SlideShare a Scribd company logo
1 of 36
Download to read offline
Lars Kurth
Community Manger, Xen Project
Chairman, Xen Project Advisory Board
Director, Open Source, Citrix
lars_kurth
Reactive Services Proactive Services Security Quality Management
Alerts and Warnings
Incident Handling:
analysis, response on site,
response support, response
coordination
Vulnerability Handling:
Vulnerability analysis, response,
response coordination
Artefact Handling: analysis,
response, response coordination
Announcements
Technology Watch
Security Audits or Assessments
Configuration and Maintenance
of Security Tools, Applications,
and Infrastructures
Development of Security Tools
Intrusion Detection Services
Security-Related Information
Dissemination
Vulnerability Bounty Programs
Risk Analysis
Business Continuity and
Disaster Recovery Planning
Security Consulting
Awareness Building
Education/Training
Product Evaluation or
Certification
Products and Distros
Ensure that a fix is available in all product variants that were affected by the vulnerability and ideally
deployed by key customers at the time information of the security issue becomes public.
Cloud Providers and other public facing services
Ensure that a fix is deployed on all public facing hosts that were affected by the vulnerability at the
time information of a security issue becomes public.
Standard: ISO/IEC29147 ➜ ISO/IEC DIS 29147
https://www.first.org
The overall process a CSIRT team goes through when they discover a
vulnerability themselves or one is reported to them directly
In this case we assume that the CSIRT team has full control over all components in their system, which
is normally only the case when the Software stack is proprietary.
The process an open source project’s CSIRT team goes through
(modelled on best practice as used by Linux distros, Xen Project and
others)
How a commercial CSIRT team interacts with an open source team and
how this constrains what the commercial team can do
Triage
Vulnerability
reported to
organization
Analysis of Issue
Organizational / Planning
Establish Impacted Releases / Customers
Create PoC / Test Case: Understand the
issue, investigate its impact, enable test
that issue is fixed
Impact assessment
Negotiate Disclosure Schedule
Draft issue description
Plan deployment: large organizations need
to make sure that staff across impacted
teams is available
Allocate CVE Number
Issue description
Triage
Analysis of Issue
Vulnerability
reported to
organization
Organizational / Planning
Development of Mitigation
Live Patch Development
Develop fix
Q&A of fix
(formal proof that fix addresses the exploit)
Develop Live Patch
Backport fix/live patch to affected products
Per product validation
Analysis of Issue
Organizational / Planning
Development of Mitigation
Live Patch Development
Packaging/Deployment
Disclosure
Resource planning
Packaging (bundling of several fixes)
Q&A of packages against affected releases /
customer types
Deployment to affected customers
Disclosure to impacted FOSS project
(if applicable)
Pre-disclosure to important customers
typically under an NDA type agreement
Publish Documentation
Customer notification
This model assumes that the managing CSIRT organization is only
constrained by the wishes of the issue reporter
– This gives such an organization the freedom to for example pre-disclose
information to “important customers”
– And a maximum of freedom on any implementation schedule, assuming it can
convince the discoverer of an issue
– The possibility to not disclose any issues publicly: aka quietly fix them
When open source components are used, significant constraints are put
on what the CSIRT team can do
A similar situation also arises in situations where multiple parties are
impacted (e.g. Spectre, Meltdown)
Triage
Vulnerability
reported to
FOSS
organization
Analysis of Issue
Organizational / Planning
Establish Impacted Releases
Create PoC/Test Case: Understand the
issue, investigate its impact, enable test
that issue is fixed
Impact assessment
Negotiate Disclosure Schedule
Draft issue description
Plan deployment: large organizations need
to make sure that staff across impacted
teams is available
Allocate CVE Number
Issue description
Triage
Analysis of Issue
Vulnerability
reported to
FOSS
organization
Organizational / Planning
Development of Mitigation
