Logo
    Search

    2019-012: OWASP ASVSv4 discussion with Daniel Cuthbert and Jim Manico - Part 1

    enApril 01, 2019

    About this Episode

    Show Notes


    SpecterOps and Tim Tomes are giving training at WorkshopCon https://www.workshopcon.com

    Rob Cheyne Source Boston - https://sourceconference.com/events/boston19/

     

    Architecture is not an implementation, but a way of thinking about a problem that has potentially many different answers, and no one single "correct" answer.

     

    https://github.com/OWASP/ASVS

    “is to normalize the range in the coverage and level of rigor available in the market when it comes to performing Web application security verification using a commercially-workable open standard. “

     

    ASVS team:

    • Daniel Cuthbert @dcuthbert
    • Andrew van der Stock
    • Jim Manico @manicode
    • Mark Burnett
    • Josh C Grossman

     

    https://github.com/OWASP/ASVS/raw/master/4.0/OWASP%20Application%20Security%20Verification%20Standard%204.0-en.pdf

    https://github.com/OWASP/ASVS/raw/master/4.0/OWASP%20Application%20Security%20Verification%20Standard%204.0-en.docx

    Don’t post these links in show notes

    ASVS list (google sheet): https://drive.google.com/open?id=1xFLmvNoR2tohk08cQDLU46FWNgpx28wd

     

    ASVS PDF: https://drive.google.com/file/d/17-NDN7TWdC-vZLbsKkkBFhrYmUhF6907/view?usp=sharing

     

    https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf - old version

    http://traffic.libsyn.com/brakeingsecurity/2015-046_ASVS_with_Bill_Sempf.mp3  - Older BrakeSec Episode

     

    ASVS Page 14 - “If developers had invested in a single, secure identity provider model, such as SAML federated identity, the identity provider could be updated to incorporate new requirements such as NIST 800-63 compliance, while not changing the interfaces of the original application. If many applications shared the same security architecture and thus that same component, they all benefit from this upgrade at once. However, SAML will not always remain as the best or most suitable authentication solution - it might need to be swapped out for other solutions as requirements change. Changes like this are either complicated, so costly as to necessitate a complete re-write, or outright impossible without security architecture.”

     

    What are the biggest differences between V3 and V4?


    Why was a change needed?

     

    https://xkcd.com/936/ - famous XKCD password comic

     

    David Cybuck: Appendix C:  IoT

        Why was this added?

        These controls are in addition to all the other ASVS controls?

    How do they see section 1 architecture and section 14, configuration --- in the context of rapid deployment, infrastructure as code, containerization.

     

    You added IoT, but not ICS or SCADA?

        https://www.owasp.org/index.php/OWASP_ICS_/_SCADA_Security_Project

     

    BrakeSec IoT Top 10 discussion:

    http://traffic.libsyn.com/brakeingsecurity/2019-001.mp3

    http://traffic.libsyn.com/brakeingsecurity/2019-002-aaron_guzman_pt2.mp3

     

    Seems incomplete… (Section 1.13 “API”)

        Will this be added later?

        What is needed to fill that in? (manpower, SME’s, etc?)

    3 levels of protection… why have levels at all?

        Why shouldn’t everyone be at Level 3?

        I just don’t like the term ‘bare minimum’ (level 1)--brbr

    Threat modeling blog (leviathan): https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling

    Adam Shostack ThreatModeling Book: https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998

    https://www.owasp.org/images/archive/6/65/20170626175919!TM-Lessons-Star-Wars-May-2017.pdf

    https://www.youtube.com/watch?v=2C7mNr5WMjA

    Cost to get to L2? L3?

    https://manicode.com/ secure coding education

     

    https://www.blackhat.com/presentations/bh-usa-09/WILLIAMS/BHUSA09-Williams-EnterpriseJavaRootkits-PAPER.pdf

     

    Check out our Store on Teepub! https://brakesec.com/store

    Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com

    #Brakesec Store!:https://www.teepublic.com/user/bdspodcast

    #Spotifyhttps://brakesec.com/spotifyBDS

    #RSShttps://brakesec.com/BrakesecRSS

    #Youtube Channel:  http://www.youtube.com/c/BDSPodcast

    #iTunes Store Link: https://brakesec.com/BDSiTunes

    #Google Play Store: https://brakesec.com/BDS-GooglePlay

    Our main site:  https://brakesec.com/bdswebsite

    #iHeartRadio App:  https://brakesec.com/iHeartBrakesec

    #SoundCloudhttps://brakesec.com/SoundcloudBrakesec

    Comments, Questions, Feedback: bds.podcast@gmail.com

    Support Brakeing Down Security Podcast by using our #Paypalhttps://brakesec.com/PaypalBDS OR our #Patreon

