SlideShare a Scribd company logo
When companies think about their source code it’s generally with
a single conern: Does it work? But they often overlook an equally
crucial question: Are we doing enough to protect it from hackers
and thieves?
At Symantec, we’ve been asking the second question for years.
Our earlier security measures were adequate, but in today’s world,
adequate is no longer good enough. That’s why we created a robust
strategy to keep our source code secure.
Since 2012 we consolidated hundreds of repositories where we used
to keep source code, and then we secured that code in a virtual vault
surrounded by five layers of protection. We also subjected the code to
the full power of Symantec’s monitoring solutions. Finally, we changed
internal policies to prevent the sort of employee behaviors that tended
to put our code at risk.
The results have been promising. We’ve been able to protect our
source code with an elite level of security, without impeding the
developers who need access to the code.
Our strategy works just as well for any company looking to protect
its source code or other confidential data. In this paper we’ll explain
what we did, how we did it, and how you can get the same results.
After that, if you’d like to learn more about how our model can
work for you we’ll be happy to arrange an executive briefing and
demonstration.
Source Code Security
the Symantec Way
As one of the world’s leading cybersecurity companies, Symantec has developed best-in-class strategies to keep our own source code safe. In
Source Code Security The Symantec Way, we share our best practices with you.
This paper is intended for CIOs, CTOs , CISOs, and other senior managers exploring how to safeguard their intellectual property. We’ll give you a
transparent look into how we locked down our own source code, from consolidating our repositories to securing the code in multiple layers of
protection. We’ll tell you what worked—and what didn’t.
Our goal, as always: to help you model your own security after the best we have to offer.
CustomerONE | p. 2
Source Code Security the Symantec Way
Background
Tim Fitzgerald, our chief security officer since June 2014, remembers
the two events that shaped his view of cybersecurity. The first was
news of a state-sponsored attack on more than 30 companies in
late 2009. The other was the realization in 2012 that Symantec’s
PCAnywhere code had been stolen six years earlier, which reinforced
our need to constantly improve our security.
Google revealed the first event in 2010 when it accused hackers in
China of breaking into its systems to gain access to specific email
accounts and steal some of its intellectual property. The announcement
came on Tim’s third day at Symantec, back when he was a manager
of information security. He recalls how deflated the news left him, and
he wondered whether his team was fighting a war it couldn’t win.
Then, in 2012, a group of hackers released a segment of confidential
Symantec source code that had been stolen in 2006. The source
code was already obsolete by that point, but the incident still caused
us to take a hard look at how to protect Symantec holistically and our
intellectual property specifically.
“When I became the CSO that was my first priority: We couldn’t have a
theft of our source code on a massive scale.” Tim says. “Our goal was
to avoid a catastrophic loss.”
In the years since then, we’ve accomplished that thanks to an
ambitious four-step plan to secure our source code: consolidate,
protect, monitor and manage. Here’s a quick recap of our journey,
starting with a summary of our solution and followed by a discussion
of how we achieved it.
The Solution, Summarized
In the summer of 2015 we finished consolidating our source code
repositories into duplicate environments in Arizona and Virginia. The
code now sits in what we call our “bank vault,” secured by several
“locks” and five additional levels of protection.
The solution takes advantage of a number of Symantec products that
alert us when the source code is moved in ways that violate corporate
policy (for example, if it’s emailed or saved to a thumb drive):
• Data Loss Prevention monitors our network and endpoint layers,
scanning for the exfiltration of highly confidential data
• Control Compliance Suite manages “risk thresholds” of IT
infrastructure and provides remediation recommendations
• Validation and ID Protection Service provides two-factor
authentication to limit unauthorized access
• Symantec Endpoint Protection (SEP) secures our endpoints with
firewall, intrusion protection, antivirus and more to protect against
targeted attacks
We also developed a policy to thwart social-engineering efforts.
Specifically, we trained our engineers to be extra-vigilant when they
receive requests for access to source code. For example, even when
the request comes from a colleague, the engineer is required to verify
the inquiry with the requester’s manager.
Getting to this point wasn’t easy—it took several years of strategizing,
implementing and fine-tuning. But ask our executive staff if the effort
was worth it and the answer is clear.
