[Infowarrior] - Apple security is 'struggling,' researcher says
Richard Forno
rforno at infowarrior.org
Tue Jun 9 12:51:01 UTC 2009
(Rich knows his stuff.....-rf)
Apple security is 'struggling,' researcher says
Laments lack of 'formal security program'
By Dan Goodin in San Francisco r
Posted in Anti-Virus, 9th June 2009 00:52 GMT
http://www.theregister.co.uk/2009/06/09/apple_security_suggestions/
A well-known security consultant says Apple is struggling to
effectively protect its users against malware and other online threats
and suggests executives improve by adopting a secure development
lifecycle to design its growing roster of products.
"Based on a variety of sources, we know that Apple does not have a
formal security program, and as such fails to catch vulnerabilities
that would otherwise be prevented before product releases," writes
Rich Mogull, founder of security firm Securosis and a self-described
owner of seven Macs. "To address this lack, Apple should integrate
secure software development into all internal development efforts."
Microsoft was among the first companies to integrate an SDL into its
internal development routine. Under the program, products are built
from the ground up with security in mind, so that poorly written
sections of older code are replaced with code that can better
withstand attack. It also subjects programs to a variety of simulated
attacks. Adobe Systems recently beefed up the SDL program for Reader
and Acrobat following criticism about the security of those two
programs.
Mogull's suggestion was one of five he made recently to ensure company
is doing everything it should to safeguard its customers.
"It's clear that that Apple considers security important, but that the
company also struggles to execute effectively when faced with security
challenges," he writes in a recent article on Mac news website
Tidbits. He goes on to fault the company for its ongoing failure to
patch a gaping security hole in Mac versions of Java.
The suggestions came as Apple on Monday announced Safari 4.0, a
release that fixes more than 50 vulnerabilities in the browser.
Protection against clickjacking attacks, denial-of-service flaws and
bugs that allow for remote code execution were among the fare.
Another suggestion from Mogull is that Apple appoint and empower a
high-ranking executive to oversee security in all Apple products. The
CSO, or chief security officer, would serve as the public face for
Apple security as well as the internal boss who coordinates the
company's response to security incidents and development of new
products that are safe.
"None of this will work if the CSO is merely a figurehead, and this
must be an executive management position with the budget, staff, and
authority to get the job done," Mogull says.
The researcher also called on Apple to complete work adding anti-
exploitation technologies into OS X. While features such as
sandboxing, library randomization, no-execute flags and stack
protection are partially implemented now, "these implementations are
either incomplete or flawed in ways that nearly eliminate their
security advantages," Mogull says. (Fellow researcher Charlie Miller
has said largely the same thing.)
Mogull's remaining two suggestions are:
* Establish a security response team to manage communications
between internal employees and external researchers reporting
vulnerabilities in Apple products, and
* Manage vulnerabilities in third-party software.
Apple has yet to respond to criticism about the vulnerable version of
Java it continues to ship with its Macs. ®
More information about the Infowarrior
mailing list