SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Executive summary
Kaspersky for Business
As the world becomes more and more interconnected, global reliance on safe, trustworthy technology intensifies and the
security of products themselves becomes increasingly important. The evolution of security products takes place in parallel
with the growth of the vulnerabilities research industry, and as the threat landscape develops, the structure and nature of
our products become more complex too.
Software development is a multifaceted process, with many stages in the road from code to customer. Unlike most other
software, security products consist of numerous components, some deeply integrated into the OS and this makes solving
security issues even more important – not doing so could take an entire system down.
One of the biggest challenges in software development is avoiding what developers refer to as ‘whack-a-mole’, an ongoing
situation where the same problems keep reoccurring, again and again. This is inefficient – and dangerous.
From code to customer:
The road to making our
products secure
When the architecture of software components is done right, this situation can be avoided.
And combined with a collaborative software development lifecycle that puts security front and
center of every single step in the development process, it’s even safer. This is what Kaspersky
does – we’ve adopted a fundamental, strategic approach involving cross-team collaboration,
diverse internal and external information sources and ongoing education.
We’ve refined the entire process and the result is hands-down the best way to embed safety
into our products – and deliver the same to our customers. Continue reading to find out how
we do this.
From code to customer: The road
to making our products secure
We at Kaspersky Lab take our role as a leading security vendor seriously. In the process of devel-
oping our products, we are guided every step of the way by the core principles that make them
secure. Unlike other software, security products consist of many components, some integrated
deeply into the OS, which is why solving security issues in our products is so important.
It’s been over two decades since we developed our first antivirus solution, and over this time
we’ve gained unique, first-hand experience in how to respond quickly and effectively to the
new and evolving challenges of the cybersecurity industry. The evolution of security products –
as well as other software – occurs in parallel with the growth of the vulnerabilities research
industry. As the threat landscape continues to develop, the structure and nature of our products
become more complex, with enhancements and new features in every release.
We understand the direct link between making a product more complex and the number of po-
tential vulnerabilities to be found in it. Our specialist product teams and our entire development
process are geared towards ensuring that our software engineering processes are as safe as
possible. Building the highest levels of security into our products is at the heart of what we do.
It’s all in the foundation
When the architecture of software components is done right, a ‘whack-a-mole’
scenario – where problems keep recurring – can be avoided, and the same
applies to fixing vulnerabilities. Our product teams work closely with our product
security team to ensure that our architecture is secure.
This approach has allowed us to avoid the problems highlighted by Google
‘Security Princess’ Parisa Tabriz in her keynote at Black Hat USA 2018. In her address,
Tabriz discussed an issue that all developers are familiar with – the frustration of
receiving reports about security vulnerabilities that have been previously fixed, or
are a trivial variant of a known bug or even a symptom of an underlying condition
or process failing that was known about but wasn’t addressed.
Securing the
development process.
The first three steps in
particular – planning,
requirements and
analysis and design –
help to avoid a ‘whack a
mole’ situation.
Product
Security
Planning
Development
Maintenance
Vulnerability Response
Pentest Security Requirements Whack-A-Mole
Elimination
Security Risk Assessments
Requirements
Testing
Analysis,
Design
Fuzzing Attack Surface Analysis
At Kaspersky Lab, this is where the Secure Development Lifecycle comes in, an
approach which involves making security a priority during the development
process of a product. Eliminating the likelihood of a ‘whack-a-mole’ scenario
during architecture development not only eradicates ongoing problems with the
same vulnerabilities, it also frees up resources that can be redeployed to work on
developing other products and maintaining already released products. The net
result is secure product architecture that has numerous advantages, including:
•	 Minimizes vulnerabilities that can lead to serious architecture changes at core
components during the maintenance step of development
•	 Frees-up resources during maintenance
•	 Reduces the amount of security updates necessary.
How the product and product
security teams interact. The
security champion is an
additional layer that ensures
that information from product
security is correctly applied.
Our product security team is the entry point for R&D for all issues relating to
the security risks of products and infrastructure. The team is responsible for a
number of critical tasks, including preparing the initial requirements, code auditing,
vulnerabilities response, risks analysis, vulnerabilities assessment, providing
mitigations, fuzzing processes integration, penetration testing, and more. Our Anti-
Malware Research Team (AMR) also provides crucial input during these steps.
Sources of vulnerability information
Even after the product team has invested significant time and effort into writing
software according to security standards, an attacker can find a weak spot inside the
product or its environment (OS), which can be compromised. For this reason, we use
diverse sources of information about vulnerabilities to optimize our product security.
We recognize various sources of information for security risks and vulnerabilities:
Publicly disclosed vulnerabilities in an OS that may be affecting our products in
some way, vulnerabilities in third-party libraries or software which we use in our
products, public vulnerabilities reports from researchers, reports from our Bug
Bounty program portal, reports which hackers send to our vulnerabilities mailbox
(vulnerabilities@kaspersky.com), reports which researchers submit to our online
form and privately reported vulnerabilities from our security researchers, architects
and penetration testers.
Product Team 1
Security Champion Security Champion Security Champion
Product Team 1
Product Security
Product Team 1
The different sources of
vulnerabilities intelligence that
Kaspersky Lab receives
Product Team
Product Team
Vulnerability in OS that
affects a product
Vulnerability in 3rd
party
that affects a product
Public vulnerability
into a product
Vulnerability report from
HackerOne
Private vulnerability report
inside the company
Vulnerability report from
vulnerabilities@kaspersky.com
Vulnerability report from
at website
ProductSecurity
Publicly disclosed unpatched vulnerabilities in our products are critical
because by their nature, attackers can use them to attack our customers.
Depending on the CVSS (Common Vulnerability Scoring System) score and the
potential impact level on customers, fixing these vulnerabilities is our top priority.
Fixing publicly disclosed vulnerabilities into operating systems and third-party
software that affect our products is also a high-priority scenario.
The HackerOne vulnerabilities reporting platform gives us a flexible and
regulated way of accepting reports from researchers. The platform’s workflow
for vulnerabilities reports processing begins from triage and includes
compensating ‘bug bounty’ to researchers and addressing around the disclosure
of sensitive information about a particular vulnerability. (A hacker can request
complete or partial information disclosure about a vulnerability after its fixed and
the fix has been released to the public.)
Some vulnerability reporters prefer to submit their discoveries directly to us via our
dedicated vulnerability reporting mailbox at vulnerabilities@kaspersky.com. We
recommend using encryption to submit this sensitive information using our public
PGP key, a common practice in the industry to secure this type of process.
Responding to reports
Responding to vulnerabilities reports is a separate process with a special
workflow. The response process starts when we receive information about a
potential vulnerability that may affect our products. Sometimes, we receive a
report that’s supposedly about a vulnerability in one of our products but is in
fact a vulnerability or weak spot inside an OS. In such cases, we also provided
an update to mitigate this situation.
Kaspersky Lab’s involvement with the Bug Bounty program at HackerOne is
in response to the evolving challenges of the security industry. Of course, we
have our own highly specialized security researchers and architects in-house,
but we also recognize that external, independent security researchers can
bring their own points of view and thinking to the process, and by letting these
external researchers pentest our products, it makes them even stronger and
more secure.
We also believe that paying hackers to report vulnerabilities is right as well as
smart – not doing so may see them being tempted to sell their information to
