Engineers are People Too.ppt
《Engineers are People Too.ppt》由会员分享,可在线阅读,更多相关《Engineers are People Too.ppt(48页珍藏版)》请在麦多课文档分享上搜索。
1、Engineers are People Too,Adam Shostack Microsoft,Outline,Engineering in Large Projects Threat Modeling Usability Tools,A Software Engineers Day,Solve customer problems Write code Build cool stuff Change the world,Costs, Risks and Mitigations Feature Requirements Performance Security Privacy Accessib
2、ility Design Geographical & Political concerns Partner & Programmability Compatibility Internationalizability (dates) Configurability Manageability Logging Internationalizability (text handling) Telemetry Programmability And oh yeah, write some code,A software engineers day (take 2),Outline, Enginee
3、ring in Large Projects Threat Modeling Usability Tools,Security Development Lifecycle Working to protect our users,Education/Training,Accountability,Administer and track security training,Incident Response (MSRC),Establish release criteria and sign-off as part of FSR,Ongoing Process Improvements,Pro
4、cess,Guide product teams to meet SDL requirements,Secure design, including the following topics: Attack surface reduction Defense in depth Principle of least privilege Secure defaults Threat modeling, including the following topics: Overview of threat modeling Design to a threat model Coding to a th
5、reat model Testing to a threat model Secure coding, including the following topics: Buffer overruns Integer arithmetic errors Cross-site scripting SQL injection Weak cryptography Managed code issues (Microsoft .NET/Java) Security testing, including the following topics: Security testing versus funct
6、ional testing Risk assessment Test methodologies Test automation Privacy, including the following topics: Types of privacy data Privacy design best practices Risk analysis Privacy development best practices Privacy testing best practices,Orientation: Basic Concepts for Security Development Lifecycle
7、,Outline,Engineering in Large Projects Threat Modeling Usability Tools,Threat Modeling,Analyzing the design of a system Engineers know their code and how it changes Really, really hard for normal engineers to do Requires a skillset acquired by osmosis (“The security mindset”) Overcome creator blindn
8、ess Extreme consequences for errors or omissions Training (version 1): “Think like an attacker” And the consequences,SDL Threat Modeling Tool,SDL TM Tool makes threat modeling flow better for a broader set of users Main Approach: Simple, prescriptive, self-checks Tool Draw threat model diagrams with
9、 live feedback Guided analysis of threats and mitigations using STRIDE Integrates with bug tracking systems,STRIDE Framework* for finding threats,* Framework, not classification scheme. STRIDE is a good framework, bad taxonomy,Find threats: Use STRIDE per element,Flow & Engineering,“the person is fu
10、lly immersed in what he or she is doing, characterized by a feeling of energized focus, full involvement, and success” Elements of flow The activity is intrinsically rewarding People become absorbed in the activity A loss of the feeling of self-consciousness, Distorted sense of time A sense of perso
11、nal control over the situation or activity Clear goals Concentrating and focusing Direct and immediate feedback Balance between ability level and challenge,The Flow Channel,Flow and Threat Modeling,Outline,Engineering in Large Projects Threat Modeling (II) Usability Tools,2009 TM problem statement,E
12、ven with the SDL TM Tool Threat models often pushed to one person Less collaboration One perspective Sometimes a junior person Meetings to review & share threat models Experts took over meetings Working meetings became review meetings,Elevation of Privilege: The Threat Modeling Game,Inspired by Thre
13、at Poker by Laurie Williams, NCSU Serious games movement Threat modeling game should be Simple Fun Encourage flow,Approach: Draw on Serious Games,Field of study since about 1970 “serious games in the sense that these games have an explicit and carefully thought-out educational purpose and are not in
14、tended to be played primarily for amusement.” (Clark Abt) Now include “Tabletop exercises,” persuasive games, games for health, etc,Elevation of Privilege is the easy way to get started threat modeling,Draw a diagram,How to play,Deal out all the cards Play hands (once around the table) Connect the t
15、hreat on a card to the diagram Play in a hand stays in the suit Play once through the deck Take notes: Player Points Card Component Notes _ _ _ _ _ _ _ _ _ _,Example,Bob plays 10 of Tampering,Charlie plays 5 of Tampering,Dan plays 8 of Tampering,After the Elevation of Privilege Game,Finish up Count
16、points Declare a winner File bugs,Elevation of Privilege is Licensed Creative Commons Attribution Go play!,http:/ does the game work as a tool?,Attractive and cool Encourages flow Requires participation Threats act as hints Instant feedback Social permission for Playful exploration Disagreement Prod
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ENGINEERSAREPEOPLETOOPPT
