SlideShare a Scribd company logo
1 of 35
#wceu @perezbox | @sucuri_security
#wceu @perezbox | @sucuri_security
#wceu @perezbox | @sucuri_security
WordPress Security 
It Starts With Good Posture 
#wceu @perezbox | @sucuri_security
Background 
#wceu @perezbox | @sucuri_security
“As a species, we are risk adverse when it 
comes to gains, but risk seeking when it 
comes to loss…” 
- Bruce Schneider, BlackHat 2014 
State of Incident Response 
#wceu @perezbox | @sucuri_security
Why should I 
worry about 
security? 
#wceu @perezbox | @sucuri_security
• Audience 
• Business 
• Responsibility 
#wceu @perezbox | @sucuri_security
“The value of a network is equals the square 
of the number of users.” 
- Metcalf Law – Value of a Network 
#wceu @perezbox | @sucuri_security
Attacks come in 
many forms 
Malware distribution, 
email spam, web server 
abuses, phishing lures 
#wceu @perezbox | @sucuri_security
Security begins 
with Good 
Posture 
#wceu @perezbox | @sucuri_security
Security is about 
Risk Reduction 
The risk will never be 
zero 
#wceu @perezbox | @sucuri_security
As posture increases, 
risk reduces 
#wceu @perezbox | @sucuri_security
Protection 
Response 
Detection 
#wceu @perezbox | @sucuri_security
Maintenance 
Protection 
Response 
Detection 
#wceu @perezbox | @sucuri_security
Best Practices/ 
Response 
Protection 
Principles Maintenance 
Detection 
#wceu @perezbox | @sucuri_security
“The biggest weakness we face as a 
community in security is also it’s greatest 
strength as a platform – its extensibility and 
ease of use.” 
- Tony Perez 
#wceu @perezbox | @sucuri_security
Diving into the WordPress 
Security LifeCycle 
#wceu @perezbox | @sucuri_security
Best Practice / 
Principles 
The Foundation 
#wceu @perezbox | @sucuri_security
Best Practice/Principles 
• Defense in Depth 
– Layered Defenses 
• Principle of Least Privileged 
– 20 admins? 
• Function Isolation (Production vs 
Staging vs Testing) 
– Soup Kitchen Servers 
#wceu @perezbox | @sucuri_security
Maintenance 
It Begins with Good 
Administration 
#wceu @perezbox | @sucuri_security
Maintenance 
• User Management 
• Backups 
• Account Management 
• Software Management 
#wceu @perezbox | @sucuri_security
Protection 
Stopping attacks from 
impacting your website 
#wceu @perezbox | @sucuri_security
Protection 
• Denial of Service Attacks 
• Brute Force Attacks 
• Exploitation of Software 
Vulnerabilities 
• Application Hardening 
#wceu @perezbox | @sucuri_security
Detection 
Identifying security events 
#wceu @perezbox | @sucuri_security
Detection 
• Activity Monitoring 
• Security Scanning 
• Malware / Non-Malware Scanning 
• Indicators of Compromise 
#wceu @perezbox | @sucuri_security
Response 
How do you address 
the problem? 
#wceu @perezbox | @sucuri_security
Response 
• Incident Handling 
• What’s an Incident? 
• Brand / Business Impacts 
#wceu @perezbox | @sucuri_security
The WordPress 
security plugin 
ecosystem 
http://blog.sucuri.net/2014/09/understand 
ing-the-wordpress-security-plugin-ecosystem. 
html 
#wceu @perezbox | @sucuri_security
Access Control – 
Login 
33% of infected 
websites come from 
poor credentials and user 
management 
#wceu @perezbox | @sucuri_security
Access Control 
• Whitelisting Access 
• Two Factor Authentication 
• Password Managers 
#wceu @perezbox | @sucuri_security
Online Habits 
Your security goes 
beyond just the 
application 
#wceu @perezbox | @sucuri_security
Online Habits 
• Local AntiVirus – Mac / Windows 
• Personal Virtual Private Network’s 
• Auto Play / Enabled JS 
#wceu @perezbox | @sucuri_security
When all else fails, 
enlist the help of 
professionals 
#wceu @perezbox | @sucuri_security
Get in touch 
Let’s get social: 
• Twitter: @perezbox 
• Twitter: @sucuri_security 
• Facebook: /SucuriSec 
Read what I write: 
• http://blog.sucuri.net 
• http://tonyonsecurity.com 
#wceu @perezbox | @sucuri_security

More Related Content

What's hot

Word camp orange county 2012 enduser security
Word camp orange county 2012   enduser securityWord camp orange county 2012   enduser security
Word camp orange county 2012 enduser security
Tony Perez
 

What's hot (20)

Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit GuideSucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
 
Sucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get HackedSucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get Hacked
 
Sucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital MarketersSucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital Marketers
 
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website SpeedSucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
 
Why Do Hackers Hack?
Why Do Hackers Hack?Why Do Hackers Hack?
Why Do Hackers Hack?
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
Wordpress security best practices - WordCamp Waukesha 2017
Wordpress security best practices - WordCamp Waukesha 2017Wordpress security best practices - WordCamp Waukesha 2017
Wordpress security best practices - WordCamp Waukesha 2017
 
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's API
 
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics ReportsSucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
 
Sucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online StoreSucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online Store
 
Word camp orange county 2012 enduser security
Word camp orange county 2012   enduser securityWord camp orange county 2012   enduser security
Word camp orange county 2012 enduser security
 
What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?
 
The 7 Deadly Sins of WordPress Security
The 7 Deadly Sins of WordPress SecurityThe 7 Deadly Sins of WordPress Security
The 7 Deadly Sins of WordPress Security
 
Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri Security
 
The Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageThe Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS Baggage
 
WCEU 2016 - 10 tips to sleep better at night
WCEU 2016 - 10 tips to sleep better at nightWCEU 2016 - 10 tips to sleep better at night
WCEU 2016 - 10 tips to sleep better at night
 
WPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press websiteWPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press website
 
WP Security - Master Class #SMWLagos2014
WP Security - Master Class #SMWLagos2014WP Security - Master Class #SMWLagos2014
WP Security - Master Class #SMWLagos2014
 
WordPress Hardening v4
WordPress Hardening v4WordPress Hardening v4
WordPress Hardening v4
 
Access Denied
Access DeniedAccess Denied
Access Denied
 

Viewers also liked

WordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, DefensesWordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, Defenses
Tony Perez
 
Facebook Security SMCMIDMO
Facebook Security SMCMIDMOFacebook Security SMCMIDMO
Facebook Security SMCMIDMO
Jerry Gamblin
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (8)

Beyonce
BeyonceBeyonce
Beyonce
 
Building a Security Framework for Websites
Building a Security Framework for WebsitesBuilding a Security Framework for Websites
Building a Security Framework for Websites
 
WordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, DefensesWordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, Defenses
 
Facebook security
Facebook securityFacebook security
Facebook security
 
Information security
Information securityInformation security
Information security
 
Facebook Security SMCMIDMO
Facebook Security SMCMIDMOFacebook Security SMCMIDMO
Facebook Security SMCMIDMO
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to WordPress Security Begins With Good Posture

Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Aditya K Sood
 
brochure 2016-September (1)
brochure 2016-September (1)brochure 2016-September (1)
brochure 2016-September (1)
Dan Kunkel
 

Similar to WordPress Security Begins With Good Posture (20)

Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
 
WordPress Security: Beyond The Plugin
WordPress Security:  Beyond The PluginWordPress Security:  Beyond The Plugin
WordPress Security: Beyond The Plugin
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4
 
Shift Left Security – Guidance on embedding security for a Digital Transforma...
Shift Left Security – Guidance on embedding security for a Digital Transforma...Shift Left Security – Guidance on embedding security for a Digital Transforma...
Shift Left Security – Guidance on embedding security for a Digital Transforma...
 
