Enable javascript in your browser for better experience. Need to know to enable it?

黑料门

Perspectives edition 13 banner
Edition #13 | December 2020

Facing the new security frontiers

As eventful as 2020 has been, cybersecurity has managed to stay in the headlines. In October alone, the US government鈥檚 Cybersecurity and Infrastructure Security Agency issued the equivalent of one alert per day for industries and businesses, and the head of the Securities and Exchange Commission warned corporations needed to boost vigilance against a possible .听


The good news is that many businesses are paying attention. Cybersecurity awareness has grown by leaps and bounds, with one recent survey finding almost 80% of businesses rank cybersecurity among their , up from just over 60% in 2017.听


At the same time, confidence among businesses that they can deal with cybersecurity in practice is . It鈥檚 easy to understand why; new trends and technologies equal a steady stream of new threats, forcing enterprises to constantly adjust their capabilities to keep up.听

Confidence in cyber resilience measures slipped from 2017 to 2019

Source: Marsh/Microsoft

By far the biggest change over the past few years is in the nature of systems businesses are trying to secure. Ubiquitous connectivity has made systems easier to control and opened more possible entry points for bad actors. The rise in working from home and online activity driven by the pandemic has highlighted connectivity鈥檚 downsides as well its advantages. A recent poll of US technology executives, for instance, found 89% of organizations had been targeted by COVID-19 related .听听


What鈥檚 more, the pandemic has changed behavior in a way that has negative security implications. 鈥淔or many people, the only way to socialize now is digitally,鈥 says Harinee Muralinath, Capability Lead at 黑料门. 鈥淧eople are online more often, they鈥檙e socializing more on digital platforms and they鈥檙e frightened about the current situation, so there鈥檚 definitely a higher hit ratio on clickbait. There鈥檚 been a rise in intelligent phishing targeting the human fear around the pandemic.鈥澨

With the rate of threats unlikely to slow down, the only effective response is to make security equally dynamic. Security needs to scale as the boundaries of the enterprise, and the threat landscape, change - a capability that traditional security frameworks and off-the-shelf solutions lack.


鈥淎s long as security is just a box to check, it鈥檚 not going to drive the necessary outcomes,鈥 says Jim Gumbley, Cyber Security Principal at 黑料门. 鈥淚t requires a shift in culture.鈥 But where should organizations start?听


Quote from Jim Gumbley, Cyber Security Principal, 黑料门
鈥淎s long as security is just a box to check, it鈥檚 not going to drive the necessary outcomes. It requires a shift in culture.鈥


Jim Gumbley

Cyber Security Principal, 黑料门


Know your weak spots

Step one is recognizing how the nature of threats has shifted, and facing up to the new security realities being created by the proliferation of connectivity, data and cloud-based computing models.


Cloud computing


锘縏he mass migration from in-house servers to cloud-based architecture comes with some inherent security advantages. Given it鈥檚 foundational to their business model, major cloud service providers invest in and prioritize security in a way few enterprises can match, so any cloud-hosted systems have a strong base level of defense.听


鈥淭here鈥檚 definitely a plus in going to the cloud in that you do benefit from the nearly always superior capabilities of major cloud providers to protect their hardware and networks,鈥 says Robin Doherty, Lead Security Architect, 黑料门.听


The problem is, some enterprises assume entrusting their assets to a cloud provider means security is effectively covered. A recent study of firms in four major Asia Pacific markets found over half believed all security infrastructure requirements are handled by their cloud service provider, and just 40% understood security was a . This is despite the fact that, as Doherty points out, most cloud providers are explicit about where their duties end - and 鈥済ive their customers a lot of scope鈥 to introduce vulnerabilities.听

Common Misconception of Responsibility

Source: Frost & Sullivan/Forcepoint

There鈥檚 also a basic technical point about cloud that makes it riskier in some respects. 鈥淚f you鈥檝e got an on-premise network and fail to configure it correctly, not just anyone can get access and there鈥檚 only so far a problem can go, because there鈥檚 a degree of physical separation,鈥 Gumbley explains. 鈥淐loud is designed to connect to the internet, so even small errors can have a huge blast radius.鈥澨


Cloud means any system is effectively only as strong as its weakest link. And as Neelu Tripathy, Security Practice Lead at 黑料门 notes, sometimes those links are very weak indeed.听


鈥淏ecause everything is so distributed, if you look at it from the attacker perspective, it鈥檚 become a lot more difficult to go after back-end systems,鈥 she says. 鈥淎ttacks are moving outside, to individuals. Social engineering, phishing and the like are proving a lot of help for attackers to get that first foot forward into the organization.鈥澨


Cloud-enabled connectivity is also a double-edged sword in that it makes many of the capabilities and resources that can help companies available to bad actors.听


鈥淲ith the rise of open source, cloud systems with high processing power, and languages that make scripting easy, you don鈥檛 need to be a great programmer to write a bot that will sniff around to test how vulnerable a system is,鈥 says Muralinath. 鈥淎nd if you鈥檙e using underlying platforms or containers you pulled off the internet, there are many people who have already done the same, which means those tools come with known vulnerabilities. A bigger repository of knowledge has been opened up for attackers to use as well.鈥


Quote from Neelu Tripathy, Security Practice Lead, 黑料门
鈥淏ecause everything is so distributed, attacks are moving outside, to individuals. Social engineering, phishing and the like are proving a lot of help for attackers to get that first foot forward into the organization.鈥


Neelu Tripathy

Security Practice Lead, 黑料门


Data


Along with the ascent of cloud platforms, there鈥檚 been a sea change in the way consumers view their data that鈥檚 forced companies to reckon with data security.听


鈥淐ompanies are attaching more and more importance to privacy, not necessarily because they care a lot more about their customers than they did 10 years ago, but because the attitudes of society, governments and jurisdictions have changed,鈥 Doherty says.听


Fewer organizations are engaging in potentially hazardous habits like using customer information in test environments, or sharing sensitive data on USB sticks, Doherty notes. As a result, in many companies, data protection is growing stronger. But that doesn鈥檛 change the fact that the exponential growth in the volume of data, and the use of data for business intelligence, means it鈥檚 a much larger and more tempting target.听听


Applying data-based tools like AI and machine learning to drive business decisions can also introduce new dimensions of risk, according to Gumbley.听


鈥淗aving AI systems that can explain why they鈥檝e made a particular decision is very difficult,鈥 he says. 鈥淚f someone is able to game that system you may not even be able to detect it because you didn鈥檛 understand why it made a decision in the first place. In order to secure any system, you need to understand it, and that can be a challenge given the way certain decision support systems are deployed.鈥


Quote from Jim Gumbley, Cyber Security Principal, 黑料门
鈥淚n order to secure any system, you need to understand it, and that can be a challenge given the way certain decision support systems are deployed.鈥


Jim Gumbley听

Cyber Security Principal, 黑料门


The IoT


Greater adoption of the Internet of Things (IoT) has enabled companies to automate many critical functions, including in some cases security itself. But as more connected devices are deployed at critical points in the production process, or come into closer contact with employees and customers, the enterprise鈥檚 attack surface expands.听


鈥淚鈥檝e even heard about devices like thermometers being hacked,鈥 says Muralinath. 鈥淭hat alone can be enough to bring someone inside a network where they can access other devices and data. The fact that we鈥檙e so connected is something that鈥檚 also increased the threat landscape.鈥澨


Particularly when it鈥檚 part of the systems that govern critical assets like health facilities or infrastructure, IoT security 鈥渂ecomes critical, because the impact is direct and it鈥檚 physical,鈥 says Tripathy.听


Unfortunately, 鈥渁 lot of IoT products have poor security,鈥 Doherty says, shipping with problematic default configurations or passwords that may never be optimized or updated.听


This is particularly worrying when more people are working remotely and as the lines between personal and work devices have blurred. A new study by the US National Cyber Security Alliance, for example, showed about a third of connected device users don鈥檛 always bother to change default passwords and that half regularly access .听

Respondents that change connected device password settings from the default manufacturer settings

Source: NCSA

That argues for enterprises to work toward creating a 鈥榸ero-trust鈥 architecture, meaning 鈥測ou don鈥檛 trust devices just because they鈥檙e on your network, and you don鈥檛 trust everything that a system does just because you created that system,鈥 Doherty explains.

