other hand, isn't it somewhat analagous to hiring 24/7 armed security 
guards and installing a state of the art physical security system in a museum, 
and passing and enforcing strict laws against grand larceny?

The secure coding alternative would be for museums to stop displaying 
priceless art works.

===
Karen Mercedes Goertzel, CISSP
Lead Associate
Booz Allen Hamilton
703.698.7454
goertzel_ka...@bah.com

If you're not failing every now and again,
it's a sign you're not doing anything very innovative.
- Woody Allen

From: sc-l-boun...@securecoding.org [sc-l-boun...@securecoding.org] on behalf 
of Bobby G. Miller [b.g.mil...@gmail.com]
Sent: 20 September 2013 19:47
To: sc-l@securecoding.org
Subject: [External] [SC-L] Sad state of affairs

I was just listening to a podcast interviewing a security executive from a 
prominent vendor.  The response to vulnerabilities was to raise the 
cost/complexity of exploiting bugs rather than actually employing secure coding 
practices.  What saddened me most was that the approach was apparently 
effective enough.

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] [External] Re: Sad state of affairs

2013-09-24 Thread Bobby G. Miller
So all it takes to call code secure is to apply sufficient quantities of
bandaids, bubblegum and barbed wire?  Job security yes, secure coding NO.

Just my opinion, but I think we need to hold to a much higher standard.






On Mon, Sep 23, 2013 at 6:08 AM, Goertzel, Karen [USA] 
goertzel_ka...@bah.com wrote:

 I agree that ONE end goal of software security is to safeguard data - but
 it is not the only goal...and may not even be the primary goal, depending
 on the type of system the software is part of. In a safety-critical system,
 safeguard the data takes on a very different meaning from what one thinks
 of in a typical information system. Yes, I may in fact be trying to
 safeguard input sent from logical or physical sensors so that the data
 can't be tampered with in a way that can threaten the safe operation of the
 system. But safeguarding the data in that case is only a means to an end -
 the main goal is to prevent someone from intentionally exploiting a flaw in
 the software in order to instigate a physical failure that could threaten
 health, lives, the environment, etc.

 ===
 Karen Mercedes Goertzel, CISSP
 Lead Associate
 Booz Allen Hamilton
 703.698.7454
 goertzel_ka...@bah.com

 If you're not failing every now and again,
 it's a sign you're not doing anything very innovative.
 - Woody Allen

 
 From: sc-l-boun...@securecoding.org [sc-l-boun...@securecoding.org] on
 behalf of Jeffrey Walton [noloa...@gmail.com]
 Sent: 21 September 2013 00:24
 To: Rafal Los
 Cc: Secure Coding List; Bobby G. Miller
 Subject: [External]  Re: [SC-L] Sad state of affairs

 On Fri, Sep 20, 2013 at 11:34 PM, Rafal Los ra...@ishackingyou.com
 wrote:
 
  Wait a minute, this relationship is a bit confused I think. Prasad said
 it well- often the result of a maturing software security program is that
 the simple and easy bugs disappear and the ones that are left are difficult
 to find and complex in exploitation.
 
  This is known as eliminating the low hanging fruit. While this doesn't
 eliminate ALL bugs, I ultimately believe that's a fools' errand anyway.
 Making the software as free of bugs as possible necessarily makes the ones
 left in the system difficult to find and exploit. Then you work in good
 anomaly detection mechanisms and have a great case for *reasonably* secure
 software.
 
 Well, the end goal of software security is to safe guard the data. All
 a bad guy wants to do is collect, egress and monetize the data (sans
 National Security concerns). If the data is not safe, then the
 definition of reasonable has problems.

 Consider: I was part of two breaches. The one in the 1990's cost me
 about $10,000 to fix (I found out after I was sued). The second was in
 New York last summer that cost me $75 to fix (have a card re-issued
 and shipped next-day service).

 If you ask the companies involved if their processes were reasonable,
 they would probably say YES. After all, the companies followed best
 practices, minimized their losses and maximized their profits. If you
 ask me, I would say NO.

 Picking low hanging fruit is not enough. Ironically, we're not even
 doing that very well (as BM noted). If you don't agree, take some time
 to cruise ftp.gnu,org and look at the state of those projects (and its
 not just free software). But I consider it a failure of security
 professionals since its our job to educate developers and improve
 their processes.*

  Of course, this is all predicated on you knowing and being able to
 define the word reasonable.
 :)

  Just my opinion.
 And my jaded opinion :)

 Jeff

 * There's some hand waiving here since some (many?) argue its a waste
 of time and money to teach developers; and the money is better spent
 on building tools that make it hard/difficult to do things incorrectly
 in the first place. I kind of think its a mixture of both.

  - Reply message -
  From: Jeffrey Walton noloa...@gmail.com
  To: Bobby G. Miller b.g.mil...@gmail.com
  Cc: Secure Coding List sc-l@securecoding.org
  Subject: [SC-L] Sad state of affairs
  Date: Fri, Sep 20, 2013 10:01 PM
 
 
  On Fri, Sep 20, 2013 at 7:47 PM, Bobby G. Miller b.g.mil...@gmail.com
 wrote:
  I was just listening to a podcast interviewing a security executive
 from a
  prominent vendor.  The response to vulnerabilities was to raise the
  cost/complexity of exploiting bugs rather than actually employing secure
  coding practices.  What saddened me most was that the approach was
  apparently effective enough.
  +1. Software security is in a sad state. What I've observed: let the
  developers deliver something, then have it pen tested, and finally fix
  what the pen testers find. I call it catch me if you can security.
 
  I think the underlying problem is the risk analysis equations. Its
  still cost effective to do little or nothing. Those risk analysis
  equations need to be unbalanced.
 
  And I don't believe this is the solution: