SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Copyright © 2012 Splunk, Inc.




Data-Driven Security:
Managing Risk at Etsy
Nick Galbreath @ngalbreath
Director of Engineering - Etsy
Gartner Security Summit
National Harbor, MD
June 12, 2012
Agenda

Who am I? Who is Etsy? Splunk at Etsy?

Web Application Security

Account Takeover

Payments and PCI

Credits, Data, Further Reading

                           2
@ngalbreath


http://slidesha.re/KPvHYu


            3
Whois Nick Galbreath
Director of Engineering at Etsy covering:
–   Fraud
–   Security
                                                        2
–   Support Engineering                           -06-1
–   (and other stuff outside of this talk)   2012 y
                                                 is m
Software Development background in              two  year
                                                     e rsary
E-Commerce and Social Media                    anniv tsy
Books, Patents, Oh My… http://client9.com/         at E


                                        4
$525,000,000 in community sales
    875,000 active sellers
    41MM unique visitors
    15MM registered members
    150 countries




5
What Could Possibly Go Wrong?
                                                • Marketplace Risk like Big Auction Site
                                                • Payment Risk like Payments Company
                                                • Social Risk like that Big Social Network


                                                With a member base frequently:
                                                • New to Etsy
                                                • New to Running a Business
                                                • New to the Internet



Photo Credit: Rod Ramsey http://bit.ly/KnI8uB
                                                  6
To Make It More Interesting:
               Continuous Deployment
On average, there are 50+ production code changes per day. So when we
have a problem:
Is it an operations problem?
Is it a development problem?                 Learn more
Is it a product problem causing            http://bit.ly/KFYYlZ
complaints to come in?
Or is it an attack?

                                  7
Old Workflow: #notwinning
    Logging into production network (!)
    Finding the right file
    Unzipping the right file
    Grepping
•   Writing very clever scripts to extract data
•   Writing more clever scripts to merge data
•   Making a report – in plain text               34 minutes for
•   Alerting
                                                  one day’s log
                                                   for nothing!

                                           8
Splunk installed at Etsy mid-2010
"Hey. .. let's go try this NEW thing!"
           (door slamming shut)

           "Sorry.... we're closed.”
                    Steve Martin. Comedy is not pretty. 1979.
                    Track 8 ~2:45


   Serious New Technology Fatigue
   Why don’t we use a Real Database with SQL?
   Grep technology works
   &^#*&@^*#^%^ YAQL – Yet Another Query Language
                                          9
L’Outrage
Then a colleague:
  • Didn’t know Etsy’s stack (new)
  • Remote and out of office
  • Didn’t have production access
  • Didn’t know any of my very clever scripts
  • Not experienced with Splunk
  • In about 30 minutes
whips up a real-time email alert for
a velocity check on a particular URL

     I only have one thing
      to say about this…..
                                           10
OH, YEAAHH!
  400+GB indexed per day
  30+ TB total storage
  60+ data sources from
  “hundreds of servers” (via
  central syslog aggregation)




 11
Data-Driven Security
   Three examples of how we use data and Splunk
   to help make Etsy a safer place to conduct
   business.

   •Web Application Security
   •Account Takeover
   •Payments and PCI

   That said we are barely scratching the surface
   of Splunk!
Data-Driven By Mat Edelson. John Hopkins Engineering Magazine, Fall 2011
http://eng.jhu.edu/wse/magazine-fall-11/item/data-driven/
Illustration by Mark McGinnis No association, just a great article & illustration
              12
WebApp Security
Make Security Visible
   Your peers actually are interested in security.
            But are you letting them?


      Turn security from a binary event into
               a continuous event.



                         14
Detect the Steps
 A journey of a thousand miles begins with a single step.
                     Lao-tzu, China 600BC



A single breach begins with a journey of a thousand steps.
                  Nick Galbreath, USA 2012AD




                              15
SQLi, XSS, CSRF
source=“info.log” log_name_space=“SECURITY” attacktype=“XSS”




                       That was
                         easy


                                    16
SQLi, XSS, CRSF
source=“info.log” log_name_space=“SECURITY” attacktype=“SQL”| geoip ip




       Paints a
       different
        picture




                                  17
The Dumbest Check Possible for SQLi
We have some snazzy technology for detecting SQLi in Splunk, but you
don’t need it to get started:

source=access.log
   (uri="*UNION+ALL*" OR uri="*UNION%20ALL*”)


