Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. If I'm a non-security-focused developer who realizes that I have a security requirement for my code, what's the best way to find defenses I might leverage?

If I'm a non-security-focused developer who realizes that I have a security requirement for my code, what's the best way to find defenses I might leverage?

Scheduled Pinned Locked Moved Uncategorized
16 Posts 10 Posters 7 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

    @letoams ok, so where does it lead? 😀

    letoams@defcon.socialL This user is from outside of this forum
    letoams@defcon.socialL This user is from outside of this forum
    letoams@defcon.social
    wrote last edited by
    #7

    @adamshostack “assume, I am about to fail, how will AI that’s over my head to use, save me?”

    adamshostack@infosec.exchangeA 1 Reply Last reply
    0
    • letoams@defcon.socialL letoams@defcon.social

      @adamshostack “assume, I am about to fail, how will AI that’s over my head to use, save me?”

      adamshostack@infosec.exchangeA This user is from outside of this forum
      adamshostack@infosec.exchangeA This user is from outside of this forum
      adamshostack@infosec.exchange
      wrote last edited by
      #8

      @letoams But that's not what I'm asking. I'm asking what is someone practically supposed to do, and I would love answers that are not "ask an LLM a question where the person can't evaluate the answers."

      1 Reply Last reply
      0
      • M mweiss@infosec.exchange

        @adamshostack @hacksilon I don't see anything inherently wrong with abdication in the short term. Nobody is an expert at everything, and everyone starts as a newb at everything. It's what you do with it over time that matters.

        aimaz@mstdn.socialA This user is from outside of this forum
        aimaz@mstdn.socialA This user is from outside of this forum
        aimaz@mstdn.social
        wrote last edited by
        #9

        @mweiss @adamshostack @hacksilon something I’ve long thought an issue with search engines is that they’re great at finding things you already know the name of. LLMs seem pretty good at finding the names of things from a description. So if someone is finding mitigations that they understand what it is, why it works and any limitations that seems like a good thing.

        hacksilon@infosec.exchangeH 1 Reply Last reply
        0
        • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

          If I'm a non-security-focused developer who realizes that I have a security requirement for my code, what's the best way to find defenses I might leverage? Is it the OWASP cheat sheet series? Assume that I'm under shipping pressure, a bit overwhelmed, don't know the jargon, and don't have time to read the 100 pages of ASVS, never mind the 336 pages of the cloud controls matrix. (Background: I have the advantage or disadvantage of having accumulated knowledge over time, and I"m looking to give more actionable guidance around the threat modeling question of "what are we going to do about it?" and... we have a lot of very, very abstract guidance. That's of course because we have a lot of technical domains like cloud or IoT, a lot of sector guidance, and more, so I'm not critiquing, but asking what a developer ought to do.)

          lee_holmes@infosec.exchangeL This user is from outside of this forum
          lee_holmes@infosec.exchangeL This user is from outside of this forum
          lee_holmes@infosec.exchange
          wrote last edited by
          #10

          @adamshostack I think the answer should be "Defensive Design Patterns." Good security architects have built up a bank of these in their head: "It looks like you're writing an updater! Here are some best practices around that." Once somebody makes that connection that they are writing an updater, they can always search the internet (or ask AI) for the best practices part - but having that lightbulb moment is not guaranteed.

          1 Reply Last reply
          0
          • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

            If I'm a non-security-focused developer who realizes that I have a security requirement for my code, what's the best way to find defenses I might leverage? Is it the OWASP cheat sheet series? Assume that I'm under shipping pressure, a bit overwhelmed, don't know the jargon, and don't have time to read the 100 pages of ASVS, never mind the 336 pages of the cloud controls matrix. (Background: I have the advantage or disadvantage of having accumulated knowledge over time, and I"m looking to give more actionable guidance around the threat modeling question of "what are we going to do about it?" and... we have a lot of very, very abstract guidance. That's of course because we have a lot of technical domains like cloud or IoT, a lot of sector guidance, and more, so I'm not critiquing, but asking what a developer ought to do.)

            alien@mastodon.greenA This user is from outside of this forum
            alien@mastodon.greenA This user is from outside of this forum
            alien@mastodon.green
            wrote last edited by
            #11

            @adamshostack honestly this whole grammar (role+"assume" context) is giving me prompt vibe, I hope you are not trying to compare the same answer from a person and an AI haha

            That being said there's no correct answer? I would suggest a PR with compulsory security review to merge, being the review manually taken from a security programmer. Problem is you could find a lot of useful things in OWASP (mostly vuln focused) as well as other sources (depending on the case) but if you don't know (...)

            alien@mastodon.greenA 1 Reply Last reply
            0
            • alien@mastodon.greenA alien@mastodon.green

              @adamshostack honestly this whole grammar (role+"assume" context) is giving me prompt vibe, I hope you are not trying to compare the same answer from a person and an AI haha

              That being said there's no correct answer? I would suggest a PR with compulsory security review to merge, being the review manually taken from a security programmer. Problem is you could find a lot of useful things in OWASP (mostly vuln focused) as well as other sources (depending on the case) but if you don't know (...)

              alien@mastodon.greenA This user is from outside of this forum
              alien@mastodon.greenA This user is from outside of this forum
              alien@mastodon.green
              wrote last edited by
              #12

              @adamshostack the jargon, or the basics, you might be implementing stuff half the way or making things worse for future reviewers. Even if you ask an AI to do the job, without this base, it might misunderstand or patch the wrong thing.

              Aren't you able to ask a community for your specific needs? Are you sure you don't have time to recheck with a security team, even if they are not devs?

              1 Reply Last reply
              0
              • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                If I'm a non-security-focused developer who realizes that I have a security requirement for my code, what's the best way to find defenses I might leverage? Is it the OWASP cheat sheet series? Assume that I'm under shipping pressure, a bit overwhelmed, don't know the jargon, and don't have time to read the 100 pages of ASVS, never mind the 336 pages of the cloud controls matrix. (Background: I have the advantage or disadvantage of having accumulated knowledge over time, and I"m looking to give more actionable guidance around the threat modeling question of "what are we going to do about it?" and... we have a lot of very, very abstract guidance. That's of course because we have a lot of technical domains like cloud or IoT, a lot of sector guidance, and more, so I'm not critiquing, but asking what a developer ought to do.)

                canario@infosec.exchangeC This user is from outside of this forum
                canario@infosec.exchangeC This user is from outside of this forum
                canario@infosec.exchange
                wrote last edited by
                #13

                @adamshostack I would suggest to check your dev environment first and esp. the frameworks, libraries and tools you use. They may come with security controls that you can leverage incl. docs with usage examples and references to OWASP resources for further research if needed.

                1 Reply Last reply
                0
                • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                  If I'm a non-security-focused developer who realizes that I have a security requirement for my code, what's the best way to find defenses I might leverage? Is it the OWASP cheat sheet series? Assume that I'm under shipping pressure, a bit overwhelmed, don't know the jargon, and don't have time to read the 100 pages of ASVS, never mind the 336 pages of the cloud controls matrix. (Background: I have the advantage or disadvantage of having accumulated knowledge over time, and I"m looking to give more actionable guidance around the threat modeling question of "what are we going to do about it?" and... we have a lot of very, very abstract guidance. That's of course because we have a lot of technical domains like cloud or IoT, a lot of sector guidance, and more, so I'm not critiquing, but asking what a developer ought to do.)

                  S This user is from outside of this forum
                  S This user is from outside of this forum
                  spacelifeform@infosec.exchange
                  wrote last edited by
                  #14

                  @adamshostack

                  The fewer dependencies, the better.

                  Minimize the attack surface.

                  1 Reply Last reply
                  0
                  • adamshostack@infosec.exchangeA adamshostack@infosec.exchange

                    If I'm a non-security-focused developer who realizes that I have a security requirement for my code, what's the best way to find defenses I might leverage? Is it the OWASP cheat sheet series? Assume that I'm under shipping pressure, a bit overwhelmed, don't know the jargon, and don't have time to read the 100 pages of ASVS, never mind the 336 pages of the cloud controls matrix. (Background: I have the advantage or disadvantage of having accumulated knowledge over time, and I"m looking to give more actionable guidance around the threat modeling question of "what are we going to do about it?" and... we have a lot of very, very abstract guidance. That's of course because we have a lot of technical domains like cloud or IoT, a lot of sector guidance, and more, so I'm not critiquing, but asking what a developer ought to do.)

                    paulshryock@phpc.socialP This user is from outside of this forum
                    paulshryock@phpc.socialP This user is from outside of this forum
                    paulshryock@phpc.social
                    wrote last edited by
                    #15

                    @adamshostack validate and sanitize your inputs, and escape your outputs.

                    Treat what isn't yours as "input", including anything you receive from the network, database, file system, etc.

                    This will get you surprisingly far.

                    I'm "not a security expert", so don't take this as " advice from a security expert."

                    1 Reply Last reply
                    0
                    • aimaz@mstdn.socialA aimaz@mstdn.social

                      @mweiss @adamshostack @hacksilon something I’ve long thought an issue with search engines is that they’re great at finding things you already know the name of. LLMs seem pretty good at finding the names of things from a description. So if someone is finding mitigations that they understand what it is, why it works and any limitations that seems like a good thing.

                      hacksilon@infosec.exchangeH This user is from outside of this forum
                      hacksilon@infosec.exchangeH This user is from outside of this forum
                      hacksilon@infosec.exchange
                      wrote last edited by
                      #16

                      @aimaz @mweiss @adamshostack yep. It reaches its limits with more complex issues or specific technical stuff (for example, it usually gets very specific keycloak configuration strategies wrong and hallucinates features that do not exist). I actually have a personal benchmark question for LLMs where I‘m asking a question whose answer requires some specific knowledge of how TLS works, which works quite well as a differentiator for me: https://infosec.exchange/@hacksilon/116076554555995053

                      So, general brainstorming = good, the more specific it gets, the likelier it will lead you wrong.

                      1 Reply Last reply
                      1
                      0
                      • R relay@relay.infosec.exchange shared this topic
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups