https://wiki.owasp.org/api.php?action=feedcontributions&user=Jbmaga1&feedformat=atomOWASP - User contributions [en]2024-03-29T04:49:53ZUser contributionsMediaWiki 1.27.2https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=256536OWASP Video Game Security Framework2020-01-02T23:14:59Z<p>Jbmaga1: 2020- Added New VGSF Framework</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:'' <br />
[[File:VGSF FRAMEWORK IMAGE.jpg|frame|center|VGSF]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* Dmytro Korzhevin<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that align to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the proper level of compliance is to audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing business environment for changes related to the overall compliance status. The goal is to detect anomalies and watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non-compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<nowiki>**</nowiki>''Overall if anything goes wrong, will you be able to pinpoint where non-compliance is.''<br />
<br />
'''''How ''''' do we want to view information on what is being monitored? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to structure compliance in daily operations. The goal should not only be to set up a compliance framework but to use as much automation as possible. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:a) Work Requirements<br />
<br />
:2) Process<br />
<br />
:a) Change management<br />
<br />
:3) Technology<br />
:a) Identity Access Management (IAM) Software<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
In the prevention phase begins the implementation of a security solution.<br />
This phase can have many sub tasks/levels depending on what you are implementing.<br />
<br />
<br />
<br />
<br /><br />
'''Prevention Process'''<br />
<br /><br />
<br />
:1. Plan<br />
<br />
:2. Analyze<br />
<br />
:3. Design<br />
<br />
:4. Build<br />
<br />
:5. Deploy<br />
<br />
<br /><br />
<br />
'''1. Plan'''<br />
<br />
<br /><br />
Some of the planning work could have been done in the strategy phase. <br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br /><br />
<br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
<br />
:1) Application <br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Data Protection<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) IT infrastructure<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:4) Identity & Access Management<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
<br /><br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
:1) Software Application<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Data Protection<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) IT Infrastructure<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
<br />
<br />
<br />
:4) Identify & Access Management<br />
<br /><br />
'''''Does''''' it align with our overall security & business strategy?<br />
<br />
<br /><br />
'''''Does''''' it fit in our current architecture?<br />
<br /><br />
'''''What''''' would the impact on this solution be?<br />
<br /><br />
<br />
'''2. Analyze'''<br />
<br /><br />
<br />
'''''What''''' capabilities do we need to assess?<br />
:1) Application<br />
:2) Architecture<br />
:3) Processes & Flows<br />
<br /><br />
<br />
'''''What''''' functions exist in the current security solutions vs future?<br />
<br /><br />
<br />
'''3. Design'''<br />
<br /><br />
'''''How''''' exactly do we want this solution to function?<br />
:1) Configuration<br />
<br />
'''4. Build'''<br />
:1) Assigning work tasks and doing them<br />
<br /><br />
<br />
<br />
'''5. Test'''<br />
:1) What is our testing strategy?<br />
<br />
:2) How do we shift when bugs are found?<br />
<br />
<br /><br />
<br />
'''6. Deploy'''<br />
:1) What is our "go-live" strategy for moving the solution from development to production?<br />
<br />
<br /><br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
[https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
Management refers to the management of access and identity within your organization.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
Service Delivery & Support refers to how an organization should approach managing any security services that have been implemented going forward.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.techn0rome0.com/home/2019/4/17/video-game-security-overview Video Game Security Overview]<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
* [https://www.researchgate.net/publication/51952605_IT_Security_Issues_Within_the_Video_Game_Industry IT Security Issues Within Video Game Industry]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
{{Tools categories}}<br />
<br />
Work in progress - set of tools will be put here aside with proposed classification.<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=File:VGSF_FRAMEWORK_IMAGE.jpg&diff=256535File:VGSF FRAMEWORK IMAGE.jpg2020-01-02T23:14:33Z<p>Jbmaga1: </p>
<hr />
<div>This photo showcases the VGSF Domains and Security Capability Areas within each domain</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=252607OWASP Video Game Security Framework2019-06-26T14:55:31Z<p>Jbmaga1: /* Related Projects */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that align to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the proper level of compliance is to audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing business environment for changes related to the overall compliance status. The goal is to detect anomalies and watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non-compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<nowiki>**</nowiki>''Overall if anything goes wrong, will you be able to pinpoint where non-compliance is.''<br />
<br />
'''''How ''''' do we want to view information on what is being monitored? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to structure compliance in daily operations. The goal should not only be to set up a compliance framework but to use as much automation as possible. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:a) Work Requirements<br />
<br />
:2) Process<br />
<br />
:a) Change management<br />
<br />
:3) Technology<br />
:a) Identity Access Management (IAM) Software<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
In the prevention phase begins the implementation of a security solution.<br />
This phase can have many sub tasks/levels depending on what you are implementing.<br />
<br />
<br />
<br />
<br /><br />
'''Prevention Process'''<br />
<br /><br />
<br />
:1. Plan<br />
<br />
:2. Analyze<br />
<br />
:3. Design<br />
<br />
:4. Build<br />
<br />
:5. Deploy<br />
<br />
<br /><br />
<br />
'''1. Plan'''<br />
<br />
<br /><br />
Some of the planning work could have been done in the strategy phase. <br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br /><br />
<br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
<br />
:1) Application <br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Data Protection<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) IT infrastructure<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:4) Identity & Access Management<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
<br /><br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
:1) Software Application<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Data Protection<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) IT Infrastructure<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
<br />
<br />
<br />
:4) Identify & Access Management<br />
<br /><br />
'''''Does''''' it align with our overall security & business strategy?<br />
<br />
<br /><br />
'''''Does''''' it fit in our current architecture?<br />
<br /><br />
'''''What''''' would the impact on this solution be?<br />
<br /><br />
<br />
'''2. Analyze'''<br />
<br /><br />
<br />
'''''What''''' capabilities do we need to assess?<br />
:1) Application<br />
:2) Architecture<br />
:3) Processes & Flows<br />
<br /><br />
<br />
'''''What''''' functions exist in the current security solutions vs future?<br />
<br /><br />
<br />
'''3. Design'''<br />
<br /><br />
'''''How''''' exactly do we want this solution to function?<br />
:1) Configuration<br />
<br />
'''4. Build'''<br />
:1) Assigning work tasks and doing them<br />
<br /><br />
<br />
<br />
'''5. Test'''<br />
:1) What is our testing strategy?<br />
<br />
:2) How do we shift when bugs are found?<br />
<br />
<br /><br />
<br />
'''6. Deploy'''<br />
:1) What is our "go-live" strategy for moving the solution from development to production?<br />
<br />
<br /><br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
[https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
Management refers to the management of access and identity within your organization.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
Service Delivery & Support refers to how an organization should approach managing any security services that have been implemented going forward.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.techn0rome0.com/home/2019/4/17/video-game-security-overview Video Game Security Overview]<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
* [https://www.researchgate.net/publication/51952605_IT_Security_Issues_Within_the_Video_Game_Industry IT Security Issues Within Video Game Industry]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=251540OWASP Video Game Security Framework2019-05-14T19:03:55Z<p>Jbmaga1: </p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that align to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the proper level of compliance is to audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing business environment for changes related to the overall compliance status. The goal is to detect anomalies and watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non-compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<nowiki>**</nowiki>''Overall if anything goes wrong, will you be able to pinpoint where non-compliance is.''<br />
<br />
'''''How ''''' do we want to view information on what is being monitored? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to structure compliance in daily operations. The goal should not only be to set up a compliance framework but to use as much automation as possible. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:a) Work Requirements<br />
<br />
:2) Process<br />
<br />
:a) Change management<br />
<br />
:3) Technology<br />
:a) Identity Access Management (IAM) Software<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
In the prevention phase begins the implementation of a security solution.<br />
This phase can have many sub tasks/levels depending on what you are implementing.<br />
<br />
<br />
<br />
<br /><br />
'''Prevention Process'''<br />
<br /><br />
<br />
:1. Plan<br />
<br />
:2. Analyze<br />
<br />
:3. Design<br />
<br />
:4. Build<br />
<br />
:5. Deploy<br />
<br />
<br /><br />
<br />
'''1. Plan'''<br />
<br />
<br /><br />
Some of the planning work could have been done in the strategy phase. <br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br /><br />
<br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
<br />
:1) Application <br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Data Protection<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) IT infrastructure<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:4) Identity & Access Management<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
<br /><br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
:1) Software Application<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Data Protection<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) IT Infrastructure<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
<br />
<br />
<br />
:4) Identify & Access Management<br />
<br /><br />
'''''Does''''' it align with our overall security & business strategy?<br />
<br />
<br /><br />
'''''Does''''' it fit in our current architecture?<br />
<br /><br />
'''''What''''' would the impact on this solution be?<br />
<br /><br />
<br />
'''2. Analyze'''<br />
<br /><br />
<br />
'''''What''''' capabilities do we need to assess?<br />
:1) Application<br />
:2) Architecture<br />
:3) Processes & Flows<br />
<br /><br />
<br />
'''''What''''' functions exist in the current security solutions vs future?<br />
<br /><br />
<br />
'''3. Design'''<br />
<br /><br />
'''''How''''' exactly do we want this solution to function?<br />
:1) Configuration<br />
<br />
'''4. Build'''<br />
:1) Assigning work tasks and doing them<br />
<br /><br />
<br />
<br />
'''5. Test'''<br />
:1) What is our testing strategy?<br />
<br />
:2) How do we shift when bugs are found?<br />
<br />
<br /><br />
<br />
'''6. Deploy'''<br />
:1) What is our "go-live" strategy for moving the solution from development to production?<br />
<br />
<br /><br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
[https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.techn0rome0.com/home/2019/4/17/video-game-security-overview Video Game Security Overview]<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
* [https://www.researchgate.net/publication/51952605_IT_Security_Issues_Within_the_Video_Game_Industry IT Security Issues Within Video Game Industry]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250929OWASP Video Game Security Framework2019-05-02T03:30:50Z<p>Jbmaga1: </p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that align to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the proper level of compliance is to audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing business environment for changes related to the overall compliance status. The goal is to detect anomalies and watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non-compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<nowiki>**</nowiki>''Overall if anything goes wrong, will you be able to pinpoint where non-compliance is.''<br />
<br />
'''''How ''''' do we want to view information on what is being monitored? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to structure compliance in daily operations. The goal should not only be to set up a compliance framework but to use as much automation as possible. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:a) Work Requirements<br />
<br />
:2) Process<br />
<br />
:a) Change management<br />
<br />
:3) Technology<br />
:a) Identity Access Management (IAM) Software<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
In the prevention phase begins the implementation of a security solution.<br />
This phase can have many sub tasks/levels depending on what you are implementing.<br />
<br />
<br />
<br />
<br /><br />
'''Prevention Process'''<br />
<br /><br />
<br />
:1. Plan<br />
<br />
:2. Analyze<br />
<br />
:3. Design<br />
<br />
:4. Build<br />
<br />
:5. Deploy<br />
<br />
<br /><br />
<br />
'''1. Plan'''<br />
<br />
<br /><br />
Some of the planning work could have been done in the strategy phase. <br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br /><br />
<br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
<br />
:1) Application <br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Data Protection<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) IT infrastructure<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:4) Identity & Access Management<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
<br /><br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
:1) Software Application<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Data Protection<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) IT Infrastructure<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
<br />
<br />
<br />
:4) Identify & Access Management<br />
<br /><br />
'''''Does''''' it align with our overall security & business strategy?<br />
<br />
<br /><br />
'''''Does''''' it fit in our current architecture?<br />
<br /><br />
'''''What''''' would the impact on this solution be?<br />
<br /><br />
<br />
'''2. Analyze'''<br />
<br /><br />
<br />
'''''What''''' capabilities do we need to assess?<br />
:1) Application<br />
:2) Architecture<br />
:3) Processes & Flows<br />
<br /><br />
<br />
'''''What''''' functions exist in the current security solutions vs future?<br />
<br /><br />
<br />
'''3. Design'''<br />
<br /><br />
'''''How''''' exactly do we want this solution to function?<br />
:1) Configuration<br />
<br />
'''4. Build'''<br />
:1) Assigning work tasks and doing them<br />
<br /><br />
<br />
<br />
'''5. Test'''<br />
:1) What is our testing strategy?<br />
<br />
:2) How do we shift when bugs are found?<br />
<br />
<br /><br />
<br />
'''6. Deploy'''<br />
:1) What is our "go-live" strategy for moving the solution from development to production?<br />
<br />
<br /><br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
[https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250928OWASP Video Game Security Framework2019-05-02T03:28:25Z<p>Jbmaga1: /* Collaboration */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that align to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the proper level of compliance is to audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing business environment for changes related to the overall compliance status. The goal is to detect anomalies and watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non-compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<nowiki>**</nowiki>''Overall if anything goes wrong, will you be able to pinpoint where non-compliance is.''<br />
<br />
'''''How ''''' do we want to view information on what is being monitored? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to structure compliance in daily operations. The goal should not only be to set up a compliance framework but to use as much automation as possible. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:a) Work Requirements<br />
<br />
:2) Process<br />
<br />
:a) Change management<br />
<br />
:3) Technology<br />
:a) Identity Access Management (IAM) Software<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
In the prevention phase begins the implementation of a security solution.<br />
This phase can have many sub tasks/levels depending on what you are implementing.<br />
<br />
<br />
<br />
<br /><br />
'''Prevention Process'''<br />
<br /><br />
<br />
:1. Plan<br />
<br />
:2. Analyze<br />
<br />
:3. Design<br />
<br />
:4. Build<br />
<br />
:5. Deploy<br />
<br />
<br /><br />
<br />
'''1. Plan'''<br />
<br />
<br /><br />
Some of the planning work could have been done in the strategy phase. <br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br /><br />
<br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
<br />
1. Application <br />
<br />
2. Data Protection<br />
<br />
3. IT infrastructure<br />
<br />
4. Identity & Access Management<br />
<br />
<br /><br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
:1) Software Application<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Data Protection<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) IT Infrastructure<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
<br />
<br />
<br />
:4) Identify & Access Management<br />
<br /><br />
'''''Does''''' it align with our overall security & business strategy?<br />
<br />
<br /><br />
'''''Does''''' it fit in our current architecture?<br />
<br /><br />
'''''What''''' would the impact on this solution be?<br />
<br /><br />
<br />
'''2. Analyze'''<br />
<br /><br />
<br />
'''''What''''' capabilities do we need to assess?<br />
:1) Application<br />
:2) Architecture<br />
:3) Processes & Flows<br />
<br /><br />
<br />
'''''What''''' functions exist in the current security solutions vs future?<br />
<br /><br />
<br />
'''3. Design'''<br />
<br /><br />
'''''How''''' exactly do we want this solution to function?<br />
:1) Configuration<br />
<br />
'''4. Build'''<br />
:1) Assigning work tasks and doing them<br />
<br /><br />
<br />
<br />
'''5. Test'''<br />
:1) What is our testing strategy?<br />
<br />
:2) How do we shift when bugs are found?<br />
<br />
<br /><br />
<br />
'''6. Deploy'''<br />
:1) What is our "go-live" strategy for moving the solution from development to production?<br />
<br />
<br /><br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
[https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250927OWASP Video Game Security Framework2019-05-02T03:26:55Z<p>Jbmaga1: </p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that align to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the proper level of compliance is to audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing business environment for changes related to the overall compliance status. The goal is to detect anomalies and watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non-compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<nowiki>**</nowiki>''Overall if anything goes wrong, will you be able to pinpoint where non-compliance is.''<br />
<br />
'''''How ''''' do we want to view information on what is being monitored? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to structure compliance in daily operations. The goal should not only be to set up a compliance framework but to use as much automation as possible. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:a) Work Requirements<br />
<br />
:2) Process<br />
<br />
:a) Change management<br />
<br />
:3) Technology<br />
:a) Identity Access Management (IAM) Software<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
In the prevention phase begins the implementation of a security solution.<br />
This phase can have many sub tasks/levels depending on what you are implementing.<br />
<br />
<br />
<br />
<br /><br />
'''Prevention Process'''<br />
<br /><br />
<br />
:1. Plan<br />
<br />
:2. Analyze<br />
<br />
:3. Design<br />
<br />
:4. Build<br />
<br />
:5. Deploy<br />
<br />
<br /><br />
<br />
'''1. Plan'''<br />
<br />
<br /><br />
Some of the planning work could have been done in the strategy phase. <br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br /><br />
<br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
<br />
1. Application <br />
2. Data Protection<br />
3. IT infrastructure<br />
4. Identity & Access Management<br />
<br />
<br /><br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
:1) Software Application<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Data Protection<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) IT Infrastructure<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
<br />
<br />
<br />
:4) Identify & Access Management<br />
<br /><br />
'''''Does''''' it align with our overall security & business strategy?<br />
<br />
<br /><br />
'''''Does''''' it fit in our current architecture?<br />
<br /><br />
'''''What''''' would the impact on this solution be?<br />
<br /><br />
<br />
'''2. Analyze'''<br />
<br /><br />
<br />
'''''What''''' capabilities do we need to assess?<br />
:1) Application<br />
:2) Architecture<br />
:3) Processes & Flows<br />
<br /><br />
<br />
'''''What''''' functions exist in the current security solutions vs future?<br />
<br /><br />
<br />
'''3. Design'''<br />
<br /><br />
'''''How''''' exactly do we want this solution to function?<br />
:1) Configuration<br />
<br />
'''4. Build'''<br />
:1) Assigning work tasks and doing them<br />
<br /><br />
<br />
<br />
'''5. Test'''<br />
:1) What is our testing strategy?<br />
<br />
:2) How do we shift when bugs are found?<br />
<br />
<br /><br />
<br />
'''6. Deploy'''<br />
:1) What is our "go-live" strategy for moving the solution from development to production?<br />
<br />
<br /><br />
<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
[https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250926OWASP Video Game Security Framework2019-05-02T03:24:20Z<p>Jbmaga1: /* Prevention */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that align to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the proper level of compliance is to audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing business environment for changes related to the overall compliance status. The goal is to detect anomalies and watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non-compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<nowiki>**</nowiki>''Overall if anything goes wrong, will you be able to pinpoint where non-compliance is.''<br />
<br />
'''''How ''''' do we want to view information on what is being monitored? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to structure compliance in daily operations. The goal should not only be to set up a compliance framework but to use as much automation as possible. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:a) Work Requirements<br />
<br />
:2) Process<br />
<br />
:a) Change management<br />
<br />
:3) Technology<br />
:a) Identity Access Management (IAM) Software<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
In the prevention phase begins the implementation of a security solution.<br />
This phase can have many sub tasks/levels depending on what you are implementing.<br />
<br />
<br />
<br />
<br /><br />
'''Prevention Process'''<br />
<br /><br />
:1. Plan<br />
<br />
:2. Analyze<br />
<br />
:3. Design<br />
<br />
:4. Build<br />
<br />
:5. Deploy<br />
<br /><br />
'''1. Plan'''<br />
<br />
<br /><br />
Some of the planning work could have been done in the strategy phase. <br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
What do we need a security solution for?<br />
1. Application <br />
2. Data Protection<br />
3. IT infrastructure<br />
4. Identity & Access Management<br />
<br /><br />
'''''What''''' do we need a security solution for?<br />
<br /><br />
:1) Software Application<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Data Protection<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) IT Infrastructure<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
<br />
<br />
<br />
:4) Identify & Access Management<br />
<br /><br />
'''''Does''''' it align with our overall security & business strategy?<br />
<br />
<br /><br />
'''''Does''''' it fit in our current architecture?<br />
<br /><br />
'''''What''''' would the impact on this solution be?<br />
<br /><br />
<br />
'''2. Analyze'''<br />
<br /><br />
<br />
'''''What''''' capabilities do we need to assess?<br />
:1) Application<br />
:2) Architecture<br />
:3) Processes & Flows<br />
<br /><br />
<br />
'''''What''''' functions exist in the current security solutions vs future?<br />
<br /><br />
<br />
'''3. Design'''<br />
<br /><br />
'''''How''''' exactly do we want this solution to function?<br />
:1) Configuration<br />
<br />
'''4. Build'''<br />
:1) Assigning work tasks and doing them<br />
<br /><br />
<br />
<br />
'''5. Test'''<br />
:1) What is our testing strategy?<br />
<br />
:2) How do we shift when bugs are found?<br />
<br />
<br /><br />
<br />
'''6. Deploy'''<br />
:1) What is our "go-live" strategy for moving the solution from development to production?<br />
<br />
<br /><br />
<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
[https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250916OWASP Video Game Security Framework2019-05-02T02:25:03Z<p>Jbmaga1: </p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that align to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the proper level of compliance is to audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing business environment for changes related to the overall compliance status. The goal is to detect anomalies and watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non-compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<nowiki>**</nowiki>''Overall if anything goes wrong, will you be able to pinpoint where non-compliance is.''<br />
<br />
'''''How ''''' do we want to view information on what is being monitored? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to structure compliance in daily operations. The goal should not only be to set up a compliance framework but to use as much automation as possible. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:a) Work Requirements<br />
<br />
:2) Process<br />
<br />
:a) Change management<br />
<br />
:3) Technology<br />
:a) Identity Access Management (IAM) Software<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
In the prevention phase begins the implementation of a security solution.<br />
This phase can have many sub tasks/levels depending on what you are implementing.<br />
Some of the planning work could have been done in the strategy phase. <br />
<br />
1. Plan<br />
2. <br />
<br />
<br />
What do we need a security solution for?<br />
1. Application <br />
2. Data Protection<br />
3. IT infrastructure<br />
4. Identity & Access Management<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
[https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250909OWASP Video Game Security Framework2019-05-01T20:10:49Z<p>Jbmaga1: /* Governance & Compliance */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that align to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the proper level of compliance is to audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing business environment for changes related to the overall compliance status. The goal is to detect anomalies and watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non-compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<nowiki>**</nowiki>''Overall if anything goes wrong, will you be able to pinpoint where non-compliance is.''<br />
<br />
'''''How ''''' do we want to view information on what is being monitored? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to structure compliance in daily operations. The goal should not only be to set up a compliance framework but to use as much automation as possible. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:a) Work Requirements<br />
<br />
:2) Process<br />
<br />
:a) Change management<br />
<br />
:3) Technology<br />
:a) Identity Access Management (IAM) Software<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
[https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250908OWASP Video Game Security Framework2019-05-01T20:00:04Z<p>Jbmaga1: /* Quick Download */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that align to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the proper level of compliance is to audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing business environment for changes related to the overall compliance status. The goal is to detect anomalies and watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non-compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<nowiki>**</nowiki>''Overall if anything goes wrong, will you be able to pinpoint where non-compliance is.''<br />
<br />
'''''How ''''' do we want to view information on what is being monitored? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to structure compliance in daily operations. The goal should not only be to set up a compliance framework but to use as much automation as possible. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:a) Work Requirements<br />
<br />
:2) Process<br />
<br />
:a) Change management<br />
<br />
:3) Technology<br />
:a) Identity Access Management (IAM) Software<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250890OWASP Video Game Security Framework2019-05-01T14:11:05Z<p>Jbmaga1: </p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation Alignment<br />
<br />
:2. Audit Process<br />
<br />
:3. Monitor Method<br />
<br />
:4. Control Setup<br />
<br /><br />
'''1. Regulation Alignment'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit Process'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the right level of compliance is to properly audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing infrastructure for changes related to compliance status. The goal is to detect anomalies and be able to watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<br />
<br />
'''''What''''' monitoring method are we planning to use? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to ensure as much compliance. The goal should not only be to set up a compliance framework but to use as much automation as possibly. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250889OWASP Video Game Security Framework2019-05-01T14:08:45Z<p>Jbmaga1: </p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project The OWASP Game Security Framework Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation Alignment<br />
<br />
:2. Audit Process<br />
<br />
:3. Monitor Method<br />
<br />
:4. Control Setup<br />
<br /><br />
'''1. Regulation Alignment'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit Process'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the right level of compliance is to properly audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing infrastructure for changes related to compliance status. The goal is to detect anomalies and be able to watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<br />
<br />
'''''What''''' monitoring method are we planning to use? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to ensure as much compliance. The goal should not only be to set up a compliance framework but to use as much automation as possibly. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250888OWASP Video Game Security Framework2019-05-01T14:07:23Z<p>Jbmaga1: /* News and Events */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation Alignment<br />
<br />
:2. Audit Process<br />
<br />
:3. Monitor Method<br />
<br />
:4. Control Setup<br />
<br /><br />
'''1. Regulation Alignment'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit Process'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the right level of compliance is to properly audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing infrastructure for changes related to compliance status. The goal is to detect anomalies and be able to watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<br />
<br />
'''''What''''' monitoring method are we planning to use? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to ensure as much compliance. The goal should not only be to set up a compliance framework but to use as much automation as possibly. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Governance & Compliance (G&C) Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250882OWASP Video Game Security Framework2019-05-01T02:27:34Z<p>Jbmaga1: </p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation Alignment<br />
<br />
:2. Audit Process<br />
<br />
:3. Monitor Method<br />
<br />
:4. Control Setup<br />
<br /><br />
'''1. Regulation Alignment'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit Process'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the right level of compliance is to properly audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing infrastructure for changes related to compliance status. The goal is to detect anomalies and be able to watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<br />
<br />
'''''What''''' monitoring method are we planning to use? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to ensure as much compliance. The goal should not only be to set up a compliance framework but to use as much automation as possibly. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
<br />
* [https://discord.gg/kS7UBc6 Join the discord channel!]<br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250881OWASP Video Game Security Framework2019-05-01T02:26:33Z<p>Jbmaga1: </p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation Alignment<br />
<br />
:2. Audit Process<br />
<br />
:3. Monitor Method<br />
<br />
:4. Control Setup<br />
<br /><br />
'''1. Regulation Alignment'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit Process'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the right level of compliance is to properly audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing infrastructure for changes related to compliance status. The goal is to detect anomalies and be able to watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<br />
<br />
'''''What''''' monitoring method are we planning to use? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to ensure as much compliance. The goal should not only be to set up a compliance framework but to use as much automation as possibly. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
https://discord.gg/kS7UBc6 <br />
<br />
== Resources ==<br />
*[https://www.pcicomplianceguide.org/faq/ PCI Compliance]<br />
*[https://eugdpr.org/the-regulation/gdpr-faqs/ GDPR Compliance]<br />
*[https://www.nist.gov/cyberframework NIST Cyber Security Framework]<br />
* [https://partner.steamgames.com/doc/gettingstarted Steam Game Release Process]<br />
* [https://developer.nintendo.com/the-process Nintendo Game Release Process]<br />
* [https://partners.playstation.net/ Sony Playstation Game Release Process]<br />
* [https://www.xbox.com/en-US/developers Microsoft Xbox Game Release Process]<br />
* [https://developer.amazon.com/apps-and-games Amazon Game Release Process]<br />
* [https://help.gamesalad.com/gamesalad-cookbook/publishing/google-play-publishing/ Google Playstore Game Release Process]<br />
* [https://developer.apple.com/app-store/launch/ Apple Appstore Game Release Process]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250880OWASP Video Game Security Framework2019-05-01T01:56:36Z<p>Jbmaga1: /* Resources Update*/</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation Alignment<br />
<br />
:2. Audit Process<br />
<br />
:3. Monitor Method<br />
<br />
:4. Control Setup<br />
<br /><br />
'''1. Regulation Alignment'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit Process'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the right level of compliance is to properly audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing infrastructure for changes related to compliance status. The goal is to detect anomalies and be able to watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<br />
<br />
'''''What''''' monitoring method are we planning to use? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to ensure as much compliance. The goal should not only be to set up a compliance framework but to use as much automation as possibly. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