Will wildly undercount but also low false positive rate
Will detect scans from various tools
Will get you started in making security visible
                                       18
SQLi and Database Errors
source="error.log" ( "syntax error" NOT "smarty" NOT "ClientLogger" ) | eval event=_raw | table event'
• We use Splunk to alert on any database syntax errors too.
• SQLi attacks and probes will likely trigger a bust of syntax errors
   if code doesn’t properly sanitize data

                                                                           was
                                                                       That e
                                                                         clos
                                                                          Do the same with
                                                                          server 500 errors,
                                                                             core dumps
                                                  19
Investigating Rent-A-CPU Traffic
source=“access.log”
| lookup datacenter-cidrs provider_cidr AS true_client_ip
  OUTPUTNEW provider_name
| where isnotnull(provider_name)
| top provider_name




         Publi
               c Dat
                    a
            S ee
         Appe
              ndix


                                                     20
SANS ISC 10K Sources
source=“access.log”
 | where isnotnull(true_client_ip)
 | lookup isc-bad-ips src_ip AS true_client_ip
 | where isnotnull(rank)
 | table true_client_ip, rank, reports, attacks, last_seen
 | stats count by true_client_ip,rank
 | sort rank




 Public D
         a
See App ta
        endix



                                          21
Attacker-Driven Testing
“I thought I found something but then it stopped
working…”                            Email to security-reports@etsy.com from ethical hacker


 Attacker-driver testing augments Etsy’s proactive security measures
 Splunk alerts us on potential attacks using a number of parameters
 What URLs are being targeted?
 Maybe they found something?
 Can it be reproduced? (sometimes completely automated validation)
 Fixes can be pushed out that day, if not within minutes.

                                            22
Security Post-Mortems
For any security vulnerability, found either external or internal,
exploited or not, we hold “blameless post-mortems”
Use to teach about security issues
     e.g. review OWASP Top 10 http://bit.ly/fXsJg6
Can we make it so this mistake doesn’t happen again or can be
automatically detected?
A Key to post-mortem is know when something started and when it
ended. Logs “at your fingertips” via Splunk helps greatly
(and absolutely essential for actual incidents)

                                    23
Account Takeover
Account Takeover

  • Stolen credentials
  • Brute forcing of credentials
  • Using account takeover of email to
    further takeover other accounts
Horrible for victim and really slow to clean up

               25
Many Users Failing to Sign-in from One IP
    'source=“info.log” log_namespace=“login”
         reason="wrong password” true_client_ip!=38.117.156.X X X
    | dedup etsy_username,true_client_ip
    | transaction true_client_ip
    | where eventcount > X X X X
    | table true_client_ip,etsy_username
    | geoip true_client_ip
    | table true_client_ip,true_client_ip_countryname,etsy_username'




                                     26
Brute Forcing Passwords?
source=”info.log”
log_namespace="login”                                         Peop
                                                                    le wil
reason="wrong password"                                        try 10 l
true_client_ip!=38.117.156.X X X                             passw 0
                                                                   ords
| transaction etsy_username                                  manu
                                                                   ally
| where eventcount > XXXX
| table etsy_username,true_client_ip,eventcount
| sort -eventcount
                               Frequency Buckets set in Splunk Dashboard
                                   27
I Forgot My Password x1000
 source=“/web/access.log”
 request_uri=/forgot_password.php
 http_method=POST
| transaction true_client_ip
| where eventcount > X X X
| table true_client_ip,eventcount
                                                          o from
| sort –eventcount                                    Hell bia!
                                                        Ser

 Not just fraud… has disclosed problems in email transport
 and product problems with our reset flow

                                    28
Apply the same analysis to other
    things that should not change much
–   Payment cards
–   Email addresses
–   Passwords (successful change)
–   Regular physical addresses



                            29
CAPTCHA
                 Splunk 2x2 dashboard keeps us in-the-know on
                  how often CAPTCHAs are being shown,
                 to whom, and how often they pass.




reCAPTCHA http://www.google.com/recaptcha
                                            30
Integrated into Support Tools
      Splunk is glued into our internal tools used by
      General Support and MITS (Marketplace Integrity /
      Trust & Safety) teams.




                  31
Payments and PCI
Payments @ Etsy
Ramping up on our own payments platform
Full PCI Environment
With separate Splunk installation



                       This space intentionally left blank.




                                       33
Alerting on Unusual Payment Activity
All the WebApp security and account take-
over rules apply, along with special checks
for payment activity
 Abnormally large payments
                                              Part of
 Payment velocity                                     a larger
                                              paymen
 Very small payments (skimming?)                       t risk
                                                solution
 The usual IP address checks.



                                     34
Compliance and Reporting

Instead of building custom applications with fuzzy requirements
“Log it, let Splunk figure it out later”
Even the business guys can use it for ad-hoc queries.
Unexpected side effect: removing and/or changing data is really hard.
This is good. Compare to SQL. (Splunk also has a secure log system)
Easy to make reports
PCI QSA so far says this meets PCI requirements.

                                     35
Internal Risk
Again, instead of build out of new
application (with fuzzy requirements)
Log It, Splunk it later.
Who, is what making what changes
Who is looking at potentially sensitive
data
And alert on it.
Used in payments and main support         Etsy Support and MITS 2012
applications                                    100% Good Eggs
                                             Team Etsy 2012
                                   36
Credits
Acknowledgements
This presentation would not be possible without the hard work by:
           Marcus Barczak          Jerry Soung            Zane Lackey
           Operations              Fraud and Risk         Security
                                    Engineering           Engineering


Big thanks to everyone at Etsy in Engineering, Payments, Operations,
Support and MITS
And of course, the fine folks at Splunk!



                                      38
Data and References
Datacenter IP List:
       https://github.com/client9/ipcat

ISC Top Troublemaker IPs:
       http://isc.sans.edu/ipsascii.html
       http://isc.sans.edu/sources.html

On Security and Continuous Deployment:
       http://bit.ly/KFYYlZ

Other presentations on Etsy and Security/Fraud/DevOps:
       http://slidesha.re/Kw5zdV http://slidesha.re/IMaavq
       http://slidesha.re/JGaU2s

                                            39
Security Engineering and “Just Culture”
Treating security mistakes as “accidents” (whether exploited or not)
Based originally on health care initiatives
Patient Safety and “Just Culture”, David Marx JD
– http://psnet.ahrq.gov/resource.aspx?resourceID=1582
– http://bit.ly/LhRHaT (presentation)
John Allspaw on Blameless Post-Mortems:
http://codeascraft.etsy.com/2012/05/22/blameless-postmortems/




                                    40
www.etsy.com


                                               It’s time for questions!

                                     Nick Galbreath
                                     @ngalbreath
t t p : //s l i d e s h a . r e /K P v H Y u

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedJason Chan
 
Serverless Security: What's Left to Protect?
Serverless Security: What's Left to Protect?Serverless Security: What's Left to Protect?
Serverless Security: What's Left to Protect?Guy Podjarny
 
The Psychology of Security Automation
The Psychology of Security AutomationThe Psychology of Security Automation
The Psychology of Security AutomationJason Chan
 
Principles Of Chaos Engineering - Chaos Engineering Hamburg
Principles Of Chaos Engineering - Chaos Engineering HamburgPrinciples Of Chaos Engineering - Chaos Engineering Hamburg
Principles Of Chaos Engineering - Chaos Engineering HamburgNils Meder
 
MassTLC Cloud Summit Keynote
MassTLC Cloud Summit KeynoteMassTLC Cloud Summit Keynote
MassTLC Cloud Summit KeynoteAriel Tseitlin
 
SpringOne2GX 2014 Splunk Presentation
SpringOne2GX 2014 Splunk PresentationSpringOne2GX 2014 Splunk Presentation
SpringOne2GX 2014 Splunk PresentationDamien Dallimore
 
Protect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying TechniquesProtect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying TechniquesLeo Loobeek
 
Integrating Splunk into your Spring Applications
Integrating Splunk into your Spring ApplicationsIntegrating Splunk into your Spring Applications
Integrating Splunk into your Spring ApplicationsDamien Dallimore
 
Operations: Production Readiness
Operations: Production ReadinessOperations: Production Readiness
Operations: Production ReadinessAmazon Web Services
 
Performance Analysis of Idle Programs
Performance Analysis of Idle ProgramsPerformance Analysis of Idle Programs
Performance Analysis of Idle Programsgreenwop
 
Vladimir Ulogov - Large Scale Simulation | ZabConf2016 Lightning Talk
Vladimir Ulogov - Large Scale Simulation | ZabConf2016 Lightning TalkVladimir Ulogov - Large Scale Simulation | ZabConf2016 Lightning Talk
Vladimir Ulogov - Large Scale Simulation | ZabConf2016 Lightning TalkZabbix
 
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017Amazon Web Services
 
Chaos Engineering 101 by Russ Miles
Chaos Engineering 101 by Russ MilesChaos Engineering 101 by Russ Miles
Chaos Engineering 101 by Russ MilesRussell Miles
 
Monktoberfest Fast Delivery
Monktoberfest Fast DeliveryMonktoberfest Fast Delivery
Monktoberfest Fast DeliveryAdrian Cockcroft
 
Securing Rails
Securing RailsSecuring Rails
Securing RailsAlex Payne
 
AWS FIS の実験テンプレートを書いてみよう!!
AWS FIS の実験テンプレートを書いてみよう!!AWS FIS の実験テンプレートを書いてみよう!!
AWS FIS の実験テンプレートを書いてみよう!!政雄 金森
 
Serverless in production, an experience report (codemotion milan)
Serverless in production, an experience report (codemotion milan)Serverless in production, an experience report (codemotion milan)
Serverless in production, an experience report (codemotion milan)Yan Cui
 

Was ist angesagt? (20)

Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 
Serverless Security: What's Left to Protect?
Serverless Security: What's Left to Protect?Serverless Security: What's Left to Protect?
Serverless Security: What's Left to Protect?
 
The Psychology of Security Automation
The Psychology of Security AutomationThe Psychology of Security Automation
The Psychology of Security Automation
 
Principles Of Chaos Engineering - Chaos Engineering Hamburg
Principles Of Chaos Engineering - Chaos Engineering HamburgPrinciples Of Chaos Engineering - Chaos Engineering Hamburg
Principles Of Chaos Engineering - Chaos Engineering Hamburg
 
MassTLC Cloud Summit Keynote
MassTLC Cloud Summit KeynoteMassTLC Cloud Summit Keynote
MassTLC Cloud Summit Keynote
 
SpringOne2GX 2014 Splunk Presentation
SpringOne2GX 2014 Splunk PresentationSpringOne2GX 2014 Splunk Presentation
SpringOne2GX 2014 Splunk Presentation
 
Introduction to Chaos Engineering
Introduction to Chaos EngineeringIntroduction to Chaos Engineering
Introduction to Chaos Engineering
 
Protect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying TechniquesProtect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying Techniques
 
Integrating Splunk into your Spring Applications
Integrating Splunk into your Spring ApplicationsIntegrating Splunk into your Spring Applications
Integrating Splunk into your Spring Applications
 
Operations: Production Readiness
Operations: Production ReadinessOperations: Production Readiness
Operations: Production Readiness
 
Performance Analysis of Idle Programs
Performance Analysis of Idle ProgramsPerformance Analysis of Idle Programs
Performance Analysis of Idle Programs
 
Vladimir Ulogov - Large Scale Simulation | ZabConf2016 Lightning Talk
Vladimir Ulogov - Large Scale Simulation | ZabConf2016 Lightning TalkVladimir Ulogov - Large Scale Simulation | ZabConf2016 Lightning Talk
Vladimir Ulogov - Large Scale Simulation | ZabConf2016 Lightning Talk
 
Unsafe SSL webinar
Unsafe SSL webinarUnsafe SSL webinar
Unsafe SSL webinar
 
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017
 
Chaos Engineering 101 by Russ Miles
Chaos Engineering 101 by Russ MilesChaos Engineering 101 by Russ Miles
Chaos Engineering 101 by Russ Miles
 
Monktoberfest Fast Delivery
Monktoberfest Fast DeliveryMonktoberfest Fast Delivery
Monktoberfest Fast Delivery
 
Securing Rails
Securing RailsSecuring Rails
Securing Rails
 
AWS FIS の実験テンプレートを書いてみよう!!
AWS FIS の実験テンプレートを書いてみよう!!AWS FIS の実験テンプレートを書いてみよう!!
AWS FIS の実験テンプレートを書いてみよう!!
 
Serverless in production, an experience report (codemotion milan)
Serverless in production, an experience report (codemotion milan)Serverless in production, an experience report (codemotion milan)
Serverless in production, an experience report (codemotion milan)
 
What DevOps Isn't
What DevOps Isn'tWhat DevOps Isn't
What DevOps Isn't
 

Ähnlich wie Data Driven Security, from Gartner Security Summit 2012

Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Nick Galbreath
 
Java application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developerJava application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developerSteve Poole
 
Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)Phillip Maddux
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdNipun Jaswal
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secureEoin Keary
 
Web application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursWeb application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursDavid Busby, CISSP
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin FalckNorth Texas Chapter of the ISSA
 
FUEL_USERS_GROUP
FUEL_USERS_GROUPFUEL_USERS_GROUP
FUEL_USERS_GROUPWill Pearce
 
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunk
 
IBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's StandpointIBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's StandpointLuis Grangeia
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security TestingTEST Huddle
 
Pentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated TestingPentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated TestingAndrew McNicol
 
SplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakoutSplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakoutSplunk
 
Crash Course In Brain Surgery
Crash Course In Brain SurgeryCrash Course In Brain Surgery
Crash Course In Brain Surgerymorisson
 
The Other AI: How Semantic Reasoning Automates Security Analysis
The Other AI: How Semantic Reasoning Automates Security AnalysisThe Other AI: How Semantic Reasoning Automates Security Analysis
The Other AI: How Semantic Reasoning Automates Security AnalysisAnton Goncharov
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsSecurity Innovation
 
Java Hurdling: Obstacles and Techniques in Java Client Penetration-Testing
Java Hurdling: Obstacles and Techniques in Java Client Penetration-TestingJava Hurdling: Obstacles and Techniques in Java Client Penetration-Testing
Java Hurdling: Obstacles and Techniques in Java Client Penetration-TestingTal Melamed
 

Ähnlich wie Data Driven Security, from Gartner Security Summit 2012 (20)

Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
 
Java application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developerJava application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developer
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
 
Web application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursWeb application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yours
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
 
FUEL_USERS_GROUP
FUEL_USERS_GROUPFUEL_USERS_GROUP
FUEL_USERS_GROUP
 
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
 
IBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's StandpointIBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's Standpoint
 
Luis Grangeia IBWAS
Luis Grangeia IBWASLuis Grangeia IBWAS
Luis Grangeia IBWAS
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
 
Pentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated TestingPentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated Testing
 
SplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakoutSplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakout
 
ISSA Siem Fraud
ISSA Siem FraudISSA Siem Fraud
ISSA Siem Fraud
 
Crash Course In Brain Surgery
Crash Course In Brain SurgeryCrash Course In Brain Surgery
Crash Course In Brain Surgery
 
The Other AI: How Semantic Reasoning Automates Security Analysis
The Other AI: How Semantic Reasoning Automates Security AnalysisThe Other AI: How Semantic Reasoning Automates Security Analysis
The Other AI: How Semantic Reasoning Automates Security Analysis
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software Systems
 
Java Hurdling: Obstacles and Techniques in Java Client Penetration-Testing
Java Hurdling: Obstacles and Techniques in Java Client Penetration-TestingJava Hurdling: Obstacles and Techniques in Java Client Penetration-Testing
Java Hurdling: Obstacles and Techniques in Java Client Penetration-Testing
 

Mehr von Nick Galbreath

Making operations visible - devopsdays tokyo 2013
Making operations visible  - devopsdays tokyo 2013Making operations visible  - devopsdays tokyo 2013
Making operations visible - devopsdays tokyo 2013Nick Galbreath
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Nick Galbreath
 
Fixing security by fixing software development
Fixing security by fixing software developmentFixing security by fixing software development
Fixing security by fixing software developmentNick Galbreath
 
DevOpsDays Austin 2013 Reading List
DevOpsDays Austin 2013 Reading ListDevOpsDays Austin 2013 Reading List
DevOpsDays Austin 2013 Reading ListNick Galbreath
 
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013Nick Galbreath
 
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013Nick Galbreath
 
Rebooting Software Development - OWASP AppSecUSA
Rebooting Software Development - OWASP AppSecUSA Rebooting Software Development - OWASP AppSecUSA
Rebooting Software Development - OWASP AppSecUSA Nick Galbreath
 
libinjection and sqli obfuscation, presented at OWASP NYC
libinjection and sqli obfuscation, presented at OWASP NYClibinjection and sqli obfuscation, presented at OWASP NYC
libinjection and sqli obfuscation, presented at OWASP NYCNick Galbreath
 
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forumlibinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open ForumNick Galbreath
 
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012Nick Galbreath
 
Time tested php with libtimemachine
Time tested php with libtimemachineTime tested php with libtimemachine
Time tested php with libtimemachineNick Galbreath
 
libinjection: a C library for SQLi detection, from Black Hat USA 2012
libinjection: a C library for SQLi detection, from Black Hat USA 2012libinjection: a C library for SQLi detection, from Black Hat USA 2012
libinjection: a C library for SQLi detection, from Black Hat USA 2012Nick Galbreath
 
New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20Nick Galbreath
 
Slide show font sampler, black on white
Slide show font sampler, black on whiteSlide show font sampler, black on white
Slide show font sampler, black on whiteNick Galbreath
 
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012Nick Galbreath
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012Nick Galbreath
 

Mehr von Nick Galbreath (16)

Making operations visible - devopsdays tokyo 2013
Making operations visible  - devopsdays tokyo 2013Making operations visible  - devopsdays tokyo 2013
Making operations visible - devopsdays tokyo 2013
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013
 
Fixing security by fixing software development
Fixing security by fixing software developmentFixing security by fixing software development
Fixing security by fixing software development
 
DevOpsDays Austin 2013 Reading List
DevOpsDays Austin 2013 Reading ListDevOpsDays Austin 2013 Reading List
DevOpsDays Austin 2013 Reading List
 
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013
 
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013
 
Rebooting Software Development - OWASP AppSecUSA
Rebooting Software Development - OWASP AppSecUSA Rebooting Software Development - OWASP AppSecUSA
Rebooting Software Development - OWASP AppSecUSA
 
libinjection and sqli obfuscation, presented at OWASP NYC
libinjection and sqli obfuscation, presented at OWASP NYClibinjection and sqli obfuscation, presented at OWASP NYC
libinjection and sqli obfuscation, presented at OWASP NYC
 
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forumlibinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum
 
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012
 
Time tested php with libtimemachine
Time tested php with libtimemachineTime tested php with libtimemachine
Time tested php with libtimemachine
 
libinjection: a C library for SQLi detection, from Black Hat USA 2012
libinjection: a C library for SQLi detection, from Black Hat USA 2012libinjection: a C library for SQLi detection, from Black Hat USA 2012
libinjection: a C library for SQLi detection, from Black Hat USA 2012
 
New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20
 
Slide show font sampler, black on white
Slide show font sampler, black on whiteSlide show font sampler, black on white
Slide show font sampler, black on white
 
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
 

Kürzlich hochgeladen

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Data Driven Security, from Gartner Security Summit 2012

