Why I Ran a Lock-Picking Session In My Office
by Tash Norris
“What an opportunity to demonstrate the power of collaboration between security and engineering when building a product.”
Head to any major security conference, be it B-Sides, BlackHat or DefCon you’re likely to come across a lock picking village. But why?
Aside from the fact that it’s good to just sit and be still (see n number of posts on mindfulness), I truly believe lock picking provides a good ice breaker and an avenue to talk about the importance of security.
Take your standard padlocks (4 pin tumbler locks) are common and meet functional requirements, they’re built for a specific threat model and perform their job well. The padlocks though, are really easy to pick, the tools are easily accessible and tutorials are all over the internet. To me, they’re a good example of building purely to one set of (functional) requirements, and only testing against one set of (functional) requirements. The product works, it sells but it’s not secure. In addition, introducing security now requires a complete re-design of the mechanics, hugely costly.
Encourages shifting security left
When I run these lock picking sessions I talk about the power of having security (and other SME’s) engaged right from the beginning. We can provide design support, review architectures, test as we go and become trusted advisors. We can also talk about Threat Models, and how security can support even at the design and ideation phase. Threat vectors, the threat landscape and threat actors. For example, in London, a strong 4 pin padlock protecting my bike is more at risk from bolt cutters than lock picks so that should dictate how I decide to protect my asset. That might not be the case everywhere.
Introduces the concept of security testing
Not just pen testing, but actually testing the security of a product at every stage. When we lock pick we have an opportunity to discuss the mechanics of the lock and why it’s easy to pick, even when we change to other tumbler style locks. Introducing the power of a security engagement in ensuring the vulnerability wouldn’t be passed on to other implementations of the mechanics (hey spring loaded locks). We can draw parallels to discussing engineering patterns and how we can introduce security tests in the same way we use functional/ load/ requirements testing to validate the presence — or fix — of vulnerabilities continuously (e.g. every build).
Builds (security team) brand awareness
Lock picking sessions are great advertising tools too, I do some up front advertising on Slack, in office newsletters and via word of mouth but there’s nothing like taking over one of the tables in a communal area to catch that drive by traffic with “wanna learn how to pick a lock?”. These types of sessions are disarming, people are intrigued, they want to learn more and now, as they take time learning how to hold the picks and use them, you have a captive audience to talk about security with.
Most importantly, they know who you are now. You are a contact in a team they may have known little about, a resource they can use to ask questions of, look to for advice or even confide in.
It’s totally legal, cheaper than running multiple team lunches and good fun. Why not try it?
As an FYI the best picks I’ve used are by MadBob, these don’t tend to break easily and are much nicer to hold than other cheaper brands. However, there’s nothing wrong with using a cheaper set on Amazon, just be prepared for them to break!
About the Author
Tash is the lead Security Engineer at Photobox Group, owning the intent for the AppSec and CloudSec strategy. Currently building tools and processes to automate all the things, empower delivery teams to own the security of their products and pick locks. Tash is also on the review panel for DevSecCon, a member of the London OWASP WIA leadership team, contributor to Threat Modeling open source projects and an avid advocate for Women in Tech/Cyber and Blue Team goodness of all kinds.
The article has been originally published at: https://medium.com/@tashjnorris/why-i-ran-a-lock-picking-session-in-my-office-a80d49d26565