Anda di halaman 1dari 6

As information security professionals, we constantly ask, “Are we doing

enough?” To which, the answer is usually a resounding “No.” So, we embark


on an often endless cycle of product and process evaluation, purchase and
implementation only to end up plagued by our initial insecurity - that we!re
still not doing enough, that we!re still not secure.

This paranoia is driven by a multitude of fac- threats. Viewed in a broader light of environ-
tors. Beyond the desire to succeed in our pro- mental adaption in complex systems, we be-
fessional roles, consider the influence of gin to recognize that planning for failure is not
highly publicized breaches, the endless suc- only important, it's fundamental in addressing
cession of "next generation" security toolsets, our objective of comprehensive security.
the barrage of threats including the next "zero-
day" exploit, and the evolving government Armed with the handful of strategic initiatives
regulations meant to ensure information secu- outlined here, IT security professionals can
rity in the first place. Collectively, these factors begin accounting for the inevitability of failure,
breed an industry-wide fear of catastrophic improving their overall security posture.
system failure. Naturally, we are inclined to
embody this fear by building systems aimed Understanding failure
solely at preventing it.
Before we begin planning for failure, we must
This logic is flawed. The preventative security learn to accept that information security is an
solutions that we employ today only protect imperfect entity; that, despite our best efforts,
against “known threats” - or those that have any defense measure we employ will fail; and
already been identified by our existing info se- that if this failure is unavoidable, it must be
curity systems. Meanwhile, attackers continue factored into the information security process.
to persevere, relentlessly. Admitting suscepti- For the same reasons banks use video sur-
bility to these security loopholes, or “unknown veillance while simultaneously deploying pre-
threats”, that facilitate failure, may prove more vention measures (guards, alarms, etc.), IT
useful than focusing so much on known organizations need to embrace the notion that

www.insecuremag.com 62
prevention is not a credible stand-alone Van Valen!s Red Queen hypothesis helps ex-
measure. Educating ourselves, our teams, plain information security product developers!
and our departments about the various theo- and hackers! tendency to one-up each other. It
ries and studies that lend creditability to this suggests the balance between competing
contrarian thinking is imperative. There are species evolves dynamically - a state where
many complex systems outside IT where fail- adaptive improvement is always possible for
ure preparation is standard practice. Why both species so they continually evolve in re-
should the network be viewed any differently? lationship to one another and keep up with the
evolutionary improvement of their counter-
We should first consider the factors that drive parts. In the context of information security,
innovation in the information security products product vendors and attackers continually
landscape. The rules that govern economics compete for survival, each incrementally
and natural selection help eliminate the infe- trumping each other!s more advantageous at-
rior, unaffordable and ineffectual offerings. We tributes without driving their competition into
are able to select from a range of best-of- extinction. So as quickly as a system can be
breed defensive solutions that, upon deploy- updated to protect against an identified threat,
ment, instill a sense of reasonable confidence an unknown, more adaptable threat can com-
in our information security systems. promise the systems! effectiveness.

This confidence sets the stage for a less-than- In this way, active countermeasures to known
desirable consequence. The more fit a secu- threats only provide the illusion of control.
rity product is perceived to be, the more likely Bruce Schneier explains this well in his book
it is to recklessly reassure us that we are se- Beyond Fear, when he outlines “security thea-
cure. And while we!re caught up in a fleeting ter.” According to Schneier, security theater
sense of security, the same market dynamics describes countermeasure solutions that pro-
that drive product innovation are fueling the vide the feeling of improved security while do-
evolution of pervasive and agile threats. ing little or nothing to actually ensure safety.
This is not to say that a firewall doesn!t, in
To overcome their adversaries, attackers have fact, protect against the known threats for
become increasingly covert, both in the which it!s configured against; instead, it draws
means through which they!re infiltrating our attention to our tendency as information secu-
systems and their intended end result. Typi- rity professionals to be blinded with confi-
cally, an information security system!s ability dence in our defensive efforts and ignore the
to detect and protect against these attacks potential vulnerabilities of our current systems
depends on deterministic strategies, where to unknown threats.
products are configured to address only
known threats or events. If attacker!s opera- Industry reports lend additional credibility to
tions are unknown, and therefore go unde- the insidious and pervasive nature of network
tected, preventive countermeasures cannot be attackers and can often provide clues to what
adapted to thwart their attacks. isn!t working on an industry-wide level. A June
2008 security survey conducted by Informa-
In an attempt to counter such deficits, hybrid tionWeek reported that while 95 percent of the
products have appeared - those that include organizations surveyed had security budgets
deterministic and heuristic strategies, such as that were the same or increased from 2007,
behavioral- or anomaly-based methods. Cur- 66 percent of them suspected their vulnerabil-
rently, the time it takes these products to help ity to breaches to be the same or worse as
us accurately identify and resolve malicious they were in 2007. The same survey partici-
network activity is insufficient in containing the pants suggested that firewalls, antivirus tools,
damage caused an attack. But when these encryption and VPNs were only effective
hybrid technologies become pervasive - as about two-thirds of the time, providing ample
the competitive product ecosystem suggests opportunity for successful attacks.
they will - attackers will adapt and evade, be-
coming simultaneously able to impersonate Or take, for example, the recent findings about
“normal” behavior and remain relatively unde- a non-dictionary attack on the popular wire-
tectable. less encryption method Wi-Fi Protected

www.insecuremag.com 63
Access (WPA), which were presented at the Findings from both industry and academic re-
PacSec Tokyo 2008 conference by academic search encourage us to more closely scruti-
researchers Erik Tews and Martin Beck. In nize our own security systems and processes.
their paper, entitled “Practical Attacks against Combined with exposure to theories, such as
WEP and WPA,” they report finding a hole in Red Queen and Schneier!s security theater,
part of 802.11i that forms the basis of WPA. we begin to understand the ever-evolving na-
Leveraging this weakness, they were able to ture of attackers and their ability to evade the
break the temporary Key Integrity Protocol security products we employ to detect and
(TKIP) in under 15 minutes. protect against them. As a group we should
acknowledge the imperfect nature of our in-
These findings carry implications for informa- formation security systems and processes.
tion security professionals in enterprises Equipped with this new perspective, we can
worldwide. Sure, we can upgrade to WPA2 if more effectively address questions like those
we haven!t already, but how long until this en- around securing wireless networks - we can
cryption method is cracked? begin accounting for inevitable failure as a
fundamental tenet of design.

As a group we should acknowledge the imperfect nature of our information


security systems and processes.

Risk mitigation "The Financial Impact of Cyber Risk: 50


Questions Every CFO Should Ask"
Evaluating security infrastructure in accor- (webstore.ansi.org/cybersecurity.aspx) - takes
dance with risk management theory provides a more holistic approach. The guide suggests
a valuable framework with which to start ac- that organizations calculate network security
counting for system and process failure. As risks for specific attacks or events by first ask-
long as we are trying to protect assets, we ing questions of every department or group
must accept that some combination of existing within the organization that might be affected.
threats (or attacks from which we are trying to This comprehensive pooling of data seeks to
protect our assets) and vulnerabilities (or the ensure better accuracy in determining the or-
way in which an attacker prevails), can put ganizations! potential risks, and the costs as-
those assets at risk. Identifying our organiza- sociated with them, because it involves every-
tions! assets, calculating their individual risk one who might be affected by a security
and employing a risk management model can breach.
help us determine our organizations! specific
threshold for risk. This equation, supported by the basic theories
outlined in the Common Criteria Part 1 and
ISO International Standard ISO/IEC NIST Special Publication 800-30, can help in-
15408-1:2005, also known as Common Crite- formation security professionals in determin-
ria Part 1, offers a straightforward formula for ing what risk management actions, if any,
calculating the relationship among variables, should be executed.
such as threats and vulnerabilities that ac-
count for an assets! quantitative risk The formulas inform allocation of resources -
(standards.iso.org/ittf/PubliclyAvailableStanda essentially, helping us assess the type of pro-
rds/). Similarly, the NIST Special Publication tection we can afford in terms of time, money,
800-30 provides a simple decision chart for energy and space consumption, human re-
determining an organization!s acceptability of sources, tolerability and sustainability. They
risk (csrc.nist.gov/publications/nistpubs/). allow us to arrive at an acceptable level the
cost associated with our organizations! spe-
A recent adaptation of these basic risk mitiga- cific risks while also directing us to where vul-
tion theories—issued by the American Na- nerabilities persist.
tional Standards Institute (ANSI) and the
Internet Security Alliance in a guide called

www.insecuremag.com 64
Devaluate data We can turn to Red Team exercises—or secu-
rity practice drills issued by the US govern-
We should not be surprised when we!re faced ment. An example is the confidential report
with reports about the information security that recently spurred an onslaught of “Poten-
risks of Internet communication, such as VoIP, tial for Terrorist Use of Twitter” stories in the
SMS-linked micro-blogs or social networks. media. However, we should proceed with cau-
We should anticipate them because, by na- tion when directing our attention to such exer-
ture, network information is highly vulnerable. cises, as we don!t want to adopt their alarmist
perspective.
Consider the characteristics of posting data on
the Internet. Technology makes instant com- We must also avoid making it easy to hack a
munication simple. This communication can system. This may seem obvious, but it!s a
be private, and often private communication is surprisingly common oversight. In the recent
centered around sensitive matters. Communi- Sarah Palin hack, the hacker simply reset
cation can also be public, and sometimes pub- Palin's password using her birth date, ZIP
lic communications can reveal too much in- code and information about where she met
formation. As such, Internet communication is her spouse–all information available through a
becoming increasingly transparent. Because simple Google search. It seems someone
we!re inclined to capitalize on the simplicity it would have thought to adjust the password
provides, what, as information security profes- settings on her personal email accounts or
sionals, can we do to ensure that sensitive en- take them down entirely.
terprise data remains relatively private?

Any amount of time wasted in implementing a patch widens the window of time during
which an organizations! data is vulnerable to a known threat, and system failure.

We must heed these warnings. More specifi- Accounting for known threats
cally, we should use communication modes
other than the Internet when transmitting sen- We must ensure that failure doesn!t occur be-
sitive enterprise data. To help ensure that all cause of a known issue. With risk mitigation
employees take such precautions, not just theories, we can more accurately determine
those of us in IT, we can block users within which information security product invest-
our network from accessing non-corporate ments will lessen risks associated with known
email, VoIP, micro-blogging and social net- threats and events. Aggressively applying
work accounts. We can also provide warnings more- or less-comprehensive detection and
and education that deters them from using prevention solutions based on these determi-
personal accounts to send company docu- nations is imperative.
ments and information when working outside
of the enterprise network. Additionally, as the information security eco-
system evolves, more known threats are re-
Finally, and most importantly, we can try to vealed. These threats are often brought to our
devalue data whenever possible. We can use attention by the security products! vendors in
full-disk and database encryption so that when the form of a patch or signature file. Though it
a loss or breach occurs, the thief finds the may seem obvious, staying abreast of these
data inaccessible or, at least, very expensive. updates within our existing infrastructures is of
We can use unique passwords with the help equivocal, if not greater, importance to invest-
of a password manager so that if one pass- ing in new products or upgrades. Any amount
word is compromised, others aren!t. We can of time wasted in implementing a patch wid-
use “one-time” data instances such as one- ens the window of time during which an or-
time passwords or one-time credit card num- ganizations! data is vulnerable to a known
bers. threat, and system failure.

www.insecuremag.com 65
What happens when a known threat infiltrates The controversy surrounding the Microsoft
our systems during this window of vulnerabil- MS08-067 emergency patch is an example of
ity? Or, if it attacks before the patch itself is this. The patch was issued on October 23,
issued, when the threat is still unknown? 2008 to remedy the Windows RPC exploit.
Yet, Trojans capitalizing on the flaw were iden-
Though vendors may tout the idea of “zero- tified the day following its release. Further
day threat detection,” more often than not evi- analysis of these strains suggested that they
dence suggests the contrary. Rather, it points may have been in circulation before the patch
to an undefined time period before a patch was issued, perhaps as early as September
was issued and implemented when vulnerable 29. The concept of “zero day” goes out the
systems were successfully attacked and ex- window, but the potential exploitations or
ploited. events that occurred because of the vulner-
ability remain.

Incorporating an incident response plan into our information security practices and
processes provides us with the ability to better identify the cause and extent of a breach.

Negative day threat detection and network full fidelity, the events that predated classifica-
forensics tion of the threat.

Incorporating an incident response plan into In the case of vendor-issued patches, network
our information security practices and proc- forensics technologies offer “negative day
esses provides us with the ability to better threat detection.” That is, the patch serves as
identify the cause and extent of a breach. With an incident or notification of a previously un-
a plan in place, we can account for the fallibil- known threat. And we can go back, even
ity of patches and defensive solutions as well weeks prior to the issuance of patch, and use
as the pervasive nature of system threats and the published threat patterns to search for in-
vulnerabilities. stances of the offensive malware that might
have crossed the network since the first re-
A well-executed incident response plan incor- ports of the incident.
porates a number of variables. Above all, it
must contain the direct damage caused by an But alert mechanisms that rely on pre-defined
attack. It must provide the tools for a methodi- signatures, patterns or data or those that are
cal and timely response, curbing the indirect identified by security vendors or researchers
damage, such as negative publicity, reduced are hardly infallible. We can also leverage
customer confidence, or legal repercussions. capture technology for surveillance - a proc-
If set up properly, it can also identify and re- ess of continuously capturing and monitoring
solve the root causes of an incident so repeat traffic for detection of any atypical activity or
occurrences can be avoided. The hallmark of anomaly. Specifically in high-risk or vulnerable
such a plan is network forensics technology - areas of a network, monitoring traffic records
or more specifically, traffic capture, regenera- can help us proactively distinguish between
tion and search solutions. legitimate alerts and false positives. They can
help us uncover previously undetected, or un-
Capitalizing on the advancements in data known, breaches.
storage, which increase space at lower costs,
these solutions record all data crossing a net- When prevention fails, detection is key. Net-
work and store it for later recall and analysis. work forensics tools equip us better in effi-
This complete record of network traffic pro- ciently realizing known and unknown
vides context to alerts or events. Once we breaches. We can more effectively stem fur-
identify a threat, we can navigate through traf- ther loss or future loss of sensitive data and
fic history and search evidence surrounding update existing controls to avoid repeat at-
the actual event, not just superficial metadata tacks. These tools provide necessary fortitude
such as log files and header information. We to any effective incident response plan and
can use this evidence to view and replay, with help us account for failure.

www.insecuremag.com 66
Complex systems reside in a state of equilib- not turn to the security guard for eye-witness
rium where events have individual and aggre- testimony. They!d rely more heavily on the fo-
gate impacts. For example, why is it difficult to rensic record of evidence provided by the
immunize against certain viruses? Because in cameras.
many cases, these viruses evolve and evade
the cocktails of drugs that seek to prevent Why then, as information security profession-
them from successfully attacking healthy cells. als, do we think our organizations are any dif-
This characteristic holds true for any complex ferent than the virus or the bank? We should
system with multiple inputs and outputs. know better than to believe we!re safe from
network failure of some undetermined variety
Another system of moderate-to-sufficient and magnitude. We must take into considera-
complexity that!s worth examining is security tion education about the pervasiveness of
in a bank. A bank has a diverse collection of threats, the specific risks that our organiza-
defenses to protect against robbery, including tions face in the wake of these threats, the
a vault, time-release locks, bulletproof glass importance of devaluating data and the role
and security guards. But it also employs a se- played by network forensics technologies.
curity measure that accounts for the failure of Once we realize the impediments to adopting
those defensive solutions: surveillance cam- these strategies are non-existent, we can
eras. If the defensive measures fail to detect move to implement them throughout our in-
and prevent a robbery until after the money formation security systems and processes -
and robbers are long gone, authorities would ultimately accounting for network failure.

Steve Shillingford has more than 15 years of experience in sales, operations and management in technology
companies. He joined Solera Networks (www.soleranetworks.com) in early 2007 from Oracle Corporation,
where he was responsible for some of the largest deals in the company during his tenure, all in the Rocky
Mountain region. Steve was named top salesperson within Oracle in 2005 as a result of this success. Prior to
joining Oracle in 2000, Steve had held several sales and operational management positions at Novell over the
preceding seven years. Steve holds a B.S. with honors in Psychology from Brigham Young University.

www.insecuremag.com 67

Anda mungkin juga menyukai