Keynote : CODE BLUE in the ICU! by Jeff Moss

80
Code Blue in the ICU! Thinking about network safety in a public health light © Jeff Moss – [email protected]

description

Thinking about network safety in a public health light. ネットワークの安全性を公衆衛生にたとえて解説。

Transcript of Keynote : CODE BLUE in the ICU! by Jeff Moss

Page 1: Keynote : CODE BLUE in the ICU! by Jeff Moss

Code Blue in the ICU! Thinking  about  network  safety  in  a  public  health  light  

©  Jeff  Moss  –  [email protected]  

Page 2: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 3: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 4: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 5: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 6: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 7: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 8: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 9: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 10: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 11: Keynote : CODE BLUE in the ICU! by Jeff Moss

h@p://chrisharrison.net/  

Page 12: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 13: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 14: Keynote : CODE BLUE in the ICU! by Jeff Moss

1. NaEon  States  want  SECRETS  

Page 15: Keynote : CODE BLUE in the ICU! by Jeff Moss

1. NaEon  States  want  SECRETS  2. Organized  Criminals  want  MONEY  

Page 16: Keynote : CODE BLUE in the ICU! by Jeff Moss

1. NaEon  States  want  SECRETS  2. Organized  Criminals  want  MONEY  3. Protesters  want  ATTENTION  

Page 17: Keynote : CODE BLUE in the ICU! by Jeff Moss

1. NaEon  States  want  SECRETS  2. Organized  Criminals  want  MONEY  3. Protesters  want  ATTENTION  4. Hackers  &  researchers  want  KNOWLEDGE  

Page 18: Keynote : CODE BLUE in the ICU! by Jeff Moss

1. NaEon  States  want  SECRETS  2. Organized  Criminals  want  MONEY  3. Protesters  want  ATTENTION  4. Hackers  &  researchers  want  KNOWLEDGE  

That’s  you  guys!  

Page 19: Keynote : CODE BLUE in the ICU! by Jeff Moss

Hackers  &  Researchers  point  the  way!  

-­‐ Discover  new  classes  of  vulnerabiliEes  -­‐ Expose  poor  product  security  -­‐ Spur  public  debate  

Page 20: Keynote : CODE BLUE in the ICU! by Jeff Moss

Hackers  &  Researchers  point  the  way!  

-­‐ Discover  new  classes  of  vulnerabiliEes  -­‐ Expose  poor  product  security  -­‐ Spur  public  debate  

Criminals  and  Governments  don’t  do  this  It’s  not  in  their  interests  

Page 21: Keynote : CODE BLUE in the ICU! by Jeff Moss

All  these  groups  need  the  net  to  work  

Page 22: Keynote : CODE BLUE in the ICU! by Jeff Moss

Q:  What  if  there  is  a  5th  group  that  doesn’t?  

Page 23: Keynote : CODE BLUE in the ICU! by Jeff Moss

Denial of service is increasing

0  

100  

200  

300  

400  

500  

600  

700  

2010   2011   Mar-­‐12   Oct-­‐12   Apr-­‐13   Feb-­‐14   Sept-­‐14  ?  

DDoS  in  Gigabits  per  second  

Gps  flow  

?  

NTP  RAMP  CloudFlare  

DNS  RAMP  SpamHaus  

Page 24: Keynote : CODE BLUE in the ICU! by Jeff Moss

When  invesEng:  

Specialize  for  larger  risk  /  returns  

Page 25: Keynote : CODE BLUE in the ICU! by Jeff Moss

When  invesEng:  

Specialize  for  larger  risk  /  returns  

Diversify  to  reduce  risk  /  returns  

Page 26: Keynote : CODE BLUE in the ICU! by Jeff Moss

We  now  have  clouds  of  complexity  

Page 27: Keynote : CODE BLUE in the ICU! by Jeff Moss

We  have  virtual  clouds  of  complexity  

Page 28: Keynote : CODE BLUE in the ICU! by Jeff Moss

The  failure  modes  of  Complex  systems  are  impossible  to  predict  

Page 29: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 30: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 31: Keynote : CODE BLUE in the ICU! by Jeff Moss