Complex supply chains


Another common vulnerability is the tendency of companies to concentrate on their own practices while neglecting or underestimating the risks posed by increasingly tangled vendor, production and supply chain networks.听


In many cases, employees may not be aware of all the different organizations that stand behind the systems they use. Across the vast spectrum of software service providers, suppliers and distribution partners, Gumbley says, 鈥渢here only needs to be one weak link in the chain, one that hasn鈥檛 got good software security standards,鈥 for a problem to surface.听


Unfortunately there are no real shortcuts to addressing this; it requires deep scrutiny of service agreements and the standards held by partners for possible shortfalls.听


鈥淢aking sure you鈥檝e got good standards compliance across your supply chain can be like watching paint dry, but it can make a big impact,鈥 Gumbley says.听

Perspectives delivered to your inbox

From security policies to security culture听听

Technology, zero-trust architectures and training can all help enterprises manage emerging security challenges, but according to 黑料门鈥 experts, even the most capable teams can only hope to construct a partial safety net, and occasional failures are all but inevitable.听


Instead of focusing on the unrealistic target of making the organization impregnable, business leaders should prioritize changing the way security is perceived. 鈥淭he biggest problem with security is mindset,鈥 says Muralinath.听


The first perception to tackle is that security is the exclusive responsibility of a stand-alone team. 鈥淵ou can no longer have a central security team that acts as a gatekeeper, deciding what can go to production, following a checklist, reviewing whatever鈥檚 deployed every six months, and telling delivery teams what to do,鈥 says Doherty. 鈥淧eople are deploying all the time now, and the old style of controls don鈥檛 work anymore.鈥


Quote from Robin Doherty, Lead Security Architect, 黑料门
鈥淵ou can no longer have a central security team that acts as a gatekeeper, reviewing whatever鈥檚 deployed every six months. People are deploying all the time now, and the old style of controls don鈥檛 work anymore.鈥


Robin Doherty

Lead Security Architect, 黑料门


鈥淪iloed, compliance-led security with lots of focus on hardware and firewalls - security in the corner, you could call it - is almost a bit of theatre or a fig leaf to show people that something is being done,鈥 agrees Gumbley. 鈥淚t leaves enterprises vulnerable to getting washed away by all the risk out there.鈥澨


The more future-proof approach is to position security as a collective effort, in which every function, having something to lose, also has a role and a say. 鈥淪ecurity has to be based on different perspectives,鈥 Gumbley explains. 鈥淭he technologists might not understand the particular value of a certain set of data, but another team will because they live and breathe it. Legal, HR or other parts of the business often have a better idea of what鈥檚 at stake and what can actually go wrong than someone who knows how to configure a firewall.鈥澨


鈥淓nterprises can foster a more collaborative security culture by deploying members of the security team to act as internal consultants,鈥 Doherty says. Having security work within project teams embeds defense mechanisms throughout the development process and avoids the 鈥渟ecurity sandwich,鈥 where checks are applied only at the beginning and end of a project with potentially painful results.听

Security sandwich

Source: 黑料门

鈥淎dding a security person into a cross-functional team means you鈥檙e doing a better job of reducing risk as you go,鈥 he explains. 鈥淵ou don鈥檛 end up in a situation where the project or requirements change over time, and when the security team comes back towards the end, they identify a bunch of problems. And then you have to have a horrible conversation about whether you need to postpone going live.鈥澨


Making security more democratic may involve delicate organizational changes that reshape the balance of control and accountability, Muralinath says. That argues for the process to be accompanied by senior management support and a certain amount of outreach to all levels of the enterprise.听