Develop fix
Q&A of fix
(formal proof that fix addresses the exploit)
Develop Live Patch
Backport fix/live patch to affected products
Per product validation
sue
al / Planning
of Mitigation Pre-Disclosure
Pre-disclosure to qualifying downstream
CSIRTS
Typically fixed time-table (e.g. 2 weeks)
Restricts what CSIRT can do (e.g. no
deployment of fix during embargo)
Collaboration between qualifying CSIRTs
can be restricted
sue
al / Planning
of Mitigation Pre-Disclosure Public Disclosure
Publish Documentation and the fix
Projects might use own channel
Or openwall oss-security
Products and Distros
Ensure that a fix is available in all product variants that were affected by the vulnerability and ideally
deployed by key customers at the time information of the security issue becomes public.
Cloud Providers and other public facing services
Ensure that a fix is deployed on all public facing hosts that were affected by the vulnerability at the
time information of a security issue becomes public.
Whether these goals are achievable, depends on the FOSS Vulnerability
Management Process
Pre-Disclosure Period
Tr
Vulnerabilities
with fixes
predisclosed
to org
Will usually perform triage, because OSS
based product/service typically is modified
(patch queue) and/or use an unusual
configuration.
May choose not to fix a lower severity issue
immediately.
Analysis of Issue
Organizational / Planning
Pre-Disclosure Period
Tr
Vulnerabilities
with fixes
predisclosed
to org
Verify Impacted Releases / Customers
Create PoC / Test Case
Own Impact Assessment
(assessment typically depends on
assumptions that are not always universal)
Plan deployment: large organizations need
to make sure that staff across impacted
teams is available
Product specific issue description
Analysis of Issue
Organizational / Planning
Pre-Disclosure Period
Tr
Vulnerabilities
with fixes
predisclosed
to org
Adaptation of Mitigation
Live Patch Development
Adapt fix
Q&A of fix in own environment
(formal proof that fix addresses the exploit)
Develop Live Patch
Backport fix/live patch to affected products
Per product validation
Vulnerabilities
with fixes
predisclosed
to org
Analysis of Issue
Organizational / Planning
Pre-Disclosure Period
Tr
Packaging & DeploymentAdaptation of Mitigation
Packaging (bundling of several fixes)
Q&A of packages against affected releases /
customer types
Ready delivery channels for publication to
affected customers (e.g. automatic
deployment)
Analysis of Issue
Organizational / Planning
Pre-Disclosure Period
Tr
Packaging & DeploymentAdaptation of Mitigation
If deployment under embargo is permissible:
• Update all hosts that are affected
(typically using live patching)
• In the past (and in theory in some cases
today) some hosts may need to be
rebooted ➜ in such cases, customers
need to be notified during the embargo
period and may need to take action
Vulnerabilities
with fixes
predisclosed
to org
Does it qualify to be on a FOSS project’s pre-disclosure list?
Timetable:
• When is an issue pre-disclosed?
• How many bugs are pre-disclosed at once?
• How long is the disclosure period?
What can be done with the privileged information from the list:
• Deployment under embargo?
• Communicating to affected customers that they need to take action (e.g. scheduled reboots)
• Collaboration with other pre-disclosure list members
Technical:
• FOSS projects may do less than the CSIRT would do normally
• E.g. no live patches, no PoCs, no severity assessment, backports to older versions, …
Orgs qualifying for
pre-disclosure
linux-distros
@openwall.org
Xen Project OpenStack
FOSS & Commercial
Distros
Commercial & FOSS
Downstreams
Distros, products,
public services,
large users
This means that cloud
and hosting providers
generally do not know
of Linux related
security issues under
pre-disclosure and cannot
plan for, fix or deploy fixes
until they become public
Service Providers that are on Openwall Distros
Policy:
xenproject.org/security-policy.html
Pre-disclosure list membership:
FOSS projects/distros: 7
Products based on Xen: 11
Public Service Providers/Large Users: 57
That is a large pre-disclosure list, but we haven't had a single leakage since we
made the list inclusive 4 years ago
Allow updating of public
facing systems during
embargo
linux-distros
@openwall.org
Xen Project OpenStack
Only in rare and
extreme cases
Not documented
Yes, unless
discoverer objects
Enables hosting and cloud providers to update
their systems during the pre-disclosure period
In addition, Xen allows pre-disclosure member to
make non-specific announcements to customers,
aka “please reboot X by date because of an
upcoming Xen Project security issue”
An open source project,
of which a commercial
variant is delivered to
a service provider
Template adapted from one designed by PresentationGO.com
Pre-disclosure does not
normally allow to inform
customers of the issue,
even under NDA
Service providers, even
those using commercial
derivatives, qualify to be
on the pre-disclosure list
Service provider
has capability to deploy
fixes under embargo
Pre-disclosure list
members are allowed
to securely share information,
including binaries
Service provider
has visibility and
can plan deployment
This is also useful for live
patching and back-ports
for releases out of security
support
Openwall Distros: 5 days normally, up to 2 weeks in exceptional circumstances
Openstack: 3-5 days
• Generally too short for deployment at scale
Xen Project: 2 weeks, usually in batches of several issues
• 2 weeks have proven to be enough time for most organizations to handle 5-6 issues in one go
(assumes live patching)
Intel SYSRET (2012)
Heartbleed (2014)
Shellshock (2014)
Meltdown & Spectre (2018)
CVE-2018-8897 (2018)
Speculative Store Bypass (2018)
Speculative register leakage from lazy FPU context switching (2018)
L1 Terminal Fault (2018)
before June/July 28
The two attack vectors, now combined as Spectre are independently found
by Google’s Project Zero researchers and researchers from the academic
world. Meltdown attack vector is identified.
June 1st/July 28th
GPZ shares the Spectre findings with
Intel, AMD and ARM. Shares
Meltdown findings later
Based on www.theverge.com/2018/1/11/16878670/meltdown-spectre-disclosure-embargo-google-microsoft-linux &
plus.google.com/+jwildeboer/posts/jj6a9JUaovP
Aug – Dec 2017
Intel informs partners and other interested parties under NDA.
These are working on fixes privately (with the exception of Linux
which develops KPTI publicly under a cover story). Some deploy
fixes. The Coordinated Release Date is agreed upon to be 2018-
01-09
Jan 1 – 3 2018
Rumours are circulating eventually
leading to a Register article breaking
the story ➜ GPZ goes public before the
agreed release date
Typically, during
initial discussion
of the issue, it
becomes
apparent that
this is a multi-
vendor-issue
The finder of the issue stays in control over the time-table, reaching out to other impacted CSIRTS
The finder can insist on other constraints impacting CSIRTs
Exception: the discovery comes through a bug bounty program
➜ the discoverer essentially sells rights to the CSIRT managing the program
Information
sharing by trust
if finder permits
Coordinator: Frequently the discoverers delegate managing the disclosure to a preferred CSIRT,
which then acts as a front-end for other CSIRTS
Typically coordinators (if commercial) will share information with other CSIRTS under NDA to
cover themselves against litigation and prevent disclosure of issues
Information
sharing
frequently
under NDA
Security Disclosure between FOSS and vendors can be complex
– Most project’s have opaque practices: Linux Kernel, Qemu, Cloud Foundry, …
– There are exceptions: Linux Distros, Drupal, Mozilla, Node.js, OpenStack, Xen
Project
– Some standardization in the LF eco-system would be helpful
➜ across FOSS the range of different practices is even wider
– However this will be hard: it took the Xen Project 5 years of difficult iterative
public negotiations to get to where we are today
Multi-party Disclosure is even harder, but becoming more common
– Emerging standards and Best Practices amongst CSIRTs
– These promote NDAs amongst participating CSIRTs
(trust is insufficient if commercial stakes are high and there are legal risks)
➜ a problem for FOSS projects which cannot normally sign NDAs
Open Source Policies:
xenproject.org/security-policy.html
security.openstack.org/vmt-process.html
oss-security.openwall.org/wiki/mailing-lists/distros
Best Practice and Standards:
ISO/IEC29147 ➜ ISO/IEC DIS 29147
www.first.org
www.first.org/global/sigs/
vulnerability-coordination/multiparty/guidelines-v1.0
lars.kurth@xenproject.org
Picture by Lars Kurth

