Title | URL | Author |
---|---|---|
Secure Design Hackathons |
Zoe Braiterman |
Purpose of a secure design hackathon
Insecure design is now included as number 4 in the OWASP Top 10 Web Application Security Risks. The purpose of these hackathons is to allow security learners at all levels to think outside the box about solving real-world problems.
The types of hypothetical systems or applications are meant to be themes, with multiple applications of their kind, already on the market, with many users. The point of the activity is centered around community-building, and the challenges are meant to facilitate creative though processes, not develop actual applications or products.
The hackathons are intended to be fun and collaborative, and a good way to connect like-minded individuals and provide a chance for them to build up their project portfolio, on their GitHub accounts and/or YouTube and/or other social media platforms.
Who should participate in this type of hackathon?
Any individual interested to learn about security, or just think about solving real world problems in technology. The structure of each of these Hackathons allow for complete beginners to participate. The problems to solve and questions asked are very high-level and open-ended, in order to encourage diverse perspectives.
General structure of a hackathon
- Explain to participants what we expect them to submit for their solutions
- Participants form teams and work on their solutions (with access to their team members and our mentorship over Slack, or another team communications platform).
- Participants submit their solutions, and present at a later date (perhaps after a week or two).
Assignment
Things for participants to consider and explain in written form:
- What controls will you put into place to protect storage and transmission of data?
- What kinds of cardholder data will be processed from users?
- How will you encrypt that data, in transit and at rest? Why?
- To whom will you grant access to what data (refer to your answer to the previous question)?
- Web application firewall (WAF) configuration considerations
- What are some potential data privacy concerns, and what are some steps you would take to protect users’ data? Consider regulatory requirements, and steps you would take to implement them.
Deliverables participants may want to submit
- Diagrams
- A questionnaire for a potential development team (along with possible answers and explanations for your choice of questions)
- A list of answers to the questions we pose.
- Written descriptions of a participant's underlying thought processes
- Architectural diagrams (for more advanced participants)
- Wireframes or user stories
Very basic threat modeling related questions to consider, regardless of submission format (Thank you, Adam Shostack, for advising on these question choices)
- What are you building (Referencing your answers to the above questions)?
- What can go wrong?
- What could be overlooked or not addressed?
- How would you attack it?
- Have you read a news story lately that suggests an attack?
- What are you going to do about that?
- Did you do a good enough job?
Some basic questions for a Risk Analysis Team (taken from Phil Martin’s “Simple CISSP” by Phil Martin) may include:
- What could happen?
- What would the impact be?
- How often could it happen?
- Do we really believe the first three answers?
Recognition of Submissions
-
If you choose to contribute a attack trees or data flow diagram (DFD) to the OWASP Threat Modeling Cookbook project... Congratulations! You will officially be an OWASP project contributor. :)
-
If you choose to submit a text document or another type of diagram, I will Tweet the link to your submitted GitHub repository and post it to the Activities page of the OWASP Women in AppSec, Diversity and Inclusion GitHub repository.
**Option to submit a pull request to the OWASP Threat Modeling Cookbook project
If you choose this option, please
- Follow the guidelines documented by Project Leader, Jonathan Marcil.
- Direct any clarifying questions you may have toward me (Zoe Braiterman) on Twitter or LinkedIn.
Before participating, participants are prompted to check the following Creative Commons licensing information.
Past Hackathons