https://discord.gg/kS7UBc6 <br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
* https://partner.steamgames.com/doc/gettingstarted<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250878OWASP Video Game Security Framework2019-05-01T01:53:20Z<p>Jbmaga1: </p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation Alignment<br />
<br />
:2. Audit Process<br />
<br />
:3. Monitor Method<br />
<br />
:4. Control Setup<br />
<br /><br />
'''1. Regulation Alignment'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit Process'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the right level of compliance is to properly audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing infrastructure for changes related to compliance status. The goal is to detect anomalies and be able to watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<br />
<br />
'''''What''''' monitoring method are we planning to use? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br /><br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to ensure as much compliance. The goal should not only be to set up a compliance framework but to use as much automation as possibly. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
https://discord.gg/kS7UBc6 <br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250877OWASP Video Game Security Framework2019-05-01T01:51:56Z<p>Jbmaga1: /* Governance & Compliance */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation Alignment<br />
<br />
:2. Audit Process<br />
<br />
:3. Monitor Method<br />
<br />
:4. Control Setup<br />
<br /><br />
'''1. Regulation Alignment'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit Process'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the right level of compliance is to properly audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing infrastructure for changes related to compliance status. The goal is to detect anomalies and be able to watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
:2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
<br />
<br />
'''''What''''' monitoring method are we planning to use? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to ensure as much compliance. The goal should not only be to set up a compliance framework but to use as much automation as possibly. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
https://discord.gg/kS7UBc6 <br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250876OWASP Video Game Security Framework2019-05-01T01:50:17Z<p>Jbmaga1: /* Quick Download */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation Alignment<br />
<br />
:2. Audit Process<br />
<br />
:3. Monitor Method<br />
<br />
:4. Control Setup<br />
<br /><br />
'''1. Regulation Alignment'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit Process'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the right level of compliance is to properly audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing infrastructure for changes related to compliance status. The goal is to detect anomalies and be able to watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
::<br />
::2) User Activity<br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
:<br />
<br />
'''''What''''' monitoring method are we planning to use? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
:<br />
'''''What''''' monitoring technology can help us achieve this? <br />
:1) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to ensure as much compliance. The goal should not only be to set up a compliance framework but to use as much automation as possibly. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
https://discord.gg/kS7UBc6 <br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250875OWASP Video Game Security Framework2019-05-01T01:25:57Z<p>Jbmaga1: Updated Governance & Compliance (1st draft)</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation Alignment<br />
<br />
:2. Audit Process<br />
<br />
:3. Monitor Method<br />
<br />
:4. Control Setup<br />
<br /><br />
'''1. Regulation Alignment'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Audit Process'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the right level of compliance is to properly audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing infrastructure for changes related to compliance status. The goal is to detect anomalies and be able to watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
''Assess monitoring capabilities available''<br />
:1) Infrastructure<br />
::a) Are the technology resources IT environment (Virtual Machines,Applications, Databases, etc.) staying compliant after setup?<br />
<br />
::2)User Activity <br />
::a) Are users still able to operate daily job functions with compliance in place?<br />
<br />
:2) Processes<br />
::a) Is the Disaster Recover plan being implemented and tracked at each stage<br />
::b) Is the Incident Response plan being implemented and tracked at each stage<br />
<br />
:3) Reports<br />
<br />
'''''What''''' monitoring method are we planning to use? <br />
:1) Reports<br />
:2) Dashboards/Charts<br />
:3) Alerts<br />
<br />
'''''What''''' monitoring technology can help us achieve this? <br />
:3) Data Analytic tools<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Frequency <br />
<br />
:2) Complexity<br />
<br />
<br /><br />
'''4. Control Setup'''<br />
<br />
<br /><br />
During this phase an org must implement controls in place to ensure as much compliance. The goal should not only be to set up a compliance framework but to use as much automation as possibly. This will in turn reduce overhead and will make compliance easier to manage and modify in the future.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve compliance standards that are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to automate future compliance controls?<br />
<br />
:1) Automation Code/Scripts<br />
<br />
:2) Role-based Security <br />
<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
https://discord.gg/kS7UBc6 <br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250860OWASP Video Game Security Framework2019-04-30T21:53:22Z<p>Jbmaga1: /* Governance & Compliance */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation, etc.)''<br />
<br /><br />
<br />
2. '''Compliance'''<br />
<br />
<br /><br />
The best way to ensure an organization is maintaining the right level of compliance is to properly audit.<br />
<br />
Auditing involves performing routine internal checks to ensure policies are being followed by all.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' audit objectives should we test against?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''How detailed should the audit be?''''' <br />
<br />
:1) High level<br />
::a) "Do you have a ____ to accomplish ___?"--- A simple "yes" or "no" checkbox audit<br />
<br />
:2) Behavioral<br />
::a) "Walk me through the process in the event ____ happens"--- Applied scenarios & employee critical thinking<br />
<br />
<br /><br />
'''''How often should audits happen?''''' <br />
::a) Monthly<br />
::b) Quarterly<br />
::c) Yearly<br />
::d) Combination or randomly<br />
<br />
''**Its important to be able to perform an audit on call for unpredictable external shifts in compliance requirements''<br />
<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
Monitoring involves watching an existing infrastructure for changes related to compliance status. The goal is to detect anomalies and be able to watch organizational trends from a compliance point of view. This valuable information will aid in quickly remedying non compliance and developing new strategies by pinpointing areas of improvements.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' compliance items do we need to monitor? (prioritize)<br />
<br />
:1) Assess monitoring capabilities available<br />
<br />
::a) <br />
<br />
::b) <br />
<br />
<br />
<br /><br />
'''''What''''' metrics are a priority within compliance?<br />
<br />
<br /><br />
'''''How''''' do we decide on compliance improvement initiatives when a trend appears?<br />
<br />
:1) Based on <br />
<br />
::a) <br />
<br />
::b) <br />
<br />
<br />
<br /><br />
'''4. Security Controls'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve ones are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
https://discord.gg/kS7UBc6 <br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250859OWASP Video Game Security Framework2019-04-30T21:16:33Z<p>Jbmaga1: /* Governance & Compliance */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model. With the current trends in gaming raising the risk to the public's privacy, having a proper G&C model will keep the business continuity high therefore lowering the risks related to non-compliance.<br />
<br />
<br /><br />
'''Governance & Compliance Process'''<br />
<br /><br />
:1. Regulation<br />
<br />
:2. Audit<br />
<br />
:3. Monitor<br />
<br />
:4. Control<br />
<br /><br />
'''1. Regulation'''<br />
<br />
<br /><br />
There are many regulations that attribute to organizational compliance and understanding policies that adhere to the business model and future security strategy is the first step.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are some of the current industry standards related to gaming?<br />
<br /><br />
:1) Government<br />
<br />
::a) General Data Protection Regulation (GDPR)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:2) Community<br />
<br />
::a) Open Web Application Security Project (OWASP)<br />
::b) Payment Card Industry Data Security Standard (PCI)<br />
::c) The National Institute for Standards and Technology (NIST)<br />
<br />
:3) Vendor<br />
<br />
::a) Microsoft<br />
::b) Sony<br />
::c) Nintendo<br />
::d) Google<br />
::e) Amazon<br />
::f) Apple<br />
::g) Steam<br />
<br />
<br /><br />
'''''Which''''' ones are mandatory?<br />
''**Prioritize by impact on business (financial, reputation,etc)''<br />
<br /><br />
<br />
<br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Compliance'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Monitoring'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Security Controls'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''How''''' do we achieve ones are mandatory?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
https://discord.gg/kS7UBc6 <br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250858OWASP Video Game Security Framework2019-04-30T20:31:30Z<p>Jbmaga1: /* Governance & Compliance */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance Attack Surface ==<br />
The purpose of the Governance & Compliance phase in the framework is to layout a guiding path to establishing and maintaining a G&C operating model.<br />
<br />
Governance & Risk Process<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
https://discord.gg/kS7UBc6 <br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250857OWASP Video Game Security Framework2019-04-30T19:57:40Z<p>Jbmaga1: /* Classifications */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1. Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
2. '''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
3. '''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''4. Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250719OWASP Video Game Security Framework2019-04-26T21:18:44Z<p>Jbmaga1: /* Classifications */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1.Establish Purpose'''<br />
<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
'''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
'''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250718OWASP Video Game Security Framework2019-04-26T21:17:54Z<p>Jbmaga1: /* Classifications */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br /><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br /><br />
'''Strategy & Risk Process'''<br />
<br /><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br /><br />
'''1.Establish Purpose'''<br />
<br /><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br /><br />
'''''Example Questions to ask:'''''<br />
<br /><br />
'''''What''''' are the project requirements?<br />
<br /><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br /><br />
'''''What''''' is the proposed approach to this project?<br />
<br /><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br /><br />
'''''Who''''' are the parties involved?<br />
<br /><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br /><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br /><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br /><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br /><br />
'''Triage Capabilities'''<br />
<br />
<br /><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br /><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
