Sep 19, 2016
ATSG
Keep up with the latest views and information from ShoreGroup, our partners, and our customers.
So can we apply the 5Ws to information security? Let’s give it a shot.
Everyone in an enterprise needs some level of physical and/or system access to perform their job and the given tasks it entails. But are we doing a good enough job of identifying WHO is requesting access and then authenticating that user?
One unfortunate byproduct of using directory services to authenticate users is the typical sprawl of access control it results in. This can lead to a number of vulnerabilities that can be leveraged by nefarious actors. Auditing, performing frequent assessments, and optimizing your directory services platform are among the key measures that can ensure the right people have the right access in accordance with their tenure and duties, while adhering to the principle of least privilege.
Once a user is authenticated, have we identified WHAT device is requesting system access? Have we done any type of posture assessment on that device to ensure that it complies with a policy for local or foreign devices? Can that computing device be trusted to access data, store it locally or touch sensitive infrastructure?
Regardless of whether it’s MPack, Blackhole, Angler to Neutrino, these exploit kits all have a few things in common. Most notably, the capability to take advantage of systems and software that are left unpatched. Sadly, many of these systems remain unpatched not for days, weeks or even months, but years.
One of the best hygiene methods an enterprise can do to reduce the surface area of opportunity for hackers is to frequently scan endpoints, systems and infrastructure devices for vulnerabilities and apply the proper updates, patches or compensating controls to those vulnerabilities to minimize business risk.
Furthermore, as we create and consume data, have we identified WHAT data is to be considered proprietary, restricted and sensitive, and would require a higher level of control than the weekly cafeteria menu? Can we then apply controls based on the WHO and WHAT above to ensure that only authenticated users and devices are granted access to the most sensitive of content?
To make the most of any administrative or technical control, an enterprise needs to assign value to the data it creates and consumes by incorporating a basic Data Classification Program. Whether it’s knowing the width and depth of a Cardholder Data Environment (CDE) to assist with PCI Compliance, or the business risk of having proprietary design documents on unsecured shares or endpoints, being able to classify data for its entire lifecycle (from inception or receipt to expiration or destruction) helps ensure the investment in current or future administrative and technical controls will be maximized.
When a user and device are requesting system access, do we know WHERE that user session originated? Are there more restrictive privacy laws in the country of origin? Or is the place of origin one of increased risks based on factors such as a user’s home network, a VPN connection, unsecured hotel wireless, or originating from a country where it would be physically impossible to initiate communication from based on travel time? Do we have visibility to WHERE our outbound connections are going? Is a user attempting to upload a sensitive document to an unsanctioned cloud storage service or browsing a domain that’s known for distributing malware?
Having visibility into the source:destination of networked communication with real time intelligence of any potentially risky or statistically impossible behaviors can go a long way toward preventing data leakage, destruction of sensitive data or the distribution of malicious applications and software.
After applying the most basic of Data Classification rules, are we ensuring that proprietary, restricted and sensitive data is created, consumed and stored on devices and systems with tighter administrative and technical controls? Are we auditing user and account access on these systems to further enforce the principle of least privilege?
In accordance with the WHO and WHATs from above, enterprises should follow their Data Classification program with a certification process to identify systems, shares, and endpoints that are authorized to create and consume sensitive data. Furthermore, by maintaining tight control of WHERE sensitive data resides, we can fine-tune the fidelity of the technical controls’ event reporting capabilities to reduce false negatives (e.g.: clipping level) and the dwell time to incident recognition.
Much like the end of summer and our personal lives, there is a natural cadence to user behaviors. Have we trended user account access behavior to identify and isolate anomalous access requests?
Like the behavior trending that credit card companies have been engaging in for decades, trending user behavior over time can provide significant visibility into potential threats from hijacked user credentials, either by trusted insiders or imposters. It is likely not normal behavior for user account rjohansen, for instance, to attempt access to the R&D share at 3am, but it may be normal on the other hand, for rjohansen to access spreadsheets with customer data at the end of each fiscal quarter.
Have we instituted and enforced the principle of least privilege? Have we asked WHY a user or system account has requested access to a share, installed software or made changes to data?
While technical controls can assist in protecting data, the administrative control of identifying sensitive data must stay in the hands of the business function’s leadership, the Data Owner. The Data Owner institutes the workflow and influences the technical controls that can support proper user access control. The Data Owner is responsible for granting user access to the data individuals need to perform their job functions. If there is a deviation, which there inevitably will be, the proper business justification to allow rjohansen access to the R&D share at 3 a.m. for 90 days will be documented so it can be audited.
While it is back to school time and our routines are returning to something like a “normal” state, it’s also a good time to establish a similar normal for good information security hygiene, consisting of maintaining a regular cadence of assessing, auditing and optimizing administrative and technical controls. While we all may have enjoyed a break over the summer, the bad actors, nefarious insiders and other threats to our data are working year-round.
Learn more about the information security services ATSG has to offer by contacting one of our experts today.
© 2024 ShoreGroup. All rights reserved. | Privacy Policy | Legal
Comments