SlideShare a Scribd company logo
Top 3 Tips
For
Security Docs
Michael Furman
Security Architect
Icons made by Appzgear
and Freepik
What will we see today?
• Why is security important?
• Don’t be part of the problem
• Do’s and Don’ts
About Me
• 20+ years in software engineering
• 10+ years in application security
• 4+ years Lead Security Architect at Tufin
• www.linkedin.com/in/furmanmichael/
• ultimatesecpro@gmail.com
• Read my blog https://ultimatesecurity.pro/
• Follow me on twitter @ultimatesecpro
• I like to travel, read books and listen to music.
About Tufin
• Market Leader in Security Policy Orchestration for
firewalls and cloud
– New Tufin products integrate security into DevOps
pipeline
• Established in 2005
• Used in over 2,300 enterprises, including 40
Fortune 100 companies
• We are constantly growing!
www.tufin.com/careers/
Why is security important?
• Google for “hacker stole credit cards”.
• Google for “cybersecurity breaches”.
Sony PlayStation 2011
• Exposed personal information
of 77 million users
• Sony suspended PlayStation
Network services
– costs 155.4 million USD
• Sony U.K. fined 395 million USD
Target Breach 2013
• 40 million of credit and debit cards are stolen
• Reissuing 21.8 million cards
– 200 million USD
Equifax 2017
• US consumer credit reporting agency
• Unauthorized access to data
– 145.5 million American customers
– 15.2 million UK customers
• Cost of the breach around 449 million USD
Where to start?
• OWASP Top Ten Overview:
https://ultimatesecurity.pro/post/top-ten-presentation/
Don’t be part of the problem
• Run vulnerability scans
• Do a Pen Test
• Regularly upgrade a server
• Regularly upgrade a tool
Vulnerability vs. security features
• A vulnerability is a weakness which can be
exploited by an attacker
• Security features is enchantment of a product
to meet a security requirement
Do’s and Don’ts - Vulnerability
• Describe a vulnerability
– not how to hack
• Notify customers only
– Public disclosure after the sufficient time
Icons made by Smashicons
Do’s and Don’ts - Security Fixes
• Public disclosure
• Be preemptive
– If it limits the existing functionality
Icons made by Freepik
Take Aways
• Engage with your IT team
• Documenting vulnerabilities is different from
documenting security fixes
Thank you!
• Contact me
– www.linkedin.com/in/furmanmichael/
– ultimatesecpro@gmail.com
– https://ultimatesecurity.pro/
– @ultimatesecpro

More Related Content

PPTX
Passwords are passé. WebAuthn is simpler, stronger and ready to go
PPTX
How can you deliver a secure product
PPTX
OWASP A4 XML External Entities (XXE)
PPTX
Istio Security Overview
PPTX
Web Application Security - DevFest + GDay George Town 2016
PPTX
Application Security within Agile
PPTX
Continuous Integration and Quality Development
PPTX
ZeroNights2013 testing of password policy
Passwords are passé. WebAuthn is simpler, stronger and ready to go
How can you deliver a secure product
OWASP A4 XML External Entities (XXE)
Istio Security Overview
Web Application Security - DevFest + GDay George Town 2016
Application Security within Agile
Continuous Integration and Quality Development
ZeroNights2013 testing of password policy

What's hot (20)

PPTX
Career In Information security
PPTX
OWASP Top Ten 2017
PPTX
Security testing fundamentals
PPTX
Secure coding practices
PPTX
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
PDF
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
PPTX
501 ch-1-mastering-security-basics
PDF
CIS Security Benchmark
PPTX
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
PDF
Evil User Stories - Improve Your Application Security
PDF
Akila srinivasan microsoft-bug_bounty-(publish)
PDF
Mobile Threats and Owasp Top 10 Risks
PPTX
Web security
PPTX
Continuous and Visible Security Testing with BDD-Security
PDF
Predstavitev Kaspersky Small Office Security za mala podjetja
PPTX
Layered API Security: What Hackers Don't Want You To Know
PDF
Symantec 賽門鐵克產線機台防護方案建議
PPTX
[OPD 2019] AST Platform and the importance of multi-layered application secu...
PDF
Serverless Security Checklist
PPTX
Securing the cloud
Career In Information security
OWASP Top Ten 2017
Security testing fundamentals
Secure coding practices
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
501 ch-1-mastering-security-basics
CIS Security Benchmark
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Evil User Stories - Improve Your Application Security
Akila srinivasan microsoft-bug_bounty-(publish)
Mobile Threats and Owasp Top 10 Risks
Web security
Continuous and Visible Security Testing with BDD-Security
Predstavitev Kaspersky Small Office Security za mala podjetja
Layered API Security: What Hackers Don't Want You To Know
Symantec 賽門鐵克產線機台防護方案建議
[OPD 2019] AST Platform and the importance of multi-layered application secu...
Serverless Security Checklist
Securing the cloud
Ad

