SlideShare a Scribd company logo
WordPress Security:
Beyond The Plugin
WordCamp Sacramento 2018
Stacy M. Clements
Who Am I?
• Small Business Owner
• Air Force veteran
• Fixer/Problem Solver/Pitbull
WordPress Security?
“What security plugin should I use to
secure my site?”
“Which security plugin is better, XXXXXX or
YYYYYY?”
“Secure your website in 2 minutes by
installing XXXXXX plugin.”
WordPress Security?
“What security plugin should I use to
secure my site?”
“Which security plugin is better, XXXXXX or
YYYYYY?”
“Secure your website in 2 minutes by
installing XXXXXX plugin.”
THAT’S NOT HOW
THIS WORKS
THAT’S NOT HOW ANY
OF THIS WORKS
Where’s The Checklist?
WordPress Security:  Beyond The Plugin
WordPress Security:  Beyond The Plugin
The solution lies in redefining the problem.
Changing The Game
GAME SCORE
Changing The Game
Changing The Game
Security is not an IT issue.
It’s a business issue.
We can’t eliminate risk.
We navigate it.
TechnologyProcess
People
So What Can We Do?
I’m from the
government,
and I’m here to
help.
• Collaborative effort
• Built using “best
practice” standards and
guidelines
• Checklist
• One-size-fits-all
• Designed to be flexible
NIST Cybersecurity
Framework
NIST Cybersecurity
Framework Core
What needs
protection?
What
safeguards
are available?
What techniques can
identify incidents?
Processes to
contain
impacts of
incidents?
Processes to
restore
capabilities?
Framework Core Elements
Functions organize basic cybersecurity
activities at the highest level
Framework Core Elements
Categories break down Functions into groups
of cybersecurity outcomes
Framework Core Elements
Subcategories get more specific – describing specific
outcomes of technical and/or management activities
Framework Core Elements
Informative References are common standards,
guidelines, and practices used to achieve these outcomes
Identify
IDENTIFY Asset Management
• Website – files and database
• Plugins/extensions
• Third party integrations
• Cloud storage, payment processor, accounting
• Users – and what roles?
• Who has access to your data?
Identify
IDENTIFY Asset Management
• Website is not just a collection of files and
database
• Do you have a written inventory of:
• Domain registrar
• Web host
• SSL certificate
• What about ways people access the site?
• Computer, mobile device? What about WiFi?
Identify
IDENTIFY Asset Management
Risk Assessment
• You need to know what you have, and
know what the threats/vulnerabilities are
• How do you get your “cyber threat
intelligence”?
• US-CERT
• Vendor-specific
• WordPress specific
Protect
PROTECT Access Control
• Manage users / roles (does everyone
REALLY need admin access?)
• And no one is named “admin”
• Enforce strong passwords (website AND
devices)
• Two-factor authentication
Protect
PROTECT Access Control
Information Protection Procedures
• Update – everything (plugins, core, access
devices)
• Backups – regularly made and tested
• Appropriate actions for known
vulnerabilities
• VPN, SFTP
• Develop and exercise incident response
and recovery plans
Protect
PROTECT Access Control
Information Protection Procedures
Protective Technology
• Firewalls – cloud-based, endpoint
• Antivirus / malware scanner on access
devices
• Block brute force login attempts
• Blacklist IPs – or whitelist
• Web server – updated software versions?
Secure file permissions?
Detect
• Server
• Application
• Access
• Change – did something get modified?
• Malware scanning
DETECT Security Continuous Monitoring
Detect
• Who is getting and assessing alerts?
• Who is taking action?
• Check for blacklisting
• Mxtoolbox
• Google Search Console
DETECT Security Continuous Monitoring
Detection Processes
How Are We Looking?
IDENTIFY
Asset Management
Risk Assessment
PROTECT
Access Control
Information Protection Procedures
Protective Technology
DETECT
Security Continuous Monitoring
Detection Processes
TechnologyProcessPeople
How Are We Looking?
IDENTIFY
Asset Management
Risk Assessment
PROTECT
Access Control
Information Protection Procedures
Protective Technology
DETECT
Security Continuous Monitoring
Detection Processes
TechnologyProcessPeople
Respond
RESPOND Execute Response Plan
• Don’t Panic!
• Major / Minor?
• Quarantine site - preserve log
files
• Notifications
• Failover
Respond
RESPOND Execute Response Plan
Analysis & Mitigation
• What happened?
• Investigate notifications – assess impact
• What immediate actions do you need to
take? (put out the fire)
Recover
• Restore site from the
backup you created
and tested
(you did do that, right?)
RECOVER Execute Recovery Plan
Recover
• Recovery is not just returning to the
pre- incident state
• Hotwash
• Lessons Learned?
RECOVER Execute Recovery Plan
Improvements
Continuous Process
DETECT
RESPOND
PROTECT
IDENTIFY
RECOVER
Takeaways
• Security is more than a plugin
• Not (just) IT!
• Always have backup
• Lessons learned – not burned
KNOWLEDGE
IS OF NO VALUE UNLESS PUT INTO
PRACTICE
THANK YOU!
QUESTIONS?
Stacy M. Clements
https://www.linkedin.com/in/stacyclements
https://twitter.com/stacyclements
https://milepost42.com