Professional WordPress Security: Beyond Security Plugins
Professional WordPress Security: Beyond Security PluginsProfessional WordPress Security: Beyond Security Plugins
Professional WordPress Security: Beyond Security Plugins
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.ppt
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glance
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patterns
 
Berezha Security
Berezha SecurityBerezha Security
Berezha Security
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
 
Security At The Speed of Innovation - Marudhamaran Gunasekaran
Security At The Speed of Innovation - Marudhamaran GunasekaranSecurity At The Speed of Innovation - Marudhamaran Gunasekaran
Security At The Speed of Innovation - Marudhamaran Gunasekaran
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
 
Digital Inclusion in the Public Sector
Digital Inclusion in the Public SectorDigital Inclusion in the Public Sector
Digital Inclusion in the Public Sector
 
brochure 2016-September (1)
brochure 2016-September (1)brochure 2016-September (1)
brochure 2016-September (1)
 
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
 

More from Tony Perez

Website Security (WordPress) - It's About the Basics
Website Security (WordPress) - It's About the BasicsWebsite Security (WordPress) - It's About the Basics
Website Security (WordPress) - It's About the Basics
Tony Perez
 
WordCamp Minneapolis 2014 - Website Security Presentation - Sucuri Security
WordCamp Minneapolis 2014 - Website Security Presentation - Sucuri SecurityWordCamp Minneapolis 2014 - Website Security Presentation - Sucuri Security
WordCamp Minneapolis 2014 - Website Security Presentation - Sucuri Security
Tony Perez
 
Word press website security
Word press website securityWord press website security
Word press website security
Tony Perez
 
WordPress Security - Dealing With Today's Hacks
WordPress Security - Dealing With Today's HacksWordPress Security - Dealing With Today's Hacks
WordPress Security - Dealing With Today's Hacks
Tony Perez
 

More from Tony Perez (11)

A Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersA Practical Security Framework for Website Owners
A Practical Security Framework for Website Owners
 
2017 WHD - Bridging the Divide Between Behavior and Security
2017 WHD - Bridging the Divide Between Behavior and Security2017 WHD - Bridging the Divide Between Behavior and Security
2017 WHD - Bridging the Divide Between Behavior and Security
 
Accounting for Website Security in Higher Education
Accounting for Website Security in Higher EducationAccounting for Website Security in Higher Education
Accounting for Website Security in Higher Education
 
Business of People - Lessons Learned Building a Remote Workforce
Business of People - Lessons Learned Building a Remote WorkforceBusiness of People - Lessons Learned Building a Remote Workforce
Business of People - Lessons Learned Building a Remote Workforce
 
Website Security (WordPress) - It's About the Basics
Website Security (WordPress) - It's About the BasicsWebsite Security (WordPress) - It's About the Basics
Website Security (WordPress) - It's About the Basics
 
Website Security - Latest and Greatest (WordPress 2014)
Website Security - Latest and Greatest (WordPress 2014)Website Security - Latest and Greatest (WordPress 2014)
Website Security - Latest and Greatest (WordPress 2014)
 
WordCamp Minneapolis 2014 - Website Security Presentation - Sucuri Security
WordCamp Minneapolis 2014 - Website Security Presentation - Sucuri SecurityWordCamp Minneapolis 2014 - Website Security Presentation - Sucuri Security
WordCamp Minneapolis 2014 - Website Security Presentation - Sucuri Security
 
Joomla! Day Atlanta 2014 - Website Security - The Basics
Joomla! Day Atlanta 2014 - Website Security - The BasicsJoomla! Day Atlanta 2014 - Website Security - The Basics
Joomla! Day Atlanta 2014 - Website Security - The Basics
 
Word press website security
Word press website securityWord press website security
Word press website security
 
WordPress Security - Dealing With Today's Hacks
WordPress Security - Dealing With Today's HacksWordPress Security - Dealing With Today's Hacks
WordPress Security - Dealing With Today's Hacks
 
WordPress Security - The "No-BS" Version
WordPress Security - The "No-BS" VersionWordPress Security - The "No-BS" Version
WordPress Security - The "No-BS" Version
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