“Compared to where we were when we started, I feel a lot better now,”
Tim says. “We’re making solid progress toward a steady protection
scheme, so it’ll be exponentially harder for someone to get in and do
something catastrophic.”
How We Got Here
As we mentioned, our four-step plan to secure our source code was to
consolidate, protect, monitor and manage.
Specifically we:
1. Consolidated our repositories and migrated them to two centrally
managed systems;
2. Blanketed our source-code environment in our strongest level of
security technology;
3. Tracked suspicious source-code movement with security policies
that were fine-tuned enough to give us the alerts we wanted, but
not so broad as to overwhelm us with false positives; and
4. Managed the whole system with a dedicated staff that has
granular control over the entire process.
STEP 1: CONSOLIDATE THE REPOSITORIES
The first phase was to consolidate our source-code repositories—all
750 of them, and all dispersed across the globe—into two approved,
secured platforms.
One reason we had so many repositories was, whenever we
acquired companies, we just kept using whatever they’d been using.
Our developers liked it that way—it meant they had convenient access
to their code. But the setup wasn’t nearly so comforting for our
Global Security Organization, which needed to keep close tabs on
every single line of code to make sure it was properly secured from
unauthorized access.
We’d been wanting to consolidate our repositories for years to simplify
CustomerONE | p. 3
Source Code Security the Symantec Way
our processes and eliminate legacy systems with known vulnerabilities.
We’d delayed consolidating so as not to disrupt our development
efforts, but the more sophisticated the hacker community became, the
more we realized we had to act.
The consolidation process turned out to be relatively straightforward.
However, we ran into some internal resistance as we began evaluating
third-party vendors to provide our repository solution. Most of our
developers were already using a solution by Perforce, but some
insisted on being allowed to use an open-source product called Git.
At the time we dismissed Git because the open-source version wasn’t
robust enough for our purposes. But in the two years it took us to
transition to Perforce, at least one Git-based solution—an Atlassian
product called Stash (later renamed BitBucket)—became mature
enough that we were able to approve it as a second option for
employees. That helped quell the dissent.
STEP 2: PROTECT THE SOURCE CODE
While the consolidation project was underway, other Symantec teams
were developing an ambitious strategy to encase our source code
within five layers of protection: application security controls; host-based
security; network security; physical security; and on the outermost
level, a set of tight policies and standards.
(Some of the elements are proprietary, but we can go into greater
detail at an executive briefing.)
Our developers expressed concern that the additional layers of security
would slow them down. So we made sure that every new measure
would allow them to work at least as efficiently as before.
“That was a very important aspect,” says Suresh Sinha, who led our
source-code protection program. “We were protecting Symantec’s
credibility in the marketplace but we also wanted to provide developers
a platform to do what they do best: product development.”
STEP 3: MONITOR THE MOVEMENT OF SOURCE CODE
Once we locked up our source code, we needed to make sure it
was accessed only in compliance with Symantec policy. We had the
perfect product to do that: Symantec Data Loss Prevention. It works by
monitoring the network and endpoint layers, always scanning for the
exfiltration of highly confidential data.
Our security staff programmed Symantec DLP to scan for the secret
watermarks we’ve embedded in our code that allow us to track how
the code is used.
We also set up Symantec DLP to track how other confidential data
moved around our network. That turned out to be a good learning
experience. The product can be set up to look for things like digits
matching the pattern of a Social Security or credit-card number,
or it can track certain customer information. The rules are simple,
but the issue is in fine-tuning them to give you sufficient—but not
excessive—information.
For example, we set up a rule to look for Columbus, a code name
for an acquisition. We were flooded with alerts (everything from
innocuous mentions to false positives), way too many for our team to
investigate. Multiply that by scores of other rules, each producing its
own avalanche of hits, and what we got was a nightmare: 10,000 alerts
per day, with a staff of just six to vet them all. Needless to say, plenty of
alerts went uninvestigated.
“Our initial efforts with DLP were not well thought out,” Tim
acknowledges. “We went through several iterations of using and
misusing the solution before we figured out just how powerful it can be
when it’s used strategically rather than as a catch-all solution.”
