SlideShare uma empresa Scribd logo
1 de 14
And why the LIR is a key factor
M. Steltman - RIPE79 – 16-10-2019
The compelling case for vulnerability
management
Why are we vulnerable ?
“We are vulnerable, because hard- and software has vulnerabilities.
The bad guys find them and use them for themselves.
So we need good guys to find them too, and then fix those leaks. It’s all
we have”
Bruce Schneier
So, why don’t we just patch?
4
The patching process for companies
explained
5
?
Sounds easy but hard to achieve 100%
6
?
Too much to deal with
7
8
Digital
Infrastructure,
Including LIRs
Companies
with digital
presence Financial servicesManufacturing Logistics Healthcare Retail MobilityGovernment
Digital
Services
Plan B: Coordinated responsible disclosure / Bug bou
Common
approach:
“Motivate”
Add:
Find and
report
Coordinated responsible disclosure
=> towards: CRD on steroids
10
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
networks
Add
performance
information
Collect and
aggregate
Forward
&
Policy
Members & Constituents of:
What can and should LIRs do?
11
** Where does LIR responsibility start and stop **?
-> LIR is NOT responsible, but is (as other intermediaries) a key actor in getting
this going
This goes way beyond ISP abuse mitigation!
-LIR ( as ISP, hoster, CSP) is a key actor , the essential “middle man”:
- Monitor: Which badness is visible in my networks: vulnerabilities and
abuse
- Receive: Subscribe to feeds, receive abuse- and vulnerability
information
- Triage: Who has the actual problem, which user or
cusromer?
- Forward: Who can and should fix this?
- Policy: “motivate” users / customers to act, or act yourself
Questions for RIPE community / LIRs
12
- Do you agree that this “actual vulnerability”approach can be very effective?
- Do you agree that the LIR is a key middleman in this approach?
Concrete actions for such LIRs, what can you already do NOW:
- Start with this mindset
- Update your policies, accept code of conduct NtD and Abuse
- Be reachable !
- Subscribe to offered aggregated feeds
- Forward info and act , to customers / users
- Using standard OSS systems such as Abuse-IO
• If this initiative will start, are YOU prepared to participate ?
13
The current approach : motivate companies to patch 100%, is insufficient
The solution: Find ACTUAL leaks, aggregate, add performance info
Then forward to those who can fix– or who can make someone fix
In NL:
All we need is already there! Just need to go on steroids
Gov: (NCSC): please take the lead, connect the dots
Providers / LIRS: Adopt the CoC , connect to NBIP and start making a
difference
In your country: replicate the model
** It is time to act, now! **
Stichting
Digitale Infrastructuur
Nederland
www.dinl.nl

Mais conteúdo relacionado

Semelhante a RIPE79 the compelling case for national vulnerability management programs

TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-LookTomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
Brian F. Eddy
 
Whitepaper interview with pam morris
Whitepaper  interview with pam morrisWhitepaper  interview with pam morris
Whitepaper interview with pam morris
Computer Aid, Inc
 

Semelhante a RIPE79 the compelling case for national vulnerability management programs (20)

TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-LookTomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
 
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
 
Digital disruption – dive in to thrive
Digital disruption – dive in to thriveDigital disruption – dive in to thrive
Digital disruption – dive in to thrive
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!
 
Interview with pam morris
Interview with pam morrisInterview with pam morris
Interview with pam morris
 
If you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoptionIf you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoption
 
12 Items You Need To Include In Your Mobile Healthcare App Brief
12 Items You Need To Include In Your Mobile Healthcare App Brief12 Items You Need To Include In Your Mobile Healthcare App Brief
12 Items You Need To Include In Your Mobile Healthcare App Brief
 
How to sell the vision & value of online community
How to sell the vision & value of online communityHow to sell the vision & value of online community
How to sell the vision & value of online community
 
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
 
The 2013 Social Business Benchmark Preliminary Findings
The 2013 Social Business Benchmark Preliminary FindingsThe 2013 Social Business Benchmark Preliminary Findings
The 2013 Social Business Benchmark Preliminary Findings
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!
 
Whitepaper interview with pam morris
Whitepaper  interview with pam morrisWhitepaper  interview with pam morris
Whitepaper interview with pam morris
 
Lessons Learned by Social Businesses, 10 June 2014
Lessons Learned by Social Businesses, 10 June 2014Lessons Learned by Social Businesses, 10 June 2014
Lessons Learned by Social Businesses, 10 June 2014
 
Building a Digital Supply Chain - report - 9 APR 2018
Building a Digital Supply Chain - report - 9 APR 2018Building a Digital Supply Chain - report - 9 APR 2018
Building a Digital Supply Chain - report - 9 APR 2018
 
Transforming Healthcare: Build vs Buy
Transforming Healthcare: Build vs BuyTransforming Healthcare: Build vs Buy
Transforming Healthcare: Build vs Buy
 
Argyle CMO Summit 2015
Argyle CMO Summit 2015 Argyle CMO Summit 2015
Argyle CMO Summit 2015
 
