Every few months we hear of yet another large organization being involved in a costly security incident.
Can we analyze these major breaches for what went wrong and learn from them?
An analysis of major breaches leads us to find 3 main preconditions for a major security breach. Adversaries find and exploit systems with all three of these attributes:
This is kind of a silly question, but let’s think this through. Why would a system be accessible from the Internet?
Any company which hosts services such as web sites, VPNs, APIs which need to be accessible from outside of their physical office must expose the systems hosting these services to the Internet. For example, companies which allow their staff to work out of office must host some kind of service facing the Internet if they want the remote staff to be able to access internal services, generally using a VPN.
This is a classic example of the balance between security and convenience. The risk of opening these services up to the Internet is generally worth the added productivity, and companies choose take on the risk.
It’s likely the services you decide to host on the Internet will need to serve some sensitive data. What good is a service that doesn’t have access to the data you are looking for? Imagine logging into your email from home only to find all of the data in your emails is inaccessible. It would be useless to host an email service like that.
But this doesn’t mean you should allow this publicly facing system to have unlimited access to the source of that sensitive data, which we unfortunately see far too often. Instead, these systems should be restricted as much as possible to reduce the impact of those systems being compromised.
These publicly facing systems should be requesting the sensitive data from an entirely different system which is not accessible from the Internet. In the event the public system is compromised, it restricts compromised data to that which is loaded on on the public system during normal operations. While this is still a bad situation, it is preferable to immediately exposing all of your sensitive data to the adversary.
It also allows your security staff and monitoring systems a stricter set of data to analyze and recognize attempts to compromise the internal system serving the sensitive data.
If you can’t get away from hosting a system on the Internet, and serving sensitive data from that system, then you should take a defense in depth approach and limit the amount of data you are exposing with your public systems.
How many times have you hit the “Update Later” option when your OS or software tells you there’s a new update? It’s a big interruption to productivity to install the updates and restart your system. Now think about doing this with your servers which provide functionality to not just you, but everyone else who uses that service.
Worse yet, lots of servers are configured with software that has not been thoroughly tested on the software being updated. Blindly applying updates is a risky move as often times the patch has unintended consequences and now your system has gone from functioning just fine to completely broken down.
We constantly work with companies that continue running old and vulnerable versions of Java on their systems because software they use every day to be productive does not work on the newer versions.
Combine all that with the fact that staff resources are limited and we have long delays from when patches are released to when they are applied.
It’s no wonder these breaches continue to happen. Companies are focused on the bottom line, and impacts to company productivity have immediate financial impact. Meanwhile the looming risk of a data breach is in the back of the minds of company leaders as they roll the dice on being the next headline.
Balancing the security risks and business productivity is a complicated process which requires time and effort to analyze, but it must be done. Starting off with a Risk Assessment will allow your company to intelligently determine how much and where resources should be invested in security.
Frequent Vulnerability Assessments and Penetration Tests will increase the likelihood your company will find these accessible and vulnerable systems before criminals do. Appropriate investments in Security Monitoring and Incident Response will allow your company to recognize and respond to indicators of compromise and limit the damage caused by the security breach.
Viam Technologies can help you understand the security risks facing your organization and provide you with the insight necessary to effectively mitigate them. Contact Us today for a free consultation.
Michael is the inventor of a patent pending web proxy technology and brings to Viam his expertise in web and Linux security. Outside of work he enjoys carpentry, having built a dog mansion for his spoiled dog.
When criminals compromise your organization will you know? Viam Technologies provides a range of cyber security services.
Contact us today to be prepared.
© 2023 Viam Technologies