Here’s the lesson for you: Think through your DLP tracking strategy
ahead of time, before you start implementing. Know what data you
want to track, and at what level of granularity. Then develop rules to get
there, but be ready for a bit of trial and error. And if your rules deliver
too many alerts, don’t get discouraged and discontinue the rules—
instead, tweak and refine them so the results are actionable. (See the
CustomerONE story, “Symantec Data Loss Prevention: From Adoption
to Maturity” for more about how we did this.)
STEP 4: MANAGE THE PROCESS INTELLIGENTLY
In the past, we had repositories being run variously by IT, engineering
and infrastructure teams. That led to redundancies and duplication of
effort, as well as inconsistency in how we responded to alerts.
We solved that by ceding all control to our Security Operations Center.
Our SOC staffers know which alerts are serious and which are lesser
priorities. They also know how to handle various concerns themselves
and when to elevate them to other departments.
We advise customers to do something similar. By having a single point
of contact, users will know their alerts are being managed consistently,
by people specifically trained for the role.
We also enlisted our IT staff to help keep source code safe. Like the
rest of us, our engineers are apt to let their guard down in a safe
environment. They might be too trusting when someone who identifies
herself as a colleague asks for access to code. Or they might take risky
shortcuts as they move code from one site to another.
So in our Global Symantec Labs in Southern California, we’ve
developed specific policies to thwart such efforts. For example, we
ask engineers to be vigilant and skeptical of requests for code. We
ask them to avoid giving out confidential information until they’ve
CustomerONE | p. 4
Source Code Security the Symantec Way
successfully identified the person on the other side of the phone call
or email. They must document the person’s request and then confirm
with both the person’s manager and our global security team before
granting approval.
We were concerned that engineers would be reluctant to comply with
vetting policies that took them away from their primary engineering
roles. As it turns out, that wasn’t a problem.
“They know they’re working for a security company,” says Thomas
Teller, a senior manager with Global Symantec Labs. “They want us
to have high standards everywhere. They don’t want to be the weak
link in the chain when it comes to maintaining the confidentiality of our
source code.”
Challenges
As you develop your own source-code protection strategy, be ready
for two possible challenges: overcoming the technical challenge of
reinventing legacy infrastructure, and finding the right staff to run
your program.
For us, rebuilding our legacy infrastructure involved complicated
changes to how our systems communicate with each other. We also
had to figure out how to strengthen our security controls without
forcing our engineers to jump through too many hoops.
These were formidable challenges, but our employees had the
technical skills to succeed. But what if your staff doesn’t have that
same level of technical know-how?
Here’s some advice from Danny Graves, the Symantec manager who
helped run our source-code protection project. The key, he says, is to
start with a smart strategy that’s developed in collaboration with the
best technical minds in your company. Then make sure you predict
and plan for the sort of obstacles we’ve outlined, well before you
encounter them.
“A task this complex comes down to project management,” he says.
“Involve the key members of your development community, security
and IT—not just the leadership but the actual ‘doers’ who use these
environments every day. Then sit down and agree on the best strategy
to implement best practices wherever you can.”
Best practices include patch management, encryption, strong
authentication, endpoint protection and centralized management.
While you’re working through the technical issue, prepare for a second
challenge: staffing.
To do the job right you’ll need a wide variety of skills—engineering
leaders, project managers, Data Loss Prevention engineers, and more.
All tend to be in short supply, but finding the right ones will save you
time in the long run.
“We went through several iterations of using
and misusing [DLP] before we figured out
just how powerful it can be.”
— Tim Fitzgerald, Symantec Chief Security Officer
CustomerONE | p. 5
Source Code Security the Symantec Way
customer_one@symantec.com
CustomerONE Team
350 Ellis Street
Mountain View, CA 94043
800-745-6054
Symantec’s CustomerONE team can facilitate discussions between
you and our IT security practitioners to help you address your
security questions and concerns. Please contact us directly or
through your Symantec sales team.
Copyright © 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other
countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the
maximum extent allowed by law. The information in this document is subject to change without notice.
