You are on page 1of 5

BUILDING SECURITY IN

Editors: Brian Chess, bchess@vantuyl.com | Brad Arkin, barkin@adobe.com

Developing Secure I also describe steps EMC has taken


to implement this road map and
strengthen its product development

Products in the Age of practices in the face of APTs.

Rethinking Product

Advanced Persistent Security


In the new threat landscape, if the
software is the new firewall, it had

Threats better be attack resistant.

Attack-Resistant Software:
Necessary but Insufficient
Eric Baize | EMC Corp. For technology providers, devel-
oping attack-resistant software is a
core element of their product secu-
rity program. It’s also part of their
overall goal of minimizing the risk

2 011 was characterized by high-


profile security incidents and
the rise of sophisticated attacks
IT infrastructures and running
business processes is now the line
separating a compromised user
of their product introducing vulner-
abilities into their customers’ envi-
ronments. Comprehensive product
called advanced persistent threats from the information the attackers security programs typically encom-
(APTs). These attacks often start by seek. If exploited, it helps the attack pass secure software development
directly targeting a few power users propagate itself within the organiza- techniques such as threat model-
with malicious software. They then tion. In a user-centric perimeter, the ing or white-box testing, product
propagate themselves by exploit- software has become the new fire- security reviews before product
ing flaws in applications deployed wall and therefore must become an release, and a coordinated response
across the enterprise. Several tech- active element to defend organiza- to vulnerabilities reported on the
nology providers, including Google tions against APTs. technology providers’ products.
and RSA, fell victim to APTs and APTs are making technology Developing secure software is noth-
made it public.1,2 providers completely reconsider ing new and has been broadly docu-
The rise of APTs has demon- their assumptions. A Security for mented.4,5 For several years, EMC
strated the limitations of network- Business Innovation Council report has defined and implemented its
centric perimeter security as we’ve best summarized the new reality: own secure software development
practiced it for more than 20 years. “Consider that no organization is life cycle.6
In this approach, a firewall separates impenetrable. Assume that your These practices typically focus
the assets to protect (servers and organization might already be com- on building products that are more
information) from untrusted net- promised and go from there.”3 All resistant to attacks when the envi-
works. With APTs, all networks are technology providers need to review ronment in which these products
untrusted and the security perim- this assumption against their prod- are deployed is compromised.
eter has become user-centric. The uct security programs. However, during the recent wave
user is the attackers’ new focus; Here, I discuss how these pro- of attacks, several technology pro-
spear-phishing emails and mali- found changes are impacting tech- viders had to urge their custom-
cious software on USB devices nology providers’ product security ers to take precautionary measures
have become attackers’ favorite strategy. I suggest an industry road because they, not their customers,
weapons. The software powering map for rethinking product security. had been attacked.2,7