  • 1. Copyright © 2012 Splunk, Inc. Data-Driven Security: Managing Risk at Etsy Nick Galbreath @ngalbreath Director of Engineering - Etsy Gartner Security Summit National Harbor, MD June 12, 2012
  • 2. Agenda Who am I? Who is Etsy? Splunk at Etsy? Web Application Security Account Takeover Payments and PCI Credits, Data, Further Reading 2
  • 4. Whois Nick Galbreath Director of Engineering at Etsy covering: – Fraud – Security 2 – Support Engineering -06-1 – (and other stuff outside of this talk) 2012 y is m Software Development background in two year e rsary E-Commerce and Social Media anniv tsy Books, Patents, Oh My… http://client9.com/ at E 4
  • 5. $525,000,000 in community sales 875,000 active sellers 41MM unique visitors 15MM registered members 150 countries 5
  • 6. What Could Possibly Go Wrong? • Marketplace Risk like Big Auction Site • Payment Risk like Payments Company • Social Risk like that Big Social Network With a member base frequently: • New to Etsy • New to Running a Business • New to the Internet Photo Credit: Rod Ramsey http://bit.ly/KnI8uB 6
  • 7. To Make It More Interesting: Continuous Deployment On average, there are 50+ production code changes per day. So when we have a problem: Is it an operations problem? Is it a development problem? Learn more Is it a product problem causing http://bit.ly/KFYYlZ complaints to come in? Or is it an attack? 7
  • 8. Old Workflow: #notwinning Logging into production network (!) Finding the right file Unzipping the right file Grepping • Writing very clever scripts to extract data • Writing more clever scripts to merge data • Making a report – in plain text 34 minutes for • Alerting one day’s log for nothing! 8
  • 9. Splunk installed at Etsy mid-2010 "Hey. .. let's go try this NEW thing!" (door slamming shut) "Sorry.... we're closed.” Steve Martin. Comedy is not pretty. 1979. Track 8 ~2:45 Serious New Technology Fatigue Why don’t we use a Real Database with SQL? Grep technology works &^#*&@^*#^%^ YAQL – Yet Another Query Language 9
  • 10. L’Outrage Then a colleague: • Didn’t know Etsy’s stack (new) • Remote and out of office • Didn’t have production access • Didn’t know any of my very clever scripts • Not experienced with Splunk • In about 30 minutes whips up a real-time email alert for a velocity check on a particular URL I only have one thing to say about this….. 10
  • 11. OH, YEAAHH! 400+GB indexed per day 30+ TB total storage 60+ data sources from “hundreds of servers” (via central syslog aggregation) 11
  • 12. Data-Driven Security Three examples of how we use data and Splunk to help make Etsy a safer place to conduct business. •Web Application Security •Account Takeover •Payments and PCI That said we are barely scratching the surface of Splunk! Data-Driven By Mat Edelson. John Hopkins Engineering Magazine, Fall 2011 http://eng.jhu.edu/wse/magazine-fall-11/item/data-driven/ Illustration by Mark McGinnis No association, just a great article & illustration 12
  • 14. Make Security Visible Your peers actually are interested in security. But are you letting them? Turn security from a binary event into a continuous event. 14
  • 15. Detect the Steps A journey of a thousand miles begins with a single step. Lao-tzu, China 600BC A single breach begins with a journey of a thousand steps. Nick Galbreath, USA 2012AD 15
  • 16. SQLi, XSS, CSRF source=“info.log” log_name_space=“SECURITY” attacktype=“XSS” That was easy 16
  • 17. SQLi, XSS, CRSF source=“info.log” log_name_space=“SECURITY” attacktype=“SQL”| geoip ip Paints a different picture 17
  • 18. The Dumbest Check Possible for SQLi We have some snazzy technology for detecting SQLi in Splunk, but you don’t need it to get started: source=access.log (uri="*UNION+ALL*" OR uri="*UNION%20ALL*”) Will wildly undercount but also low false positive rate Will detect scans from various tools Will get you started in making security visible 18
  • 19. SQLi and Database Errors source="error.log" ( "syntax error" NOT "smarty" NOT "ClientLogger" ) | eval event=_raw | table event' • We use Splunk to alert on any database syntax errors too. • SQLi attacks and probes will likely trigger a bust of syntax errors if code doesn’t properly sanitize data was That e clos Do the same with server 500 errors, core dumps 19
  • 20. Investigating Rent-A-CPU Traffic source=“access.log” | lookup datacenter-cidrs provider_cidr AS true_client_ip OUTPUTNEW provider_name | where isnotnull(provider_name) | top provider_name Publi c Dat a S ee Appe ndix 20
  • 21. SANS ISC 10K Sources source=“access.log” | where isnotnull(true_client_ip) | lookup isc-bad-ips src_ip AS true_client_ip | where isnotnull(rank) | table true_client_ip, rank, reports, attacks, last_seen | stats count by true_client_ip,rank | sort rank Public D a See App ta endix 21