    https://brakesec.com/BDSPatreon

    #Twitter@brakesec @boettcherpwned @bryanbrake @infosystir

    #Player.FM : https://brakesec.com/BDS-PlayerFM

    #Stitcher Network: https://brakesec.com/BrakeSecStitcher

    #TuneIn Radio App: https://brakesec.com/TuneInBrakesec

    Recent Episodes from Brakeing Down Security Podcast

    p2-accidentalCISO, building trust in new places

    p2-accidentalCISO, building trust in new places

     

    Full Youtube VOD: https://www.youtube.com/watch?v=uX7odQTBkyQ 

     

     

    Questions and topics:

    1. Let’s talk about Mindful Business Podcast

      1. What’s the topics you cover?

    2. Topic #1: discuss your experiences when you were a new leader.

      1.  What worked? What didn't? What would you have done differently?

      2. Do you emulate your manager's style? What have been your go-to management resources? 

      3. What is a good piece of advice that you’ve been given or that you impart to others that relates to leadership?

    3. Topic #2: building/Operating SaaS products (we can discuss securing them, what functions should be table stakes (data structures, logging, etc)

    4. Topic #3: What are bare minimums for building ‘secure’ Saas products in your particular field? And how do you balance security with a positive user experience (i. e. getting customers to buy into MFA/OAUTH, OTA updates

    5. Topic #4: Do many SaaS products get over-integrated? Is the need for integration override best practices in security? 

    Additional information / pertinent LInks (Would you like to know more?):

    1. Twitter/Mastodon:
      https://twitter.com/AccidentalCISO
      https://infosec.exchange/@accidentalciso

    2. The Mindful Business Security Show:
      https://www.mindfulsmbshow.com/
      https://twitter.com/mindfulsmbshow



    Show points of Contact:

    Amanda Berlin: @infosystir @hackershealth 

    Brian Boettcher: @boettcherpwned

    Bryan Brake: https://linkedin.com/in/brakeb 

    Brakesec Website: https://www.brakeingsecurity.com

    Youtube channel: https://youtube.com/@brakeseced

    Twitch Channel: https://twitch.tv/brakesec

    AccidentalCISO on BrakeSecEd, talking Leadership, SaaS development, and Appsec

    AccidentalCISO on BrakeSecEd, talking Leadership, SaaS development, and Appsec

    Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time based on new information, and do not represent views of past, present, or future employers.

     

    Recorded: 28 Jan 2024

    Youtube VOD: https://youtube.com/live/uX7odQTBkyQ



    Questions and topics:

    1. Let’s talk about Mindful Business Podcast

      1. What’s the topics you cover?

    2. Topic #1: discuss your experiences when you were a new leader.

      1.  What worked? What didn't? What would you have done differently?

      2. Do you emulate your manager's style? What have been your go-to management resources? 

      3. What is a good piece of advice that you’ve been given or that you impart to others that relates to leadership?

    3. Topic #2: building/Operating SaaS products (we can discuss securing them, what functions should be table stakes (data structures, logging, etc)

    4. Topic #3: What are bare minimums for building ‘secure’ Saas products in your particular field? And how do you balance security with a positive user experience (i. e. getting customers to buy into MFA/OAUTH, OTA updates

    5. Topic #4: Do many SaaS products get over-integrated? Is the need for integration override best practices in security? 

    Additional information / pertinent LInks (Would you like to know more?):

    1. Twitter/Mastodon:
      https://twitter.com/AccidentalCISO
      https://infosec.exchange/@accidentalciso

    2. The Mindful Business Security Show:
      https://www.mindfulsmbshow.com/
      https://twitter.com/mindfulsmbshow

    Show points of Contact:

    Amanda Berlin: @infosystir @hackershealth 

    Brian Boettcher: @boettcherpwned

    Bryan Brake: https://linkedin.com/in/brakeb 

    Brakesec Website: https://www.brakeingsecurity.com

    Youtube channel: https://youtube.com/@brakeseced

    Twitch Channel: https://twitch.tv/brakesec

    How to get more headcount, BLUFFs Vulnerability, and Ranty Clause debuts!

    How to get more headcount, BLUFFs Vulnerability, and Ranty Clause debuts!

    Show Topic Summary:

    Ms. Berlin proposes a question of how to gather more headcount with metrics, we discuss the BLUFFS bluetooth vulnerability, and “Ranty Claus” talks about CISA’s remarks of putting the onus on device product makers to remove choice for customers and implement secure defaults.

    #youtube VOD: https://www.youtube.com/watch?v=emcAzTx9z0c 

    Questions and topics:

    1. https://cyberscoop.com/cisa-goldstein-secure-by-design/

    2. https://hackaday.com/2023/12/02/update-on-the-bluffs-bluetooth-vulnerability/

    Additional information / pertinent LInks (Would you like to know more?):

    1. https://cyberscoop.com/jen-easterly-secure-by-design/

    2. https://www.cisa.gov/resources-tools/resources/stop-passing-buck-cybersecurity 

    3. Examples of companies forcing changes https://www.bleepingcomputer.com/news/microsoft/microsoft-will-roll-out-mfa-enforcing-policies-for-admin-portal-access/  

    4. https://github.com/aya-rs/aya - eBPF implementation in Rust

    5. https://ossfortress.io/  

    6. https://www.darkreading.com/endpoint-security/critical-logofail-bugs-secure-boot-bypass-millions-pcs 



    Show points of Contact:

    Amanda Berlin: @infosystir @hackershealth 

    Brian Boettcher: @boettcherpwned

    Bryan Brake: @bryanbrake on Mastodon.social, https://linkedin.com/in/brakeb 

    Brakesec Website: https://www.brakeingsecurity.com

    Twitter: @brakesec 

    Youtube channel: https://youtube.com/c/BDSPodcast

    Twitch Channel: https://twitch.tv/brakesec

    25Oct - okta breached (again), Energy company hit by supply chain attack, and you can help hire the best people

    Nicole Sundin - CPO at Axio - SEC compliance, usable security, setting up risk mgmt programs

    Nicole Sundin - CPO at Axio - SEC compliance, usable security, setting up risk mgmt programs

    Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers.

     

    Guest Bio: Nicole is the Chief Product Officer at Axio. Nicole has spent her career building awareness around the benefits of usable security and human-centered security as a way to increase company revenue and create a seamless user experience.

     Youtube VOD Link: https://youtube.com/live/tFaAB9an47g

     Questions and topics: Usable security: is it an oxymoron?

    What determines if the security is ‘usable’ or no? We sacrifice security for a better UX, what can be done to alleviate that? Or is it some sort of sliding scale in “poor UX, amazing security or awesome UX, poor security” Examples of poor UX for ‘people’: MFA, and password managers.

    SEC updates and ‘material events’ and how that would affect security, IR, and other company reporting functions. 

     

    Also, additional documentation (Regulation S-K Item 106) https://www.linkedin.com/posts/nicole-sundin-5225a1149_sec-adopts-rules-on-cybersecurity-risk-management-activity-7090065804083290112-ISD8

    Are companies ready to talk about their cybersecurity? Can the SEC say “you’re not doing enough?”

     What is ‘enough’?

    Are we heading toward yet another audit needed for public companies, similar to SOX?

    When does an 8-K get publicly disclosed?

    Materiality is based on a “reasonable investor”?

    So, you don’t need to announce that until you’re certain, and it’s based on what you can collect? Cyber Risk Management and some good examples of how to set up a proper cyber risk organization

    Additional Links:

    https://csrc.nist.gov/CSRC/media/Projects/usable-cybersecurity/images-media/Is%20Usable%20Security%20an%20Oxymoron.pdf

    http://web.mit.edu/Saltzer/www/publications/protection/Basic.html

    https://www.sec.gov/news/press-release/2023-139

    https://www.sec.gov/news/statement/munter-statement-assessing-materiality-030922

    https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/sec-final-cybersecurity-disclosure-rules.html

    https://www.nasa.gov/centers/ames/research/technology-onepagers/hc-computing.html

     https://securityscorecard.com/blog/what-is-cyber-security-performance-management/

     

    Brakeing Down Security Podcast
    enSeptember 23, 2023

    John Aron, letters of marque, what does a "junior" job look like with AI?

    John Aron, letters of marque, what does a "junior" job look like with AI?

    Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers.

     

    Guest Bio: John is the CEO of Aronetics. An avid climber and runner, John has spoken at many conferences about topics like ZeroTrust, BIOS/UEFI security, communication security, and malware. Aronetics is a technology-enabled service provider. 

     

    Youtube VOD: https://youtube.com/live/5dIVTwVZLAU

    Linkedin VOD: https://www.linkedin.com/video/live/urn:li:ugcPost:7101738254823030784



    Show Topic Summary:

     

    John joins us to discuss “letters of Marque” in an effort for hackers to ‘hack back’... the overreliance on automation, and communication siloes. We also talk about what a ‘junior position’ in infosec looks like with AI doing all the “Level 1 SOC Analyst” type roles normally given to someone fresh to the security industry.

     

    Questions and topics:

    1. Is infosec over reliant on automation? Automation comes with its own challenges.

      1. Documentation woes

      1. Automation is usually found in userland

     

    Aronetics’ Thor provides defense and counter-offense tamper-proof technology digitally tied to 

     

    Letter of Marque - good idea, or geopolitical disaster waiting to happen?


    Siloes and communication -best ways to overcome those in an org and outside?

    How do we overcome siloing?

     

    Overcoming security challenges?Identity management - 2FA is everywhere, there’s already ways around 2FA, so what now? 3FA? Biometrics? Make everyone carry around physical tokens that we can lose?

     

    Blog post: https://www.aronetics.com/post-quantum-cryptography/
    What do we need to protect against? Nation states with quantum computers? Rubber hose cryptography?

     

    Crime thrives in areas of low visibility. https://www.aronetics.com/unknown/ 

     

    https://www.aronetics.com/inside-the-breach/ (threat detection - the crime thrives in low vis areas)

     

    Show points of Contact:

    Brakesec Website: https://www.brakeingsecurity.com

    Youtube channel: https://youtube.com/c/BDSPodcast

    Twitch Channel: https://twitch.tv/brakesec

    Amanda Berlin: @infosystir@infosec.exchange (Mastodon) @hackershealth 

    Brian Boettcher: @boettcherpwned

    Bryan Brake: @bryanbrake on Mastodon.social

    Brakeing Down Security Podcast
    enSeptember 03, 2023

    Megan Roddie - co-author of "Practical Threat Detecion Engineering"

    Megan Roddie - co-author of "Practical Threat Detecion Engineering"

    Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers.

    Buy here: https://subscription.packtpub.com/book/security/9781801076715

    Amazon Link: https://packt.link/megan

    Youtube VOD: https://www.youtube.com/watch?v=p1_jQa9OQ2w

     

    Show Topic Summary:

    Megan Roddie is currently working as a Senior Security Engineer at IBM. Along with her work at IBM, she works with the SANS Institute as a co-author of FOR509, presents regularly at security conferences, and serves as CFO of Mental Health Hackers. Megan has two Master's degrees, one in Digital Forensics and the other in Information Security Engineering, along with many industry certifications in a wide range of specialties. When Megan is not fighting cybercrime, she is an active competitor in Muay Thai/Kickboxing. She is a co-author of “Practical Threat Detection Engineering” from Packt publishing, on sale now in print and e-book. Buy here: https://subscription.packtpub.com/book/security/9781801076715

     

    https://packt.link/megan ← Amazon redirect link that publisher uses if you want something easier on the notes

     

    Questions and topics:

    1. Of the 3 models, which do you find you use more and why? (PoP, ATT&CK, kill chain)

    2. What kind of orgs have ‘detection engineering’ teams? What roles are involved here, and can other teams (like IR) be involved or share a reverse role there?

    3. Lab setup requires an agent… any agent for ingestion or something specific? 

    4. How does Fleet or data ingestion work for Iot/Embedded device testing? Anything you suggest?

    5. How important is it to normalize your log output for ingestion? (app, web, server all tell the story)

    Additional information / pertinent LInks (Would you like to know more?):

    1. Unified Kill Chain: https://www.unifiedkillchain.com/

    2. ATT&CK: https://attack.mitre.org/ 

    3. D3FEND matrix BrakeSec show from 2021: https://brakeingsecurity.com/2021-023-d3fend-framework-dll-injection-types-more-solarwinds-infections 

    4. Pyramid of Pain: https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html

    5. https://www.securitymagazine.com/articles/98486-435-million-the-average-cost-of-a-data-breach 

    6. https://medium.com/@gary.j.katz (per Megan, ‘it’s basically Chapter 11 of the book’)




    Show points of Contact:

    Amanda Berlin: @infosystir @hackershealth 

    Brian Boettcher: @boettcherpwned

    Bryan Brake: @bryanbrake on Mastodon.social, Twitter, bluesky

    Brakesec Website: https://www.brakeingsecurity.com

    Twitter: @brakesec 

    Youtube channel: https://youtube.com/c/BDSPodcast

    Twitch Channel: https://twitch.tv/brakesec

    meeting new people, walking on your keyboard causes issues, even google gets phone numbers wrong.