cybercriminals instead. Their qualified reports must fulfil stringent guidelines,
including a detailed explanation of the vulnerability they’re reporting together
with technical details and an example of a reliable working exploit or proof
of concept.
Sources of vulnerability
reporting
The scope of our Bug Bounty program currently includes Kaspersky Internet
Security 2019 Beta and Kaspersky Endpoint Security 11. Vulnerability exploitations
should apply to Windows 8.1+, and we compensate researchers for discovering
Remote Code Execution (RCE) vulnerabilities, Local Privilege Escalation (LPE)
and Information Disclosure (ID) – the latter being limited to sensitive user data
like passwords, payment data and authentication tokens. For a detailed report
and working exploit example of the <<unicorn>> vulnerability, which allows an
attacker to remotely execute malicious code inside our high-privilege process
using the ‘man-in-the-middle’ vector, the pay-out can be as high as $100k.
•	 User mode (Ring 3) is where the antivirus service and GUI processes
execute – the antivirus service is a high priority process, while GUI is
low priority.
•	 Antivirus drivers execute into Kernel mode (Ring 0) and obtain access to
the Windows kernel and all processes in VM (virtual memory). This kind of
exploitation is highly dangerous because Ring 0 has the most privileges
and a successful exploitation here can lead to the entire system being
compromised.
•	 Some antivirus products contain special components that work at the
hypervisor level (known as Ring -1). These components control cross-VM
(virtual memory) operations and provide protection from screenshotting.
Exploiting a vulnerability at this level compromises virtual machines and
can also bypass built-in security measures (such as Device Guard and
Credential Guard).
Vulnerability processing
workflow in a bug
bounty scenario Report
submitting
Vulnerability
assessment
Bounty
payout
Report
confirmation
A patch
releasing
Response to
researcher
Ring 3
(low privileges)
Ring 3
(high privileges)
Ring 0 Ring -1
AV bypass
Information Disclosure (ID)
Local Privilege Escalation (LPE)
(Escalation of Privilege)
Remote Code Execution (RCE) vulnerabilities
Types of vulnerabilities found in
antivirus products. Attackers use
‘AV bypass’ to circumvent major
parts of a product’s protection.
The darker the cube, the more
serious the level of danger
Advantages of ongoing
developer training
Never stop learning
As we continue to integrate secure practices into our software development
lifecycle, we also encourage our developers and architects to learn about them.
We combine our knowledge of secure development from our existing R&D
experience with insights from our product security team who continuously update
their knowledge and skills with new and emerging practices. The result is the
implementation of the following major vectors into our product security training:
Security training for
developers, engineers
and architects
Introduction to
app security
How to use
code analysis
Threat
modeling
Importance of
cryptography
Secure coding
practice
Importance of
vulnerability fixing
This approach is highly beneficial to our developers and to the company as
a whole - please refer to the image below for more information. It not only
encourages developers to think about different areas of computer security
that they may not otherwise consider and it also helps reduce the total cost of
software maintenance and boosts our reputation.
Advantages
•	 Lower expenses for security
updates issue
•	 Freeng human resources
for products support
•	 Improving the reputation of
the company
•	 Improving developer’s skills
Сode analysis
Secure coding
Сrypto
Threat modeling
Putting security front and center of
everything we do
The process of creating secure software isn’t easy, especially when it comes to
complex products and solutions. To deliver optimum security levels, security
should be front and center of every stage in the software development and
maintenance process, including writing security requirements, risks assessments,
attack surface analysis, fuzzing, pentesting, vulnerability response and developer
education. And at Kaspersky Lab, this is exactly what we do. The result? The
world’s most tested, most awarded security.
Kaspersky Lab
Find a partner near you: www.kaspersky.com/buyoffline
Kaspersky for Business: www.kaspersky.com/business
Enterprise Cybersecurity: www.kaspersky.com/enterprise
IT Security News: business.kaspersky.com/
Our unique approach: www.kaspersky.com/true-cybersecurity
#truecybersecurity
#HuMachine
www.kaspersky.com
© 2019 AO Kaspersky Lab. All rights reserved. Registered trademarks and service marks are the property of
their respective owners.
Expert
analysis
HuMachine™
Big Data /
Threat Intelligence
Machine
Learning