  • 22. Attacker-Driven Testing “I thought I found something but then it stopped working…” Email to security-reports@etsy.com from ethical hacker Attacker-driver testing augments Etsy’s proactive security measures Splunk alerts us on potential attacks using a number of parameters What URLs are being targeted? Maybe they found something? Can it be reproduced? (sometimes completely automated validation) Fixes can be pushed out that day, if not within minutes. 22
  • 23. Security Post-Mortems For any security vulnerability, found either external or internal, exploited or not, we hold “blameless post-mortems” Use to teach about security issues e.g. review OWASP Top 10 http://bit.ly/fXsJg6 Can we make it so this mistake doesn’t happen again or can be automatically detected? A Key to post-mortem is know when something started and when it ended. Logs “at your fingertips” via Splunk helps greatly (and absolutely essential for actual incidents) 23
  • 25. Account Takeover • Stolen credentials • Brute forcing of credentials • Using account takeover of email to further takeover other accounts Horrible for victim and really slow to clean up 25
  • 26. Many Users Failing to Sign-in from One IP 'source=“info.log” log_namespace=“login” reason="wrong password” true_client_ip!=38.117.156.X X X | dedup etsy_username,true_client_ip | transaction true_client_ip | where eventcount > X X X X | table true_client_ip,etsy_username | geoip true_client_ip | table true_client_ip,true_client_ip_countryname,etsy_username' 26
  • 27. Brute Forcing Passwords? source=”info.log” log_namespace="login” Peop le wil reason="wrong password" try 10 l true_client_ip!=38.117.156.X X X passw 0 ords | transaction etsy_username manu ally | where eventcount > XXXX | table etsy_username,true_client_ip,eventcount | sort -eventcount Frequency Buckets set in Splunk Dashboard 27
  • 28. I Forgot My Password x1000 source=“/web/access.log” request_uri=/forgot_password.php http_method=POST | transaction true_client_ip | where eventcount > X X X | table true_client_ip,eventcount o from | sort –eventcount Hell bia! Ser Not just fraud… has disclosed problems in email transport and product problems with our reset flow 28
  • 29. Apply the same analysis to other things that should not change much – Payment cards – Email addresses – Passwords (successful change) – Regular physical addresses 29
  • 30. CAPTCHA Splunk 2x2 dashboard keeps us in-the-know on how often CAPTCHAs are being shown, to whom, and how often they pass. reCAPTCHA http://www.google.com/recaptcha 30
  • 31. Integrated into Support Tools Splunk is glued into our internal tools used by General Support and MITS (Marketplace Integrity / Trust & Safety) teams. 31
  • 33. Payments @ Etsy Ramping up on our own payments platform Full PCI Environment With separate Splunk installation This space intentionally left blank. 33
  • 34. Alerting on Unusual Payment Activity All the WebApp security and account take- over rules apply, along with special checks for payment activity Abnormally large payments Part of Payment velocity a larger paymen Very small payments (skimming?) t risk solution The usual IP address checks. 34
  • 35. Compliance and Reporting Instead of building custom applications with fuzzy requirements “Log it, let Splunk figure it out later” Even the business guys can use it for ad-hoc queries. Unexpected side effect: removing and/or changing data is really hard. This is good. Compare to SQL. (Splunk also has a secure log system) Easy to make reports PCI QSA so far says this meets PCI requirements. 35
  • 36. Internal Risk Again, instead of build out of new application (with fuzzy requirements) Log It, Splunk it later. Who, is what making what changes Who is looking at potentially sensitive data And alert on it. Used in payments and main support Etsy Support and MITS 2012 applications 100% Good Eggs Team Etsy 2012 36
  • 38. Acknowledgements This presentation would not be possible without the hard work by: Marcus Barczak Jerry Soung Zane Lackey Operations Fraud and Risk Security Engineering Engineering Big thanks to everyone at Etsy in Engineering, Payments, Operations, Support and MITS And of course, the fine folks at Splunk! 38
  • 39. Data and References Datacenter IP List: https://github.com/client9/ipcat ISC Top Troublemaker IPs: http://isc.sans.edu/ipsascii.html http://isc.sans.edu/sources.html On Security and Continuous Deployment: http://bit.ly/KFYYlZ Other presentations on Etsy and Security/Fraud/DevOps: http://slidesha.re/Kw5zdV http://slidesha.re/IMaavq http://slidesha.re/JGaU2s 39
  • 40. Security Engineering and “Just Culture” Treating security mistakes as “accidents” (whether exploited or not) Based originally on health care initiatives Patient Safety and “Just Culture”, David Marx JD – http://psnet.ahrq.gov/resource.aspx?resourceID=1582 – http://bit.ly/LhRHaT (presentation) John Allspaw on Blameless Post-Mortems: http://codeascraft.etsy.com/2012/05/22/blameless-postmortems/ 40
  • 41. www.etsy.com It’s time for questions! Nick Galbreath @ngalbreath t t p : //s l i d e s h a . r e /K P v H Y u