Similar to Top 3 tips for security documentation (20)

PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PDF
Data security in the age of GDPR – most common data security problems
PDF
Measure To Avoid Cyber Attacks
PDF
Measures to Avoid Cyber-attacks
PDF
Tech Talent Meetup Hacking Security Event Recap
PPTX
Security in an Interconnected and Complex World of Software
PDF
Hard Truths your CISO won’t tell you.pdf
PPTX
Security Snake Oil Cycle 2019
PPTX
How to-become-secure-and-stay-secure
PPTX
How Data Security Impacts The Tech Industry.pptx
PDF
How Data Security Impacts The Tech Industry
PPTX
Information security - what is going on 2016
PPTX
Will Your Business Get Hacked? #HumberBizWeek2016
PPTX
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
PPTX
Will Your Business Get Hacked in 2016?
PDF
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
PDF
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PPTX
Securing the Skies: Navigating Cloud Security Challenges and Beyond
ODP
Break it while you make it: writing (more) secure software
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Data security in the age of GDPR – most common data security problems
Measure To Avoid Cyber Attacks
Measures to Avoid Cyber-attacks
Tech Talent Meetup Hacking Security Event Recap
Security in an Interconnected and Complex World of Software
Hard Truths your CISO won’t tell you.pdf
Security Snake Oil Cycle 2019
How to-become-secure-and-stay-secure
How Data Security Impacts The Tech Industry.pptx
How Data Security Impacts The Tech Industry
Information security - what is going on 2016
Will Your Business Get Hacked? #HumberBizWeek2016
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
Will Your Business Get Hacked in 2016?
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
CyberCare Pro - Cybersecurity for SME's updated.pptx
Securing the Skies: Navigating Cloud Security Challenges and Beyond
Break it while you make it: writing (more) secure software
Ad

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Machine learning based COVID-19 study performance prediction
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Cloud computing and distributed systems.
PDF
Approach and Philosophy of On baking technology
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation_ Review paper, used for researhc scholars
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectroscopy.pptx food analysis technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Machine Learning_overview_presentation.pptx
Cloud computing and distributed systems.
Approach and Philosophy of On baking technology
A comparative analysis of optical character recognition models for extracting...
Big Data Technologies - Introduction.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Assigned Numbers - 2025 - Bluetooth® Document
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.

Top 3 tips for security documentation

  • 1. Top 3 Tips For Security Docs Michael Furman Security Architect Icons made by Appzgear and Freepik
  • 2. What will we see today? • Why is security important? • Don’t be part of the problem • Do’s and Don’ts
  • 3. About Me • 20+ years in software engineering • 10+ years in application security • 4+ years Lead Security Architect at Tufin • www.linkedin.com/in/furmanmichael/ • ultimatesecpro@gmail.com • Read my blog https://ultimatesecurity.pro/ • Follow me on twitter @ultimatesecpro • I like to travel, read books and listen to music.
  • 4. About Tufin • Market Leader in Security Policy Orchestration for firewalls and cloud – New Tufin products integrate security into DevOps pipeline • Established in 2005 • Used in over 2,300 enterprises, including 40 Fortune 100 companies • We are constantly growing! www.tufin.com/careers/
  • 5. Why is security important? • Google for “hacker stole credit cards”. • Google for “cybersecurity breaches”.
  • 6. Sony PlayStation 2011 • Exposed personal information of 77 million users • Sony suspended PlayStation Network services – costs 155.4 million USD • Sony U.K. fined 395 million USD
  • 7. Target Breach 2013 • 40 million of credit and debit cards are stolen • Reissuing 21.8 million cards – 200 million USD
  • 8. Equifax 2017 • US consumer credit reporting agency • Unauthorized access to data – 145.5 million American customers – 15.2 million UK customers • Cost of the breach around 449 million USD
  • 9. Where to start? • OWASP Top Ten Overview: https://ultimatesecurity.pro/post/top-ten-presentation/
  • 10. Don’t be part of the problem • Run vulnerability scans • Do a Pen Test • Regularly upgrade a server • Regularly upgrade a tool
  • 11. Vulnerability vs. security features • A vulnerability is a weakness which can be exploited by an attacker • Security features is enchantment of a product to meet a security requirement
  • 12. Do’s and Don’ts - Vulnerability • Describe a vulnerability – not how to hack • Notify customers only – Public disclosure after the sufficient time Icons made by Smashicons
  • 13. Do’s and Don’ts - Security Fixes • Public disclosure • Be preemptive – If it limits the existing functionality Icons made by Freepik
  • 14. Take Aways • Engage with your IT team • Documenting vulnerabilities is different from documenting security fixes
  • 15. Thank you! • Contact me – www.linkedin.com/in/furmanmichael/ – ultimatesecpro@gmail.com – https://ultimatesecurity.pro/ – @ultimatesecpro