WordPress Security Begins With Good Posture

  • 1. #wceu @perezbox | @sucuri_security
  • 2. #wceu @perezbox | @sucuri_security
  • 3. #wceu @perezbox | @sucuri_security
  • 4. WordPress Security It Starts With Good Posture #wceu @perezbox | @sucuri_security
  • 5. Background #wceu @perezbox | @sucuri_security
  • 6. “As a species, we are risk adverse when it comes to gains, but risk seeking when it comes to loss…” - Bruce Schneider, BlackHat 2014 State of Incident Response #wceu @perezbox | @sucuri_security
  • 7. Why should I worry about security? #wceu @perezbox | @sucuri_security
  • 8. • Audience • Business • Responsibility #wceu @perezbox | @sucuri_security
  • 9. “The value of a network is equals the square of the number of users.” - Metcalf Law – Value of a Network #wceu @perezbox | @sucuri_security
  • 10. Attacks come in many forms Malware distribution, email spam, web server abuses, phishing lures #wceu @perezbox | @sucuri_security
  • 11. Security begins with Good Posture #wceu @perezbox | @sucuri_security
  • 12. Security is about Risk Reduction The risk will never be zero #wceu @perezbox | @sucuri_security
  • 13. As posture increases, risk reduces #wceu @perezbox | @sucuri_security
  • 14. Protection Response Detection #wceu @perezbox | @sucuri_security
  • 15. Maintenance Protection Response Detection #wceu @perezbox | @sucuri_security
  • 16. Best Practices/ Response Protection Principles Maintenance Detection #wceu @perezbox | @sucuri_security
  • 17. “The biggest weakness we face as a community in security is also it’s greatest strength as a platform – its extensibility and ease of use.” - Tony Perez #wceu @perezbox | @sucuri_security
  • 18. Diving into the WordPress Security LifeCycle #wceu @perezbox | @sucuri_security
  • 19. Best Practice / Principles The Foundation #wceu @perezbox | @sucuri_security
  • 20. Best Practice/Principles • Defense in Depth – Layered Defenses • Principle of Least Privileged – 20 admins? • Function Isolation (Production vs Staging vs Testing) – Soup Kitchen Servers #wceu @perezbox | @sucuri_security
  • 21. Maintenance It Begins with Good Administration #wceu @perezbox | @sucuri_security
  • 22. Maintenance • User Management • Backups • Account Management • Software Management #wceu @perezbox | @sucuri_security
  • 23. Protection Stopping attacks from impacting your website #wceu @perezbox | @sucuri_security
  • 24. Protection • Denial of Service Attacks • Brute Force Attacks • Exploitation of Software Vulnerabilities • Application Hardening #wceu @perezbox | @sucuri_security
  • 25. Detection Identifying security events #wceu @perezbox | @sucuri_security
  • 26. Detection • Activity Monitoring • Security Scanning • Malware / Non-Malware Scanning • Indicators of Compromise #wceu @perezbox | @sucuri_security
  • 27. Response How do you address the problem? #wceu @perezbox | @sucuri_security
  • 28. Response • Incident Handling • What’s an Incident? • Brand / Business Impacts #wceu @perezbox | @sucuri_security
  • 29. The WordPress security plugin ecosystem http://blog.sucuri.net/2014/09/understand ing-the-wordpress-security-plugin-ecosystem. html #wceu @perezbox | @sucuri_security
  • 30. Access Control – Login 33% of infected websites come from poor credentials and user management #wceu @perezbox | @sucuri_security
  • 31. Access Control • Whitelisting Access • Two Factor Authentication • Password Managers #wceu @perezbox | @sucuri_security
  • 32. Online Habits Your security goes beyond just the application #wceu @perezbox | @sucuri_security
  • 33. Online Habits • Local AntiVirus – Mac / Windows • Personal Virtual Private Network’s • Auto Play / Enabled JS #wceu @perezbox | @sucuri_security
  • 34. When all else fails, enlist the help of professionals #wceu @perezbox | @sucuri_security
  • 35. Get in touch Let’s get social: • Twitter: @perezbox • Twitter: @sucuri_security • Facebook: /SucuriSec Read what I write: • http://blog.sucuri.net • http://tonyonsecurity.com #wceu @perezbox | @sucuri_security