I  like  the  Code  Blue  press  release  

“Code  Blue  is  a  hospital  emergency  code  that  indicates  a  paEent  in  need  of  immediate  medical  a@enEon,  or  that  calls  for  relevant  teams  to  respond  immediately.  We  named  the  conference  ajer  the  code  because  we  hope  to  save  the  world  by  combining  people’s  knowledge”  

h@p://japandailypress.com/white-­‐hat-­‐hackers-­‐to-­‐gather-­‐at-­‐code-­‐blue-­‐cybersecurity-­‐conference-­‐in-­‐tokyo-­‐1043926/  

Page 32: Keynote : CODE BLUE in the ICU! by Jeff Moss

Public  health  analogy  

• No  one  thinks  they  are  going  to  cure  cancer  

• Diseases  are  “managed”,  very  few  are  ever  eliminated  

•  It  is  possible  to  be  re-­‐infected  

Page 33: Keynote : CODE BLUE in the ICU! by Jeff Moss

Public  health  analogy  

• No  one  thinks  they  are  going  to  cure  cancer  • No  administrator  thinks  they  can  ever  be  perfectly  secure  • Diseases  are  “managed”,  very  few  are  ever  eliminated  

• Very  few  classes  of  vulnerabiliEes  are  ever  eliminated  •  It  is  possible  to  be  re-­‐infected  • A  new  variant  of  an  old  vulnerability  can  re-­‐infect  your  systems  

Page 34: Keynote : CODE BLUE in the ICU! by Jeff Moss

This  is  a  healthy  way  of  thinking  

Page 35: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 36: Keynote : CODE BLUE in the ICU! by Jeff Moss

Perimeter  security  

Involves:  Security  department  IT  department  ApplicaEon  teams  

Page 37: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 38: Keynote : CODE BLUE in the ICU! by Jeff Moss

German  arEst  Babis  Cloud  has  made  'hedonIsM(y)  trojaner',  an  installaEon  of  the  ancient  greek  trojan  horse  from  computer  keyboard  bu@ons.  

Page 39: Keynote : CODE BLUE in the ICU! by Jeff Moss

They  are  already  inside  your  perimeter  

Involves:  Security  department    Legal  department  IT  department      CommunicaEons  ApplicaEon  teams    Risk  Management  

           Public  RelaEons              Finance              R&D  

Page 40: Keynote : CODE BLUE in the ICU! by Jeff Moss

The  year  is  2014  

• You  sEll  can’t  send  secure  email  easily  • You  can’t  have  a  secure  mobile  phone  call  • Web  browsing  securely  is  essenEally  impossible  • Name  resoluEon  is  insecure,  but  geqng  be@er  

Why?  What  has  failed  us?  

Page 41: Keynote : CODE BLUE in the ICU! by Jeff Moss

We  are  running  out  of  opEons  

1990s  

• Consumer  SelecEon  

Page 42: Keynote : CODE BLUE in the ICU! by Jeff Moss

We  are  running  out  of  opEons  

1990s  

• Consumer  SelecEon  

Consumers  can’t  make  informed  Security  product  decisions  

Page 43: Keynote : CODE BLUE in the ICU! by Jeff Moss

We  are  running  out  of  opEons  

1990s  

• Consumer  SelecEon  

2000s  

•  Insurance  Pressure  

Consumers  can’t  make  informed  Security  product  decisions  

Page 44: Keynote : CODE BLUE in the ICU! by Jeff Moss

We  are  running  out  of  opEons  

1990s  

• Consumer  SelecEon  

2000s  

•  Insurance  Pressure  

Consumers  can’t  make  informed  Security  product  decisions  

Lack  of  data  prevents  the  Crea>on  of  actuarial  tables  

Page 45: Keynote : CODE BLUE in the ICU! by Jeff Moss

We  are  running  out  of  opEons  

1990s  

• Consumer  SelecEon  

2000s  

•  Insurance  Pressure  

2010s  

• RegulaEons  

Consumers  can’t  make  informed  Security  product  decisions  

Lack  of  data  prevents  the  Crea>on  of  actuarial  tables  

Page 46: Keynote : CODE BLUE in the ICU! by Jeff Moss

We  are  running  out  of  opEons  

1990s  

• Consumer  SelecEon  

2000s  

•  Insurance  Pressure  

2010s  

• RegulaEons  

Consumers  can’t  make  informed  security  product  decisions  

Lack  of  data  prevents  the  crea>on  of  actuarial  tables  

Governments  are  reluctant  to  regulate  the  fast  moving  internet  

Page 47: Keynote : CODE BLUE in the ICU! by Jeff Moss

That  leaves  us  

We  must  provide  leadership  and  direcEon  where  and  when  we  can  

We  need  to  help  companies  do  the  right  thing  through  educaEon  and  configuraEon  

Page 48: Keynote : CODE BLUE in the ICU! by Jeff Moss

“First, Do No Harm” - Auguste François Chomel, 1847

Primum  non  nocere  “SomeEmes  it  may  be  be@er  to  not  do  something,  or  even  be@er  to  do  nothing,  than  to  risk  causing  more  harm  than  good.”  

Page 49: Keynote : CODE BLUE in the ICU! by Jeff Moss

“First, Do No Harm” - Auguste François Chomel, 1847

To  me  this  can  be  applied  to  informaEon  security  when  thought  of  as  a  public  safety  issue:  

• Do  no  harm  to  the  trust  of  users  –  be  open  about  your  policies  • Be  honest  about  the  risks  of  using  technology  • Do  not  let  wishful  thinking  influence  your  decisions  

Page 50: Keynote : CODE BLUE in the ICU! by Jeff Moss

Community Immunity (Also  known  as  Herd  Immunity  Theory)  

“A  form  of  immunity  that  occurs  when  the  vaccinaEon  of  a  significant  porEon  of  a  populaEon  provides  a  measure  of  protecEon  for  individuals  who  have  not  developed  immunity.”  

Page 51: Keynote : CODE BLUE in the ICU! by Jeff Moss

Three Modes of Immunity

Page 52: Keynote : CODE BLUE in the ICU! by Jeff Moss

Three Modes of Immunity

Page 53: Keynote : CODE BLUE in the ICU! by Jeff Moss

Three Modes of Immunity

Page 54: Keynote : CODE BLUE in the ICU! by Jeff Moss

Community Immunity only applies to diseases that are contagious

Disease    Transmission  Immunity  threshold  

Mumps    Airborne  droplet    75  -­‐  86%  

Pertussis    Airborne  droplet    92  -­‐  94%  Rubella    Airborne  droplet    80  -­‐  85%  Smallpox    Social  contact    83  -­‐  85%  

Page 55: Keynote : CODE BLUE in the ICU! by Jeff Moss

1.  No  one  is  immunized  –  Contagious  disease  spreads  through  the  populaEon  

2.  Some  of  the  populaEon  gets  immunized  –  Contagious  disease  spreads  through  some  of  the  populaEon  

3.  Most  of  the  populaEon  is  immunized  –  Spread  of  contagious  disease  is  contained  

Three Modes of Immunity

Page 56: Keynote : CODE BLUE in the ICU! by Jeff Moss

1.  No  one  is  immunized  –  Contagious  disease  spreads  through  the  populaEon  Networks  and  systems  are  not  maintained  –  Malware  spreads  through  networks  without  noEce  and  li@le  to  stop  them  

2.  Some  of  the  populaEon  gets  immunized  –  Contagious  disease  spreads  through  some  of  the  populaEon  

3.  Most  of  the  populaEon  is  immunized  –  Spread  of  contagious  disease  is  contained  

Three Modes of Immunity

Page 57: Keynote : CODE BLUE in the ICU! by Jeff Moss

1.  No  one  is  immunized  –  Contagious  disease  spreads  through  the  populaEon  Networks  and  systems  are  not  maintained  –  Malware  spreads  through  networks  without  noEce  and  li@le  to  stop  them  

2.  Some  of  the  populaEon  gets  immunized  –  Contagious  disease  spreads  through  some  of  the  populaEon  Some  networks  and  systems  are  not  maintained  –  Malware  is  someEmes  noEced  and  removed,  and  spreads  through  some  of  the  populaEon  

3.  Most  of  the  populaEon  is  immunized  –  Spread  of  contagious  disease  is  contained  

Three Modes of Immunity

Page 58: Keynote : CODE BLUE in the ICU! by Jeff Moss

1.  No  one  is  immunized  –  Contagious  disease  spreads  through  the  populaEon  Networks  and  systems  are  not  maintained  –  Malware  spreads  through  networks  without  noEce  and  li@le  to  stop  them  

2.  Some  of  the  populaEon  gets  immunized  –  Contagious  disease  spreads  through  some  of  the  populaEon  Some  networks  and  systems  are  not  maintained  –  Malware  is  someEmes  noEced  and  removed,  and  spreads  through  some  of  the  populaEon  

3.  Most  of  the  populaEon  is  immunized  –  Spread  of  contagious  disease  is  contained  Most  all  networks  and  systems  are  maintained  –  Malware  is  noEced  most  of  the  Eme  and  removed,  acEons  are  taken  to  protect  other  systems  besides  your  own.  

Three Modes of Immunity

Page 59: Keynote : CODE BLUE in the ICU! by Jeff Moss

1.  No  one  is  immunized  –  Contagious  disease  spreads  through  the  populaEon  Networks  and  systems  are  not  maintained  –  Malware  spreads  through  networks  without  noEce  and  li@le  to  stop  them  

2.  Some  of  the  populaEon  gets  immunized  –  Contagious  disease  spreads  through  some  of  the  populaEon  Some  networks  and  systems  are  not  maintained  –  Malware  is  someEmes  noEced  and  removed,  and  spreads  through  some  of  the  populaEon  

3.  Most  of  the  populaEon  is  immunized  –  Spread  of  contagious  disease  is  contained  Most  all  networks  and  systems  are  maintained  –  Malware  is  noEced  most  of  the  Eme  and  removed,  acEons  are  taken  to  protect  other  systems  besides  your  own.  

Three Modes of Immunity

Page 60: Keynote : CODE BLUE in the ICU! by Jeff Moss

Firewall  as  VaccinaEon?  

Page 61: Keynote : CODE BLUE in the ICU! by Jeff Moss

Vaccinate  yourself  and  others  

Can  protecEng  your  network  and  systems  with  a  firewall  or  router  act  as  a  “virtual  vaccine”?  

Can  your  network  peers  get  a  conferred  benefit?  

Page 62: Keynote : CODE BLUE in the ICU! by Jeff Moss

Don’t  do  anything  addiEonal  on  your  network  Don’t  go  out  of  your  way  to  monitor  your  systems  Don’t  stay  up  to  date  on  patches  or  applicaEon  updates  

Do  Nothing  or  “Not  Immunized”  

Page 63: Keynote : CODE BLUE in the ICU! by Jeff Moss

Do  Nothing  or  “Not  Immunized”  

PRO:  • Least  expensive  opEon,  no  training  or  changes  necessary  • Requires  no  network  or  applicaEon  modificaEons  

CON:  • You  are  part  of  the  problem  and  possibly  causing  harm  • There  might  be  legal  consequences  

Page 64: Keynote : CODE BLUE in the ICU! by Jeff Moss

Protect  your  systems  and  applicaEons,  but  not  those  of  others  

Protect  only  yourself  or  “ParEally  Immunized”  

Page 65: Keynote : CODE BLUE in the ICU! by Jeff Moss

Protect  your  systems  and  applicaEons,  but  not  those  of  others  

Examples:  •  Secure  your  systems  by  patching,  updaEng,  selecEng  good  sojware  •  Filter  spoofed  inbound  traffic  to  your  network,  but  not  outbound  

•  Enable  DNSSEC  validaEon  on  your  DNS,  but  do  not  sign  your  zones  •  Limit  spam  by  checking  for  SPF  records  and  using  DNS  blackholes,  but  not  publishing  your  own  SPF  records  

Protect  only  yourself  or  “ParEally  Immunized”  

Page 66: Keynote : CODE BLUE in the ICU! by Jeff Moss

Protect only yourself or “Partially Immunized”

PRO:  •  Lower  cost  that  being  fully  immunized  •  You  are  be@er  protecEng  your  systems  against  misuse  by  others  

CON:  •  You  only  take  acEons  that  protect  your  systems  –  not  those  of  others  • Higher  management  and  configuraEon  overhead  

Page 67: Keynote : CODE BLUE in the ICU! by Jeff Moss

Same  as  “ParEally  Immunized”  but  you  take  addiEonal  acEons    to  protect  those  around  you.  

Protect yourself and others or “Fully Immunized”

Page 68: Keynote : CODE BLUE in the ICU! by Jeff Moss

Same  as  “ParEally  Immunized”  but  you  take  addiEonal  acEons  to  protect  those  around  you.  

Examples:  • Prevent  source  address  spoofing  from  leaving  your  network  • DNSSEC  sign  your  zone  files  so  others  can  rely  on  the  data  • Disable  recursion  on  your  name  servers  to  limit  AMP  a@acks  • Publish  an  SPF  record  to  reduce  spam  by  telling  other  networks  about  your  mail  server  

Protect yourself and others or “Fully Immunized”

Page 69: Keynote : CODE BLUE in the ICU! by Jeff Moss

Protect yourself and others or “Fully Immunized”

PRO:  •  You  are  “conferring  an  immunity”  to  some  degree  to  others  •   Most  beneficial  to  all  users  of  the  internet  

•   Best  security  stance  for  yourself  and  those  around  you  

CON:  •   Most  expensive  to  maintain  due  to  configuraEon  maintenance  

•   You  need  be@er  trained  staff  to  stay  current  on  best  pracEces  

Page 70: Keynote : CODE BLUE in the ICU! by Jeff Moss

DNSSEC  is  available  to  the  majority  of  internet  users    

https://www.dnssec-deployment.org/

Page 71: Keynote : CODE BLUE in the ICU! by Jeff Moss

What  if  you  don’t  own  or  operate  a  network?  

Page 72: Keynote : CODE BLUE in the ICU! by Jeff Moss

Donate  Resources  

Page 73: Keynote : CODE BLUE in the ICU! by Jeff Moss

Donate resources

Page 74: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 75: Keynote : CODE BLUE in the ICU! by Jeff Moss

Donate resources

h?p://folding.stanford.edu/  

Page 76: Keynote : CODE BLUE in the ICU! by Jeff Moss

Different communities

Companies  Governments  Individuals  

Page 77: Keynote : CODE BLUE in the ICU! by Jeff Moss
Page 78: Keynote : CODE BLUE in the ICU! by Jeff Moss

Think  of  the  Future  

Next  GeneraEon  technologies  are  starEng  to  be  deployed  

Can  we  use  them  to  help  protect  ourselves  and  others?  

DNSSEC  =  You  can  trust  the  answers  from  DNS  DANE  =  Risk  of  rogue  SSL  CAs  virtually  eliminated  IPv6  =  IPSEC  support,  less  NAT,  be@er  a@ribuEon,  future  growth  

Page 79: Keynote : CODE BLUE in the ICU! by Jeff Moss

Has  thinking  about  network  heath  in  a  public  safety  light  helped?  

Page 80: Keynote : CODE BLUE in the ICU! by Jeff Moss