<br /><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br /><br />
'''Define Vision'''<br />
<br />
<br /><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
<br /><br />
Example Questions to ask:<br />
<br />
<br /><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br /><br />
'''''What''''' are the current threats to the organization?<br />
<br />
<br /><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br /><br />
'''Plan Next Steps'''<br />
<br />
<br /><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
<br /><br />
''Example Questions to ask:''<br />
<br />
<br /><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br /><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250717OWASP Video Game Security Framework2019-04-26T21:15:53Z<p>Jbmaga1: /* Business Strategy & Risk */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br/><br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br/><br />
'''Strategy & Risk Process'''<br />
<br/><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br/><br />
'''1.Establish Purpose'''<br />
<br/><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br/><br />
'''''Example Questions to ask:'''''<br />
<br/><br />
'''''What''''' are the project requirements?<br />
<br/><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br/><br />
'''''What''''' is the proposed approach to this project?<br />
<br/><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br/><br />
'''''Who''''' are the parties involved?<br />
<br/><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br/><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br/><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br/><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br/><br />
'''Triage Capabilities'''<br />
<br/><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br/><br />
''Example Questions to ask:''<br />
<br/><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br/><br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br/><br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br/><br />
'''Define Vision'''<br />
<br/><br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br/><br />
Example Questions to ask:<br />
<br/><br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br/><br />
'''''What''''' are the current threats to the organization?<br />
<br/><br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br/><br />
'''Plan Next Steps'''<br />
<br/><br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br/><br />
''Example Questions to ask:''<br />
<br/><br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br/><br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br/><br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250716OWASP Video Game Security Framework2019-04-26T21:14:08Z<p>Jbmaga1: /* Business Strategy & Risk */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br/><br />
'''Strategy & Risk Process'''<br />
<br/><br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br/><br />
'''1.Establish Purpose'''<br />
<br/><br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br/><br />
'''''Example Questions to ask:'''''<br />
<br/><br />
'''''What''''' are the project requirements?<br />
<br/><br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br/><br />
'''''What''''' is the proposed approach to this project?<br />
<br/><br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br/><br />
'''''Who''''' are the parties involved?<br />
<br/><br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br/><br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br/><br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br/><br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br/><br />
'''Triage Capabilities'''<br />
<br/><br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br/><br />
''Example Questions to ask:''<br />
<br/><br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br />
'''Define Vision'''<br />
<br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
Example Questions to ask:<br />
<br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br />
'''''What''''' are the current threats to the organization?<br />
<br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br />
'''Plan Next Steps'''<br />
<br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
''Example Questions to ask:''<br />
<br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250715OWASP Video Game Security Framework2019-04-26T21:11:47Z<p>Jbmaga1: /* Business Strategy & Risk */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br/><br />
'''Strategy & Risk Process'''<br />
<br />
:1. Establish Purpose<br />
<br/><br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
:<br />
'''1.Establish Purpose'''<br />
<br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
'''''Example Questions to ask:'''''<br />
<br />
'''''What''''' are the project requirements?<br />
<br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br />
'''''What''''' is the proposed approach to this project?<br />
<br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br />
'''''Who''''' are the parties involved?<br />
<br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br />
'''Triage Capabilities'''<br />
<br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
''Example Questions to ask:''<br />
<br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br />
'''Define Vision'''<br />
<br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
Example Questions to ask:<br />
<br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br />
'''''What''''' are the current threats to the organization?<br />
<br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br />
'''Plan Next Steps'''<br />
<br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
''Example Questions to ask:''<br />
<br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250714OWASP Video Game Security Framework2019-04-26T21:09:12Z<p>Jbmaga1: /* Classifications */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
'''Strategy & Risk Process'''<br />
<br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
:<br />
'''1.Establish Purpose'''<br />
<br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
'''''Example Questions to ask:'''''<br />
<br />
'''''What''''' are the project requirements?<br />
<br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br />
'''''What''''' is the proposed approach to this project?<br />
<br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br />
'''''Who''''' are the parties involved?<br />
<br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br />
'''Triage Capabilities'''<br />
<br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
''Example Questions to ask:''<br />
<br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br />
'''Define Vision'''<br />
<br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
Example Questions to ask:<br />
<br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br />
'''''What''''' are the current threats to the organization?<br />
<br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br />
'''Plan Next Steps'''<br />
<br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
''Example Questions to ask:''<br />
<br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250713OWASP Video Game Security Framework2019-04-26T21:07:37Z<p>Jbmaga1: /* Business Strategy & Risk */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
'''Strategy & Risk Process'''<br />
<br />
:1. Establish Purpose<br />
<br />
:2. Triage Capabilities<br />
<br />
:3. Define Vision<br />
<br />
:4. Plan Next steps<br />
<br />
'''Establish Purpose'''<br />
<br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
'''''Example Questions to ask:'''''<br />
<br />
'''''What''''' are the project requirements?<br />
<br />
:1) Detailed in Project plan<br />
<br />
::a) May come from leadership and other areas of business<br />
<br />
'''''What''''' is the proposed approach to this project?<br />
<br />
:1) Methodology<br />
<br />
::a) Waterfall<br />
<br />
::b) Agile<br />
<br />
'''''Who''''' are the parties involved?<br />
<br />
:1) Key Stake Holders<br />
<br />
:2) Subject Matter Experts (SMEs)<br />
<br />
:3) Project Managers & Staff<br />
<br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br />
:1) Resource Availability<br />
<br />
::a) Staff<br />
<br />
::b) Technology<br />
<br />
::c) Finances<br />
<br />
:2) Complexity of project<br />
<br />
::a) No SME<br />
<br />
::b) Vendor support<br />
<br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
:1) Varies by project<br />
<br />
'''Triage Capabilities'''<br />
<br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
''Example Questions to ask:''<br />
<br />
'''''What''''' security controls do we currently have in place?<br />
<br />
:1) Physical Security<br />
<br />
:2) Network Security<br />
<br />
:3) System Integrity<br />
<br />
:4) Application Security<br />
<br />
:5) User Security<br />
<br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
:1) Lack of scalability<br />
<br />
:2) Cannot perform data analytics<br />
<br />
'''Define Vision'''<br />
<br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
Example Questions to ask:<br />
<br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
:1) Better alignment with the business<br />
<br />
::a) Budget planning<br />
<br />
::b) Make security a part of future business decisions<br />
<br />
:2) Improve financials decisions<br />
<br />
::a) Decrease spending<br />
<br />
::b) Smarter spending<br />
<br />
:3) Lower cyber risks to organization<br />
<br />
::a) Address current and future security challenges<br />
<br />
::b) Implement detection, prevention, response<br />
<br />
:4) Higher Return on Investment (ROI)<br />
<br />
::a) Competitive advantage<br />
<br />
::b) Higher market share<br />
<br />
::c) Increased consumer trust<br />
<br />
'''''What''''' are the current threats to the organization?<br />
<br />
'''''What''''' does the org need to protect?<br />
<br />
:1) Based on value of asset<br />
<br />
::a) Cost<br />
<br />
::b) Rarity<br />
<br />
:2) Based on impact to business<br />
<br />
::a) Stop operations<br />
<br />
::b) Impact user privacy<br />
<br />
'''Plan Next Steps'''<br />
<br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
''Example Questions to ask:''<br />
<br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
:1) People<br />
<br />
:2) Process<br />
<br />
:3) Technology<br />
<br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
:1) Retrospect meetings<br />
<br />
:2) Revamp Strategy & Risk<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250712OWASP Video Game Security Framework2019-04-26T21:04:05Z<p>Jbmaga1: /* Business Strategy & Risk */ First Draft done</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
'''Strategy & Risk Process'''<br />
<br />
1. Establish Purpose<br />
<br />
2. Triage Capabilities<br />
<br />
3. Define Vision<br />
<br />
4. Plan Next steps<br />
<br />
'''Establish Purpose'''<br />
<br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
'''''Example Questions to ask:'''''<br />
<br />
'''''What''''' are the project requirements?<br />
<br />
1) Detailed in Project plan<br />
<br />
:a) May come from leadership and other areas of business<br />
<br />
'''''What''''' is the proposed approach to this project?<br />
<br />
1) Methodology<br />
<br />
:a) Waterfall<br />
<br />
:b) Agile<br />
<br />
'''''Who''''' are the parties involved?<br />
<br />
1) Key Stake Holders<br />
<br />
2) Subject Matter Experts (SMEs)<br />
<br />
3) Project Managers & Staff<br />
<br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br />
1) Resource Availability<br />
<br />
:a) Staff<br />
<br />
:b) Technology<br />
<br />
:c) Finances<br />
<br />
2) Complexity of project<br />
<br />
:a) No SME<br />
<br />
:b) Vendor support<br />
<br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
1) Varies by project<br />
<br />
'''Triage Capabilities'''<br />
<br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
''Example Questions to ask:''<br />
<br />
'''''What''''' security controls do we currently have in place?<br />
<br />
1) Physical Security<br />
<br />
2) Network Security<br />
<br />
3) System Integrity<br />
<br />
4) Application Security<br />
<br />
5) User Security<br />
<br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
1) Lack of scalability<br />
<br />
2) Cannot perform data analytics<br />
<br />
'''Define Vision'''<br />
<br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
Example Questions to ask:<br />
<br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
1) Better alignment with the business<br />
<br />
:a) Budget planning<br />
<br />
:b) Make security a part of future business decisions<br />
<br />
2) Improve financials decisions<br />
<br />
:a) Decrease spending<br />
<br />
:b) Smarter spending<br />
<br />
3) Lower cyber risks to organization<br />
