Perimeter
1/28/2013
03:04 PM
Tom Parker
Tom Parker
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Combatting Advanced Threats In 2013 Through Basics

Focus on fixing the problems of a past generation before focusing on the next

As most on the pointy end of investigating and cleaning up compromises have known for some time, despite all of the hype over next-generation this and big-data that, 2012 was another great year for cyberespionage and state-sponsored adversaries.

As with past years, many of the most egregious compromises in 2012 occurred in organizations with some of the biggest security budgets and the best toys, fresh off of the show floor of your favorite security product conference. It remains, as has always been the case, that money buys good security -- but that money has to be well-spent.

It’s no secret that security has very much become a marketing term -- and that’s fine; we all have bills to pay. However, the increasing culture of silver-bullet solutions has seemingly distracted many a CISO from the fundamentals of running a secure enterprise, something that the pointy-hat brigade (amongst others) are lapping up. I’m talking about principles of least-privilege, asset management, service account management, shared accounts, network segmentation, basic logging functions, and OS hardening.

We continue to fall short on these fundamental principles, yet we would far rather spend our money on the latest, shiny “next-generation” security appliance than fixing them. If there is one think I would do in every IT-enabled corporation in 2013, it would be to take a long, hard look at fixing the problems associated with past generations of shoddy practices before worrying about defending our network against the next-generation-nuke-launching-state-sponsored-teleporting-sophisticated-web2.0-blah threat.

While there’s absolutely a time and a place for technology-based solutions, another increasing trend in 2012 seemed to be organizations' procurement of potentially useful technologies without correct forethought as to how they might be fully leveraged to best serve the unique needs of the enterprise. In many cases, technologies may as well be gathering dust in storage than the manner in which they are currently being used. In other cases, they really are gathering dust in their boxes due to insufficient resource to deploy them correctly.

The bottom line here is that while you may have just bought the best and most expensive product in a given solution space, in the present environment, your organization is unlikely to use it to the fullest extent of its capabilities. And so you may as well have purchased that half-as-expensive competitor's version and spent the remaining cash on hiring an FTE or two to ensure it’s being used correctly and to take care of the fact that you still use the same local admin password on everything and that anyone on your network can STILL RDP to your domain controllers, which you have no logs of.

As someone who lives largely in the offensive side of the industry (that is, if not breaking into clients' networks, its offending shoddy security product vendors), I can tell you that some of the most secure organizations my team and I frustratingly encounter are customers who don’t necessarily have the largest security budgets, but are smart with their available resources and focus on the basics first. This creates a good culture, not just in security teams (which may be small), but most importantly throughout IT departments, and has the added benefit of shedding new light on which technology-based solutions can actually help enhance their security postures and how they may be best integrated into the existing environment.

When having a dialogue on this with large organizations, you will often run into a question of scalability and cost based on environment size. While this argument may have held water in the past, it is now largely invalid due to the large amount of solutions in the (IT, not security) marketplace, which, while may not stop that highly sophisticated, nuke launching 0day-donning malware, will solve many of the fundamental issues that remained the real cause of many a red-faced corporation last year.

Tom Parker is CTO of FusionX LLC

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mark532010
50%
50%
Mark532010,
User Rank: Apprentice
1/29/2013 | 5:38:57 PM
re: Combatting Advanced Threats In 2013 Through Basics
This really resonates with me. So many companies purchase big time apps and hire "world class" experts who spend their time trying to keep up with zero-day threats, yet look-áat some of the biggest breakins and always you find a-ádepressing repeated pattern of unpatched servers, default passwords, plain-text passwords, etc.

More attention to the basics, like knowing who is in the administrators group on EVERY server - not just the easy to find ones, would help most companies far more than exotic software.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4907
Published: 2014-07-11
Cross-site scripting (XSS) vulnerability in share/pnp/application/views/kohana_error_page.php in PNP4Nagios before 0.6.22 allows remote attackers to inject arbitrary web script or HTML via a parameter that is not properly handled in an error message.

CVE-2014-4908
Published: 2014-07-11
Multiple cross-site scripting (XSS) vulnerabilities in PNP4Nagios through 0.6.22 allow remote attackers to inject arbitrary web script or HTML via the URI used for reaching (1) share/pnp/application/views/kohana_error_page.php or (2) share/pnp/application/views/template.php, leading to improper hand...

CVE-2014-2963
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

CVE-2014-3310
Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

CVE-2014-3311
Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.