Quantifying Defence

Chat with Horangi CyberSecurity

2023/04/06

Apple PodCast

Spotify

Youtube

AI Generated Summary

This podcast interview from Horangi CyberSecurity’s “Ask a CISO” series features Anant Shrivastava discussing his journey into information security, the move to DevSecOps, quantifying defense, and software supply chain security.

Guest Background

Key Topics Discussed

Journey into Information Security:

Early Years:

Realization:

Mobile Security:

Journey Summary:

Why Not Programming:

Move into DevSecOps:

Starting Point:

Company Acquisition:

Hollow Flake Quote:

Journey:

DevSecOps Should Not Exist:

Quantifying Defense - The Battle for Budget:

Another Angle:

Cost Calculations:

Rise of Cloud and Open Source:

Journey Progressively Improving:

No Upper Limit to Loss:

Distinguishing Terms:

Quantifying Defense:

Mindset Change:

Software Supply Chain Security:

Why Worry About It:

80% Import Statements:

Why Care:

Initial Days:

How to Secure Supply Chain:

Three Aspects:

  1. Need to know what using: There has to be way to track what is it that constitute as components in environment - points to keyword “SBOM” (Software Bill of Material)
    • Just like: When go to carpenter or storekeeper, say “I want these” - give list of items
    • Software Bill of Material: List of items that are part of software stack
  2. Should be able to query database: Which has list of vulnerabilities
    • Databases: Like NVDs or local country-specific vulnerability database might be there
    • Query them: Find if existing flaws in those components
    • Covering: From situation where existing bugs are covered - not using something already vulnerable
  3. Put money where mouth is: Because product giving value, should be taking portion of that value (not talking about huge percentages, maybe 2% of profit), put that as push back to open source communities
    • Use fund: In maybe two different manners:
      • Directly support developers: “Hey you developing something I’m using, here is donation, ensure food on plate, in position to work on things”
      • Contract with developer: “Since developing component for me, going to pay small sum (not life-changing sum), ensure recurring sum goes to you because work important to me”

US Government Initiatives:

Developer Reality:

Other Approaches:

SSDF and Frameworks:

Supply Chain is More Than Modules:

Last Thought:

Key Insights:

Actionable Takeaways:

  1. Offense is measurable, defense is not - need to figure out how to quantify
  2. Move infosec from art to science - need metrics and procedures
  3. Offensive problems are technical, defensive problems are political
  4. 80% of software is dependencies - need SBOM
  5. Supply chain includes more than code - IDEs, SaaS, IAM policies
  6. Put money where mouth is - support open source developers (2% of profit)
  7. Reserve employee time to contribute to open source projects
  8. SSDF has teeth - cascading requirement for US government contractors
  9. Meet in middle - offensive people tone down expectations, developers rank up bugs
  10. Need better communication of security value to leadership