Mais conteúdo relacionado

Mais procurados

A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Kaspersky
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aIgor Pandzic
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSalil Kumar Subramony
 
Trusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsTrusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsKaspersky
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeDigital Defense Inc
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey מוטי שגיא
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
 
Security in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learnedSecurity in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learnedBoaz Shunami
 
Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06Tiago Oliveira
 

Mais procurados (20)

A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Trusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsTrusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tips
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Security in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learnedSecurity in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learned
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 

Semelhante a From Code to Customer: How to Make Software Products Secure

Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfNathanDjami
 
Software risk management
Software risk managementSoftware risk management
Software risk managementJose Javier M
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the Cloud5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the CloudtCell
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsCheckmarx
 
SIG-product-overview.pdf
SIG-product-overview.pdfSIG-product-overview.pdf
SIG-product-overview.pdfAklnt
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...ESET Middle East
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementAnton Chuvakin
 
10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the HackersCheckmarx
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023SofiaCarter4
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017Jermund Ottermo
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewAshish Patel
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideAryan G
 

Semelhante a From Code to Customer: How to Make Software Products Secure (20)

Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
 
Software risk management
Software risk managementSoftware risk management
Software risk management
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
smpef
smpefsmpef
smpef
 
5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the Cloud5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the Cloud
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
 
Se project-methodology-for-security-project-web
Se project-methodology-for-security-project-webSe project-methodology-for-security-project-web
Se project-methodology-for-security-project-web
 
SIG-product-overview.pdf
SIG-product-overview.pdfSIG-product-overview.pdf
SIG-product-overview.pdf
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
 
10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 
Agile and Secure Development
Agile and Secure DevelopmentAgile and Secure Development
Agile and Secure Development
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference Guide
 

Mais de Kaspersky

A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineKaspersky
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureKaspersky
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureKaspersky
 
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...Kaspersky
 
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктурыМаксим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктурыKaspersky
 
Кирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИКирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИKaspersky
 
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...Kaspersky
 
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021Kaspersky
 
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Kaspersky
 
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...Kaspersky
 
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...Kaspersky
 
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтраИгорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтраKaspersky
 
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...Kaspersky
 
Марина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных системМарина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных системKaspersky
 
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...Kaspersky
 
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...Kaspersky
 
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...Kaspersky
 
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...Kaspersky
 
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугрозОлег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугрозKaspersky
 
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...Kaspersky
 

Mais de Kaspersky (20)

A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in Ukraine
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
 
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
 
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктурыМаксим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
 
Кирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИКирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИ
 
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
 
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
 
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
 
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
 
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
 
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтраИгорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
 
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
 
Марина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных системМарина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных систем
 
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
 
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
 
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
 
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
 
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугрозОлег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
 
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
 

Último

Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 

Último (20)

Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 

From Code to Customer: How to Make Software Products Secure

  • 1. Executive summary Kaspersky for Business As the world becomes more and more interconnected, global reliance on safe, trustworthy technology intensifies and the security of products themselves becomes increasingly important. The evolution of security products takes place in parallel with the growth of the vulnerabilities research industry, and as the threat landscape develops, the structure and nature of our products become more complex too. Software development is a multifaceted process, with many stages in the road from code to customer. Unlike most other software, security products consist of numerous components, some deeply integrated into the OS and this makes solving security issues even more important – not doing so could take an entire system down. One of the biggest challenges in software development is avoiding what developers refer to as ‘whack-a-mole’, an ongoing situation where the same problems keep reoccurring, again and again. This is inefficient – and dangerous. From code to customer: The road to making our products secure
  • 2. When the architecture of software components is done right, this situation can be avoided. And combined with a collaborative software development lifecycle that puts security front and center of every single step in the development process, it’s even safer. This is what Kaspersky does – we’ve adopted a fundamental, strategic approach involving cross-team collaboration, diverse internal and external information sources and ongoing education. We’ve refined the entire process and the result is hands-down the best way to embed safety into our products – and deliver the same to our customers. Continue reading to find out how we do this.
  • 3. From code to customer: The road to making our products secure We at Kaspersky Lab take our role as a leading security vendor seriously. In the process of devel- oping our products, we are guided every step of the way by the core principles that make them secure. Unlike other software, security products consist of many components, some integrated deeply into the OS, which is why solving security issues in our products is so important. It’s been over two decades since we developed our first antivirus solution, and over this time we’ve gained unique, first-hand experience in how to respond quickly and effectively to the new and evolving challenges of the cybersecurity industry. The evolution of security products – as well as other software – occurs in parallel with the growth of the vulnerabilities research industry. As the threat landscape continues to develop, the structure and nature of our products become more complex, with enhancements and new features in every release. We understand the direct link between making a product more complex and the number of po- tential vulnerabilities to be found in it. Our specialist product teams and our entire development process are geared towards ensuring that our software engineering processes are as safe as possible. Building the highest levels of security into our products is at the heart of what we do. It’s all in the foundation When the architecture of software components is done right, a ‘whack-a-mole’ scenario – where problems keep recurring – can be avoided, and the same applies to fixing vulnerabilities. Our product teams work closely with our product security team to ensure that our architecture is secure. This approach has allowed us to avoid the problems highlighted by Google ‘Security Princess’ Parisa Tabriz in her keynote at Black Hat USA 2018. In her address, Tabriz discussed an issue that all developers are familiar with – the frustration of receiving reports about security vulnerabilities that have been previously fixed, or are a trivial variant of a known bug or even a symptom of an underlying condition or process failing that was known about but wasn’t addressed. Securing the development process. The first three steps in particular – planning, requirements and analysis and design – help to avoid a ‘whack a mole’ situation. Product Security Planning Development Maintenance Vulnerability Response Pentest Security Requirements Whack-A-Mole Elimination Security Risk Assessments Requirements Testing Analysis, Design Fuzzing Attack Surface Analysis
  • 4. At Kaspersky Lab, this is where the Secure Development Lifecycle comes in, an approach which involves making security a priority during the development process of a product. Eliminating the likelihood of a ‘whack-a-mole’ scenario during architecture development not only eradicates ongoing problems with the same vulnerabilities, it also frees up resources that can be redeployed to work on developing other products and maintaining already released products. The net result is secure product architecture that has numerous advantages, including: • Minimizes vulnerabilities that can lead to serious architecture changes at core components during the maintenance step of development • Frees-up resources during maintenance • Reduces the amount of security updates necessary. How the product and product security teams interact. The security champion is an additional layer that ensures that information from product security is correctly applied. Our product security team is the entry point for R&D for all issues relating to the security risks of products and infrastructure. The team is responsible for a number of critical tasks, including preparing the initial requirements, code auditing, vulnerabilities response, risks analysis, vulnerabilities assessment, providing mitigations, fuzzing processes integration, penetration testing, and more. Our Anti- Malware Research Team (AMR) also provides crucial input during these steps. Sources of vulnerability information Even after the product team has invested significant time and effort into writing software according to security standards, an attacker can find a weak spot inside the product or its environment (OS), which can be compromised. For this reason, we use diverse sources of information about vulnerabilities to optimize our product security. We recognize various sources of information for security risks and vulnerabilities: Publicly disclosed vulnerabilities in an OS that may be affecting our products in some way, vulnerabilities in third-party libraries or software which we use in our products, public vulnerabilities reports from researchers, reports from our Bug Bounty program portal, reports which hackers send to our vulnerabilities mailbox (vulnerabilities@kaspersky.com), reports which researchers submit to our online form and privately reported vulnerabilities from our security researchers, architects and penetration testers. Product Team 1 Security Champion Security Champion Security Champion Product Team 1 Product Security Product Team 1 The different sources of vulnerabilities intelligence that Kaspersky Lab receives Product Team Product Team Vulnerability in OS that affects a product Vulnerability in 3rd party that affects a product Public vulnerability into a product Vulnerability report from HackerOne Private vulnerability report inside the company Vulnerability report from vulnerabilities@kaspersky.com Vulnerability report from at website ProductSecurity
  • 5. Publicly disclosed unpatched vulnerabilities in our products are critical because by their nature, attackers can use them to attack our customers. Depending on the CVSS (Common Vulnerability Scoring System) score and the potential impact level on customers, fixing these vulnerabilities is our top priority. Fixing publicly disclosed vulnerabilities into operating systems and third-party software that affect our products is also a high-priority scenario. The HackerOne vulnerabilities reporting platform gives us a flexible and regulated way of accepting reports from researchers. The platform’s workflow for vulnerabilities reports processing begins from triage and includes compensating ‘bug bounty’ to researchers and addressing around the disclosure of sensitive information about a particular vulnerability. (A hacker can request complete or partial information disclosure about a vulnerability after its fixed and the fix has been released to the public.) Some vulnerability reporters prefer to submit their discoveries directly to us via our dedicated vulnerability reporting mailbox at vulnerabilities@kaspersky.com. We recommend using encryption to submit this sensitive information using our public PGP key, a common practice in the industry to secure this type of process. Responding to reports Responding to vulnerabilities reports is a separate process with a special workflow. The response process starts when we receive information about a potential vulnerability that may affect our products. Sometimes, we receive a report that’s supposedly about a vulnerability in one of our products but is in fact a vulnerability or weak spot inside an OS. In such cases, we also provided an update to mitigate this situation. Kaspersky Lab’s involvement with the Bug Bounty program at HackerOne is in response to the evolving challenges of the security industry. Of course, we have our own highly specialized security researchers and architects in-house, but we also recognize that external, independent security researchers can bring their own points of view and thinking to the process, and by letting these external researchers pentest our products, it makes them even stronger and more secure. We also believe that paying hackers to report vulnerabilities is right as well as smart – not doing so may see them being tempted to sell their information to cybercriminals instead. Their qualified reports must fulfil stringent guidelines, including a detailed explanation of the vulnerability they’re reporting together with technical details and an example of a reliable working exploit or proof of concept. Sources of vulnerability reporting
  • 6. The scope of our Bug Bounty program currently includes Kaspersky Internet Security 2019 Beta and Kaspersky Endpoint Security 11. Vulnerability exploitations should apply to Windows 8.1+, and we compensate researchers for discovering Remote Code Execution (RCE) vulnerabilities, Local Privilege Escalation (LPE) and Information Disclosure (ID) – the latter being limited to sensitive user data like passwords, payment data and authentication tokens. For a detailed report and working exploit example of the <<unicorn>> vulnerability, which allows an attacker to remotely execute malicious code inside our high-privilege process using the ‘man-in-the-middle’ vector, the pay-out can be as high as $100k. • User mode (Ring 3) is where the antivirus service and GUI processes execute – the antivirus service is a high priority process, while GUI is low priority. • Antivirus drivers execute into Kernel mode (Ring 0) and obtain access to the Windows kernel and all processes in VM (virtual memory). This kind of exploitation is highly dangerous because Ring 0 has the most privileges and a successful exploitation here can lead to the entire system being compromised. • Some antivirus products contain special components that work at the hypervisor level (known as Ring -1). These components control cross-VM (virtual memory) operations and provide protection from screenshotting. Exploiting a vulnerability at this level compromises virtual machines and can also bypass built-in security measures (such as Device Guard and Credential Guard). Vulnerability processing workflow in a bug bounty scenario Report submitting Vulnerability assessment Bounty payout Report confirmation A patch releasing Response to researcher Ring 3 (low privileges) Ring 3 (high privileges) Ring 0 Ring -1 AV bypass Information Disclosure (ID) Local Privilege Escalation (LPE) (Escalation of Privilege) Remote Code Execution (RCE) vulnerabilities Types of vulnerabilities found in antivirus products. Attackers use ‘AV bypass’ to circumvent major parts of a product’s protection. The darker the cube, the more serious the level of danger
  • 7. Advantages of ongoing developer training Never stop learning As we continue to integrate secure practices into our software development lifecycle, we also encourage our developers and architects to learn about them. We combine our knowledge of secure development from our existing R&D experience with insights from our product security team who continuously update their knowledge and skills with new and emerging practices. The result is the implementation of the following major vectors into our product security training: Security training for developers, engineers and architects Introduction to app security How to use code analysis Threat modeling Importance of cryptography Secure coding practice Importance of vulnerability fixing This approach is highly beneficial to our developers and to the company as a whole - please refer to the image below for more information. It not only encourages developers to think about different areas of computer security that they may not otherwise consider and it also helps reduce the total cost of software maintenance and boosts our reputation. Advantages • Lower expenses for security updates issue • Freeng human resources for products support • Improving the reputation of the company • Improving developer’s skills Сode analysis Secure coding Сrypto Threat modeling Putting security front and center of everything we do The process of creating secure software isn’t easy, especially when it comes to complex products and solutions. To deliver optimum security levels, security should be front and center of every stage in the software development and maintenance process, including writing security requirements, risks assessments, attack surface analysis, fuzzing, pentesting, vulnerability response and developer education. And at Kaspersky Lab, this is exactly what we do. The result? The world’s most tested, most awarded security.
  • 8. Kaspersky Lab Find a partner near you: www.kaspersky.com/buyoffline Kaspersky for Business: www.kaspersky.com/business Enterprise Cybersecurity: www.kaspersky.com/enterprise IT Security News: business.kaspersky.com/ Our unique approach: www.kaspersky.com/true-cybersecurity #truecybersecurity #HuMachine www.kaspersky.com © 2019 AO Kaspersky Lab. All rights reserved. Registered trademarks and service marks are the property of their respective owners. Expert analysis HuMachine™ Big Data / Threat Intelligence Machine Learning