SYMANTEC SOLUTIONS AND
PRODUCTS IN THIS PAPER
Data Loss Prevention: DLP discovers where data is stored
across your cloud, mobile, and on-premises environments;
monitors how it’s being used on and off your corporate network;
and protects it from being leaked or stolen
Control Compliance Suite: CCS enables risk-prioritized data
center security operations and compliance through automated
continuous assessments and a unified view of security controls
and vulnerabilities
Validation and ID Protection: VIP delivers user-friendly
authentication to protect networks, applications, and data
through standards-based two-factor and risk-based token-less
authentication
Symantec Endpoint Protection: SEP provides layered
protection and intelligent security to guard against targeted
attacks and advanced persistent threats on all endpoints
Learn More with an Executive Briefing
This brief was intended to give you a broad look at how we keep our
source code secure. Your Symantec representative can show you how
to adapt our blueprint to protect your own confidential information.
For a more in-depth experience, visit our Executive Briefing Centers at
our U.S. headquarters in Mountain View, California, or in Reading, U.K.
Executive briefings provide you an exclusive opportunity to learn
how Symantec solutions can protect your business and network
environments. We’ll customize the briefing to meet your specific
goals, and we’ll also give you a sneak peek at new technologies and
challenges on the horizon.

More Related Content

PDF
What We Learned as the First and Best Customer of Symantec ATP
PPTX
What affects security program confidence? - may2014 - bill burns
PPTX
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
PDF
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
PDF
Making Threat Modeling Useful To Software Development
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
What We Learned as the First and Best Customer of Symantec ATP
What affects security program confidence? - may2014 - bill burns
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Making Threat Modeling Useful To Software Development
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...

What's hot (19)

PPTX
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
PPTX
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
PPTX
Symantec Data Loss Prevention 9
PPTX
Lisa Guess - Embracing the Cloud
PDF
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
PDF
DTS Solution - Cyber Security Services Portfolio
PPT
Avoiding data breach using security intelligence and big data to stay out of ...
PPTX
Bil Harmer - Myths of Cloud Security Debunked!
PDF
Cyber Security For Organization Proposal Powerpoint Presentation Slides
PPTX
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
PPTX
Jack Nichelson - Information Security Metrics - Practical Security Metrics
PDF
Securing The Reality of Multiple Cloud Apps: Pandora's Story
PPTX
Ransomware Has Evolved And So Should Your Company
PPTX
Cyber Risk Management in 2017 - Challenges & Recommendations
PPTX
Cloud Security - Idealware
PDF
DTS Solution - Red Team - Penetration Testing
PPTX
How to Recover from a Ransomware Disaster
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Symantec Data Loss Prevention 9
Lisa Guess - Embracing the Cloud
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DTS Solution - Cyber Security Services Portfolio
Avoiding data breach using security intelligence and big data to stay out of ...
Bil Harmer - Myths of Cloud Security Debunked!
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Ransomware Has Evolved And So Should Your Company
Cyber Risk Management in 2017 - Challenges & Recommendations
Cloud Security - Idealware
DTS Solution - Red Team - Penetration Testing
How to Recover from a Ransomware Disaster
Ad

Viewers also liked (16)

PPTX
Aplicaciones en facebook
PDF
Q1 2014 jnpr financial results slides final
PDF
Juniper networks q4 2014 financial results slides
PDF
Marketing's New Power Dynamic
PDF
Juniper networks q4 2014 financial results slides final 2015-02-23
PPSX
From virtual to high end HW routing for the adult
PDF
APIC EM APIs: a deep dive
PDF
Virtual Ops Center
PPTX
API Deep Dive: APIC EM Rest API
PDF
110714 cisco
PPTX
Soluciones de Seguridad para Banca & Finanzas