More Related Content

PDF
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
PDF
Why does security matter for devops by Caroline Wong
PDF
Top 5 Data Security Strategies in QA
PPTX
Jason Kent - AppSec Without Additional Tools
PDF
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
PPTX
451 AppSense Webinar - Why blame the user?
PDF
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
PPTX
Open Source Defense for Edge 2017
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
Why does security matter for devops by Caroline Wong
Top 5 Data Security Strategies in QA
Jason Kent - AppSec Without Additional Tools
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
451 AppSense Webinar - Why blame the user?
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
Open Source Defense for Edge 2017

What's hot (20)

PDF
Nick Drage & Fraser Scott - Epic battle devops vs security
PPTX
Application Security within Agile
PPTX
Equifax Breach Postmortem
PDF
Silver Lining for Miles: DevOps for Building Security Solutions
PDF
Secure Your WordPress Site - And Your Business
PPTX
Quick & Dirty Dozen: PCI Compliance Simplified
PDF
[OWASP Poland Day] Security in developer's life
PPTX
The Journey to DevSecOps
PDF
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
PPTX
Finding Security a Home in a DevOps World
PPTX
Security and DevOps Overview
PDF
Building Security Controls around Attack Models
PPTX
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
PDF
[OWASP Poland Day] Embedding security into SDLC + GDPR
PPTX
Securing Systems - Still Crazy After All These Years
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PPTX
The road goes ever on and on by Ciaran Conliffe
PPTX
451 and Cylance - The Roadmap To Better Endpoint Security
PPTX
Stephen Sadowski - Securely automating infrastructure in the cloud
PDF
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
Nick Drage & Fraser Scott - Epic battle devops vs security
Application Security within Agile
Equifax Breach Postmortem
Silver Lining for Miles: DevOps for Building Security Solutions
Secure Your WordPress Site - And Your Business
Quick & Dirty Dozen: PCI Compliance Simplified
[OWASP Poland Day] Security in developer's life
The Journey to DevSecOps
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
Finding Security a Home in a DevOps World
Security and DevOps Overview
Building Security Controls around Attack Models
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
[OWASP Poland Day] Embedding security into SDLC + GDPR
Securing Systems - Still Crazy After All These Years
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
The road goes ever on and on by Ciaran Conliffe
451 and Cylance - The Roadmap To Better Endpoint Security
Stephen Sadowski - Securely automating infrastructure in the cloud
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
Ad

Similar to WordPress Security: Beyond The Plugin (20)