<br />
:a) Address current and future security challenges<br />
<br />
:b) Implement detection, prevention, response<br />
<br />
4) Higher Return on Investment (ROI)<br />
<br />
:a) Competitive advantage<br />
<br />
:b) Higher market share<br />
<br />
:c) Increased consumer trust<br />
<br />
'''''What''''' are the current threats to the organization?<br />
<br />
'''''What''''' does the org need to protect?<br />
<br />
1) Based on value of asset<br />
<br />
:a) Cost<br />
<br />
:b) Rarity<br />
<br />
2) Based on impact to business<br />
<br />
:a) Stop operations<br />
<br />
:b) Impact user privacy<br />
<br />
'''Plan Next Steps'''<br />
<br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
''Example Questions to ask:''<br />
<br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
1) People<br />
<br />
2) Process<br />
<br />
3) Technology<br />
<br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
1) Retrospect meetings<br />
<br />
2) Revamp Strategy & Risk<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250711OWASP Video Game Security Framework2019-04-26T21:01:58Z<p>Jbmaga1: /* Classifications */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br />
The purpose of the Strategy & Risk phase in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
'''Strategy & Risk Process'''<br />
<br />
1. Establish Purpose<br />
<br />
2. Triage Capabilities<br />
<br />
3. Define Vision<br />
<br />
4. Plan Next steps<br />
<br />
'''Establish Purpose'''<br />
<br />
It’s important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed. Eventually a full project plan will be created for the initiatives that emerge from this phase. Establishing how an org handles these types of projects is a key driver of success.<br />
<br />
'''''Example Questions to ask:'''''<br />
<br />
'''''What''''' are the project requirements?<br />
<br />
1) Detailed in Project plan<br />
<br />
a) May come from leadership and other areas of business<br />
<br />
'''''What''''' is the proposed approach to this project?<br />
<br />
1) Methodology<br />
<br />
a) Waterfall<br />
<br />
b) Agile<br />
<br />
'''''Who''''' are the parties involved?<br />
<br />
1) Key Stake Holders<br />
<br />
2) Subject Matter Experts (SMEs)<br />
<br />
3) Project Managers & Staff<br />
<br />
'''''What''''' are the Risks, Barriers & Concerns?<br />
<br />
1) Resource Availability<br />
<br />
a) Staff<br />
<br />
b) Technology<br />
<br />
c) Finances<br />
<br />
2) Complexity of project<br />
<br />
a) No SME<br />
<br />
b) Vendor support<br />
<br />
'''''What''''' are the known tasks that need to be accomplished?<br />
<br />
1) Varies by project<br />
<br />
'''Triage Capabilities'''<br />
<br />
Assessing the current security capabilities within a company is the next step. This will allow an organization to understand certain strengths and developing areas in their sec operations. The very detailed information from the results of the assessments are vital to the next step.<br />
<br />
''Example Questions to ask:''<br />
<br />
'''''What''''' security controls do we currently have in place?<br />
<br />
1) Physical Security<br />
<br />
2) Network Security<br />
<br />
3) System Integrity<br />
<br />
4) Application Security<br />
<br />
5) User Security<br />
<br />
'''''Are''''' licensed security technologies being utilized to their fullest potential?<br />
<br />
'''''What''''' are the gaps in the security technologies currently used?<br />
<br />
1) Lack of scalability<br />
<br />
2) Cannot perform data analytics<br />
<br />
'''Define Vision'''<br />
<br />
The vision for org security needs to be created with the overall business objectives in mind. This needs to start out very high level and can be tailored a bit more later. Understanding industry trends and being innovative allows for a better vision.<br />
<br />
Example Questions to ask:<br />
<br />
'''''What''''' do we want our security posture to look like in the future?<br />
<br />
1) Better alignment with the business<br />
<br />
a) Budget planning<br />
<br />
b) Make security a part of future business decisions<br />
<br />
2) Improve financials decisions<br />
<br />
a) Decrease spending<br />
<br />
b) Smarter spending<br />
<br />
3) Lower cyber risks to organization<br />
<br />
a) Address current and future security challenges<br />
<br />
b) Implement detection, prevention, response<br />
<br />
4) Higher Return on Investment (ROI)<br />
<br />
a) Competitive advantage<br />
<br />
b) Higher market share<br />
<br />
c) Increased consumer trust<br />
<br />
'''''What''''' are the current threats to the organization?<br />
<br />
'''''What''''' does the org need to protect?<br />
<br />
1) Based on value of asset<br />
<br />
a) Cost<br />
<br />
b) Rarity<br />
<br />
2) Based on impact to business<br />
<br />
a) Stop operations<br />
<br />
b) Impact user privacy<br />
<br />
'''Plan Next Steps'''<br />
<br />
During this phase an org must create a list with the end-resulted actions necessary to get to the newly accepted vision. This list must be prioritized and grouped to form the initiatives needed for implementation.<br />
<br />
''Example Questions to ask:''<br />
<br />
'''''What''''' capabilities will achieve the defined vision from the previous step?<br />
<br />
1) People<br />
<br />
2) Process<br />
<br />
3) Technology<br />
<br />
'''''What''''' can be done to ensure continued maintenance on the defined vision?<br />
<br />
1) Retrospect meetings<br />
<br />
2) Revamp Strategy & Risk<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=250707OWASP Video Game Security Framework2019-04-26T17:57:25Z<p>Jbmaga1: /* Classifications */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br />
The purpose of Strategy & Risk in the framework is to layout a guiding path to creating and completing security related initiatives in gaming. <br />
<br />
Strategy & Risk Process<br />
# Establish Purpose<br />
# Triage Capabilities<br />
# Define Vision<br />
# Plan Next steps<br />
<br />
'''Establish Purpose'''<br />
<br />
Its important to understand in detail the goal of the overall security strategy and how can you capture requirements to ensure this phase is properly completed.<br />
<br />
'''What''' do we want our security posture to look like in the future?<br />
# Better alignment with the business Budget planning, security is apart of future business decisions<br />
# Improve financials decisions (Decrease spending, smarter spending)<br />
# Return on Investment (ROI) (competitive advantage, increase market share, consumer trust)<br />
# <br />
'''Which''' resource provider and type is this policy targeting? Example: Microsoft.Network/networkInterfaces<br />
<br />
'''What''' is the use case for the policy? Example: Block all Public IPs within the Dow tenant<br />
<br />
'''Which''' scope, such as management group, subscription, or resource group, should the policy target? ''Example:'' CloudAll <br />
<br />
'''Which''' policy effect? Example: Deny<br />
<br />
1. Disabled – Useful for testing situations or for when the policy definition has parameterized the effect. This flexibility makes it possible to disable a single assignment instead of disabling all of that policy's assignments.<br />
<br />
2. Append – Add additional fields to the requested resource during creation or update. Common example is adding tags on resources such as costCenter or specifying allowed IPs for a storage resource<br />
<br />
3. Deny – Prevent a resource request that doesn't match defined standards through a policy definition and fails the request.<br />
<br />
4. Audit – Create a warning event in the activity log when evaluating a non-compliant resource, but it doesn't stop the request. Can then use Azure Monitor to trigger serverless compute and automate more complex remediations.<br />
<br />
5. AuditIfNotExists – Enables auditing on resources that match the if condition, but doesn't have the components specified in the details of the then condition.<br />
<br />
6. DeployIfNotExists – Executes a template deployment for resources that match the if condition, but doesn't have the components specified in the details of the then condition.<br />
<br />
What is the name of the policy definition? Development environments should be Prefixed with (Dev).<br />
<br />
Examples: Restrict Public IP; (Dev) Deny SQL database TDE disablement<br />
<br />
Naming convention: <br />
<br />
• Allow = “Deny” with whitelist<br />
<br />
• Deny = “Deny” with blacklist<br />
<br />
• Limit = "Deny" if not in specific set<br />
<br />
• Enforce = "Deny" with specific expected value<br />
<br />
• Restrict = "Deny” with specific unexpected value<br />
<br />
• Apply = “Append”<br />
<br />
• Deploy = "DeployIfNotExist”<br />
<br />
• Audit = “Audit” or “AuditIfNotExists”<br />
<br />
• Require = "Deploy", “Deny”, or “DeployIfNotExists” <br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Description<br />
|- <br />
| '''Local Game Client'''<br />
|The locally running game client that is accessible to the gamer because it's running on his/her machine.<br />
|- <br />
| '''Game Network Traffic'''<br />
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.<br />
|- <br />
| '''Game Server'''<br />
|The game server that is hosting the instance that gamers connect to in order to play the game.<br />
|- <br />
| '''Game Economy'''<br />
|The economic system that exists within the game.<br />
|-<br />
|'''Game Mechanics'''<br />
|The physics engine, logic, and other environmental components within the game.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=249876OWASP Video Game Security Framework2019-04-09T15:21:02Z<p>Jbmaga1: /* Licensing */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide an adaptable blueprint to guide the development and deployment of cyber resiliency within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br />
The following is a list of the attack surfaces that can be found in video games of various types.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Description<br />
|- <br />
| '''Local Game Client'''<br />
|The locally running game client that is accessible to the gamer because it's running on his/her machine.<br />
|- <br />
| '''Game Network Traffic'''<br />
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.<br />
|- <br />
| '''Game Server'''<br />
|The game server that is hosting the instance that gamers connect to in order to play the game.<br />
|- <br />
| '''Game Economy'''<br />
|The economic system that exists within the game.<br />
|-<br />
|'''Game Mechanics'''<br />
|The physics engine, logic, and other environmental components within the game.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=249875OWASP Video Game Security Framework2019-04-09T15:16:24Z<p>Jbmaga1: /* About the Project */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery & Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide a structured blueprint to guide the development and deployment of cyber resilience within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br />
The following is a list of the attack surfaces that can be found in video games of various types.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Description<br />
|- <br />
| '''Local Game Client'''<br />
|The locally running game client that is accessible to the gamer because it's running on his/her machine.<br />
|- <br />
| '''Game Network Traffic'''<br />
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.<br />
|- <br />
| '''Game Server'''<br />
|The game server that is hosting the instance that gamers connect to in order to play the game.<br />
|- <br />
| '''Game Economy'''<br />
|The economic system that exists within the game.<br />
|-<br />
|'''Game Mechanics'''<br />
|The physics engine, logic, and other environmental components within the game.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=249873OWASP Video Game Security Framework2019-04-09T15:14:49Z<p>Jbmaga1: /* OWASP Video Game Security Framework (VGSF) */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''[[File:VGSF-LOGO.png|thumb]]<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery/ Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide a structured blueprint to guide the development and deployment of cyber resilience within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br />
The following is a list of the attack surfaces that can be found in video games of various types.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Description<br />
|- <br />
| '''Local Game Client'''<br />
|The locally running game client that is accessible to the gamer because it's running on his/her machine.<br />
|- <br />
| '''Game Network Traffic'''<br />
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.<br />
|- <br />
| '''Game Server'''<br />