88 May/June 2012 Copublished by the IEEE Computer and Reliability Societies  1540-7993/12/$31.00 © 2012 IEEE
This leaves technology provid- and monitored independently from
ers with a dual challenge. First, they secure software development. For
must make secure software devel- instance, source code protection is PURPOSE: The IEEE Computer Society is the world’s
opment practices more efficient and typically part of intellectual-property largest association of computing professionals and is the
more systematic. Second, they must protection, a major focus for tech- leading provider of technical information in the field.
MEMBERSHIP: Members receive the monthly magazine
expand the threat assumptions that nology vendors. Computer, discounts, and opportunities to serve (all activities
guide the implementation of the To bridge this gap, EMC has are led by volunteer members). Membership is open to
traditional secure software develop- expanded its product security stan- all IEEE members, affiliate society members, and others
interested in the computer field.
ment life cycle to account for pos- dards to encompass these practices. COMPUTER SOCIETY WEBSITE: www.computer.org
sible attacks on the software supply So, the product risk review stage of
Next Board Meeting: 11–15 June, Seattle, Wash., USA
chain. our secure software development
life cycle now also assesses practices EXECUTIVE COMMITTEE
President: John W. Walz*
Expanding the Secure Software for source code management, code President-Elect: David Alan Grier;* Past President: Sorel
Development Life Cycle signing, and external-component Reisman;* VP, Standards Activities: Charlene (Chuck) Walrad;†
Expanding the threat assumptions management. Secretary: Andre Ivanov (2nd VP);* VP, Educational Activities:
Elizabeth L. Burd;* VP, Member & Geographic Activities:
in this manner leads to consider- Product security and internal IT Sattupathuv Sankaran;† VP, Publications: Tom M. Conte (1st VP);*
ing new categories of attacks. This security are now converging, with a VP, Professional Activities: Paul K. Joannou;* VP, Technical &
might include attacks against serious impact on technology ven- Conference Activities: Paul R. Croll;† Treasurer: James W. Moore,
CSDP;* 2011–2012 IEEE Division VIII Director: Susan K. (Kathy)
dors’ organizational design and risk Land, CSDP;† 2012–2013 IEEE Division V Director: James W. Moore,
■■ product code during development, governance. CSDP;† 2012 IEEE Division Director VIII Director-Elect: Roger U.
■■ any supplier or original equipment Fujii†
*voting member of the Board of Governors †nonvoting member
manufacturer (OEM) involved in A More Integrated Risk
BOARD OF GOVERNORS
developing the product’s software Governance Model Term Expiring 2012: Elizabeth L. Burd, Thomas M. Conte, Frank
components, or Many end-user organizations, such E. Ferrante, Jean-Luc Gaudiot, Paul K. Joannou, Luis Kun, James W.
■■ the product distribution channels. as financial institutions, have a soft- Moore, William (Bill) Pitts
Term Expiring 2013: Pierre Bourque, Dennis J. Frailey, Atsuhiro
ware security group focused on Goto, André Ivanov, Dejan S. Milojicic, Paolo Montuschi, Jane Chu
The secure software develop- the software they develop and use Prey, Charlene (Chuck) Walrad
ment life cycle has been the main as part of their IT infrastructure. EXECUTIVE STAFF
vehicle technology vendors have These groups are typically aligned Executive Director: Angela R. Burgess; Associate Executive Director,
used to drive adoption of secure with the organization’s IT secu- Director, Governance: Anne Marie Kelly; Director, Finance & Accounting:
John Miller; Director, Information Technology & Services: Ray Kahn;
software development techniques rity group and follow the same IT Director, Membership Development: Violet S. Doan; Director, Products
in their engineering organizations. risk governance and compliance & Services: Evan Butterfield; Director, Sales & Marketing: Chris Jensen
It’s well suited to also drive the con- policies and standards that manage COMPUTER SOCIETY OFFICES
trols that protect against the attacks the overall risk in the internal IT Washington, D.C.: 2001 L St., Ste. 700, Washington, D.C. 20036-4928
I just mentioned: infrastructure. Phone: +1 202 371 0101 • Fax: +1 202 728 9614
Email: hq.ofc@computer.org
Many technology providers Los Alamitos: 10662 Los Vaqueros Circle, Los Alamitos, CA 90720-1314 •
■■ protection of the overall product are different. They have a prod- Phone: +1 714 821 8380 • Email: help@computer.org
development environment, focus- uct security group distinct from Membership & Publication Orders
Phone: +1 800 272 6657 • Fax: +1 714 821 4641 • Email: help@computer.org
ing on not only avoiding source the IT security group and respon- Asia/Pacific: Watanabe Building, 1-4-2 Minami-Aoyama, Minato-ku, Tokyo
code leakage but also prevent- sible for secure software develop- 107-0062, Japan • Phone: +81 3 3408 3118 • Fax: +81 3 3408 3553 •
ing unauthorized source code ment and vulnerability response Email: tokyo.ofc@computer.org

modification; within their product-engineering IEEE OFFICERS


■■ integrity of the source code sup- organization. In terms of reporting President: Gordon W. Day; President-Elect: Peter W. Staecker; Past
President: Moshe Kam; Secretary: Celia L. Desmond; Treasurer: Harold
ply chain for OEM components and governance, product security L. Flescher; President, Standards Association Board of Governors: Steven
and for open source software groups are typically aligned with M. Mills; VP, Educational Activities: Michael R. Lightner; VP, Membership
& Geographic Activities: Howard E. Michel; VP, Publication Services &
being embedded in products; and the product-engineering organiza- Products: David A. Hodges; VP, Technical Activities: Frederick C. Mintzer;
■■ embedding controls for product tion and focus more on reducing IEEE Division V Director: James W. Moore, CSDP; IEEE Division VIII
Director: Susan K. (Kathy) Land, CSDP; IEEE Division VIII Director-Elect:
code integrity and authenticity product risk impact on customers’ Roger U. Fujii; President, IEEE-USA: James M. Howard
verification, during both delivery IT infrastructures.
and execution of the products. The evolution toward cloud
computing has initiated a blended
These practices aren’t new for approach to risk management.
most technology vendors,8 but Technology providers that have revised 22 Feb. 2012

they’re typically defined, performed, turned into cloud providers run

www.computer.org/security 89
BUILDING SECURITY IN

on their internal IT infrastructure third party is compromised, so is can distinguish legitimate input
applications supporting their cus- the system’s entire security. Such from input containing a malicious
tomers’ critical business processes. designs have serious limitations if string. We’ve done the hard work,
Their internal IT infrastructure you assume that every computer in but with a little more effort, we can
is becoming an extension of their the environment in which the sys- greatly improve the response time
customers’ IT infrastructure. This tem operates is compromised. to a real-time attack. If secure soft-
makes it more difficult for them to This gives new life to old concepts ware can detect and stop malicious
distinguish internal IT risk from such as Adi Shamir’s secret sharing9 strings, it can and should also log
risk on customers’ IT infrastructure. and secure multiparty computation.10 and report incidents that are being
The need to take a holistic approach Applying these concepts in secure prevented. This will provide the
to product risk is accelerating this software design leads to systems in intelligence that security products
transformation. which compromising one system need to better monitor activity and
This led EMC to profoundly element doesn’t compromise the ensure quick attention, which can
change its risk manage- lead to prevention of data
ment approach. First, we
Defensive software development techniques breaches.
integrated product secu- As I mentioned
rity in our overall risk gov- alone won’t be sufficient. We need to before, if the software is
ernance and compliance the new firewall, it must
innovate and develop new techniques
structure, facilitating the take a more active role in
coordination between to build “attack-aware products.” the defense strategy in an
all the risk stakehold- IT infrastructure. It must
ers in the corporation. also build on top of tra-
Second, we created the position of system’s overall security. RSA Labo- ditional software security defense
chief risk officer (a position popular ratories’ work provides early dem- techniques to better detect attacks
in the financial-services industry) onstrations of such systems applied in their early stage.
to oversee all risk-related func- to authentication.11
tions, including product security. We should also expect to see Securing the Ecosystem
This new structure, along with our more software integrity controls Modern IT infrastructures run on
expanded secure software develop- being built into products. Tech- software that’s open, component
ment life cycle, sets us up for holis- niques such as Intel’s Trusted Exe- based, and multivendor. Even if
tically assessing and reviewing all cution Technology and application the largest technology providers
aspects of risk. whitelisting enable runtime check- are investing millions of dollars to
ing of executable integrity. They solve the software security equa-
The Road Ahead for also help further defend against the tion, attackers need only exploit one
Product Security insertion of malicious software in 0-day vulnerability in one software
Better governance and an expanded the product delivery chain. component to be successful.
secure software development life Software security must become
cycle are only the first steps toward Building Attack- ubiquitous, designed into modern
the broader changes needed in soft- Aware Products software components, and acces-
ware engineering and across the In a world with APTs, early detec- sible to any software developer.
industry regarding how to build tion is critical in stopping attacks. Software security expertise remains
and deliver products that effectively Defensive software development too centralized, in the hands of a few
resist APTs. We, as software security techniques alone won’t be sufficient. experts in the largest organizations.
practitioners, have an opportunity We need to innovate and develop Microsoft led the way by sharing
to innovate and collaborate to bet- new techniques to build “attack- early on many aspects of its Security
ter prepare our products to address aware products” that facilitate early Development Lifecycle.5 In recent
this new class of threats. detection of advanced threats. years, initiatives have emerged to
Software security practitioners share with the broader community
Adapting Secure Software have made great progress incorpo- the insight of some of the most suc-
Design Techniques to rating into software the techniques cessful software security practices.
the New Threats that stop attacks targeting the most Here are two examples:
Many security designs still rely on common security flaws: SQL injec-
a trusted third party holding the tion, cross-site scripting, and buffer ■■ BSIMM (Building Security In
master keys to the kingdom. If this overflow. Most modern software Maturity Model; www.bsimm.

