Secure Coding mailing list archives

Re: [External] Re: SearchSecurity: Medical Devices and Software Security


From: Gary McGraw <gem () cigital com>
Date: Mon, 7 Jul 2014 17:28:46 -0400

hi sc-l,

FWIW, I wrote about mdeical device security first in 1998 in the book
³Software Fault Injection.²  Our little article was merely meant as a
reminder and to let you all know that some medical device manufacturers
are actually doing analysis.

gem

On 7/7/14, 3:39 PM, "Goertzel, Karen [USA]" <goertzel_karen () bah com> wrote:

Another big frustration: No-one seems to be making any real headway into
the problem of actually measuring loss attributable to doing nothing -
or, in other words, losses cradle to grave from operating insufficiently
secure systems. People try to measure "ROI" from security, which is a
ridiculous concept because it involves trying to measure a negative -
i.e., this is how many times we DIDN'T lose $n - can't be done - or
trying to measure how much competitive advantage only being hacked 20 vs.
50 times last year gave us as a company - or other such silly
pseudo-measurements.

What I really want is:

[1] Ability to measure the aggregate of losses attributable to a single
degradation or failure in an ICT infrastructure (all layers) - not just
immediate loss due to downtime or degraded performance, but all the costs
involved in redirecting resources (i.e., to deal with incident response,
forensics, restoring from backup, implementing COOP, etc.); implementing
interim short and long-term workarounds, purchases and man-hours involved
in achieving total recovery to a sustained acceptable working state
(ideally the same or better state than pre-loss); investment in
preemptiove actions, things, and extraordinary (not what I was already
doing) risk management activities to prevent a recurrence; plus all the
other things I've probably not thought of here that contribute to the
WHOLE amount of loss (e.g., reputation loss, advertising and PR
"reputation recovery" campaigns, legal fees, fines, preparations plus
actual expenses involved in testifying in court and/or on Capitol Hill, !
additional tests and audits needed, etc.);

[2] Ability to accurately determine which of my ICT-related losses can be
attributed, in whole or in part (and, in the latter case, what %) to
intentional malevolent actions by someone (direct or via supply chain or
operational subversion or sabotage via malware, etc.) - and which losses
can be attributed to stupid mistakes by someone.

Once I can get a real grip on actual, complete loss amounts - not just
the stuff that usually gets measured - I can then see if I really have
struck the right balance between what I spend on security to
avoid/prevent loss, and what I'm actually losing - so I can figure out if
I need to adjust the equation. Also, being able to accurately identify
all the "someones" involved in causing each loss - e.g., developers,
integrators, users, administrators, etc. - while this level of
attribution isn't necessary to quantify losses - would enable me not only
to figure out if I'm spending the right amount, but if I'm spending the
right amount on the right things. For example, if my losses are mainly
down to crappy or subverted software, investment in mitigating end-user
risk is going to be of less value than investment in correcting SLDC
deficiencies.

In short, every time I read about a new attempt to measure security, it's
always either too granular or not granular enough, and I'm not seeing any
credible efforts to apply analysis across all measurement data to
actually build a COMPLETE picture not only of the current "security
situation", but of the whole cost of security - what it is, and more
importantly, what it should be.

===
Karen Mercedes Goertzel, CISSP
Senior Lead Scientist
Booz Allen Hamilton
703.698.7454
goertzel_karen () bah com

"Answers are easy. It's asking the right questions which is hard."
- The Doctor

________________________________________
From: Jeffrey Walton [noloader () gmail com]
Sent: 07 July 2014 14:56
To: Goertzel, Karen [USA]
Cc: Secure Code Mailing List
Subject: Re: [SC-L] [External] Re: SearchSecurity: Medical Devices and
Software Security

Ever since I read an article about the challenges of remote laser
surgery being done by doctors at the Naval Hospital in Bethesda, MD, via
satellite link on wounded soldiers in Iraq, I've been warning for years
about the need to apply software assurance principles to the development
and testing - and SCRM to the acquisition - of medical devices and their
embedded software.

https://en.wikipedia.org/wiki/Therac-25 FTW!

What I want to know is this: When is someone who can actually make a
difference going to FINALLY figure out the real potential hazards of the
Internet of Things.

+1. Dr. Geer has already warned about it at
http://www.lawfareblog.com/2014/04/heartbleed-as-metaphor/. Can you
imagine the IoT, with medical devices and avionics packages, running
around with little to no testing and little more that the browser
security model. Clear the cache to erase the evidence!!!

Manufacturers of the latter need to stop trying so bloody hard to
"improve" products that no longer need improvement.

This is a political problem rooted in software liability laws (or lack
thereof). Too many carrots, not enough sticks....