|The game server that is hosting the instance that gamers connect to in order to play the game.<br />
|- <br />
| '''Game Economy'''<br />
|The economic system that exists within the game.<br />
|-<br />
|'''Game Mechanics'''<br />
|The physics engine, logic, and other environmental components within the game.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=File:VGSF-LOGO.png&diff=249872File:VGSF-LOGO.png2019-04-09T15:08:29Z<p>Jbmaga1: </p>
<hr />
<div>Framework</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=249847OWASP Video Game Security Framework2019-04-09T07:32:34Z<p>Jbmaga1: </p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. <br />
<br />
<br />
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery/ Support'''<br />
<br />
==Licensing==<br />
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Video Game Security Framework? ==<br />
<br />
The goal of the OWASP Video Game Security Framework is to provide a structured blueprint to guide the development and deployment of cyber resilience within a video game enterprise operation.<br />
<br />
The target audience for the project includes:<br />
<br />
* Game Publishers <br />
* Game Developers<br />
* Security Professionals<br />
* Consumer Gamers<br />
* Quality Assurance Testers<br />
* Business Stakeholders in the Gaming Industry<br />
* Industry Enthusiasts<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Contributors ==<br />
* TBD<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP Game Security Framework Project]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* April, 2019: Site Creation and Discord channel creation.<br />
<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Business Strategy & Risk =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Business Strategy & Risk ==<br />
<br />
The following is a list of the attack surfaces that can be found in video games of various types.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Description<br />
|- <br />
| '''Local Game Client'''<br />
|The locally running game client that is accessible to the gamer because it's running on his/her machine.<br />
|- <br />
| '''Game Network Traffic'''<br />
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.<br />
|- <br />
| '''Game Server'''<br />
|The game server that is hosting the instance that gamers connect to in order to play the game.<br />
|- <br />
| '''Game Economy'''<br />
|The economic system that exists within the game.<br />
|-<br />
|'''Game Mechanics'''<br />
|The physics engine, logic, and other environmental components within the game.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Business Strategy & Risk Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Governance & Compliance =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Governance & Compliance ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* ENTER NAME<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Prevention =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Prevention ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Management =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Management ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Service Delivery/ Support =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Service Delivery/ Support ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Resources =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Resources ==<br />
This page will list additional resources related to game security that may provide more detailed context.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Romen Brewer<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
Join the discord channel:<br />
[https://discord.gg/kS7UBc6]<br />
<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Trending =<br />
<br />
== Video Game Trends==<br />
<br />
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.<br />
<br />
<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Romen Brewer<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = <br />
| contributor_email1 = <br />
<br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=249846OWASP Video Game Security Framework2019-04-09T06:05:41Z<p>Jbmaga1: /* About the Project */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
==OWASP Video Game Security Framework (VGSF)==<br />
<br />
<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''<br />
<br />
<br />
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' <br />
<br />
<br />
''Components include the following:''<br />
<br />
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.<br />
<br />
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.<br />
<br />
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.<br />
<br />
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. <br />
<br />
<br />
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''<br />
<br />
<br />
''Example:''<br />
<br />
: "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> , which could have been prevented by <code>DEFENSE.</code>”<br />
<br />
<br />
Using this structure, security testers can clearly communicate the various aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.<br />
<br />
<br />
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''<br />
<br />
==Licensing==<br />
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the OWASP Game Security Framework? ==<br />
<br />
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.<br />
<br />
The target audience for the project includes:<br />
<br />
* Gamers<br />
* QA<br />
* Game designers<br />
* Penetration testers<br />
* Gaming executives<br />
* Anyone else with a vested interest in game security<br />
<br />
== Project Leaders ==<br />
<br />
* Jason Haddix<br />
* Daniel Miessler<br />
<br />
== Contributors ==<br />
* Kevin Hemmingsen<br />
* Troy Cunefare<br />
* Ryan Lawrence<br />
* Martin Mendoza<br />
* Koray Algan<br />
* Tom Simkovic<br />
* Matt Espinoza<br />
* Chad Lynch<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| style="padding-left:25px;width:200px;" valign="top" |<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* January, 2017: Doing a complete redesign of the project.<br />
* March 2017: Presenting version 1.0 at HouSecCon 2017.<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Attack Surfaces =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Attack Surfaces ==<br />
<br />
The following is a list of the attack surfaces that can be found in video games of various types.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Description<br />
|- <br />
| '''Local Game Client'''<br />
|The locally running game client that is accessible to the gamer because it's running on his/her machine.<br />
|- <br />
| '''Game Network Traffic'''<br />
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.<br />
|- <br />
| '''Game Server'''<br />
|The game server that is hosting the instance that gamers connect to in order to play the game.<br />
|- <br />
| '''Game Economy'''<br />
|The economic system that exists within the game.<br />
|-<br />
|'''Game Mechanics'''<br />
|The physics engine, logic, and other environmental components within the game.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attack Surfaces Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Daniel Miessler<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Vulnerabilities =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Game Security Vulnerabilities ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Jason Haddix<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Exploits =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Exploits ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Daniel Miessler<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Attacker Goals =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Attacker Goals ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Daniel Miessler<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Negative Outcomes =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Negative Outcomes ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Daniel Miessler<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Defenses =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== Defenses ==<br />
These are some of the common defenses that can be used to counter attacks against various components of a game.<br />
{| class="wikitable" style="text-align: left" border="1"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Daniel Miessler<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Examples =<br />
<br />
== Real-world Examples of Gaming Vulnerabilities==<br />
<br />
''Vulnerability''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
We are actively looking for people to help in the following areas:<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Daniel Miessler<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = Justin Klein Keane]<br />
| contributor_email1 = <br />
| contributor_username1 = Justin_C._Klein_Keane<br />
| contributor_name2 = Yunsoul<br />
| contributor_email2 = <br />
| contributor_username2 = Yunsoul<br />
| mailing_list_name = <br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=249845OWASP Video Game Security Framework2019-04-09T06:02:08Z<p>Jbmaga1: /* OWASP Video Game Security Framework (VGSF) */</p>
<hr />
<div>= About the Project =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
==OWASP Game Security Framework (GSF)==<br />
<br />
<br />
<br />
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''<br />
<br />
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.<br />
<br />
''The framework is broken into three main concepts / sections:''<br />
<br />
<br />
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' <br />
<br />
<br />
''Components include the following:''<br />
<br />
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.<br />
<br />
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.<br />
<br />
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.<br />
<br />
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. <br />
<br />
<br />
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''<br />
<br />
<br />
''Example:''<br />
<br />
: "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> , which could have been prevented by <code>DEFENSE.</code>”<br />
<br />
<br />
Using this structure, security testers can clearly communicate the various aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.<br />
<br />
<br />
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''<br />
<br />
==Licensing==<br />
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.<br />
<br />
{{Social Media Links}}<br />
<br />
| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== What is the OWASP Game Security Framework? ==<br />
<br />
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.<br />
<br />
The target audience for the project includes:<br />
<br />
* Gamers<br />
* QA<br />
* Game designers<br />
* Penetration testers<br />
* Gaming executives<br />
* Anyone else with a vested interest in game security<br />
<br />
== Project Leaders ==<br />
<br />
* Jason Haddix<br />
* Daniel Miessler<br />
<br />
== Contributors ==<br />
* Kevin Hemmingsen<br />
* Troy Cunefare<br />
* Ryan Lawrence<br />
* Martin Mendoza<br />
* Koray Algan<br />
* Tom Simkovic<br />
* Matt Espinoza<br />
* Chad Lynch<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
<br />
| valign="top" style="padding-left:25px;width:200px;" |<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Quick Download ==<br />
<br />
COMING SOON<br />
<br />
== News and Events ==<br />
* January, 2017: Doing a complete redesign of the project.<br />
* March 2017: Presenting version 1.0 at HouSecCon 2017.<br />
<br />
==Classifications==<br />
<br />
{| width="200" cellpadding="2"<br />
|-<br />
| rowspan="2" align="center" valign="top" width="50%" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]<br />
| align="center" valign="top" width="50%" | [[File:Owasp-builders-small.png|link=]] <br />
|-<br />
| align="center" valign="top" width="50%" | [[File:Owasp-defenders-small.png|link=]]<br />
|-<br />
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]<br />
|-<br />
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br />
|}<br />
<br />
|}<br />
<br />
= Attack Surfaces =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== Attack Surfaces ==<br />
<br />
The following is a list of the attack surfaces that can be found in video games of various types.<br />
<br />
{| class="wikitable" border="1" style="text-align: left"<br />
! Attack Surface<br />
! Description<br />
|- <br />
| '''Local Game Client'''<br />
|The locally running game client that is accessible to the gamer because it's running on his/her machine.<br />
|- <br />
| '''Game Network Traffic'''<br />
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.<br />
|- <br />
