Friday, October 23, 2015

Enhancing Cybersecurity

One of the most discussed cybersecurity topics in recent years has been the concept of regulatory compliance.  Many agencies and industries within the United States are covered by some form of legislation or at least a set of best-practices, and yet most of this guidance fails when it comes to “advising organizations on the ins and outs of information security” (Sharkasi, 2015).  This is where organizations like ISACA and NIST play an important role in covering the gaps in IT education.  In a recently published article by ISACA entitled, Addressing Cybersecurity Vulnerabilities, Sharkasi covers a lengthy framework of improvements organizations should address to improve their overall security posture.  The following are some of the more salient points.

Emerging Technology Risk
“Assessing and minimizing the risk of emerging technology security are the first things enterprises do before using Internet of Things (IoT) technologies to manage IT systems, building equipment, smart phones and other web-enabled intelligent systems. To reduce risk, enterprises should pay more attention to newly proposed technology initiatives, ensure involvement of IT auditors in the early stages of any IT project, and extend the audit scope to include new technologies and management systems. Additionally, the performance of post-implementation review should be considered or viewed as a value-added audit project by the audit team. The audit team needs to have the right level of support and sponsorship to engage in the early stage of any IT projects. Auditors should play a significant role in IT projects and be part of the monitoring processes to ensure quality inputs and the merits of the project, rather than simply being involved with the outcome.”

Mind the Internal Threat
“While the majority of enterprises use networks as the backbone for secure data exchange transactions, standard encryption and firewall technologies can provide some measure of protection from outside attacks and theft by competitors, hackers or mercenaries. But what about the internal threat committed by the enterprise’s employees armed with computer access and passwords? The employee element is commonly overlooked. In fact, one of the most common bugs exploited by hackers to gain access to the inner workings of equipment is using default passwords. Default passwords are, from a manufacturing point of view, a convenient way of ensuring that its engineers can get into the company’s own computers when carrying out maintenance. Too often, security administration is overwhelmed with the task of trying to do it all (e.g., managing operating systems, applications, network, mobile devices, physical security). Security administration must segregate duties and define and deploy a security policy for one area before moving on to another hot spot. In conjunction with preventing internal irregularities, segregation of duties (SoD) should be applied so that the person responsible for assessing users’ level of access authorization is not the same person who implements the access controls.”

Struggling to Deal With Legacy Systems
“Now that Microsoft has pulled the support plug for Windows XP, financial institutions (FIs) and companies that have not switched to Windows 7 need to explore their options. For FIs, this means upgrades to Windows 7 and Agilis 3 are required to keep up with the latest patches and maintain Payment Card Industry Data Security Standard (PCI DSS) compliance. Most FIs began a legacy system replacement early in 2014. But some FIs failed to truly understand the complexity of management reporting they had developed internally over the years, not to mention integrating multiple systems from different vendors. Specifically, neglecting the reliance on numerous system features or databases that tied to the old system required processing and culture changes to switch software and get off of those old functions. For these reasons, FIs felt that they needed a more comprehensive compliance plan before jumping in with upgrades. As a best practice, many FIs found it possible to get by with a special contract with Microsoft in which they could keep Windows XP and get the necessary security patches to remain compliant until they are ready to upgrade in conjunction with other planned changes. Now that the Windows XP transition deadline has passed, continuing to ignore the upgrade puts FIs at risk. And because other requirements are coming, it makes sense to create a plan that addresses not only a Windows 7 upgrade, but future needs as well.”

Cybersecurity Test Tools
“Cyberattacks on enterprises and banks worldwide reflect a frightening new era in cyberwarfare. As many security experts say, ‘You cannot hack or protect what you cannot see.’ Traditional network security strategies have become increasingly complex and costly, yet they do not deliver the level of reliability that modern mission-critical computing environments require. The solution is moving to a deeper, inside-out software-based approach that greatly reduces the number of vulnerabilities that hackers and cybercriminals can exploit. Cybersecurity stealth tools do exactly this and are an innovative, software-based approach to security that saves money, increases security, and is an agile component that adapts to changes in critical business networks and rapidly evolving regulatory requirements. To that end, it is good to see developers starting to introduce security tools that bring together maintenance and help-desk products with the security system. Security professionals should become familiar with the tools, techniques and weapons used in attacking their security infrastructure. Then they will be prepared to make a number of wise acquisitions, bringing in the best-of-breed products.”

The report goes on to detail a host of additional topics, all of which represent critical points of entry into a facilities IT infrastructure.  The point Sharkasi and ISACA are making is that “attackers need to find only one weakness to get into an enterprise system and spread their reach.”  While one weakness is all an attacker may require, as defenders we are responsible for securing the whole system.  This involves a holistic approach that encompasses hardware, software and wetware (people) and must be a concerted effort embraced by both the public and private sectors to be effective.

References
Sharkasi, O. Y. (2015). Addressing cybersecurity vulnerabilities. ISACA Journal. Retrieved from http://www.isaca.org/Journal/archives/2015/Volume-5/Pages/addressing-cybersecurity-vulnerabilities.aspx