Want to Fail at Security? COMPLY!

wind-tunnel-957749_1280

Take a deep, cleansing breath, and say it with me: “Compliance is not security.”

Good. One more time. “Compliance is not security.”

It’s okay. We’re all friends here. No need for false pretenses. We all know how much truth is contained in those four simple words.

Information Security is a tricky business, due largely in part to the fact that both the good guys and the bad guys are an innovative, creative, and (sometimes) devious bunch.

A compliant organization can demonstrate that they have implemented the bare minimum in information security controls. That, or they can sweet talk an auditor into believing that the “compensating controls” are strong enough to meet the intent of the compliance requirement.

Not that it matters, though, since compliance is not security.

You protect your servers with a locked door. I bypass the lock with a lock pick (or a modified hotel keycard, or a coat hanger, or… you get the point). So what do you do? You replace the pin and tumbler lock with something stronger.

Well, shucks. I guess I’m out of luck. Time to throw in the towel (said no determined criminal EVER).

You install a stronger lock, I adapt with a stronger (more devious) attack. Motion and heat sensors? No problem. I’ll just use a Mylar balloon, a warm washcloth, and a little bit of helium (props to Chris Nickerson).

Let’s shift gears and talk about more technical controls. You patch your operating systems? Fine. I’ll target the desktop applications. You keep those patched, too? Well, smell you! Sounds like your web apps might be my best bet, except that your security-minded developers test both their code and their deployed apps for vulnerabilities.

Fine. It looks like you’ve decided to give me a run for my money. I guess I’ll have to resort to (gasp) SOCIAL ENGINEERING.

If I want in… if I really want to deface the website / steal the data / encrypt all the things and then extort payment… then compliance isn’t going to stop me.

Security, though… that’s another matter.

It is absolutely possible (even probable) that a security-minded organization, one that chooses to go above and beyond compliance, will know when they’re being attacked and be able to prevent, detect, and respond to the attack in a manner that minimizes the damage.

So how do we get from here to there? The answer has been right in front of us the entire time: assessments.

Notice I said assessments (plural).

Attackers are going to look at your business, your customers, your employees, your locations, and your infrastructure from multiple perspectives. They’ll keep at it until they find the chink in your armor.

In order to effectively (and proactively) defend against those attacks, you should be doing the following:

  • Compliance Assessment(s). Wait a minute. I JUST said that compliance is not security. I also said that compliance is the bare minimum. Love ’em or hate ’em, compliance requirements like PCI, HIPAA, and NERC/CIP are based on leading information security practices. If you want a good baseline for how prepared you are to defend against attackers who want your data, start with a compliance assessment.
  • Security Controls Assessment. The next assessment you should perform is a security controls assessment based on the security framework that your organization aligns with. NIST (FISMA) is popular among companies who do business with the U.S. Federal Government, while the ISO 27000 series works well for organizations with an international footprint. The CIS Critical Security Controls are another fan favorite, although smaller organizations may find the Common Sense Security Framework a little easier to tackle.
  • Risk Assessment. These assessments are a little trickier. The goal of a risk assessment is to identify potential threats to your organization, to determine how likely it is that those attackers could do damage, and how bad would it be if they were successful. Risk assessments can cover everything from the physical safety of your employees to the mobile apps you have in iTunes and Google Play.
  • Vulnerability Assessments / Penetration Tests. This is where the rubber meets the road. By the time you get to these assessments, you should have a decent understanding of where you’re most exposed (and where an attacker could do the most damage). Vulnerability Assessments help you validate that all your technical controls are working as intended (e.g., your patch management solution is really patching your Internet-facing servers).Penetration Tests allow authorized (ethical) attackers to test your defenses and identify gaps that have gone unnoticed by your security team (and, hopefully, by your attackers).

If you’re doing all of these assessments on a regular basis, then the bad guys are going to have a HELLUVA time getting what they’re after. If you’re skipping any of these assessments, then you have a blind spot, one that criminals won’t hesitate to exploit.

Depending on your organization’s business model, a Privacy Assessment might also be on the table, but that’s an article for another day.

Once you find an assessment process and schedule that works for your organization, turn your attention to automation. There’s no reason to exhaust your people (and your budget) with manual processes that can be replaced by a very small shell script.

Don’t automate everything, though, ESPECIALLY the pen test. If you think automated pen tests are sufficient, then it’s only a matter of time before your organization ends up on a list of publicly disclosed data breaches.

The short version: assess all the things! Your employees, your customers, and your shareholders will thank you for it.

The Curse of the Information Security Professional

despair-513529_1920

Time magazine recently published an article summarizing CareerCast’s research on the most/least stressful jobs.

At the top of the Most Stressful list: Enlisted Military Personnel. That makes PERFECT sense. High physical and travel demands, ridiculously low salary, and life-threatening situations that leave many physically and mentally scarred for the rest of their lives.

Respect.

What caught my eye, though, was the profession topping the list of least stressful jobs. Drumroll please…

Information Security Analyst.

… what?

I did a little digging into CareerCast’s methodology, and in that context, it actually makes sense. InfoSec pros don’t put their lives on the line day in and day out. We’re paid well, and there’s such a RIDICULOUS shortage of qualified information security professionals that the job market is, well, pretty damned spectacular.

There’s one important factor that I wish CareerCast had included in their methodology, though: Appreciation.

Had CareerCast found a way to measure that variable, I think the end results of their survey would have been a little different.

Let me offer a bit of perspective.

I went to school to be a music teacher. I’ve studied multiple instruments over the course of my life, including piano, trumpet, guitar, bass guitar, and voice, and I love both teaching and making music. When a musician delivers a performance, that musician leaves something with the audience: a memory, an emotion, a connection.

Other artists produce more tangible artifacts. Our society has preserved sculptures, statues, and paintings for literally thousands of years. Filmmakers and recording artists have produced visual and audio creations that we repeatedly enjoy, whether in a movie theater surrounded by hundreds of other moviegoers or in our favorite solo spot with nothing but our headphones for company.

Artists produce artifacts.

But what about folks who work in other industries? What do they produce?

Quite a bit, actually.

If you work in manufacturing, that’s a gimme. Medical? You produce life-altering, often life-saving, medications and procedures. Utilities? The power that keeps the zombie apocalypse at bay is kind of important.

Even if you work in a back office or shared services role, it’s likely that you produce something.

HR? I’d argue that you produce jobs. You help people get hired. Finance? You produce budgets that pay for all the things. Payroll? You produce paychecks. ‘nuff said. IT? As unappreciated as you are, the fact remains that you produce systems and applications that end users rely on.

But what do information security professionals produce?

Nothing.

Wait, wait, wait… Calm down. Unclench your fists and bear with me for a sec.

When we’re on our game, it’s business as usual. Nothing bad happens.

On a good day, the bad guys don’t circumvent application vulnerabilities or system misconfigurations and steal the keys to the kingdom. Websites don’t go down due to denial of service attacks or hardware failures. Malicious employees don’t abuse their access to change data, and overly-trusting employees don’t click on malicious links in unsolicited emails, no matter how desperately they want that $100 Amazon gift card.

Nothing. Bad. Happens.

In other words, information security professionals comes in early, stay late, work through lunch, work crazy on-call hours, attend professional meetings, attend conferences, attend training classes, chase certifications, read blogs, and practice hacking virtual machines in their home labs (Yeah, we have home labs. Big whoop. Wanna fight about it?), all with one goal in mind:

To make sure that nothing bad happens.

And at the end of another day when nothing bad happened, when we don’t have anything tangible to show for our efforts, that desire for appreciation (both from others and from ourselves) is often left wanting.

That, folks, is the curse of the information security professional. The fortunate few get decent paychecks and recognition from the powers that be, but all of us… ALL OF US… put in the blood, sweat, and tears necessary to keep the lights on, to keep the websites up, to keep the personal data safe, regardless of whether or not that recognition ever materializes.

We put in the extra hours, driven by a passion to do the right the thing, and we both acknowledge and embrace the stress and burnout that comes with the gig. We support each other both online and in person (no easy task for a bunch of socially awkward introverts), and we keep at it day in and day out to ensure that… You guessed it:

Nothing. Bad. Happens.

Personally, I think a career in information security is time well-spent. It’s a stressful gig in an important industry, and I’m grateful to be a part of it. Even more importantly, I encourage folks who want to help out to learn more about working in InfoSec and then apply for one of the hundreds of thousands of open jobs that we’re trying to fill.

And to all my fellow InfoSec pros out there, know this: I appreciate what you do. So do the folks who depend on you, even if they can’t always find the words to express that appreciation.

That said, I hope you can find some small comfort in reciting the successful InfoSec pro’s mantra.

“Do you remember that awful, horrible, expensive incident that NEVER happened? You’re welcome.”