Endpoint

5/2/2018
10:30 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Spring Clean Your Security Systems: 6 Places to Start

The sun is shining and you have an extra kick in your step. Why not use that newfound energy to take care of those bothersome security tasks you've put off all winter?

While most people traditionally spend the spring deep-scrubbing their bathrooms, cleaning out their garage, and dumping their hoarded detritus, the melodious chirps of colorful birds and a touch of vitamin D shining down on our pale faces are also good signals for security pros to update and renew their company's information security systems. Here are six places to start:

1. Problematic Patching
If I have to remind you to use spring cleaning for your normal patching, you're doing it wrong. Most infosec professionals already have a regular monthly patch cycle for normal desktops and servers, but every network has a few problematic servers or devices that do not get patched regularly. Perhaps these are one-off legacy servers running old operating systems for a custom application or a collection of set-and-forget Internet of Things (IoT) devices that aren't updated regularly.

Whatever they are, now is a time to take care of them. Check the firmware updates on all hardware devices and bring them up to date. If you have any embarrassingly old servers hanging around, take the time to consider a plan to remove them and replace the old custom apps on them. As always, vulnerability and patch management software make this job easier, but don't forget that these tools don't always know about your IoT devices.

2. Password Pruning
If you follow password best practices — long random passwords, with different passwords for each application or system — you probably don't have to change your passwords all that often. On the other hand, digital spring cleaning is still a good time to consider your passwords and those of other users at your company.

Most security pros probably already have a password manager because there is no other good way for a human to remember hundreds of long, complex passwords. If that's the case, good news! Changing your passwords is simple. Most of these managers have an automated feature that will automatically change all the passwords it can at once. If you still use a single password for all of your logins, or rotate between a few different ones, you should change them and consider setting up a new password manager. Now that you've cleaned up your act, consider spearheading an annual company-wide password update initiative or some form of regular password training at your organization each spring.

3. Pare Down Privileges
Network admins and IT workers should already have a formal system in place for adding accounts and privileges for new employees and, more importantly, a formal HR process for removing all those accounts when they leave. Nonetheless, spring cleaning is a great time to audit these accounts and remove any that are unnecessary.

For example, perhaps you set up a temporary account giving a consultant some privileged access but forgot to remove it. Perhaps an employee with job-related privileges on one set of systems moved to a new role and doesn't need those privileges any longer. These represent potential weak spots in your organization's security posture if left unaddressed. Whatever the case, use this time to examine your accounts and individual privileges to make sure you adhere to the principle of least privilege.

4. Dispensable Data
In the buzzword age of big data, businesses feel a need to gather and store every piece of data that could possibly be important, hoping that a data scientist might find a way to correlate it and extract value. But data can also be a liability, especially when it technically belongs to someone else.

Every security-conscious company should have gone through at least one data audit to identify the most important data they need to secure. Spring cleaning is a great opportunity to refresh that audit, with an eye focused on dumping any extraneous junk you don't really need and that could expose you to extra liability.

5. Awareness
When was your last phishing training? If it's been more than a year, that's too long. Maybe it's time for a refresher course focusing on the latest threat trends. While your employees know about phishing, do they know all the subtleties to modern spearphishing emails? Maybe they know file attachments are bad, but do they still trust Word documents too much? Spring is a perfect time for a quick corporate security awareness session.

6. Perished Policies
Many organizations treat firewalls, next-generation firewalls, and unified threat management (UTM) tools like set-and-forget devices. They establish enough policies to get their business working, and then they don't look at the systems again for months or years. This can cause problems because your network is more dynamic than you suspect and because the threat landscape constantly evolves. As attack methods change, you can and should tweak your security policies in new ways to increase protections.

Besides that, many administrators add temporary policies for legitimate reasons but then forget to remove them. For instance, a contractor needs to transfer files regularly with a remote cohort at his headquarters. To make things easy, IT spins up a temporary FTP server and punches a hole in their firewall to let the contractors reach it remotely. A month later, when the job is done, the administrator has forgotten about the FTP server and policy. Six months later, the forgotten server hasn't been patched and a hacker leverages a new exploit on it to gain remote access to the entire virtual infrastructure. Not good.

These human errors are why you should add policy purging to your digital spring cleaning task list. The good news is many firewalls and UTMs have features that will show you which policies you use the most and which have remained unused for weeks or months. These sorts of features can help you quickly eradicate any unnecessary gaps in your security.

In short, the sun's shining and giving you an extra spring in your step. Use that newfound energy to perform these six tasks, and any other small security chores you've put off for too long. By next winter, I'm certain you'll be happy you did!

Related Content:

Corey Nachreiner regularly contributes to security publications and speaks internationally at leading industry trade shows like RSA. He has written thousands of security alerts and educational articles and is the primary contributor to the WatchGuard Security Center blog, ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
asancheti
50%
50%
asancheti,
User Rank: Author
6/13/2018 | 6:00:24 PM
Tips
Good read with some important tips to follow. 
New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19406
PUBLISHED: 2018-11-21
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
CVE-2018-19407
PUBLISHED: 2018-11-21
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
CVE-2018-19404
PUBLISHED: 2018-11-21
In YXcms 1.4.7, protected/apps/appmanage/controller/indexController.php allow remote authenticated Administrators to execute any PHP code by creating a ZIP archive containing a config.php file, hosting the .zip file at an external URL, and visiting index.php?r=appmanage/index/onlineinstall&url= ...
CVE-2018-19387
PUBLISHED: 2018-11-20
format_cb_pane_tabs in format.c in tmux 2.7 through 2.8 might allow attackers to cause a denial of service (NULL Pointer Dereference and application crash) by arranging for a malloc failure.
CVE-2018-19388
PUBLISHED: 2018-11-20
FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read, access violation, and application crash) via TIFF data because of a ConvertToPDF_x86!ReleaseFXURLToHtml issue.