鈥淧eople closer to the ground, like product owners, may not understand the responsibility for security is now in their hands as well,鈥 says Muralinath. 鈥淭here are many times that they might keep putting things off, saying 鈥榣et鈥檚 just build a feature first, let鈥檚 get this out the door and we鈥檒l worry about security later.鈥 There鈥檚 a lot of education that needs to happen at that middle level of management.鈥澨


鈥淚t鈥檚 important to educate and create a good amount of awareness around security techniques,鈥 Tripathy agrees. 鈥淭elling employees exactly what is critical for the organization, what the business assets are, what data can and can鈥檛 be disclosed publicly. When the new normal is virtual and social, we need to develop critical thinking in employees in general - not only when they鈥檙e coding, but when they鈥檙e engaged in day to day activities.鈥澨

Confronting the talent deficit听


A major advantage of building security capabilities collectively is that it can help the enterprise cope with the real, and pressing, shortage of cybersecurity talent.听


According to global IT governance association ISACA over 60% of organizations believe their cybersecurity teams are understaffed, and 66% find it difficult to retain cybersecurity staff, mainly because they are regularly away.听听

State of Cybersecurity 2020

Source: ISACA

While cybersecurity experts will always have their place, 鈥渢here鈥檚 a problem when you think of security in isolation,鈥 notes Muralinath. 鈥淵ou need to build the talent in existing teams so they understand the extra things they need to do to put security in place. It鈥檚 not the number of security specialists you should be increasing, but the number of developers or others who also take care of security as part of a group, so you increase the security space organically.鈥


Quote from Harinee Muralinath, Capability Lead, 黑料门
鈥淭here鈥檚 a problem when you think of security in isolation. You need to build the talent in existing teams so they understand the extra things they need to do to put security in place.鈥


Harinee Muralinath听

Capability Lead, 黑料门


鈥淚t鈥檚 certainly been our experience at 黑料门 that there鈥檚 a fair number of people who may not have security roles, but care deeply about security and want to grow their security capabilities,鈥 agrees Doherty. 鈥淚f you can identify who those people are and give them a role to play in that transformation, it鈥檚 hugely beneficial.鈥澨


鈥淚f you can鈥檛 hire all the good people you need, grow them,鈥 says Gumbley. 鈥淢uch like DevOps in the past, there鈥檚 a massive community around security now, with all kinds of resources and opportunities to collaborate and learn. It鈥檚 more diverse, exciting and innovative than it has been at any point in my lifetime. Security鈥檚 not boring anymore.鈥


Quote from Jim Gumbley, Cyber Security Principal, 黑料门
鈥淭here鈥檚 a massive community around security now, with opportunities to collaborate and learn. It鈥檚 more diverse, exciting and innovative. Security鈥檚 not boring anymore.鈥


Jim Gumbley听

Cyber Security Principal, 黑料门


New measures of performance听


According to Doherty, edicts or controls pushed from the top down won鈥檛 cultivate the shared sense of security companies should be aiming for. 鈥淚t requires building behaviors and norms, and for that to work, it鈥檚 not particularly helpful for the C-level to say 鈥榯hese are the rules,鈥 he says. 鈥淭hey have to make space, and they have to adjust incentives.鈥澨


Specifically, incentives need to change in a way that shows the ultimate aim of security is no different than other functions in the organization - to deliver value. 鈥淥ften I hear product owners talking about needing to deliver user value, not security work,鈥 Doherty explains. 鈥淏ut security protects user value, and the reduction of risk is an increase in expected value.鈥澨


At many organizations, measures of security performance reflect the perception that it鈥檚 a control mechanism or stopgap, rather than a value contributor. 鈥淪ecurity KPIs tend to be very badly designed,鈥 Doherty says. 鈥淚f you鈥檙e asking people to reduce the number of incidents, there鈥檚 an easy way for them to do that - they just don鈥檛 tell you about what鈥檚 happening. That means you never get better over time.鈥澨


Quote from Robin Doherty ,Lead Security Architect, 黑料门
鈥淥ften I hear product owners talking about needing to deliver user value, not security work. But security protects user value, and the reduction of risk is an increase in expected value.鈥