PDF
Advanced threat security - Cyber Security For The Real World
PDF
Fire eye spearphishing
PPTX
Juniper marketing
PPTX
cisco collaboration
PDF
Partner Plus Brand Basics Session 2 Workbook
Aplicaciones en facebook
Q1 2014 jnpr financial results slides final
Juniper networks q4 2014 financial results slides
Marketing's New Power Dynamic
Juniper networks q4 2014 financial results slides final 2015-02-23
From virtual to high end HW routing for the adult
APIC EM APIs: a deep dive
Virtual Ops Center
API Deep Dive: APIC EM Rest API
110714 cisco
Soluciones de Seguridad para Banca & Finanzas
Advanced threat security - Cyber Security For The Real World
Fire eye spearphishing
Juniper marketing
cisco collaboration
Partner Plus Brand Basics Session 2 Workbook
Ad

Similar to Source Code Security the Symantec Way (20)

PDF
[EMC] Source Code Protection
PDF
[EMC] Source Code Protection
PPTX
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
PPTX
Security in an Interconnected and Complex World of Software
PPTX
Security Transformation
PPTX
Ransomware Mitigation Strategies
PDF
AEPWP09292016
PDF
Cybrary's navigating a security wasteland
PDF
Corporations - the new victims of targeted ransomware
PPTX
Computer security- protecting your devices.pptx
PPTX
Check Point Corporate Overview 2020 - Detailed
PPTX
Protecting endpoints from targeted attacks
PDF
Seminario-15-04-2015-IT_professions_in_the_anti-malware_industry
PPTX
2024 Security Outlook & Essential Security Practices
PDF
Check Point Infinity powered by R80.10
PDF
Introduction to Cybersecurity
PPTX
Building a strong security strategy
PDF
The 10 Secret Codes of Security
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PPT
Good Security Starts with Software Assurance - Software Assurance Market Plac...
[EMC] Source Code Protection
[EMC] Source Code Protection
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Security in an Interconnected and Complex World of Software
Security Transformation
Ransomware Mitigation Strategies
AEPWP09292016
Cybrary's navigating a security wasteland
Corporations - the new victims of targeted ransomware
Computer security- protecting your devices.pptx
Check Point Corporate Overview 2020 - Detailed
Protecting endpoints from targeted attacks
Seminario-15-04-2015-IT_professions_in_the_anti-malware_industry
2024 Security Outlook & Essential Security Practices
Check Point Infinity powered by R80.10
Introduction to Cybersecurity
Building a strong security strategy
The 10 Secret Codes of Security
CyberCare Pro - Cybersecurity for SME's updated.pptx
Good Security Starts with Software Assurance - Software Assurance Market Plac...

More from Symantec (20)

PDF
Symantec Enterprise Security Products are now part of Broadcom
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
PDF
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
PDF
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
PDF
Symantec Webinar | National Cyber Security Awareness Month - Own IT
PDF
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PDF
Symantec Mobile Security Webinar
PDF
Symantec Webinar Cloud Security Threat Report
PDF
Symantec Cloud Security Threat Report
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PDF
Symantec Webinar | Tips for Successful CASB Projects
PDF
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
PDF
Symantec Webinar: GDPR 1 Year On
PDF
Symantec ISTR 24 Webcast 2019
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PDF
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
PDF
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
PDF
GDPR Breach Notification Demystifying What the Regulators Want
Symantec Enterprise Security Products are now part of Broadcom
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Mobile Security Webinar
Symantec Webinar Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: GDPR 1 Year On
Symantec ISTR 24 Webcast 2019
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
GDPR Breach Notification Demystifying What the Regulators Want

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
sap open course for s4hana steps from ECC to s4
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
A comparative analysis of optical character recognition models for extracting...