90 IEEE Security & Privacy May/June 2012


com) is a survey of more than such as Common Criteria (www. starting an open conversation on
40 software security initiatives commoncriteriaportal.org) have EMC’s experience and approach, I
undertaken by large technology attempted to solve the product hope to make it easier for all of us
vendors and end-user organiza- assurance evaluation problem. to evolve our product security prac-
tions.12 It provides a model of the Recently, the Open Group Trusted tices to more effectively face the
key software security activities Technology Forum (www.open new threat landscape.
they perform. group.org/ottf ), a collabora-
■■ SAFECode (Software Assurance tion between industry and gov- References
Forum for Excellence in Code; ernment, defined supply chain 1. D. Drummond, “A New Approach
www.safecode.org) is a vendor-led integrity best-practices require- to China,” blog, 12 Jan. 2010;
organization that documents effec- ments for technology providers.13 htt p : / / go o g l ebl o g .bl o g s p o t .
tive software security approaches.4 This work represents a step on a com/2010/01/new-approach-to
long path toward measuring and -china.html.
EMC has been closely involved assessing security throughout the 2. A. Coviello, “Open Letter to RSA
with both initiatives from their ­supply chain. Customers,” RSA, Mar. 2011; www.
inception. We’ll remain involved rsa.com/node.aspx?id=3872.
until software security has become 3. “When Advanced Persistent
ingrained in every facet of software
engineering. M ost of the changes in prod-
uct security I discussed
here are nontechnical and won’t be
Threats Go Mainstream,” white
paper, Security for Business Innova-
tion Council, Aug. 2011.
Modeling and Assessing easy to implement. They involve 4. “Fundamental Practices for
Supply Chain Assurance internal governance, software devel- Secure Software Development,
As software security practitio- opment processes, industry col- 2nd Edition: A Guide to the Most
ners, we’re used to performing laboration, and standardization. By Effective Secure Development
threat models, creating dataflow
diagrams showing component
interactions, highlighting attack
surfaces, and defining trust bound- AdvertiSer informAtion • mAy/June 2012
aries and risk scores.
We now need to start applying Advertiser PAge d.schissler@computer.org
this approach to the software sup- IEEE Biometrics Cover 4 Phone: +1 508 394 4026
ply chain. The consumers of tech- Usenix 2012 Cover 2 Fax: +1 508 394 1707
nology products want to know Advertising Personnel Southwest, California:
the risk associated with the prod- Marian Anderson Mike Hughes
ucts they deploy in their environ- Sr. Advertising Coordinator Email: mikehughes@computer.org
ment. The product providers want Email: manderson@computer.org Phone: +1 805 529 6790
Phone: +1 714 816 2139
to assess the security of the com- Fax: +1 714 821 4010
ponents they integrate in their Southeast:
Sandy Brown Heather Buonadies
products and want to show their Sr. Business Development Mgr. Email: h.buonadies@computer.org
customers that they apply sound Email: sbrown@computer.org Phone: +1 973 585 7070
software security practices. Phone: +1 714 816 2144 Fax: +1 973 585 7071
Fax: +1 714 821 4010
The problem is extremely com-
Advertising Sales
plex, involving national and inter- Advertising Sales Represen- Representative (Classified
national regulations, the software tatives (display) Line)
Central, Northwest, Far East: Heather Buonadies
industry’s globalization, and the defi- Eric Kincaid Email: h.buonadies@computer.org
nition of simple risk metrics for soft- Email: e.kincaid@computer.org Phone: +1 973 585 7070
ware security. It brings into question Phone: +1 214 673 3742 Fax: +1 973 585 7071
what practical, meaningful infor- Fax: +1 888 886 8599
mation about technology provid- Advertising Sales
Northeast, Midwest, Europe, Representative (Jobs Board)
ers’ software and practices can and Middle East: Heather Buonadies
should be shared to convey a sense of Ann & David Schissler Email: h.buonadies@computer.org
confidence to customers who must Email: a.schissler@computer.org, Phone: +1 973 585 7070
deploy and rely on that technology.
Security certification programs

www.computer.org/security 91
BUILDING SECURITY IN

Practices in Use Today,” SAFE- 7. “Claims by Anonymous about Short Secrets,” Proc. 12th Usenix
Code, 8 Feb. 2011; www.safecode. Symantec Source Code,” Syman- Security Symp. (SSYM 03), Usenix
org/publications/SAFECode tec, Jan. 2012; www.symantec. Assoc., 2003, pp. 201–214.
_Dev_Practices0211.pdf. com/theme.jsp?themeid 12. G. McGraw, B. Chess, and S.
5. M. Howard and S. Lipner, The Secu- =anonymous-code-claims. Migues, “Building Security In
rity Development Life Cycle, Micro- 8. “Software Integrity Controls: An Maturity Model,” Sept. 2011;
soft Press, 2006. Assurance-Based Approach to Min- http://bsimm.com.
6. D. Dhillon, “Developer-Driven imizing Risks in the Software Supply 13. “Open Trusted Technology Pro-
Threat Modeling: Lessons Learned Chain,” SAFECode, 14 June 2010; vider Standard (O-TTPS) Snap-
in the Trenches,” IEEE Security & www.safecode.org/publications/ shot,” Open Group, Feb. 2012;
Privacy, vol. 9, no. 4, 2011, pp. 41–47. SAFECode_Software_Integrity www.opengroup.org/bookstore/
_Controls0610.pdf. catalog/s121.htm.
9. A. Shamir, “How to Share a
Secret,” Comm. ACM, vol. 22, Eric Baize is the senior director and
no. 11, 1979, pp. 612–613; head of the EMC Corporation’s
Any comments or feedback?
Please email your letters to the editor to doi:10.1145/359168.359176. Product Security Office. He rep-
lead editor Kathy Clark-Fisher 10. A.C. Yao, “Protocols for Secure resents EMC on the SAFECode
(kclark-fisher@computer.org). Computations” (extended abstract), (Software Assurance Forum for
All letters will be edited for
Proc. 23rd Ann. Symp. Foundations of Excellence in Code) board of direc-
brevity, clarity, and language.
Computer Science, IEEE CS, 1982, tors and serves on the BSIMM
pp. 160–164. (Building Security In Maturity
11. J. Brainard et al., “A New Two-Server Model) advisory board. Contact
Approach for Authentication with him at eric.baize@emc.com.
IEEE_half_horizontal_Q6:Layout 1 4/21/11 4:21 PM Page 1

Experimenting with your hiring process?


Finding the best computing job or hire shouldn’t be left to chance.
IEEE Computer Society Jobs is your ideal recruitment resource, targeting
over 85,000 expert researchers and qualified top-level managers in software
engineering, robotics, programming, artificial intelligence, networking and
communications, consulting, modeling, data structures, and other computer
science-related fields worldwide. Whether you’re looking to hire or be hired,
IEEE Computer Society Jobs provides real results by matching hundreds of
relevant jobs with this hard-to-reach audience each month, in Computer
magazine and/or online-only!

http://www.computer.org/jobs
The IEEE Computer Society is a partner in the AIP Career Network, a collection of online job sites for scientists, engineers, and
computing professionals. Other partners include Physics Today, the American Association of Physicists in Medicine (AAPM), American
Association of Physics Teachers (AAPT), American Physical Society (APS), AVS Science and Technology, and the Society of Physics
Students (SPS) and Sigma Pi Sigma.

92 IEEE Security & Privacy May/June 2012

You might also like