Quantifying Defence

Chat with Horangi CyberSecurity

2023/04/06

Apple PodCast

Spotify

Youtube

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This podcast interview from Horangi CyberSecurity’s “Ask a CISO” series features Anant Shrivastava discussing his journey into information security, the move to DevSecOps, quantifying defense, and software supply chain security.

Guest Background

Key Topics Discussed

Journey into Information Security:

Early Years:

Realization:

Mobile Security:

Journey Summary:

Why Not Programming:

Move into DevSecOps:

Starting Point:

Company Acquisition:

Hollow Flake Quote:

Journey:

DevSecOps Should Not Exist:

Quantifying Defense - The Battle for Budget:

Another Angle:

Cost Calculations:

Rise of Cloud and Open Source:

Journey Progressively Improving:

No Upper Limit to Loss:

Distinguishing Terms:

Quantifying Defense:

Mindset Change:

Software Supply Chain Security:

Why Worry About It:

80% Import Statements:

Why Care:

Initial Days:

How to Secure Supply Chain:

Three Aspects:

  1. Need to know what using: There has to be way to track what is it that constitute as components in environment - points to keyword “SBOM” (Software Bill of Material)
    • Just like: When go to carpenter or storekeeper, say “I want these” - give list of items
    • Software Bill of Material: List of items that are part of software stack
  2. Should be able to query database: Which has list of vulnerabilities
    • Databases: Like NVDs or local country-specific vulnerability database might be there
    • Query them: Find if existing flaws in those components
    • Covering: From situation where existing bugs are covered - not using something already vulnerable
  3. Put money where mouth is: Because product giving value, should be taking portion of that value (not talking about huge percentages, maybe 2% of profit), put that as push back to open source communities
    • Use fund: In maybe two different manners:
      • Directly support developers: “Hey you developing something I’m using, here is donation, ensure food on plate, in position to work on things”
      • Contract with developer: “Since developing component for me, going to pay small sum (not life-changing sum), ensure recurring sum goes to you because work important to me”

US Government Initiatives:

Developer Reality:

Other Approaches:

SSDF and Frameworks:

Supply Chain is More Than Modules:

Last Thought:

Key Insights:

Actionable Takeaways:

  1. Offense is measurable, defense is not - need to figure out how to quantify
  2. Move infosec from art to science - need metrics and procedures
  3. Offensive problems are technical, defensive problems are political
  4. 80% of software is dependencies - need SBOM
  5. Supply chain includes more than code - IDEs, SaaS, IAM policies
  6. Put money where mouth is - support open source developers (2% of profit)
  7. Reserve employee time to contribute to open source projects
  8. SSDF has teeth - cascading requirement for US government contractors
  9. Meet in middle - offensive people tone down expectations, developers rank up bugs
  10. Need better communication of security value to leadership