PDF
Top Security Challenges Facing Credit Unions Today
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PDF
Application Security in an Agile World - Agile Singapore 2016
PPTX
A Practical Security Framework for Website Owners
PDF
What Every Developer And Tester Should Know About Software Security
PDF
Security Teams & Tech In A Cloud World
PPTX
SecArmour Security Group
PPTX
It security cognic_systems
PDF
All You Need is One - A ClickOnce Love Story - Secure360 2015
PDF
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
PDF
Zen and the art of Security Testing
PPTX
For Business's Sake, Let's focus on AppSec
PPTX
CyberKnight capabilties
PPTX
SPI Dynamics web application security 101
PPTX
ComResource - NW Agent Cybersecurity
PDF
IPNEC - Security Services
PDF
Windows Active Directory Security with IS Decisions
PPTX
How to Leverage Log Data for Effective Threat Detection
PDF
Strong authentication for your organization in a cost effective cloud-based...
PPTX
Azure Operation Management Suite - security and compliance
Top Security Challenges Facing Credit Unions Today
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Application Security in an Agile World - Agile Singapore 2016
A Practical Security Framework for Website Owners
What Every Developer And Tester Should Know About Software Security
Security Teams & Tech In A Cloud World
SecArmour Security Group
It security cognic_systems
All You Need is One - A ClickOnce Love Story - Secure360 2015
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Zen and the art of Security Testing
For Business's Sake, Let's focus on AppSec
CyberKnight capabilties
SPI Dynamics web application security 101
ComResource - NW Agent Cybersecurity
IPNEC - Security Services
Windows Active Directory Security with IS Decisions
How to Leverage Log Data for Effective Threat Detection
Strong authentication for your organization in a cost effective cloud-based...
Azure Operation Management Suite - security and compliance
Ad

Recently uploaded (20)

PPTX
Database Information System - Management Information System
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Digital Literacy And Online Safety on internet
PPTX
innovation process that make everything different.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Introduction to the IoT system, how the IoT system works
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
artificial intelligence overview of it and more
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Internet___Basics___Styled_ presentation
Database Information System - Management Information System
Design_with_Watersergyerge45hrbgre4top (1).ppt
artificialintelligenceai1-copy-210604123353.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Slides PPTX World Game (s) Eco Economic Epochs.pptx
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Digital Literacy And Online Safety on internet
innovation process that make everything different.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
presentation_pfe-universite-molay-seltan.pptx
SAP Ariba Sourcing PPT for learning material
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Introduction to the IoT system, how the IoT system works
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
artificial intelligence overview of it and more
Module 1 - Cyber Law and Ethics 101.pptx
newyork.pptxirantrafgshenepalchinachinane
Internet___Basics___Styled_ presentation