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
sap open course for s4hana steps from ECC to s4
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MIND Revenue Release Quarter 2 2025 Press Release
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Approach and Philosophy of On baking technology
Programs and apps: productivity, graphics, security and other tools
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Building Integrated photovoltaic BIPV_UPV.pdf

Source Code Security the Symantec Way

  • 1. When companies think about their source code it’s generally with a single conern: Does it work? But they often overlook an equally crucial question: Are we doing enough to protect it from hackers and thieves? At Symantec, we’ve been asking the second question for years. Our earlier security measures were adequate, but in today’s world, adequate is no longer good enough. That’s why we created a robust strategy to keep our source code secure. Since 2012 we consolidated hundreds of repositories where we used to keep source code, and then we secured that code in a virtual vault surrounded by five layers of protection. We also subjected the code to the full power of Symantec’s monitoring solutions. Finally, we changed internal policies to prevent the sort of employee behaviors that tended to put our code at risk. The results have been promising. We’ve been able to protect our source code with an elite level of security, without impeding the developers who need access to the code. Our strategy works just as well for any company looking to protect its source code or other confidential data. In this paper we’ll explain what we did, how we did it, and how you can get the same results. After that, if you’d like to learn more about how our model can work for you we’ll be happy to arrange an executive briefing and demonstration. Source Code Security the Symantec Way As one of the world’s leading cybersecurity companies, Symantec has developed best-in-class strategies to keep our own source code safe. In Source Code Security The Symantec Way, we share our best practices with you. This paper is intended for CIOs, CTOs , CISOs, and other senior managers exploring how to safeguard their intellectual property. We’ll give you a transparent look into how we locked down our own source code, from consolidating our repositories to securing the code in multiple layers of protection. We’ll tell you what worked—and what didn’t. Our goal, as always: to help you model your own security after the best we have to offer.
  • 2. CustomerONE | p. 2 Source Code Security the Symantec Way Background Tim Fitzgerald, our chief security officer since June 2014, remembers the two events that shaped his view of cybersecurity. The first was news of a state-sponsored attack on more than 30 companies in late 2009. The other was the realization in 2012 that Symantec’s PCAnywhere code had been stolen six years earlier, which reinforced our need to constantly improve our security. Google revealed the first event in 2010 when it accused hackers in China of breaking into its systems to gain access to specific email accounts and steal some of its intellectual property. The announcement came on Tim’s third day at Symantec, back when he was a manager of information security. He recalls how deflated the news left him, and he wondered whether his team was fighting a war it couldn’t win. Then, in 2012, a group of hackers released a segment of confidential Symantec source code that had been stolen in 2006. The source code was already obsolete by that point, but the incident still caused us to take a hard look at how to protect Symantec holistically and our intellectual property specifically. “When I became the CSO that was my first priority: We couldn’t have a theft of our source code on a massive scale.” Tim says. “Our goal was to avoid a catastrophic loss.” In the years since then, we’ve accomplished that thanks to an ambitious four-step plan to secure our source code: consolidate, protect, monitor and manage. Here’s a quick recap of our journey, starting with a summary of our solution and followed by a discussion of how we achieved it. The Solution, Summarized In the summer of 2015 we finished consolidating our source code repositories into duplicate environments in Arizona and Virginia. The code now sits in what we call our “bank vault,” secured by several “locks” and five additional levels of protection. The solution takes advantage of a number of Symantec products that alert us when the source code is moved in ways that violate corporate policy (for example, if it’s emailed or saved to a thumb drive): • Data Loss Prevention monitors our network and endpoint layers, scanning for the exfiltration of highly confidential data • Control Compliance Suite manages “risk thresholds” of IT infrastructure and provides remediation recommendations • Validation and ID Protection Service provides two-factor authentication to limit unauthorized access • Symantec Endpoint Protection (SEP) secures our endpoints with firewall, intrusion protection, antivirus and more to protect against targeted attacks We also developed a policy to thwart social-engineering efforts. Specifically, we trained our engineers to be extra-vigilant when they receive requests for access to source code. For example, even when the request comes from a colleague, the engineer is required to verify the inquiry with the requester’s manager. Getting to this point wasn’t easy—it took several years of strategizing, implementing and fine-tuning. But ask our executive staff if the effort was worth it and the answer is clear. “Compared to where we were when we started, I feel a lot better now,” Tim says. “We’re making solid progress toward a steady protection scheme, so it’ll be exponentially harder for someone to get in and do something catastrophic.” How We Got Here As we mentioned, our four-step plan to secure our source code was to consolidate, protect, monitor and manage. Specifically we: 1. Consolidated our repositories and migrated them to two centrally managed systems; 2. Blanketed our source-code environment in our strongest level of security technology; 3. Tracked suspicious source-code movement with security policies that were fine-tuned enough to give us the alerts we wanted, but not so broad as to overwhelm us with false positives; and 4. Managed the whole system with a dedicated staff that has granular control over the entire process. STEP 1: CONSOLIDATE THE REPOSITORIES The first phase was to consolidate our source-code repositories—all 750 of them, and all dispersed across the globe—into two approved, secured platforms. One reason we had so many repositories was, whenever we acquired companies, we just kept using whatever they’d been using. Our developers liked it that way—it meant they had convenient access to their code. But the setup wasn’t nearly so comforting for our Global Security Organization, which needed to keep close tabs on every single line of code to make sure it was properly secured from unauthorized access. We’d been wanting to consolidate our repositories for years to simplify
  • 3. CustomerONE | p. 3 Source Code Security the Symantec Way our processes and eliminate legacy systems with known vulnerabilities. We’d delayed consolidating so as not to disrupt our development efforts, but the more sophisticated the hacker community became, the more we realized we had to act. The consolidation process turned out to be relatively straightforward. However, we ran into some internal resistance as we began evaluating third-party vendors to provide our repository solution. Most of our developers were already using a solution by Perforce, but some insisted on being allowed to use an open-source product called Git. At the time we dismissed Git because the open-source version wasn’t robust enough for our purposes. But in the two years it took us to transition to Perforce, at least one Git-based solution—an Atlassian product called Stash (later renamed BitBucket)—became mature enough that we were able to approve it as a second option for employees. That helped quell the dissent. STEP 2: PROTECT THE SOURCE CODE While the consolidation project was underway, other Symantec teams were developing an ambitious strategy to encase our source code within five layers of protection: application security controls; host-based security; network security; physical security; and on the outermost level, a set of tight policies and standards. (Some of the elements are proprietary, but we can go into greater detail at an executive briefing.) Our developers expressed concern that the additional layers of security would slow them down. So we made sure that every new measure would allow them to work at least as efficiently as before. “That was a very important aspect,” says Suresh Sinha, who led our source-code protection program. “We were protecting Symantec’s credibility in the marketplace but we also wanted to provide developers a platform to do what they do best: product development.” STEP 3: MONITOR THE MOVEMENT OF SOURCE CODE Once we locked up our source code, we needed to make sure it was accessed only in compliance with Symantec policy. We had the perfect product to do that: Symantec Data Loss Prevention. It works by monitoring the network and endpoint layers, always scanning for the exfiltration of highly confidential data. Our security staff programmed Symantec DLP to scan for the secret watermarks we’ve embedded in our code that allow us to track how the code is used. We also set up Symantec DLP to track how other confidential data moved around our network. That turned out to be a good learning experience. The product can be set up to look for things like digits matching the pattern of a Social Security or credit-card number, or it can track certain customer information. The rules are simple, but the issue is in fine-tuning them to give you sufficient—but not excessive—information. For example, we set up a rule to look for Columbus, a code name for an acquisition. We were flooded with alerts (everything from innocuous mentions to false positives), way too many for our team to investigate. Multiply that by scores of other rules, each producing its own avalanche of hits, and what we got was a nightmare: 10,000 alerts per day, with a staff of just six to vet them all. Needless to say, plenty of alerts went uninvestigated. “Our initial efforts with DLP were not well thought out,” Tim acknowledges. “We went through several iterations of using and misusing the solution before we figured out just how powerful it can be when it’s used strategically rather than as a catch-all solution.” Here’s the lesson for you: Think through your DLP tracking strategy ahead of time, before you start implementing. Know what data you want to track, and at what level of granularity. Then develop rules to get there, but be ready for a bit of trial and error. And if your rules deliver too many alerts, don’t get discouraged and discontinue the rules— instead, tweak and refine them so the results are actionable. (See the CustomerONE story, “Symantec Data Loss Prevention: From Adoption to Maturity” for more about how we did this.) STEP 4: MANAGE THE PROCESS INTELLIGENTLY In the past, we had repositories being run variously by IT, engineering and infrastructure teams. That led to redundancies and duplication of effort, as well as