Editor's Notes

  1. You open your window and you take a moment to take in the magnificent views Amsterdam has to offer… you’re midway through a week long trip that has taken you from the comforts of home to far off lands where you will engaging with the community you love, but in a region you have never been.. You’re excited, you’ve brought your team with you, everything that appears to be a priority is in place and ready… Take a moment to feel what it’s like to know something is wrong. Take a moment to feel vulnerable, out of control. I want you to feel the lump in your throat, to feel the heat in your face as the blood rises and you feel yourself slowly get angry… Now imagine the feelings you get as you stare at this serene picture of Amsterdam. Look at the beauty in the picture, the reflections of the light on the water, the calmness in the air, you can almost feel the state of mind as you stare at this beautiful picture.. Bing… You have just received an email… It reads, “I think something is wrong… I think we’ve been hacked…”
  2. You’ve been hacked…it impacts your users and you have no choice but to disclose… There is perhaps no worse experience for a website owner today… the emotional response within the first 24 / 48 hours is like nothing you have experience… What do you do? What do you say? How do you say it? What went wrong? How could this happen? But a fraction of the questions going through your mind… ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: It doesn’t hit you at first.. But eventually it does and the gravity of the situation becomes a very real thing… “You’ve been Hacked” a “Vulnerability has been Found in your code” There is no denying that the next couple of hours will be the hardest you have ever experienced.. Everything will be amplified.. The emotions will be raw… the media will not be your friend, the online trolls will grasp at your misfortunes in ways that you’d never expect… This, this is the harsh reality of security.. This is the side of security that we don’t talk about, but that I live daily… Whether you write content or sell products… the emotions are the same, they’re just relative to your environment but they aren’t any less or more important…
  3. My name is Tony Perez, and today we’re going to talk about Posture and how it relates to WordPress Security
  4. I have only 25 minutes to wow you with the details that make up the complex world of security so if I go to fast, I apologize now… I will cramp, as effectively as I can, the most pertinent pieces of the domain. As for who I am, I own and operate a website security company called Sucuri. I am a website security blogger and professional. My life revolves around my family, website security, business and BJJ, if you want to talk about any of those things let’s definitely catch up..
  5. At Sucuri we take our work very serious.. We mitigate a little over 40 million attacks a month these days and remediate over 400 websites a day.. Website of all caliber, from WordPress, to custom ASP sites.. It’s indifferent to us… Our passion is the evolution and state of website security across the entire spectrum…
  6. I give a lot of talks on website security, and there is one constant… always provide the audience context… it helps answer the very real and serious questions that every website owners asks themselves when it comes to Security…
  7. All of a sudden panic sets in.. You email and phone pinged, you check and it’s from your sys admin.. You’re staring at it as if in disbelief.. You find yourself looking at the words as if they were written in Chinese and you realize the inevitable has happened… The last thing you ever considered is now a reality… your stomach is in a knot… and you feel like throwing up….
  8. When I talk to this I talk to three key elements that should impact every website owner.. Your Audience, Your Business, and Your Responsibility. Yes, I know they said it was going to be easy. All you had to do was deploy your new WordPress site using the infamous 5 minute install, set it and forget it.. In minutes you would be on your way to delivering content around the world. What they likely didn’t tell you though that like the process of writing content, management and administration of your website were just as important. What they likely didn’t tell you is that you build an audience, as you build your business your responsibility to ensure the integrity of your website increases exponentially.
  9. Intuition is simple, one user is boring, 1,000,000 user is more exciting… the more people in the network, the more valuable it is.. Think the WordPress ecosystem.. Think 23% ownership of the web space, think what happens as that number continues to grow to 25%, 30%, 50%... The value of the platform and user network grows exponentially and that growth attracks more attention, and in security that equates to attacks and compromises.. And so we have to adjust our way of thinking and really appreciate the security domain of WordPress Security more professionally and recognize the entire process in a more holistic stand point…
  10. Cyber crime has matured as an industry, today you find established Demand / Supply chains It’s because of this that you must understand that attacks come in various forms, in various “payloads” We often hear of the term “Malware” – also known as “Malicious Software” what we don’t realize however is that it’s used as a generic, catch all term, but often there are various other non-malware related infections that you should be mindful of. Remember also that what you see is often but 10% of the problem, only a tip of the ice berg… You have to be mindful of malware distribution, but also abuses on your web server resources, things like email spam, phishing lures, DDOS scripts, IRC bots and several other infections / attacks.
  11. And so to achieve this I think it’s time we start changing the way we talk about security, especially WordPress Security. We have to start evolving our thoughts from the “Top 10 Things You must Do” to something that is a bit more encompassing..
  12. To do this you must first begin by appreciating what Security is truly about, and that is risk management. It’s not a domain of absolutes, your risk of a compromise will never be zero but that is why there are well established security protocols and processes defined to help you.
  13. These protocols and practices are all things that talk to your security posture.. And as that posture increases in strength, your risk reduces to a manageable level
  14. And so let’s take a look at the traditional Security Wheel in Information Security.. What you see here is a process relationship between the three pillars of Protection, Detection and Response.. This model exists because as security professionals we know and understand that no one piece of the wheel is a 100% solution, yet as a community we fail to grasp this concept and we tune our brain to understand security as a linear process that can be achieved via X, Y and Z changes… This wheel though makes a number of assumptions that are widely recognized across the Information Technology stack but something that we have lost perspective online as we focus heavily on this concept of oversimplification… Oversimplification in the way we code. Oversimplification in the way explain the platform. Oversimplification on t he responsibilities associated with website management and administration.
  15. First we have to expand the wheel with the concept of maintenance… and
  16. Finalize the security wheel with Best Practices and Principles…. What you should realize as you look at the wheel above is that it is not a linear process… it’s not something you do and forget… Each one of these categories, these domains are complex and could make up their own series of presentations but let’s take a minute to dive into each as succinctly as possible..
  17. And this is an issue that extends beyond just WordPress.. It’s something that all of today’s popular applications / frameworks suffer from, some more than others ofcourse.
  18. So let’s take the few minutes we have to quickly dive through the various facets of the lifecycle and see if we can’t better appreciate how thing fit…
  19. Many don’t realize how much risk they can reduce with basic concepts like Defense in Defense and Principles of least privileged. Defense in Defense being a principle that talks to layered defenses in which you understand and realize that it’s a series of tools and process that make up your security posture, not any single thing. And where least privileged talks specifically to the administration of user accounts – should be asking yourself, does everyone need to be an admin? This last one is one I can’t stress enough, I also call it soup kitchen servers. Soup kitchen servers lead to something known as Cross-Site Contamination, a concept where attackers can leap frog from site to site in your own environment. I bundle it though into a much larger category of function isolation.. Too often we see organizations, large and small, mixing functions.. Email servers with web servers, web servers with file servers.. Etc.. Isolate each function and categorize them appropriately – production vs staging vs testing.. Each having their own security protocols..
  20. This slide alone could be broken into several presentations, several hours each. When we think maintenance we have to appreciate how complex a process this, and with it you’ll find a number of basic administration tasks – things like basic user management, to ensuring you have adequate backups and you’re keeping your software stack current (in other words updating).
  21. How can you have a security talk these days without spending some time talking to the various security incidents over the past few months. Granted Sucuri has been at the fore front of most of these disclosures.. It is however a peak into the reality we live every day. Brute force and Denial of Service attacks are at all time highs, and it’s likely that today’s highs will be tomorrow’s normal. This explosion is in large part to the formation of a vey mature business ecosystem for bad actors (hackers). Similar to the predecessors of websites, desktop and infrastructure, we have to start thinking of ways to proactively stop these attacks from penetrating your websites. The more common technique has always been application level hardening, but it leaves much to be desired and does very little for things like exploitation of software vulnerabilities.
  22. There is a concept known as Indicators of Compromise. It’s not as common as many would like it to be, but it talks to the focus required on the various events that make up a compromise. Most often focus solely on the event itself, but when you analyze and understand the attack in its entirety you gain a much deeper appreciation for those indicators. Remember that your Detection category is tightly coupled with your Protection category. Many like to ask, well if I have protection, why do I need detection.. That is the wrong question to ask… What you should be asking is: What should I be looking as a possible indicator in the event my protection fails?
  23. There is perhaps no more devastating event to your business than when you realize you have been hacked. How do you get the word out? What do you say? How much do you disclose? We know we all love to throw stones from our own glass houses… What is your protocol in the event of an incident? Are you naïve to think it will never happen to you? What about your clients? How do you assure them that in the event of an incident they have a way out? What does an incident look like? ToS violation, Host disables your website, Google Blacklists your website, Users can’t access your website because it’s being blocked.. We have seen sites go from 40,000 visits a day to 400 after a compromise.. Think of the impacts that could have to your brand to your business…
  24. With that being said, instead of giving you a list of security plugins and tools.. I prefer to help you think of security plugins a bit differently.. Too often I see recommendations for various tools, but we often don’t fully grasp or understand how they fit in the spectrum of WordPress Security. I wrote an article about it, it’d take too long to go through it here.. So take some time to read it…
  25. Trustwave reports in their analysis that 33% of the compromises they see today are attributed to access control exploits – in short, poor access control management leading to compromises. This number is too high.. We need to d a better job… we need to