WordPress Security: Beyond The Plugin

  • 1. WordPress Security: Beyond The Plugin WordCamp Sacramento 2018 Stacy M. Clements
  • 2. Who Am I? • Small Business Owner • Air Force veteran • Fixer/Problem Solver/Pitbull
  • 3. WordPress Security? “What security plugin should I use to secure my site?” “Which security plugin is better, XXXXXX or YYYYYY?” “Secure your website in 2 minutes by installing XXXXXX plugin.”
  • 4. WordPress Security? “What security plugin should I use to secure my site?” “Which security plugin is better, XXXXXX or YYYYYY?” “Secure your website in 2 minutes by installing XXXXXX plugin.”
  • 5. THAT’S NOT HOW THIS WORKS THAT’S NOT HOW ANY OF THIS WORKS
  • 9. The solution lies in redefining the problem.
  • 12. Changing The Game Security is not an IT issue. It’s a business issue. We can’t eliminate risk. We navigate it. TechnologyProcess People
  • 13. So What Can We Do?
  • 14. I’m from the government, and I’m here to help.
  • 15. • Collaborative effort • Built using “best practice” standards and guidelines • Checklist • One-size-fits-all • Designed to be flexible NIST Cybersecurity Framework
  • 16. NIST Cybersecurity Framework Core What needs protection? What safeguards are available? What techniques can identify incidents? Processes to contain impacts of incidents? Processes to restore capabilities?
  • 17. Framework Core Elements Functions organize basic cybersecurity activities at the highest level
  • 18. Framework Core Elements Categories break down Functions into groups of cybersecurity outcomes
  • 19. Framework Core Elements Subcategories get more specific – describing specific outcomes of technical and/or management activities
  • 20. Framework Core Elements Informative References are common standards, guidelines, and practices used to achieve these outcomes
  • 21. Identify IDENTIFY Asset Management • Website – files and database • Plugins/extensions • Third party integrations • Cloud storage, payment processor, accounting • Users – and what roles? • Who has access to your data?
  • 22. Identify IDENTIFY Asset Management • Website is not just a collection of files and database • Do you have a written inventory of: • Domain registrar • Web host • SSL certificate • What about ways people access the site? • Computer, mobile device? What about WiFi?
  • 23. Identify IDENTIFY Asset Management Risk Assessment • You need to know what you have, and know what the threats/vulnerabilities are • How do you get your “cyber threat intelligence”? • US-CERT • Vendor-specific • WordPress specific
  • 24. Protect PROTECT Access Control • Manage users / roles (does everyone REALLY need admin access?) • And no one is named “admin” • Enforce strong passwords (website AND devices) • Two-factor authentication
  • 25. Protect PROTECT Access Control Information Protection Procedures • Update – everything (plugins, core, access devices) • Backups – regularly made and tested • Appropriate actions for known vulnerabilities • VPN, SFTP • Develop and exercise incident response and recovery plans
  • 26. Protect PROTECT Access Control Information Protection Procedures Protective Technology • Firewalls – cloud-based, endpoint • Antivirus / malware scanner on access devices • Block brute force login attempts • Blacklist IPs – or whitelist • Web server – updated software versions? Secure file permissions?
  • 27. Detect • Server • Application • Access • Change – did something get modified? • Malware scanning DETECT Security Continuous Monitoring
  • 28. Detect • Who is getting and assessing alerts? • Who is taking action? • Check for blacklisting • Mxtoolbox • Google Search Console DETECT Security Continuous Monitoring Detection Processes
  • 29. How Are We Looking? IDENTIFY Asset Management Risk Assessment PROTECT Access Control Information Protection Procedures Protective Technology DETECT Security Continuous Monitoring Detection Processes TechnologyProcessPeople
  • 30. How Are We Looking? IDENTIFY Asset Management Risk Assessment PROTECT Access Control Information Protection Procedures Protective Technology DETECT Security Continuous Monitoring Detection Processes TechnologyProcessPeople
  • 31. Respond RESPOND Execute Response Plan • Don’t Panic! • Major / Minor? • Quarantine site - preserve log files • Notifications • Failover
  • 32. Respond RESPOND Execute Response Plan Analysis & Mitigation • What happened? • Investigate notifications – assess impact • What immediate actions do you need to take? (put out the fire)
  • 33. Recover • Restore site from the backup you created and tested (you did do that, right?) RECOVER Execute Recovery Plan
  • 34. Recover • Recovery is not just returning to the pre- incident state • Hotwash • Lessons Learned? RECOVER Execute Recovery Plan Improvements
  • 36. Takeaways • Security is more than a plugin • Not (just) IT! • Always have backup • Lessons learned – not burned KNOWLEDGE IS OF NO VALUE UNLESS PUT INTO PRACTICE
  • 37. THANK YOU! QUESTIONS? Stacy M. Clements https://www.linkedin.com/in/stacyclements https://twitter.com/stacyclements https://milepost42.com

Editor's Notes

  • #16: based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk. Does not tell an organization how much cyber risk is tolerable, nor provide “the one and only” formula for cybersecurity. Living document - focuses on questions an organization needs to ask itself to manage its risk. While practices, technology, and standards will change over time—principles will not.
  • #17: high-level, strategic view of the lifecycle of an organization’s management of cybersecurity risk. Set of desired cybersecurity activities and outcomes
  • #22: The activities in the Identify Function are foundational for effective use of the Framework
  • #23: The activities in the Identify Function are foundational for effective use of the Framework
  • #27: What is your host doing? Is your server secure? PHP version / MySQL Avoid “soup kitchen” servers File permissions Prevent php execution in wp-content/uploads Deny access to wp-config.php
  • #28: How do I know when something happens?
  • #29: How do I know when something happens?
  • #33: Maybe it’s not a big hairy incident “incident” could be a newly announced vulnerability in plugin – just update it
  • #35: What happened – and how do we keep it from happening again? May want to communicate what you’ve done to your customers