Robin Doherty

Lead Security Architect, 黑料门


Similarly, if security teams are incentivized only to reduce risks, they鈥檒l often be left at odds with the rest of the organization, especially delivery teams, who are usually motivated to get things released as quickly as soon as possible.听


The answer, according to Gumbley, goes back to making risk something everyone is measured against. 鈥淓stablished best practice around risk management is the solution to the problem,鈥 he says. 鈥淭hat could be a risk register - a prioritized set of risks that you鈥檙e aligned around as a business. The important thing is that a set of risks is owned by the business, not by the security team.鈥澨


Muralinath meanwhile believes more metrics should be constructed around where and when vulnerabilities are detected. 鈥淗ow late did you find the defect - during early development, or production? Your pipeline should be set up such that your build doesn鈥檛 proceed to a certain environment if certain kinds of tests fail,鈥 she says. 鈥淲hat you鈥檙e really measuring is the effectiveness of those programs, as well as the knowledge and awareness of your teams.鈥澨

When the inevitable happens


Regardless of how security is evaluated and encouraged, it鈥檚 all but certain that every business will eventually have to confront an incident or breach. Yet there鈥檚 no need for that to equate to disaster if the enterprise has taken care of what Gumbley calls 鈥渟tep zero - planning, practice and preparation.鈥澨


鈥淚f you haven鈥檛 prepared you鈥檝e got no chance,鈥 he says. 鈥淚t鈥檚 worthwhile to assume you鈥檙e going to get breached and think about who you鈥檙e going to call in that kind of situation, whether for legal support, data protection, or a technical response.鈥澨


In case of an incident, the immediate priority should be identifying and addressing the vulnerability, says Tripathy. 鈥淚f it was an older version of software that was exploited, update that; or if it was a database exposed in the backend, close the network boundary.鈥 But right听after that comes 鈥済oing out and informing your customers - and being transparent about it.鈥


Quote from Harinee Muralinath, Capability Lead, 黑料门
If your customer information has been affected, it鈥檚 best to disclose that accurately, and give concrete solutions, so you鈥檙e not just making customers aware, but building trust at the same time.


Harinee Muralinath听

Capability Lead, 黑料门


鈥淚f your customer information has been affected, it鈥檚 best to just come out in the open and disclose that,鈥 agrees Muralinath. 鈥淚t鈥檚 important that you understand the depth (of the breach) enough to be able to disclose it accurately, and give concrete steps on what鈥檚 next. You need to present solutions along with information on the problem, so you鈥檙e not just making customers aware, but building trust at the same time.鈥澨


Once the dust has settled, a post-mortem can turn an incident into an opportunity to learn, but shouldn鈥檛 descend into a blame game. As Tripathy points out, most incidents 鈥渁re not just because of one layer being breached; it鈥檚 generally a misconfiguration of multiple layers.鈥 That makes it difficult to point the finger at a single person or point of failure.听


鈥淵ou鈥檝e got to do some kind of retrospective, even for near misses,鈥 agrees Gumbley. 鈥淏ut at the end of the day, assigning blame is not going to help you prevent the next incident. Breaches are so complex that there鈥檚 always multiple causes, and with many systems now a multi-vendor patchwork of different organizations and labor frameworks, it can be a real minefield.鈥澨

The lean security cycle

Source: 黑料门

鈥淭he big priority should be to learn from small incidents,鈥 says Doherty. 鈥淭here鈥檚 a temptation when you鈥檙e chasing progress to just move on, but it's important to resist that. Acknowledge that you made a mistake and luckily you didn鈥檛 end up on the front page of the news this time, but with a few variations you could have. When responsibility for security is distributed, everyone needs to be aware of these developments. You should be sharing not just information, but the story about how it happened, making it relatable so people can see how they could get themselves into the same situation.鈥

Perspectives delivered to your inbox

Conclusion: Planning for the unknown听

This year has been a good reminder that no enterprise can predict what risks or security threats may lurk around the corner - but according to Gumbley, as companies plan for 2021, that鈥檚 no reason not to try.听