inconsistency in how we responded to alerts. We solved that by ceding all control to our Security Operations Center. Our SOC staffers know which alerts are serious and which are lesser priorities. They also know how to handle various concerns themselves and when to elevate them to other departments. We advise customers to do something similar. By having a single point of contact, users will know their alerts are being managed consistently, by people specifically trained for the role. We also enlisted our IT staff to help keep source code safe. Like the rest of us, our engineers are apt to let their guard down in a safe environment. They might be too trusting when someone who identifies herself as a colleague asks for access to code. Or they might take risky shortcuts as they move code from one site to another. So in our Global Symantec Labs in Southern California, we’ve developed specific policies to thwart such efforts. For example, we ask engineers to be vigilant and skeptical of requests for code. We ask them to avoid giving out confidential information until they’ve
  • 4. CustomerONE | p. 4 Source Code Security the Symantec Way successfully identified the person on the other side of the phone call or email. They must document the person’s request and then confirm with both the person’s manager and our global security team before granting approval. We were concerned that engineers would be reluctant to comply with vetting policies that took them away from their primary engineering roles. As it turns out, that wasn’t a problem. “They know they’re working for a security company,” says Thomas Teller, a senior manager with Global Symantec Labs. “They want us to have high standards everywhere. They don’t want to be the weak link in the chain when it comes to maintaining the confidentiality of our source code.” Challenges As you develop your own source-code protection strategy, be ready for two possible challenges: overcoming the technical challenge of reinventing legacy infrastructure, and finding the right staff to run your program. For us, rebuilding our legacy infrastructure involved complicated changes to how our systems communicate with each other. We also had to figure out how to strengthen our security controls without forcing our engineers to jump through too many hoops. These were formidable challenges, but our employees had the technical skills to succeed. But what if your staff doesn’t have that same level of technical know-how? Here’s some advice from Danny Graves, the Symantec manager who helped run our source-code protection project. The key, he says, is to start with a smart strategy that’s developed in collaboration with the best technical minds in your company. Then make sure you predict and plan for the sort of obstacles we’ve outlined, well before you encounter them. “A task this complex comes down to project management,” he says. “Involve the key members of your development community, security and IT—not just the leadership but the actual ‘doers’ who use these environments every day. Then sit down and agree on the best strategy to implement best practices wherever you can.” Best practices include patch management, encryption, strong authentication, endpoint protection and centralized management. While you’re working through the technical issue, prepare for a second challenge: staffing. To do the job right you’ll need a wide variety of skills—engineering leaders, project managers, Data Loss Prevention engineers, and more. All tend to be in short supply, but finding the right ones will save you time in the long run. “We went through several iterations of using and misusing [DLP] before we figured out just how powerful it can be.” — Tim Fitzgerald, Symantec Chief Security Officer
  • 5. CustomerONE | p. 5 Source Code Security the Symantec Way customer_one@symantec.com CustomerONE Team 350 Ellis Street Mountain View, CA 94043 800-745-6054 Symantec’s CustomerONE team can facilitate discussions between you and our IT security practitioners to help you address your security questions and concerns. Please contact us directly or through your Symantec sales team. Copyright © 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. SYMANTEC SOLUTIONS AND PRODUCTS IN THIS PAPER Data Loss Prevention: DLP discovers where data is stored across your cloud, mobile, and on-premises environments; monitors how it’s being used on and off your corporate network; and protects it from being leaked or stolen Control Compliance Suite: CCS enables risk-prioritized data center security operations and compliance through automated continuous assessments and a unified view of security controls and vulnerabilities Validation and ID Protection: VIP delivers user-friendly authentication to protect networks, applications, and data through standards-based two-factor and risk-based token-less authentication Symantec Endpoint Protection: SEP provides layered protection and intelligent security to guard against targeted attacks and advanced persistent threats on all endpoints Learn More with an Executive Briefing This brief was intended to give you a broad look at how we keep our source code secure. Your Symantec representative can show you how to adapt our blueprint to protect your own confidential information. For a more in-depth experience, visit our Executive Briefing Centers at our U.S. headquarters in Mountain View, California, or in Reading, U.K. Executive briefings provide you an exclusive opportunity to learn how Symantec solutions can protect your business and network environments. We’ll customize the briefing to meet your specific goals, and we’ll also give you a sneak peek at new technologies and challenges on the horizon.