hi sc-l, FWIW, I wrote about mdeical device security first in 1998 in the book ³Software Fault Injection.² Our little article was merely meant as a reminder and to let you all know that some medical device manufacturers are actually doing analysis.
gem On 7/7/14, 3:39 PM, "Goertzel, Karen [USA]" <goertzel_ka...@bah.com> wrote: >Another big frustration: No-one seems to be making any real headway into >the problem of actually measuring loss attributable to doing nothing - >or, in other words, losses cradle to grave from operating insufficiently >secure systems. People try to measure "ROI" from security, which is a >ridiculous concept because it involves trying to measure a negative - >i.e., this is how many times we DIDN'T lose $n - can't be done - or >trying to measure how much competitive advantage only being hacked 20 vs. >50 times last year gave us as a company - or other such silly >pseudo-measurements. > >What I really want is: > >[1] Ability to measure the aggregate of losses attributable to a single >degradation or failure in an ICT infrastructure (all layers) - not just >immediate loss due to downtime or degraded performance, but all the costs >involved in redirecting resources (i.e., to deal with incident response, >forensics, restoring from backup, implementing COOP, etc.); implementing >interim short and long-term workarounds, purchases and man-hours involved >in achieving total recovery to a sustained acceptable working state >(ideally the same or better state than pre-loss); investment in >preemptiove actions, things, and extraordinary (not what I was already >doing) risk management activities to prevent a recurrence; plus all the >other things I've probably not thought of here that contribute to the >WHOLE amount of loss (e.g., reputation loss, advertising and PR >"reputation recovery" campaigns, legal fees, fines, preparations plus >actual expenses involved in testifying in court and/or on Capitol Hill, ! > additional tests and audits needed, etc.); > >[2] Ability to accurately determine which of my ICT-related losses can be >attributed, in whole or in part (and, in the latter case, what %) to >intentional malevolent actions by someone (direct or via supply chain or >operational subversion or sabotage via malware, etc.) - and which losses >can be attributed to stupid mistakes by someone. > >Once I can get a real grip on actual, complete loss amounts - not just >the stuff that usually gets measured - I can then see if I really have >struck the right balance between what I spend on security to >avoid/prevent loss, and what I'm actually losing - so I can figure out if >I need to adjust the equation. Also, being able to accurately identify >all the "someones" involved in causing each loss - e.g., developers, >integrators, users, administrators, etc. - while this level of >attribution isn't necessary to quantify losses - would enable me not only >to figure out if I'm spending the right amount, but if I'm spending the >right amount on the right things. For example, if my losses are mainly >down to crappy or subverted software, investment in mitigating end-user >risk is going to be of less value than investment in correcting SLDC >deficiencies. > >In short, every time I read about a new attempt to measure security, it's >always either too granular or not granular enough, and I'm not seeing any >credible efforts to apply analysis across all measurement data to >actually build a COMPLETE picture not only of the current "security >situation", but of the whole cost of security - what it is, and more >importantly, what it should be. > >=== >Karen Mercedes Goertzel, CISSP >Senior Lead Scientist >Booz Allen Hamilton >703.698.7454 >goertzel_ka...@bah.com > >"Answers are easy. It's asking the right questions which is hard." >- The Doctor > >________________________________________ >From: Jeffrey Walton [noloa...@gmail.com] >Sent: 07 July 2014 14:56 >To: Goertzel, Karen [USA] >Cc: Secure Code Mailing List >Subject: Re: [SC-L] [External] Re: SearchSecurity: Medical Devices and >Software Security > >> Ever since I read an article about the challenges of remote laser >>surgery being done by doctors at the Naval Hospital in Bethesda, MD, via >>satellite link on wounded soldiers in Iraq, I've been warning for years >>about the need to apply software assurance principles to the development >>and testing - and SCRM to the acquisition - of medical devices and their >>embedded software. > >https://en.wikipedia.org/wiki/Therac-25 FTW! > >> What I want to know is this: When is someone who can actually make a >>difference going to FINALLY figure out the real potential hazards of the >>Internet of Things. > >+1. Dr. Geer has already warned about it at >http://www.lawfareblog.com/2014/04/heartbleed-as-metaphor/. Can you >imagine the IoT, with medical devices and avionics packages, running >around with little to no testing and little more that the browser >security model. Clear the cache to erase the evidence!!! > >> Manufacturers of the latter need to stop trying so bloody hard to >>"improve" products that no longer need improvement. > >This is a political problem rooted in software liability laws (or lack >thereof). Too many carrots, not enough sticks.... > >As it stands, its cost effective to do nothing. The risk analysis >equations need to be tipped in favor of the consumer or user. One it >starts costing money to do nothing, doing nothing will no longer be >economically feasible. The market will drive meaningful change (as >opposed to the water downed legislation with no teeth bought and paid >for by lobbyist and special interests). > >Jeff > >On Mon, Jul 7, 2014 at 10:52 AM, Goertzel, Karen [USA] ><goertzel_ka...@bah.com> wrote: >> Ever since I read an article about the challenges of remote laser >>surgery being done by doctors at the Naval Hospital in Bethesda, MD, via >>satellite link on wounded soldiers in Iraq, I've been warning for years >>about the need to apply software assurance principles to the development >>and testing - and SCRM to the acquisition - of medical devices and their >>embedded software. I'm delighted to see someone with your influence >>start warning those who confuse software correctness and safety with >>software security of the potential havoc that can potentially be wrought >>by malevolent actors as these little widgets become increasingly >>networked and even Internet-accessible. >> >> What I want to know is this: When is someone who can actually make a >>difference going to FINALLY figure out the real potential hazards of the >>Internet of Things. Certain physical systems and devices really should >>NEVER be connected to the public Internet - e.g., most Industrial >>Control Systems, all medical devices, any plane, train, or automobile. >>And others really never NEED to be Internet-connected. I mean, do we >>really, REALLY need to be able to access our refrigerators or washing >>machines over the Web? Aren't we all growing obese enough without making >>things so bloody convenient that we needn't even walk the 20 feet from >>the bedroom to the kitchen or laundry room to program the coffee maker >>or start another rinse cycle? >> >> Manufacturers of the latter need to stop trying so bloody hard to >>"improve" products that no longer need improvement. There does come a >>time when a technology goes as far as it can go - and any further >>attempts to "improve" it are either purely cosmetic, unnecessary, or >>dangerous. I wish all these manufacturers who waste their times trying >>to invent a better toaster would, instead, invent something entirely new >>to solve a problem that hasn't already been solved quite adequately for >>many decades. No wonder American manufacturing is no longer competitive. >>All they do is continually rearrange deck chairs on the Titanic to >>improve the view as the boat sinks, instead of inventing a new means of >>transportation that actually CANNOT be taken down by an iceberg. >> >> >> === >> Karen Mercedes Goertzel, CISSP >> Senior Lead Scientist >> Booz Allen Hamilton >> 703.698.7454 >> goertzel_ka...@bah.com >> >> "Answers are easy. It's asking the right questions which is hard." >> - The Doctor >> >> ________________________________________ >> From: SC-L [sc-l-boun...@securecoding.org] on behalf of security >>curmudgeon [jeri...@attrition.org] >> Sent: 06 July 2014 01:21 >> To: Gary McGraw >> Cc: Chandu Ketkar; Secure Code Mailing List >> Subject: [External] Re: [SC-L] SearchSecurity: Medical Devices and >>Software Security >> >> On Mon, 30 Jun 2014, Gary McGraw wrote: >> >> : Chandu Ketkar and I wrote an article about medical device security >>based >> : on a talk Chandu gave at Kevin Fu?s Archimedes conference in Ann >>Arbor. >> : In the article, we discuss six categories of security defects that >> : Cigital discovers again and again when analyzing medical devices for >>our >> : customers. Have a look and pass it on: >> : >> : http://bit.ly/1pPH56p >> : >> : As always, your feedback is welcome. >> >> Per your request, my feedback: >> >> Why do so many security professionals think we need yet another article >>on >> medical devices that give a high-level overview, that ultimately boils >> down to "medical devices are not secure"? >> >> We see these every month or three, and have for a long time. Other than >> medical vendors who are very resistent to the idea that their devices >>have >> issues, who is this written for? Who exactly outside medical vendors >>think >> that those devices are secure? >> >> These articles do nothing.. absolutely nothing, to fix problems. They >>are >> bandwagon articles jumping on the 'medical security' wave that has some >> attention right now. Everyone writing these articles seems to be >> completely new to the medical arena. Most that write this crap that I >>have >> talked to can't speak to any of the history of medical disclosures. >>Names >> like Fu and Halperin are foreign to them, and the importance of 1985 in >> the timeline of medical issues is lost on them. If you find yourself >> Googling any of those, thanks for proving my point. >> >> This shit is not new. These articles are NOT advancing our field or the >> medical field. Sure, you are getting a slice of attention for the issue, >> but mostly in our echo chamber. >> >> Finally, your intro. "Since 1996 my company has analyzed hundreds of >> systems..." Really? Hundreds? You might want to fix that, else you come >> across as complete n00bz in the industry. I've done single engagements >> that involved tends of thousands of machines. Perhaps you want to >>qualify >> that to mean hundreds of vendors? Hundreds per months/year? >> >> To illustrate I am not the only one who feels this way: >> https://twitter.com/attritionorg/status/485652525589086209 >> >> 1 minute later: >> https://twitter.com/SteveSyfuhs/status/485652988044656640 >> >> Seriously, dare to evolve. > >_______________________________________________ >Secure Coding mailing list (SC-L) SC-L@securecoding.org >List information, subscriptions, etc - >http://krvw.com/mailman/listinfo/sc-l >List charter available at - http://www.securecoding.org/list/charter.php >SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) >as a free, non-commercial service to the software security community. >Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates >_______________________________________________ _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________