More Related Content

Similar to OSSNA18: Disclosure policies in the world of cloud: a look behind the scenes

Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Source Conference
 
LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...
LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...
LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...The Linux Foundation
 
Everything you need to know about your open source support contract
Everything you need to know about your open source support contractEverything you need to know about your open source support contract
Everything you need to know about your open source support contractRogue Wave Software
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
 
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...OpenNebula Project
 
General checklist for the development project
General checklist for the development projectGeneral checklist for the development project
General checklist for the development projectkeshav2011
 
T Jull - Product Development for Point-of-Care Testing Systems
T Jull - Product Development for Point-of-Care Testing SystemsT Jull - Product Development for Point-of-Care Testing Systems
T Jull - Product Development for Point-of-Care Testing SystemsThomas Jull
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingAll Things Open
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesRyan Faircloth
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-SessionRyan Faircloth
 
Xen Project Contributor Training : Part 4 Culture
Xen Project Contributor Training : Part 4 CultureXen Project Contributor Training : Part 4 Culture
Xen Project Contributor Training : Part 4 CultureThe Linux Foundation
 
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10Codenomicon
 
Sustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into SoftwareSustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into SoftwareSoftware Sustainability Institute
 
Scale14x: Are today's foss security practices robust enough in the cloud era ...
Scale14x: Are today's foss security practices robust enough in the cloud era ...Scale14x: Are today's foss security practices robust enough in the cloud era ...
Scale14x: Are today's foss security practices robust enough in the cloud era ...The Linux Foundation
 
Public Sector Agility Accelerator
Public Sector Agility AcceleratorPublic Sector Agility Accelerator
Public Sector Agility AcceleratorCraig Smith
 
Effective Software Release Management
Effective Software Release ManagementEffective Software Release Management
Effective Software Release ManagementMichael Degnan
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsCheckmarx
 
DevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceDevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceSource Code Control Limited
 

Similar to OSSNA18: Disclosure policies in the world of cloud: a look behind the scenes (20)

Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
 
LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...
LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...
LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...
 
Everything you need to know about your open source support contract
Everything you need to know about your open source support contractEverything you need to know about your open source support contract
Everything you need to know about your open source support contract
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 
DevOps and SF.pdf
DevOps and SF.pdfDevOps and SF.pdf
DevOps and SF.pdf
 
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
 
General checklist for the development project
General checklist for the development projectGeneral checklist for the development project
General checklist for the development project
 
T Jull - Product Development for Point-of-Care Testing Systems
T Jull - Product Development for Point-of-Care Testing SystemsT Jull - Product Development for Point-of-Care Testing Systems
T Jull - Product Development for Point-of-Care Testing Systems
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 
Xen Project Contributor Training : Part 4 Culture
Xen Project Contributor Training : Part 4 CultureXen Project Contributor Training : Part 4 Culture
Xen Project Contributor Training : Part 4 Culture
 
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
 
Stu w21 a
Stu w21 aStu w21 a
Stu w21 a
 
Sustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into SoftwareSustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into Software
 
Scale14x: Are today's foss security practices robust enough in the cloud era ...
Scale14x: Are today's foss security practices robust enough in the cloud era ...Scale14x: Are today's foss security practices robust enough in the cloud era ...
Scale14x: Are today's foss security practices robust enough in the cloud era ...
 
Public Sector Agility Accelerator
Public Sector Agility AcceleratorPublic Sector Agility Accelerator
Public Sector Agility Accelerator
 
Effective Software Release Management
Effective Software Release ManagementEffective Software Release Management
Effective Software Release Management
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
 
DevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceDevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous Compliance
 

More from The Linux Foundation

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleThe Linux Foundation
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...The Linux Foundation
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...The Linux Foundation
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...The Linux Foundation
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather ReportThe Linux Foundation
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...The Linux Foundation
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxThe Linux Foundation
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...The Linux Foundation
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderThe Linux Foundation
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...The Linux Foundation
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixThe Linux Foundation
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdThe Linux Foundation
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...The Linux Foundation
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DThe Linux Foundation
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsThe Linux Foundation
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...The Linux Foundation
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...The Linux Foundation
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...The Linux Foundation
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEThe Linux Foundation
 
