Page 35 - Cyber Defense eMagazine for August 2021
P. 35

4. Is there some sort of final security check involved before a product goes to market?

            There’s no single security check, but rather the completion of a gauntlet of checks, that makes a product
            ready for market. Even early in the Intel development process, a product generally is required to meet
            appropriate security milestones at that development phase in order to proceed forward. At Intel, we don’t
            just check for security at the end. It is an integral part of the entire development process. We have a team
            of more than 200 security researchers internally, and they work with the product teams collaboratively to
            evaluate the products throughout development.

            Our teams work to find and mitigate potential vulnerabilities through internal code reviews, red team
            activities such as Hack-A-Thons, and other events before products go to market. The data we collect is
            then used to develop automation and required training to help eliminate future occurrences. We also
            partner with the external research community, which is full of extremely smart and creative people. We
            want them working with us, making our platforms better. Sometimes this is known as “Crowdsourced
            Security”  and  can  include  bug  bounty  programs  which  provide  incentives  to  researchers  to  report
            vulnerabilities.


            5. What happens if researchers identify a major vulnerability via bug bounty programs after the
            product is already in the field?

            At a high level (and this can differ depending on the vulnerability), products with a vulnerability initially go
            to  PSIRTs.  At  Intel,  this  team  engages  with  the  researcher  that  uncovered  the  issue  and  does  the
            preliminary evaluation to validate and replicate the issue. Then very quickly, it’s triaged with Intel experts
            for  that  specific  platform  area  who  drop  everything  to  prioritize  resolution  of  the  issue.  Finding  and
            deploying mitigations for the issue could take days, weeks, or months, depending on the complexity. In
            the  meantime,  because  Intel  follows  the  common  industry  practice  of  Coordinated  Vulnerability
            Disclosure (CVD) for reported security vulnerabilities on launched products, we align with the researchers
            on a date to publicly disclose the issue to allow time to identify and deploy mitigations, in order to reduce
            adversary advantage.

            Then once we have a mitigation, we need to help ensure that mitigation doesn’t create other unintended
            problems. Before rolling it out into customer environments, we need to make sure we understand the full
            extent of its potential impact. First, internally we do what’s called ‘no harm testing’. Later, we do more
            robust testing with partners and then roll out the update to customers in a coordinated fashion. When
            possible, we bundle updates together so they can be validated together to save time and money for the
            customers. In addition to practicing inbound CVD in partnership with external security researchers, Intel
            also coordinates outbound vulnerability disclosure with industry partners and other external stakeholders,
            as appropriate, so that all affected parties are disclosing in unison for an optimal defensive position. It’s
            all about coordinated disclosure.


            6. What role does working with the larger hardware community play in designing for security?

            Compute  is  a  complex  endeavor  that  involves  hardware  from  multiple  vendors,  firmware,  operating
            systems, and applications. And of course, if your hardware goes online, which more and more of it does
            with the expansion of the Internet of Things, you must strive to secure compute systems across entire
            ecosystems. We’re really in an interesting time now. With so many connected and smart systems, we
            must consider security and privacy in every design decision for every product we create. These topics
            require  broad  discussion  and  collaboration,  and  they  deserve  our  detailed  attention  to  ethical
            considerations.






            Cyber Defense eMagazine – August 2021 Edition                                                                                                                                                                                               35
            Copyright © 2021, Cyber Defense Magazine.  All rights reserved worldwide.
   30   31   32   33   34   35   36   37   38   39   40