Editor's Notes

  • #2: <div>Icons made by <a href="https://www.flaticon.com/authors/appzgear" title="Appzgear">Appzgear</a> from <a href="https://www.flaticon.com/" title="Flaticon">www.flaticon.com</a> is licensed by <a href="http://creativecommons.org/licenses/by/3.0/" title="Creative Commons BY 3.0" target="_blank">CC 3.0 BY</a></div> <div>Icons made by <a href="https://www.freepik.com/" title="Freepik">Freepik</a> from <a href="https://www.flaticon.com/" title="Flaticon">www.flaticon.com</a> is licensed by <a href="http://creativecommons.org/licenses/by/3.0/" title="Creative Commons BY 3.0" target="_blank">CC 3.0 BY</a></div>
  • #3: Hi everyone, Thank you for joining the last lecture for today. What will we see today? I will start by giving you an overview of OpenID Connect. I will describe the OpenID Connect protocol, and will show you how it compares to other protocols. Then, we will review some of OpenID Connect Implementations. Finally, I will show you one of the best OpenID Connect implementations: Keycloak.
  • #4: Before we begin, a couple of words about me and the company I work for - Tufin. I have many years of experience in software development. Like most of you here today, I particularly like application security. I started to work in this area more than 10 years ago, and enjoy each day I work on it. For the last few years, I am responsible for the application security of all Tufin products. Recently I have started to write a blog – you are more then welcomed to read it. Something personal: I like traveling, reading books and listening to music. I particularly enjoy listen to jazz.
  • #5: And now, a couple of words about Tufin. Tufin is a great company. It is already over 13 years old. We have a lot of customers. Our customers are all around the world: in Israel, USA, Europe, Asia. Some are huge companies, others are much smaller. We have customers in many industries. For example: AT&T, BMW and Visa. Recently we have started to develop products that integrate security into DevOps pipeline. You are more then welcomed to visit our booth. Tufin is always growing. When I joined the company about 5 years ago, it took up only one and half floors. Now it takes up almost 4 floors and that is only in Israel. We have also expanded abroad. We recently opened up a new main office in Boston. We are always looking for good people. We are looking for Java, C++, DevOps people. We are looking for Docker and Kubernetes gurus. You can visit our site to see our open positions in RnD, Sales, Marketing and additional areas.
  • #7: http://www.pcworld.com/article/226802/playstation_network_hack_timeline.html http://www.bloomberg.com/news/2013-01-24/sony-fined-394-000-over-2011-hacker-attack-on-playstation-data.html
  • #9: The immediate cost of the breach, including security upgrades, legal fees, and free identity theft services for consumers totaled around $449 million
  • #11: Run vulnerability scans Do a Pen Test if you can budget for it, or see if you can piggyback on a PenTest that is run on your product Ensure that IT regularly upgrades the server hosting your KC If you use a tool for creating documentation (e.g. Madcap Flare, Adobe FrameMaker, AuthorIt, etc.), ask the vendor for details about what they’ve done to ensure the output they produce is secured Upgrade to the latest version, as needed
  • #13: <div>Icons made by <a href="https://www.flaticon.com/authors/smashicons" title="Smashicons">Smashicons</a> from <a href="https://www.flaticon.com/" title="Flaticon">www.flaticon.com</a> is licensed by <a href="http://creativecommons.org/licenses/by/3.0/" title="Creative Commons BY 3.0" target="_blank">CC 3.0 BY</a></div> How to document security-related issues Vulnerability vs. security features – have different documentation requirements Vulnerability – Notifications to customers only, not the entire world If you must notify everyone, then give customers sufficient time to implement your fix Describe the vulnerability, not how to hack in using the vulnerability
  • #14: <div>Icons made by <a href="https://www.freepik.com/" title="Freepik">Freepik</a> from <a href="https://www.flaticon.com/" title="Flaticon">www.flaticon.com</a> is licensed by <a href="http://creativecommons.org/licenses/by/3.0/" title="Creative Commons BY 3.0" target="_blank">CC 3.0 BY</a></div> Security Fixes Can be made public Be preemptive – tell them of upcoming changes Describe what the customers sees or it may impact them, so they can prepare for it
  • #15: You know how to document security-related issues
  • #16: Thank you for participating in my lecture! Please contact me if you need any additional information, or if you want to send me your resume.