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information SecurityXPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information SecurityThe Linux Foundation
 

More from The Linux Foundation (20)

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made Simple
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather Report
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
 
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information SecurityXPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

OSSNA18: Disclosure policies in the world of cloud: a look behind the scenes

  • 1. Lars Kurth Community Manger, Xen Project Chairman, Xen Project Advisory Board Director, Open Source, Citrix lars_kurth
  • 2.
  • 3. Reactive Services Proactive Services Security Quality Management Alerts and Warnings Incident Handling: analysis, response on site, response support, response coordination Vulnerability Handling: Vulnerability analysis, response, response coordination Artefact Handling: analysis, response, response coordination Announcements Technology Watch Security Audits or Assessments Configuration and Maintenance of Security Tools, Applications, and Infrastructures Development of Security Tools Intrusion Detection Services Security-Related Information Dissemination Vulnerability Bounty Programs Risk Analysis Business Continuity and Disaster Recovery Planning Security Consulting Awareness Building Education/Training Product Evaluation or Certification
  • 4. Products and Distros Ensure that a fix is available in all product variants that were affected by the vulnerability and ideally deployed by key customers at the time information of the security issue becomes public. Cloud Providers and other public facing services Ensure that a fix is deployed on all public facing hosts that were affected by the vulnerability at the time information of a security issue becomes public.
  • 5. Standard: ISO/IEC29147 ➜ ISO/IEC DIS 29147 https://www.first.org
  • 6. The overall process a CSIRT team goes through when they discover a vulnerability themselves or one is reported to them directly In this case we assume that the CSIRT team has full control over all components in their system, which is normally only the case when the Software stack is proprietary. The process an open source project’s CSIRT team goes through (modelled on best practice as used by Linux distros, Xen Project and others) How a commercial CSIRT team interacts with an open source team and how this constrains what the commercial team can do
  • 7. Triage Vulnerability reported to organization Analysis of Issue Organizational / Planning Establish Impacted Releases / Customers Create PoC / Test Case: Understand the issue, investigate its impact, enable test that issue is fixed Impact assessment Negotiate Disclosure Schedule Draft issue description Plan deployment: large organizations need to make sure that staff across impacted teams is available Allocate CVE Number Issue description
  • 8. Triage Analysis of Issue Vulnerability reported to organization Organizational / Planning Development of Mitigation Live Patch Development Develop fix Q&A of fix (formal proof that fix addresses the exploit) Develop Live Patch Backport fix/live patch to affected products Per product validation
  • 9. Analysis of Issue Organizational / Planning Development of Mitigation Live Patch Development Packaging/Deployment Disclosure Resource planning Packaging (bundling of several fixes) Q&A of packages against affected releases / customer types Deployment to affected customers Disclosure to impacted FOSS project (if applicable) Pre-disclosure to important customers typically under an NDA type agreement Publish Documentation Customer notification
  • 10. This model assumes that the managing CSIRT organization is only constrained by the wishes of the issue reporter – This gives such an organization the freedom to for example pre-disclose information to “important customers” – And a maximum of freedom on any implementation schedule, assuming it can convince the discoverer of an issue – The possibility to not disclose any issues publicly: aka quietly fix them When open source components are used, significant constraints are put on what the CSIRT team can do A similar situation also arises in situations where multiple parties are impacted (e.g. Spectre, Meltdown)
  • 11. Triage Vulnerability reported to FOSS organization Analysis of Issue Organizational / Planning Establish Impacted Releases Create PoC/Test Case: Understand the issue, investigate its impact, enable test that issue is fixed Impact assessment Negotiate Disclosure Schedule Draft issue description Plan deployment: large organizations need to make sure that staff across impacted teams is available Allocate CVE Number Issue description
  • 12. Triage Analysis of Issue Vulnerability reported to FOSS organization Organizational / Planning Development of Mitigation Develop fix Q&A of fix (formal proof that fix addresses the exploit) Develop Live Patch Backport fix/live patch to affected products Per product validation
  • 13. sue al / Planning of Mitigation Pre-Disclosure Pre-disclosure to qualifying downstream CSIRTS Typically fixed time-table (e.g. 2 weeks) Restricts what CSIRT can do (e.g. no deployment of fix during embargo) Collaboration between qualifying CSIRTs can be restricted
  • 14. sue al / Planning of Mitigation Pre-Disclosure Public Disclosure Publish Documentation and the fix Projects might use own channel Or openwall oss-security
  • 15. Products and Distros Ensure that a fix is available in all product variants that were affected by the vulnerability and ideally deployed by key customers at the time information of the security issue becomes public. Cloud Providers and other public facing services Ensure that a fix is deployed on all public facing hosts that were affected by the vulnerability at the time information of a security issue becomes public. Whether these goals are achievable, depends on the FOSS Vulnerability Management Process
  • 16. Pre-Disclosure Period Tr Vulnerabilities with fixes predisclosed to org Will usually perform triage, because OSS based product/service typically is modified (patch queue) and/or use an unusual configuration. May choose not to fix a lower severity issue immediately.
  • 17. Analysis of Issue Organizational / Planning Pre-Disclosure Period Tr Vulnerabilities with fixes predisclosed to org Verify Impacted Releases / Customers Create PoC / Test Case Own Impact Assessment (assessment typically depends on assumptions that are not always universal) Plan deployment: large organizations need to make sure that staff across impacted teams is available Product specific issue description
  • 18. Analysis of Issue Organizational / Planning Pre-Disclosure Period Tr Vulnerabilities with fixes predisclosed to org Adaptation of Mitigation Live Patch Development Adapt fix Q&A of fix in own environment (formal proof that fix addresses the exploit) Develop Live Patch Backport fix/live patch to affected products Per product validation
  • 19. Vulnerabilities with fixes predisclosed to org Analysis of Issue Organizational / Planning Pre-Disclosure Period Tr Packaging & DeploymentAdaptation of Mitigation Packaging (bundling of several fixes) Q&A of packages against affected releases / customer types Ready delivery channels for publication to affected customers (e.g. automatic deployment)
  • 20. Analysis of Issue Organizational / Planning Pre-Disclosure Period Tr Packaging & DeploymentAdaptation of Mitigation If deployment under embargo is permissible: • Update all hosts that are affected (typically using live patching) • In the past (and in theory in some cases today) some hosts may need to be rebooted ➜ in such cases, customers need to be notified during the embargo period and may need to take action Vulnerabilities with fixes predisclosed to org
  • 21. Does it qualify to be on a FOSS project’s pre-disclosure list? Timetable: • When is an issue pre-disclosed? • How many bugs are pre-disclosed at once? • How long is the disclosure period? What can be done with the privileged information from the list: • Deployment under embargo? • Communicating to affected customers that they need to take action (e.g. scheduled reboots) • Collaboration with other pre-disclosure list members Technical: • FOSS projects may do less than the CSIRT would do normally • E.g. no live patches, no PoCs, no severity assessment, backports to older versions, …
  • 22. Orgs qualifying for pre-disclosure linux-distros @openwall.org Xen Project OpenStack FOSS & Commercial Distros Commercial & FOSS Downstreams Distros, products, public services, large users This means that cloud and hosting providers generally do not know of Linux related security issues under pre-disclosure and cannot plan for, fix or deploy fixes until they become public Service Providers that are on Openwall Distros
  • 23. Policy: xenproject.org/security-policy.html Pre-disclosure list membership: FOSS projects/distros: 7 Products based on Xen: 11 Public Service Providers/Large Users: 57 That is a large pre-disclosure list, but we haven't had a single leakage since we made the list inclusive 4 years ago
  • 24. Allow updating of public facing systems during embargo linux-distros @openwall.org Xen Project OpenStack Only in rare and extreme cases Not documented Yes, unless discoverer objects Enables hosting and cloud providers to update their systems during the pre-disclosure period In addition, Xen allows pre-disclosure member to make non-specific announcements to customers, aka “please reboot X by date because of an upcoming Xen Project security issue”
  • 25. An open source project, of which a commercial variant is delivered to a service provider Template adapted from one designed by PresentationGO.com Pre-disclosure does not normally allow to inform customers of the issue, even under NDA
  • 26. Service providers, even those using commercial derivatives, qualify to be on the pre-disclosure list Service provider has capability to deploy fixes under embargo Pre-disclosure list members are allowed to securely share information, including binaries Service provider has visibility and can plan deployment This is also useful for live patching and back-ports for releases out of security support
  • 27. Openwall Distros: 5 days normally, up to 2 weeks in exceptional circumstances Openstack: 3-5 days • Generally too short for deployment at scale Xen Project: 2 weeks, usually in batches of several issues • 2 weeks have proven to be enough time for most organizations to handle 5-6 issues in one go (assumes live patching)
  • 28.
  • 29. Intel SYSRET (2012) Heartbleed (2014) Shellshock (2014) Meltdown & Spectre (2018) CVE-2018-8897 (2018) Speculative Store Bypass (2018) Speculative register leakage from lazy FPU context switching (2018) L1 Terminal Fault (2018)
  • 30. before June/July 28 The two attack vectors, now combined as Spectre are independently found by Google’s Project Zero researchers and researchers from the academic world. Meltdown attack vector is identified. June 1st/July 28th GPZ shares the Spectre findings with Intel, AMD and ARM. Shares Meltdown findings later Based on www.theverge.com/2018/1/11/16878670/meltdown-spectre-disclosure-embargo-google-microsoft-linux & plus.google.com/+jwildeboer/posts/jj6a9JUaovP Aug – Dec 2017 Intel informs partners and other interested parties under NDA. These are working on fixes privately (with the exception of Linux which develops KPTI publicly under a cover story). Some deploy fixes. The Coordinated Release Date is agreed upon to be 2018- 01-09 Jan 1 – 3 2018 Rumours are circulating eventually leading to a Register article breaking the story ➜ GPZ goes public before the agreed release date
  • 31. Typically, during initial discussion of the issue, it becomes apparent that this is a multi- vendor-issue The finder of the issue stays in control over the time-table, reaching out to other impacted CSIRTS The finder can insist on other constraints impacting CSIRTs Exception: the discovery comes through a bug bounty program ➜ the discoverer essentially sells rights to the CSIRT managing the program Information sharing by trust if finder permits
  • 32. Coordinator: Frequently the discoverers delegate managing the disclosure to a preferred CSIRT, which then acts as a front-end for other CSIRTS Typically coordinators (if commercial) will share information with other CSIRTS under NDA to cover themselves against litigation and prevent disclosure of issues Information sharing frequently under NDA
  • 33.
  • 34. Security Disclosure between FOSS and vendors can be complex – Most project’s have opaque practices: Linux Kernel, Qemu, Cloud Foundry, … – There are exceptions: Linux Distros, Drupal, Mozilla, Node.js, OpenStack, Xen Project – Some standardization in the LF eco-system would be helpful ➜ across FOSS the range of different practices is even wider – However this will be hard: it took the Xen Project 5 years of difficult iterative public negotiations to get to where we are today Multi-party Disclosure is even harder, but becoming more common – Emerging standards and Best Practices amongst CSIRTs – These promote NDAs amongst participating CSIRTs (trust is insufficient if commercial stakes are high and there are legal risks) ➜ a problem for FOSS projects which cannot normally sign NDAs
  • 35. Open Source Policies: xenproject.org/security-policy.html security.openstack.org/vmt-process.html oss-security.openwall.org/wiki/mailing-lists/distros Best Practice and Standards: ISO/IEC29147 ➜ ISO/IEC DIS 29147 www.first.org www.first.org/global/sigs/ vulnerability-coordination/multiparty/guidelines-v1.0