Collaboration Excellence: Strategies for Enabling a Social Business
Collaboration Excellence: Strategies for Enabling a Social BusinessCollaboration Excellence: Strategies for Enabling a Social Business
Collaboration Excellence: Strategies for Enabling a Social Business
 
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
 
Advanced demand supply integration
Advanced demand supply integrationAdvanced demand supply integration
Advanced demand supply integration
 
??? (Rutgers Innovation Key Note)
??? (Rutgers Innovation Key Note)??? (Rutgers Innovation Key Note)
??? (Rutgers Innovation Key Note)
 

Último

call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 

Último (20)

Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 

RIPE79 the compelling case for national vulnerability management programs

  • 1. And why the LIR is a key factor M. Steltman - RIPE79 – 16-10-2019 The compelling case for vulnerability management
  • 2.
  • 3. Why are we vulnerable ? “We are vulnerable, because hard- and software has vulnerabilities. The bad guys find them and use them for themselves. So we need good guys to find them too, and then fix those leaks. It’s all we have” Bruce Schneier
  • 4. So, why don’t we just patch? 4
  • 5. The patching process for companies explained 5 ?
  • 6. Sounds easy but hard to achieve 100% 6 ?
  • 7. Too much to deal with 7
  • 8. 8 Digital Infrastructure, Including LIRs Companies with digital presence Financial servicesManufacturing Logistics Healthcare Retail MobilityGovernment Digital Services Plan B: Coordinated responsible disclosure / Bug bou Common approach: “Motivate” Add: Find and report
  • 10. => towards: CRD on steroids 10 Crawl and scan Crawl and scan Crawl and scan Crawl and scan Crawl and scan Crawl and scan networks Add performance information Collect and aggregate Forward & Policy Members & Constituents of:
  • 11. What can and should LIRs do? 11 ** Where does LIR responsibility start and stop **? -> LIR is NOT responsible, but is (as other intermediaries) a key actor in getting this going This goes way beyond ISP abuse mitigation! -LIR ( as ISP, hoster, CSP) is a key actor , the essential “middle man”: - Monitor: Which badness is visible in my networks: vulnerabilities and abuse - Receive: Subscribe to feeds, receive abuse- and vulnerability information - Triage: Who has the actual problem, which user or cusromer? - Forward: Who can and should fix this? - Policy: “motivate” users / customers to act, or act yourself
  • 12. Questions for RIPE community / LIRs 12 - Do you agree that this “actual vulnerability”approach can be very effective? - Do you agree that the LIR is a key middleman in this approach? Concrete actions for such LIRs, what can you already do NOW: - Start with this mindset - Update your policies, accept code of conduct NtD and Abuse - Be reachable ! - Subscribe to offered aggregated feeds - Forward info and act , to customers / users - Using standard OSS systems such as Abuse-IO • If this initiative will start, are YOU prepared to participate ?
  • 13. 13 The current approach : motivate companies to patch 100%, is insufficient The solution: Find ACTUAL leaks, aggregate, add performance info Then forward to those who can fix– or who can make someone fix In NL: All we need is already there! Just need to go on steroids Gov: (NCSC): please take the lead, connect the dots Providers / LIRS: Adopt the CoC , connect to NBIP and start making a difference In your country: replicate the model ** It is time to act, now! **

Notas do Editor

  1. And again: we are vulnerable. Very vulnerable. VPns vulnerabilities: as if your staff entry is open for everybody Our scientific councel has said it: this van lead to diusrutions of society. What is vital and what not. Anything can turn out to be vital if it is donw or compromised long enough It reall, is time to act. But how?
  2. I was on a OECD congres last year, with Nelly, inspired by bruce. He made the matter very simple. Let start with the technology. It is nog the only thing, but if that;s not safe,
  3. Our approach: complain about vulnerabiloiies, strong language: we must patch, whi do;t we do it ? And if you don;t, you are apparently neglicent and lazy. Shame on you? Is it thast simple?
  4. Let take a look at how it works. It sounds easy enough: Know your software Crawl the CVE database Go to your supplier Update and patch your systems done. We are all a lot safer!
  5. But is hard, and cumvbersome,e VCE has 20000 entries, Huge task to know your inventor and know when to patch. Easy to overlook one. vendos don;t always supply patches. And llots of your technologies atre with third parties, your hosters, SaaS providers. They can overloop patches too.
  6. To make things worse, patching breaks things. Lots of outages are caused by patching And then the minister will say “I am going to ibtervene with companies who don’t manage their availability ? There are too many patches to keep up with Patching is a manual, time consuming process Lack of resources Some applications can’t be patched End user resistance Patching breaks things
  7. Plan B: scan for things you see from the Internet. Act as the bad guys do. Then report to the compny who can fix this
  8. So here is the plan: Put RD on steroids. It is a simple formula, that many of you recognize from other problems. Scan Forward and aggregate Add: sticks and carrots Then: send to those who do not have the problemj themselves, but KNOW who hasve the problem. LIR’s, hosters, providers. They KNOW whio is reponsible, understand the technical details, can formulate the right call to action.