| '''Game Server'''<br />
|The game server that is hosting the instance that gamers connect to in order to play the game.<br />
|- <br />
| '''Game Economy'''<br />
|The economic system that exists within the game.<br />
|-<br />
|'''Game Mechanics'''<br />
|The physics engine, logic, and other environmental components within the game.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== What is the Attack Surfaces Section? ==<br />
<br />
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Daniel Miessler<br />
<br />
== Related Projects ==<br />
<br />
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]<br />
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Quick Download ==<br />
* Coming Soon<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Vulnerabilities =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== Game Security Vulnerabilities ==<br />
<br />
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.<br />
<br />
{| class="wikitable" border="1" style="text-align: left"<br />
! Attack Surface<br />
! Vulnerability Name<br />
|- <br />
| '''Local Game Client'''<br />
|<br />
* Ability to edit in-game resources<br />
* Ability to bypass license requirement<br />
|- <br />
| '''Game Network Traffic'''<br />
|<br />
* Network Denial of Service (player)<br />
** Player bandwidth exhaustion<br />
** Player game client resource exhaustion<br />
|- <br />
| '''Game Application Traffic'''<br />
|<br />
* Application Level Denial of Service (Player)<br />
** Player application logic Denial of Service<br />
|- <br />
| '''Game Server'''<br />
|<br />
* Application Level Denial of Service (Server)<br />
** Server application logic Denial of Service<br />
* Ability to modify game ladder rankings<br />
* Ability to modify own player resources<br />
|- <br />
| '''Game Economy'''<br />
|<br />
* Ability to generate unlimited money on client side<br />
* Ability to generate unlimited money through network/application traffic modification<br />
* Ability to modify prices for in-game items<br />
* Ability to replay financial actions such as buying or selling through network/application manipulation<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Jason Haddix<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Exploits =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== Exploits ==<br />
<br />
This list refers to what a given attacker might use to take advantage of a given bug within the game.<br />
<br />
{| class="wikitable" border="1" style="text-align: left"<br />
! Exploit<br />
! Description<br />
|- <br />
| '''DDoS'''<br />
|Force a player to DC, or attack the game itself so that it cannot serve customers.<br />
|- <br />
| '''Client Modification'''<br />
|Modify the client in a way that gives advantage.<br />
|- <br />
| '''Malicious Macros'''<br />
|Implementation of macros that perform unwanted actions.<br />
|- <br />
| '''Social Engineering'''<br />
|Getting a player, mod, or game staff member to perform an action that helps the attacker.<br />
|- <br />
| '''Use Physics Bug'''<br />
|Interact with the world in a way that makes the physics engine do what the attacker wants.<br />
|-<br />
|'''Malform Network Traffic'''<br />
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== The Exploits Project ==<br />
<br />
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Daniel Miessler<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Attacker Goals =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== Attacker Goals ==<br />
<br />
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.<br />
<br />
{| class="wikitable" border="1" style="text-align: left"<br />
! Attacker Goal<br />
! Description<br />
|- <br />
| '''Avoid Damage'''<br />
|Allows the player to avoid being killed by other players or NPCs.<br />
|- <br />
| '''Gain Gear'''<br />
|Improve the amount or quality of gear the player has.<br />
|- <br />
| '''Gain In-game Currency'''<br />
|Gain more currency than would normally be allowed.<br />
|- <br />
| '''Enhance Gear'''<br />
|Give weapons or other gear powers that they wouldn't normally have.<br />
|- <br />
| '''Take Opponent Offline'''<br />
|Take a player out of the game so that the attacker's position is improved.<br />
|-<br />
|'''Skip Content'''<br />
|Allows player to skip content resuting in a faster completion or objective time<br />
|-<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== What is the Attacker Goals Project ==<br />
<br />
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.<br />
<br />
== Sub-project Leader ==<br />
<br />
* Daniel Miessler<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Negative Outcomes =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== Negative Outcomes ==<br />
<br />
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.<br />
<br />
{| class="wikitable" border="1" style="text-align: left"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Currency Magnification'''<br />
|A player ends up with more currency than they were supposed to have.<br />
|- <br />
| '''Player Anger'''<br />
|Players become extremely agitated by one or more bugs.<br />
|- <br />
| '''Players Stop Playing the Game'''<br />
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.<br />
|- <br />
| '''Invulnerable Positions'''<br />
|Locations on the map make bases or players unassailable and therefore invulnerable.<br />
|- <br />
| '''Item Multiplication'''<br />
|Items are duplicated, multiplied, or otherwise increased in an unintended way.<br />
|-<br />
|'''Unfair Ladder Victory'''<br />
|A victory is scored in favor of a player or team when they should not have won.<br />
|-<br />
|'''Unauthorized Admin Command Use'''<br />
|Regular users are somehow able to execute administrative commands.<br />
|-<br />
|'''Lost Revenue'''<br />
|The game company loses revenue due to bugs, hacks, and player anger.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== What is the Negative Outcomes Project? ==<br />
<br />
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.<br />
<br />
== Project Leader ==<br />
<br />
* Daniel Miessler<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
<br />
= Defenses =<br />
<br />
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div><br />
<br />
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-<br />
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== Defenses ==<br />
These are some of the common defenses that can be used to counter attacks against various components of a game.<br />
{| class="wikitable" border="1" style="text-align: left"<br />
! Outcomes<br />
! Description<br />
|- <br />
| '''Cryptographic Validation of Client'''<br />
|Ensure that the client will not run if it has been modified.<br />
|- <br />
| '''Enterprise-level DDoS Protection'''<br />
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.<br />
|- <br />
| '''Basic Application Security Defenses'''<br />
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.<br />
|-<br />
|'''Authentication Lockouts'''<br />
|Lock out a user's account after a certain number of failed attempts.<br />
|-<br />
|'''Two-factor Authentication'''<br />
|Require use of 2FA on a given player's account.<br />
|-<br />
|'''Better Code'''<br />
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.<br />
|-<br />
|'''Server-side Validation'''<br />
|Ensure that validations are performed on the server and not (only) the client.<br />
|}<br />
<br />
{{Social Media Links}}<br />
<br />
| valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" |<br />
<br />
== What is the Game Security Vulnerabilities Project? ==<br />
<br />
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.<br />
<br />
== Project Leaders ==<br />
<br />
* Daniel Miessler<br />
<br />
== Related Projects ==<br />
<br />
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]<br />
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]<br />
<br />
== Collaboration ==<br />
[https://game-security.slack.com The Slack Channel]<br />
<br />
== Resources ==<br />
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]<br />
<br />
== News and Events ==<br />
* Coming Soon<br />
<br />
|}<br />
= Examples =<br />
<br />
== Real-world Examples of Gaming Vulnerabilities==<br />
<br />
''Vulnerability''<br />
<br />
{| class="wikitable"<br />
!ID<br />
! style="font-weight: bold;" | Vulnerabilty Name<br />
! style="font-weight: bold;" | Description<br />
! style="font-weight: bold;" | Surface Area<br />
! style="font-weight: bold;" | Goal<br />
! style="font-weight: bold;" | Techical Impact<br />
!Business Impact<br />
! style="font-weight: bold;" | Defense<br />
! Ref<br />
!Game<br />
! Genre<br />
|-<br />
|V1<br />
| Local Resource Modification, Client-side Logic Flaw<br />
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.<br />
| Game Client<br />
| Unfair Player Advantage<br />
| Player Anger<br />
|Players leave, Lost Revenue<br />
| Cryptographic Integrity Checks on Game Client<br />
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/<br />
|<br />
| 3PS/1PS/MMO<br />
|-<br />
|VN1<br />
| colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>”<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|<br />
|-<br />
|<br />
| <br />
| <br />
| <br />
| <br />
| <br />
|<br />
| <br />
| <br />
|<br />
| <br />
|}<br />
''Working Data Collection Spreadsheet:''<br />
<br />
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0<br />
<br />
: <br />
<br />
{{Social Media Links}}<br />
<br />
<br />
= Community =<br />
<br />
We are actively looking for people to help in the following areas:<br />
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.<br />
* Adding content to any of the various sections<br />
* Input from avid gamers on how useful this is to them<br />
* Input from app security experts<br />
* Input from security types working at gaming companies<br />
* Input from game company business types<br />
If you have interest in helping, reach out to us and we'll make you a contributor.<br />
<br />
= Testing Tools =<br />
<br />
== Commonly Used Game Hacking Tools ==<br />
<br />
{{Social Media Links}}<br />
<br />
<br />
=Project About=<br />
<br />
{{Template:Project About<br />
| project_name =OWASP Internet of Things Project<br />
| project_description = <br />
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. <br />
| leader_name1 = Daniel Miessler<br />
| leader_email1 = <br />
| leader_username1 = <br />
| leader_name2 =Craig Smith<br />
| leader_email2 = <br />
| leader_username2 = <br />
| contributor_name1 = Justin Klein Keane]<br />
| contributor_email1 = <br />
| contributor_username1 = Justin_C._Klein_Keane<br />
| contributor_name2 = Yunsoul<br />
| contributor_email2 = <br />
| contributor_username2 = Yunsoul<br />
| mailing_list_name = <br />
| links_url1 = <br />
| links_name1 =<br />
}} <br />
<br />
<br />
<br />
__NOTOC__ <headertabs></headertabs><br />
<br />
[[Category:OWASP_Project]] <br />
[[Category:OWASP_Document]] <br />
[[Category:OWASP_Download]] <br />
[[Category:OWASP_Release_Quality_Document]]</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=249844OWASP Video Game Security Framework2019-04-09T05:42:48Z<p>Jbmaga1: /* OWASP Video Game Security Framework (VGSF) */</p>
<hr />
<div>==OWASP Video Game Security Framework (VGSF)==<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organizations loss of intellectual property and other digital assets has reached the millions. With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust , lead competitively, and operate more agile with different types of data.<br />
<br />
<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies''<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
<br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery/ Support'''</div>Jbmaga1https://wiki.owasp.org/index.php?title=OWASP_Video_Game_Security_Framework&diff=249843OWASP Video Game Security Framework2019-04-09T05:42:22Z<p>Jbmaga1: /* OWASP Video Game Security Framework (VGSF) */</p>
<hr />
<div>==OWASP Video Game Security Framework (VGSF)==<br />
<br />
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''<br />
<br />
<br />
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organizations loss of intellectual property and other digital assets has reached the millions. With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust , lead competitively, and operate more agile with different types of data.<br />
<br />
<br />
<br />
''The framework is comprised of five discipline areas that could produce many best practice methodologies''<br />
<br />
<br />
'''I. Business Strategy & Risk''' <br />
<br />
<br />
'''II. Governance & Compliance''' <br />
<br />
<br />
'''III. Prevention''' <br />
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''<br />
<br />
<br />
'''IV. Management''' <br />
<br />
<br />
'''V. Service Delivery/ Support'''</div>Jbmaga1