05.08.2016 Views

Problem

us-16-Weston-Windows-10-Mitigation-Improvements

us-16-Weston-Windows-10-Mitigation-Improvements

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• S<br />

<strong>Problem</strong>:<br />

Preventative Security<br />

Attackers are agile, adaptive, and results<br />

focused – effective techniques often<br />

don’t map to security boundaries<br />

• Preventative Strategy – SDL “Find all the<br />

bugs” before shipping<br />

• Static Security Boundaries – vulnerability<br />

equals “game over”<br />

• Focus on component level security –<br />

customer assets, configuration, 3 rd party<br />

software largely out-of-scope<br />

• Investigation of exploit and other attack<br />

techniques out-of-scope<br />

• Engineering driven - Focus on<br />

abstraction to support scale and process<br />

• Mitigation design and offensive security<br />

research is ad-hoc and specialized<br />

Market value for exploits is 10x<br />

vulnerabilities – preventative security is<br />

focused on lowest value asset<br />

Attackers invest in developing tool sets<br />

and libraries – no proactive disruption,<br />

reactive response only after attacks<br />

The cost for attackers is unknown – The<br />

current approach to security is abstracted<br />

from attacks – security effectiveness<br />

against real attacks unknown<br />

“Assume breach” mitigation strategy augments preventative security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!