As it stands, its cost effective to do nothing. The risk analysis
equations need to be tipped in favor of the consumer or user. One it
starts costing money to do nothing, doing nothing will no longer be
economically feasible. The market will drive meaningful change (as
opposed to the water downed legislation with no teeth bought and paid
for by lobbyist and special interests).

Jeff

On Mon, Jul 7, 2014 at 10:52 AM, Goertzel, Karen [USA]
<goertzel_karen () bah com> wrote:
Ever since I read an article about the challenges of remote laser
surgery being done by doctors at the Naval Hospital in Bethesda, MD, via
satellite link on wounded soldiers in Iraq, I've been warning for years
about the need to apply software assurance principles to the development
and testing - and SCRM to the acquisition - of medical devices and their
embedded software. I'm delighted to see someone with your influence
start warning those who confuse software correctness and safety with
software security of the potential havoc that can potentially be wrought
by malevolent actors as these little widgets become increasingly
networked and even Internet-accessible.

What I want to know is this: When is someone who can actually make a
difference going to FINALLY figure out the real potential hazards of the
Internet of Things. Certain physical systems and devices really should
NEVER be connected to the public Internet - e.g., most Industrial
Control Systems, all medical devices, any plane, train, or automobile.
And others really never NEED to be Internet-connected. I mean, do we
really, REALLY need to be able to access our refrigerators or washing
machines over the Web? Aren't we all growing obese enough without making
things so bloody convenient that we needn't even walk the 20 feet from
the bedroom to the kitchen or laundry room to program the coffee maker
or start another rinse cycle?

Manufacturers of the latter need to stop trying so bloody hard to
"improve" products that no longer need improvement. There does come a
time when a technology goes as far as it can go - and any further
attempts to "improve" it are either purely cosmetic, unnecessary, or
dangerous. I wish all these manufacturers who waste their times trying
to invent a better toaster would, instead, invent something entirely new
to solve a problem that hasn't already been solved quite adequately for
many decades. No wonder American manufacturing is no longer competitive.
All they do is continually rearrange deck chairs on the Titanic to
improve the view as the boat sinks, instead of inventing a new means of
transportation that actually CANNOT be taken down by an iceberg.


===
Karen Mercedes Goertzel, CISSP
Senior Lead Scientist
Booz Allen Hamilton
703.698.7454
goertzel_karen () bah com

"Answers are easy. It's asking the right questions which is hard."
- The Doctor

________________________________________
From: SC-L [sc-l-bounces () securecoding org] on behalf of security
curmudgeon [jericho () attrition org]
Sent: 06 July 2014 01:21
To: Gary McGraw
Cc: Chandu Ketkar; Secure Code Mailing List
Subject: [External]  Re: [SC-L] SearchSecurity: Medical Devices and
Software Security

On Mon, 30 Jun 2014, Gary McGraw wrote:

: Chandu Ketkar and I wrote an article about medical device security
based
: on a talk Chandu gave at Kevin Fu?s Archimedes conference in Ann
Arbor.
: In the article, we discuss six categories of security defects that
: Cigital discovers again and again when analyzing medical devices for
our
: customers.  Have a look and pass it on:
:
: http://bit.ly/1pPH56p
:
: As always, your feedback is welcome.

Per your request, my feedback:

Why do so many security professionals think we need yet another article
on
medical devices that give a high-level overview, that ultimately boils
down to "medical devices are not secure"?

We see these every month or three, and have for a long time. Other than
medical vendors who are very resistent to the idea that their devices
have
issues, who is this written for? Who exactly outside medical vendors
think
that those devices are secure?

These articles do nothing.. absolutely nothing, to fix problems. They
are
bandwagon articles jumping on the 'medical security' wave that has some
attention right now. Everyone writing these articles seems to be
completely new to the medical arena. Most that write this crap that I
have
talked to can't speak to any of the history of medical disclosures.
Names
like Fu and Halperin are foreign to them, and the importance of 1985 in
the timeline of medical issues is lost on them. If you find yourself
Googling any of those, thanks for proving my point.

This shit is not new. These articles are NOT advancing our field or the
medical field. Sure, you are getting a slice of attention for the issue,
but mostly in our echo chamber.

Finally, your intro. "Since 1996 my company has analyzed hundreds of
systems..." Really? Hundreds? You might want to fix that, else you come
across as complete n00bz in the industry. I've done single engagements
that involved tends of thousands of machines. Perhaps you want to
qualify
that to mean hundreds of vendors? Hundreds per months/year?

To illustrate I am not the only one who feels this way:
https://twitter.com/attritionorg/status/485652525589086209

1 minute later:
https://twitter.com/SteveSyfuhs/status/485652988044656640

Seriously, dare to evolve.

_______________________________________________
Secure Coding mailing list (SC-L) SC-L () securecoding org
List information, subscriptions, etc -
http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________


_______________________________________________
Secure Coding mailing list (SC-L) SC-L () securecoding org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________


Current thread: