SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsJohn Pescatore - SANS Director of Emerging Security Trends
This week’s Drilldown will focus on two related items (included below) from NewsBites Issue 71 and Issue 72,related to third-party application and data security issues impacting Facebook.
Facebook represents a macrocosm of the security problems facing enterprises. These two news items focus on two tough problems:
User data and all those third-party apps are the crown jewels of Facebook’s revenue stream. Security and privacy are key to enabling profits to continue. It took the negative business impact of the Cambridge Analytica scandal to convince Facebook to raise the bar in supply chain security, and Facebook has an opportunity to be more proactive around enhanced data security now. These are good business case studies to use in demonstrating the value of building security into all products and services.
______________________________________________________________________________
(September 3 and 4, 2020)
Facebook now has a vulnerability disclosure policy that lays out how the company will disclose security flaws it finds in third-party products. According to the policy, third-party companies will have 21 days to acknowledge Facebook's initial report and then 90 days to remediate the issue. If the company misses either of the deadlines, Facebook may disclose the flaw publicly. Facebook also notes that if there are mitigating circumstances--a flaw that is being actively exploited, for example--the disclosure timeline may differ.
[Editor Comments]
[Ullrich] It looks like 3 months/90 days is becoming the standard for vulnerability disclosures. This can be hard to meet for some complex bugs but should be doable for most vulnerabilities.
[Pescatore] Facebook has done a good job in recent years of essentially implementing an "app store" to drive higher levels of security into third-party apps. Facebook has a managed bug bounty program that has some coverage of third-party apps in addition to Facebook's own software and sites. Third-party apps that access user data must undergo yearly pen testing and code review by qualified assessors. The "disinformation" problem on the content side of Facebook brings in an entirely different set of problems, but on the code security side Facebook seems to be doing the right things.
Read more in:
The Register: Facebook to blab bugs it finds if it thinks code owners aren't fixing fast enough
https://www.theregister.com/2020/09/04/facebook_vulnerability_disclosure_policy/
SC Magazine: Facebook announces new details on how it will disclose bugs found in third-party products
Threatpost: Facebook Debuts Third-Party Vulnerability Disclosure Policy
https://threatpost.com/facebook-third-party-vulnerability-disclosure-policy/158976/
Facebook: Facebook's Vulnerability Disclosure Policy
https://www.facebook.com/security/advisories/Vulnerability-Disclosure-Policy
(September 9 and 10, 2020)
Facebook has received a preliminary order to stop sending European Union (EU) user data to the U.S. Facebook has until mid-September to respond to the order from the Irish Data Protection Commission (DPC). The order grew out of a July 2020 ruling from the Court of Justice of the European Union (CJEU) that invalidated Privacy Shield, the current EU-US data transfer agreement because the protections it offered against U.S. surveillance laws were found to be inadequate to protect the rights of EU data subjects. The CJEU ruling left in place Standard Contractual Clauses (SCC), which provide for data transfers between EU and non-EU countries. The Irish DPC believes that the SCC provisions are not sufficient and is therefore asking Facebook to stop data transfers. (Please note that the Wall Street Journal story is behind a paywall.)
[Editor Comments]
[Pescatore] Facebook's CEO needs to learn from Bill Gates' 2002 "Security is Job 1" direction change at Microsoft and, more recently, from Zoom CEO Eric Yuan's similar (but much faster!) epiphany and subsequent security focus in April of this year. The increasing demand for privacy and data rights is coming from consumers, not just regulatory bodies. Getting data protection and stronger user authentication built into products and services meets that demand while greatly raising the bar against attackers.
[Honan] This has major ramifications for all companies transferring personal data of EU data subjects to the U.S., and potentially for the transferring of personal data of EU data subjects to the United Kingdom in the event of a no deal Brexit. The core of the issue is that the EU does not believe that U.S. privacy laws and mechanisms are robust enough to protect the privacy rights of EU data subjects against U.S. surveillance laws and abuse of that personal data by U.S. corporates. Privacy comes at a price that for too long has been borne by the individual. This move sends a clear message to governments and companies that they, too, have a responsibility to protect the privacy of individuals.
Launched in 1989 as a cooperative for information security thought leadership, it is SANS’ ongoing mission to empower cyber security professionals with the practical skills and knowledge they need to make our world a safer place.
Read more about SANS Institute