鈥淵ou should be constantly scanning, brainstorming and trying to spot potential threats, measuring how much impact or risk they might involve, and if they鈥檙e significant enough, acting,鈥 he says. 鈥(Ransomware attack) WannaCry was a perfect example - there was a six-month grace period where organizations could have seen it coming and patched some of their servers. Will you always see what鈥檚 coming perfectly? No chance. But can you do better than passively waiting? Absolutely.鈥澨


Quote from Jim Gumbley, Cyber Security Principal, 黑料门
鈥淲ill you always see what鈥檚 coming perfectly? No chance. But can you do better than passively waiting? Absolutely.鈥


Jim Gumbley听

Cyber Security Principal, 黑料门


Automation, particularly in the form of infrastructure as code, and in areas like testing, threat detection and alerting, has significant potential to help enterprises enhance security by accelerating processes and reducing instances of human error.听


But 黑料门 experts caution against rushing to invest in the latest AI-enabled security solutions. 鈥淚t鈥檚 very easy to get caught up in thinking you need AI to solve a problem because it sounds like it鈥檚 going to be a silver bullet,鈥 Doherty says. 鈥淏ut it isn鈥檛, and in most cases there鈥檚 a lot more that companies can be doing to understand what鈥檚 going on in their systems before they start worrying about it.鈥澨


鈥淲here you have parameters defined in a system that you can identify and measure, AI can be leveraged, but it depends on what鈥檚 at stake,鈥 says Tripathy. 鈥淭here are always things that are better done manually. A basic principle in security is that the cost of controls you鈥檙e putting in can鈥檛 be higher than the value of the business asset you鈥檙e trying to protect.鈥


Quote from Neelu Tripathy, Security Practice Lead, 黑料门
鈥淎 basic principle in security is that the cost of controls you鈥檙e putting in can鈥檛 be higher than the value of the business asset you鈥檙e trying to protect.鈥


Neelu Tripathy听

Security Practice Lead, 黑料门


While risks continue to rise, experts also see plenty of room for hope about the future of enterprise security, as more organizations experiment with proactive, even inventive, steps.听


鈥淚 definitely see people investing more in security, and if nothing else, top management is really concerned, which means if you鈥檙e consulting on security, they鈥檒l listen,鈥 says Muralinath.听


Tripathy points to 鈥榖ug bounty鈥 programs, in which companies reward third parties for discovering issues or vulnerabilities, as a promising example of how security practices are starting to push the envelope.听


鈥淥rganizations are beginning to understand that they may not have the resources to perceive all the attacks that are introduced or problems latent in their applications,鈥 she says. 鈥淭here are a lot of assumptions in your thinking when you鈥檙e an insider, so external views can show you something very different. It definitely needs to be done carefully, but it鈥檚 a very smart way of looking at security, and makes me optimistic about what鈥檚 to come.鈥澨


Trends like these underline the theory that when it comes to shoring up defenses against emerging threats, enterprises may benefit most from efforts to broaden perspectives.听


鈥淐ontrols are all well and good, but there are still a lot of people who don鈥檛 think about security in their decision-making processes,鈥 Doherty explains. 鈥淚t鈥檚 important to build the ability to assess risk generally, not just security risk. It鈥檚 a difficult thing because the scope of what you need to worry about as a human or a technologist has grown; there are more and more things that each of us needs to internalize and take a little bit of responsibility for. But the power of that understanding can鈥檛 be overstated.鈥澨


Quote from Robin Doherty, Lead Security Architect, 黑料门
鈥淚t鈥檚 important to build the ability to assess risk generally, not just security risk. It鈥檚 a difficult thing because the scope of what you need to worry about as a human or a technologist has grown. But the power of that understanding can鈥檛 be overstated.鈥


Robin Doherty

Lead Security Architect, 黑料门


Perspectives delivered to your inbox

Timely business and industry insights for digital leaders.

The Perspectives subscription brings you our experts鈥 best podcasts, articles, videos and events to expand upon our popular Perspectives publication.听听

Marketo Form ID is invalid !!!