So all it takes to call code "secure" is to apply sufficient quantities of
bandaids, bubblegum and barbed wire?  Job security yes, secure coding NO.

Just my opinion, but I think we need to hold to a much higher standard.






On Mon, Sep 23, 2013 at 6:08 AM, Goertzel, Karen [USA] <
goertzel_ka...@bah.com> wrote:

> I agree that ONE end goal of software security is to safeguard data - but
> it is not the only goal...and may not even be the primary goal, depending
> on the type of system the software is part of. In a safety-critical system,
> "safeguard the data" takes on a very different meaning from what one thinks
> of in a typical information system. Yes, I may in fact be trying to
> safeguard "input" sent from logical or physical sensors so that the data
> can't be tampered with in a way that can threaten the safe operation of the
> system. But safeguarding the data in that case is only a means to an end -
> the main goal is to prevent someone from intentionally exploiting a flaw in
> the software in order to instigate a physical failure that could threaten
> health, lives, the environment, etc.
>
> ===
> Karen Mercedes Goertzel, CISSP
> Lead Associate
> Booz Allen Hamilton
> 703.698.7454
> goertzel_ka...@bah.com
>
> "If you're not failing every now and again,
> it's a sign you're not doing anything very innovative."
> - Woody Allen
>
> ________________________________________
> From: sc-l-boun...@securecoding.org [sc-l-boun...@securecoding.org] on
> behalf of Jeffrey Walton [noloa...@gmail.com]
> Sent: 21 September 2013 00:24
> To: Rafal Los
> Cc: Secure Coding List; Bobby G. Miller
> Subject: [External]  Re: [SC-L] Sad state of affairs
>
> On Fri, Sep 20, 2013 at 11:34 PM, Rafal Los <ra...@ishackingyou.com>
> wrote:
> >
> > Wait a minute, this relationship is a bit confused I think. Prasad said
> it well- often the result of a maturing software security program is that
> the simple and easy bugs disappear and the ones that are left are difficult
> to find and complex in exploitation.
> >
> > This is known as eliminating the "low hanging fruit". While this doesn't
> eliminate ALL bugs, I ultimately believe that's a fools' errand anyway.
> Making the software as free of bugs as possible necessarily makes the ones
> left in the system difficult to find and exploit. Then you work in good
> anomaly detection mechanisms and have a great case for *reasonably* secure
> software.
> >
> Well, the end goal of software security is to safe guard the data. All
> a bad guy wants to do is collect, egress and monetize the data (sans
> National Security concerns). If the data is not safe, then the
> definition of "reasonable" has problems.
>
> Consider: I was part of two breaches. The one in the 1990's cost me
> about $10,000 to fix (I found out after I was sued). The second was in
> New York last summer that cost me $75 to fix (have a card re-issued
> and shipped next-day service).
>
> If you ask the companies involved if their processes were reasonable,
> they would probably say YES. After all, the companies "followed best
> practices", minimized their losses and maximized their profits. If you
> ask me, I would say NO.
>
> Picking low hanging fruit is not enough. Ironically, we're not even
> doing that very well (as BM noted). If you don't agree, take some time
> to cruise ftp.gnu,org and look at the state of those projects (and its
> not just free software). But I consider it a failure of security
> professionals since its our job to educate developers and improve
> their processes.*
>
> > Of course, this is all predicated on you knowing and being able to
> define the word reasonable.
> :)
>
> > Just my opinion.
> And my jaded opinion :)
>
> Jeff
>
> * There's some hand waiving here since some (many?) argue its a waste
> of time and money to teach developers; and the money is better spent
> on building tools that make it hard/difficult to do things incorrectly
> in the first place. I kind of think its a mixture of both.
>
> > ----- Reply message -----
> > From: "Jeffrey Walton" <noloa...@gmail.com>
> > To: "Bobby G. Miller" <b.g.mil...@gmail.com>
> > Cc: "Secure Coding List" <sc-l@securecoding.org>
> > Subject: [SC-L] Sad state of affairs
> > Date: Fri, Sep 20, 2013 10:01 PM
> >
> >
> > On Fri, Sep 20, 2013 at 7:47 PM, Bobby G. Miller <b.g.mil...@gmail.com>
> wrote:
> >> I was just listening to a podcast interviewing a security executive
> from a
> >> prominent vendor.  The response to vulnerabilities was to raise the
> >> cost/complexity of exploiting bugs rather than actually employing secure
> >> coding practices.  What saddened me most was that the approach was
> >> apparently effective enough.
> > +1. Software security is in a sad state. What I've observed: let the
> > developers deliver something, then have it pen tested, and finally fix
> > what the pen testers find. I call it "catch me if you can" security.
> >
> > I think the underlying problem is the risk analysis equations. Its
> > still cost effective to do little or nothing. Those risk analysis
> > equations need to be unbalanced.
> >
> > And I don't believe this is the solution:
> >
> http://searchsecurity.techtarget.com/opinion/Congress-should-encourage-bug-fixes-reward-secure-systems
> .
> > Too many carrots and too few sticks means it becomes more profitable
> > to continue business as usual.
>
> _______________________________________________
> Secure Coding mailing list (SC-L) SC-L@securecoding.org
> List information, subscriptions, etc -
> http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
> as a free, non-commercial service to the software security community.
> Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
> _______________________________________________
>
_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Reply via email to