Tag Archives: europe

1 Billion Data Records Stolen in 2014, WSJ

A nice summation of the Gemalto report regarding the data breaches in 2014.

Identity theft was by far the largest type of attack, with 54% of the breaches involving the theft of personal data, up from 23% in 2013.

Data records are defined as personally identifiable information such as email addresses, names, passwords, banking details, health information, and social security numbers.

via 1 Billion Data Records Stolen in 2014, Says Gemalto – Digits – WSJ.

Key points:

  1. 4% of the data breached was encrypted – demonstrating it’s effectiveness and it’s still lack of proper adoption
  2. 78% of breaches were from U.S. companies, followed by the U.K.

Lessons abound, and I am working on publishing a new piece on the evolution of these breaches, and how “we” have misinterpreted the utility of this data.

On a similar topic, please join me in pursuing to build leading habits for everyday user’s to minimize the impact of these breaches at – http://www.hownottobehacked.com my new research project.

Best,

James

Who will be the Jamaica Ginger of Information Security?

I read a short section in Bruce Schneier’s book Liars and Outliers that tells the tale of Jamaica Ginger:

“an epidemic of paralysis occurred as a result of Jamaica Ginger… it was laced with a nerve poison… and the company was vilified”, but not until 10s of thousands were victims, this resulted in the creation of the FDA.

To date, throughout most industries there is no absolute requirement with meaningful incentives to introduce and sustain operational information technology safeguards. There are isolated elements focused on particular threats and fraud (such as, PCI for the credit card industry, CIP for the Energy sector, etc…). So what will result in the Jamaica Ginger of information security?

Some portend that a cyber-war (a real one) that creates such societal disruption; a long enough sustained negative impact to survive the policy development process, and driven enough motivation to be complete. OSHA, FDA, and other such entities exist as a result of such events.

The best action enterprises can follow is to mature and engage sufficient operations that address their information technology concerns in the marketplace. As a means of self preservation; selfish (perhaps) demonstration of a need to NOT have legislation or a body established (such as the Federal Security Bureau), and ultimately preparedness should such a requirement be introduced the changes to your business would be incremental at best.

Other thoughts?

James DeLuccia

What does the SCADA water pump attack mean to your business…

The ability to attack, compromise, and cause damage has existed since the utility industry began connecting these systems on the Internet.  Examples, including the European nation that was attacked 24+ months ago, are easy to locate.  Yesterday an attack (more proof of concept than anything it could have really been) occurred.  The current public awareness of cyber attacks, the nation state theater risks, and transparency of this action has raised the resulting awareness beyond the closed professional circles within Information Security.    There is a number of interesting writeups and I would suggest carefully reading a few for a balanced perspective.  Two that I would recommend include:

What this means for your Utility company is that the abstract threat modeling exercise that considers these attack vectors should be conducted more thoroughly with real risk and mitigation decisions progressing up to the Board of Directors.

As for everyone else who is a customer of such utility companies, the BCP/DR plans should be updated to reflect the possibility of such a loss of services.  Business enterprise information security / risk management programs (+vendor management) should elevate utility service providers (including cellular operators).  These actions should directly impact the annual/ongoing risk assessments and establish an expectation of security assessment and assurance on a regular basis from these service providers.

It is an interesting quandry that Cloud service providers are vetted and assessed more rigorously than that of Utility service providers, the original cloud.

Thoughts .. challenges?

James DeLuccia iV

Other thoughts?

James

#RSAC Panel on Cloud – security and privacy

Security, Privacy, and liability are top issues for #Cloud security and a popular topic at #RSAC (RSA SFO 2011 Conference)  The first session today was moderated by Drue Reeves (Gartner), Michelle Dennedy (iDennedy), Tanya Forsheit (InfoLawGroup LLP), Archie Reed (HP), and Eran Feigenbaum (Google).  A great discussion and lots of interesting points, and I would highlight ideas for managing security pragmatically for organizations.  Below are my notes.  Apologies for broken flows in logic, as I was trying to capture ideas put forward by panel I sometimes got lost in discussion.

Customers cannot rely only on provider to ensure data confidentiality and compliance, but are seeking assurances.

Cloud-Risks

  • Erin Feigenbaum (Google) – Customers want more transparency in general in the Cloud.  Google is seeing smaller companies move into the cloud and we see that the service and type of cloud sought varies.  Some clouds vary in ability to serve (Gmail in 2010 had uptime of 99.984%).
  • Panel – Due diligence is necessary for both sides of the customer-cloud provider model.  As such must  and get a fair assessment of is happening today for both sides – to know what is happening today.  Understanding what the customer is doing individually to create an ‘honest conversation’.  Create a performance and services assessment of internal (corporate data center and software services) delivery and then determine what Cloud providers meet the current and future state target.  Understanding what is essential to your business is critical to having reasonable expectations and having a proper cost/benefit return.

Legal, procurement, internal audit, business, and technology team members must get together to determine what is important and rate these items.  This then can allow for a better data set identification and procurement of service providers.

  • The end result is the business needs to determine what are their risk tolerance – such as what are they willing to accept.  The universe of Cloud providers allows businesses to identify those that can meet and demonstrate adherence to the criteria that matters to the business.

Focusing on the dataset is what matters and consideration of the period of time.  The dataset released to the cloud must meet your internal safeguard and risk tolerance criteria.

  1. Set Principles first – save money, keep agility, achieve availability
  2. Check application – is it generating revenue; does it create a loss of life scenario
  3. Keeping it in-house does not eliminate the risk vs. having it in the cloud.

Must focus at the strategic level …

Shadow IT, an example:

  • Shadow IT is a problem and is still ongoing.  A security survey with a bank in Canada where the marketing department did a survey in Salesforce.com.  The problem was using the system the data of private Canadian citizens was crossing the U.S. border – which is against the law.  This required a re-architecture effort to correct these activities.

There is a need for awareness and education on the implications of engaging cloud providers and how the flow of datasets impact the business’ legal obligations.

Consumer Technology in Business:

  • Eran – 50% of people surveyed installed applications that are not allowed by their corporations and IT.  The consumerization of technology is creating complex and intertwined technology ecosystems that must be considered by the business, risk management, legal, and security.
  • It is your responsibility to do the due diligence on what the cloud providers are doing to provide assurance, and work with those that provide such information.  The necessity is a balance between providing sufficient information security confidence and mapping out attack vectors for criminals.

Google Growth rate on Cloud:

  • 3,000 new businesses are signing up on the Google cloud every day – impossible to respond uniquely to each one individually.

Data Location

  • It is up to the customer on knowing what are the legal aspects and appropriate uses of the business data.  Understanding the transportation of sensitive data across borders is the business responsibility.
  • It is up to the business to understand and act to protect the data of the business – pushing the information onto a Cloud provider is not a transfer of risk / ownership / responsibility.

If you had the chance today to rebuild your systems, would you do it the same way?

  • Cloud does provide unique technologies beyond what you have already today.  Cloud providers today have allowed them to rebuild their centers that consider today’s technology data architecture and leverage new tech.

Points of reality and impossibility

  • If an organization does not have deep Identity Access Management (IAM) it is poor to try and bolt this on while transitioning to the cloud.  Reasonable expectations must be had for both the consumer and of the cloud provider.

Liability and Allocation between Customers and Clouds

  • Customers with data in their own data centers – they are basically self-insuring their operations.  When moving to the Cloud these customers are now transferring this a third party.  There is a financial aspect here.  How can liability be balanced between customer and service provider?
  • When Customer absorbs all liability they are hesitant to put X data on Cloud.  If Cloud absorbs liability the cost will be to high.

Data in Space

  • People are putting data on the cloud based on rash decisions without unique risk assessments on the data sets and providers.

Agreeing on Liability in the Cloud

  • Organizations have been able to negotiate liability clauses with cloud providers.  Ponemon institute figures are used in determining the limit of liability and are a good way of coming to a proper number that is even with industry figures.  I.e., If Ponemon institute says cost of a breach per record is $224 and business has 20,000 employee records —> The limit of liability should equal the product of these two numbers, and this has proven to be a reasonable discussion with cloud providers.  Indemnification is generally a non-discussion point.
  • The world will move into specialized applications and services.  These point organizations allows for specific legal and technology considerations that are appropriate for that niche.  This is seen at the contract level, notification levels, prioritization on RTR, and across many areas.

Everything is negotiable for the right amount of money or love – Eran

  • Cloud providers do not like to do one-offs.  Cloud providers including Google will negotiate.

APPROACH to cleanse data with confidence

  • Best tip is to encrypt data online… When de-provisioning systems and cleansing .. consider rewriting databases / applications / instances with clean values fully.  Is this a practical method of ensuring the data is satisfied.  How long should the data be in this state to ensure the data is pushed to other parallel instances?
  • Are PCI, SIGS, and such standards for financial services appropriate for the Cloud provider?  The responsibility is always the data owner.  Internal controls must be migrated out to the cloud evenly as applied internally.  It is the business’ risk and responsibility.

Recommendations of the Panel

Archie Reed:  Everyone becomes a broker and recommend that IT teams to embrace this role.  Need to understand how to source, and the chemistry and structure of the IT organization needs to shift.  It will and must include working with the business to have such parties as legal, internal audit, and risk management.

Tanya Forsheit:  I would love to see standards developed and the customers participate in a meaningful way.  The provider side has thought through these seriously over the last few years.  The business to business relationship within the Cloud – Customer relationship is weak.  Be reasonable.

Eran: There is a paradigm shift from a server you can touch and be managed by an Admin that you hired vs. one that is acquired by a contract through a Cloud providers.  Google has over 200 security professionals.  Bank robbers go where the data is – the Cloud has the data.

How do you respond to a vulnerability, how do you respond to a hack … ARE THESE the new / right questions to seek of Cloud providers?

Michelle Dennedy: Leverage and plan for a loss with cloud providers.

Drue:  There are risks you can identify to mitigate risks on the technology side, and there are financial tools (insurance, etc…) that must be deployed.

Question and Answer:

  • Cloud providers have the opportunity to have a dashboard to track and demonstrate controls.  These are hard we know.
  • FedRamp and continuous auditing is a future component of the Cloud providers (that some) will adhere to and demonstrate.

An engaging panel and some interesting and useful points raised.  Welcome any feedback and expansions on the ideas above,

James DeLuccia

Visa allows international Merchants to not demonstrate PCI DSS compliance

On February 11, 2011 Visa announced an interesting program that promotes and demonstrates the fraud deterrence strength of the Europay, MasterCard and Visa (EMV) smartcard standard and are also equipped to accept both contact-based and contactless transactions.  Those organizations that have at least 75% of their transactions originating from smartcard-enabled terminals will not have to demonstrate compliance.  This is perhaps a reflection of Visa weighing the risks and benefits of technology from a risk management point of view.  A win for merchants certainly, as this technology is widely adopted in many parts of the world.

As a reminder, all organizations within the Payment Card Industry must be compliant with the data security standard, but the nuance of demonstration / attestation is based on the channel and volume of each individual card.  This program of Visa does not impact the other Card brands, so international Merchants will still need to consider these within their global compliance and security programs.

An interesting writeup on the article is available at Computerworld here.  The press release is here.

The deployment in the U.S. requires both adoption at the Merchant level, and the consumers too.  It would be interesting to compare the costs of the EMV architecture vs. the compliance costs of organizations.  I also wonder if the net benefit of requiring security controls to be meaningfully applied to sensitive data (in this case PCI) does not raise all the “boats” (read: other sensitive data types), as it is more likely that security safeguards are applied broadly.  Is this demonstrated by 28% reduction in identity thefts in 2010?

See you in San Francisco at RSA 2011,

James DeLuccia