Perimeter
8/3/2012
09:46 AM
50%
50%

Compliance And Proofreading: A Fresh Perspective Is Required

It can be difficult to see the errors we've made

Think about how often someone proofreading your writing finds a mistake. The exact same idea applies to the far more complex processes and procedures required for robust security and compliance.

In a recent assessment project, our client’s IT staff had done a fine job of considering security issues and compliance processes for the company’s computer systems. They had documented the technical tasks, had a regular review process, and continually considered appropriate security issues.

What they failed to notice were some dangerous flaws in their backup processes. As we see way too often, this client relied on the backup software’s confirmation that these backups were successful. Since they trusted the software, they never restored any data from a backup drive in order to confirm beyond a doubt the backup had really worked. A common line of thinking, even if never admitted, is, “The computer said it worked, so it must have been successful.”

If you think this is something that only happens at small or marginal businesses, then you are in for a surprise. This is a common mistake, often made at companies you might assume are too large to make such small-time errors. And with increasingly short-staffed IT teams, these mistakes are even easier when everyone has more work than they can do. When a staff is short on time, checking backups, logs, and monitoring systems is often done haphazardly -- and sometimes not at all.

Through the years, our team has often been called in to try to help restore a failed backup that was managed by someone else. This call often comes from small and midsize businesses with small or outsourced IT staff, but we’ve also seen this situation at large organizations, too. Any company can fall prey to complacency, apathy, or ignorance.

Without fail, the person responsible for these backups trusted the software and did not perform routine, methodical testing, restoring data from the backup devices to ensure the backup was working as expected. Because this employee did not have our broad experience with many different organizations, backup failure wasn’t considered a major risk. Or perhaps the risk was known, but the staff member deferred the work until “they weren’t so busy.” From our experience and perspective, we always know the risk involved in this scenario, and also what a common and easily avoidable risk it is.

This is a classic example of how using a compliance and security “proofreader” can be invaluable: a fresh perspective, one with different experiences, to look over the operations and find the glaring holes that can be easily missed and subsequently remain unknown. This proofreading of your compliance can involve more than simple backups, of course. It works best when it is designed as an objective review of all your work. After all, proofreading only one chapter won’t actually improve a book at all.

The more removed from the day-to-day aspects of a business or department, the easier it is to spot issues and mistakes. Even if it's not required, an outside auditor (or even simply someone from another department) may be more effective (and more economical) than your own staff spending hours hoping to find the mistakes they didn’t see the first time.

Glenn S. Phillips, the president of Forte' Incorporated, works with business leaders who want to leverage technology and understand risks within. He is the author of the book Nerd-to-English and you can find him on twitter at @NerdToEnglish.

Glenn works with business leaders who want to leverage technology and understand the often hidden risks awaiting them. The Founder and Sr. Consultant of Forte' Incorporated, Glenn and his team work with business leaders to support growth, increase profits, and address ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5208
Published: 2014-12-22
BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbit...

CVE-2014-7286
Published: 2014-12-22
Buffer overflow in AClient in Symantec Deployment Solution 6.9 and earlier on Windows XP and Server 2003 allows local users to gain privileges via unspecified vectors.

CVE-2014-8896
Published: 2014-12-22
The Collaboration Server in IBM InfoSphere Master Data Management Server for Product Information Management 9.x through 9.1 and InfoSphere Master Data Management - Collaborative Edition 10.x through 10.1, 11.0 before FP7, and 11.3 and 11.4 before 11.4 FP1 allows remote authenticated users to modify ...

CVE-2014-8897
Published: 2014-12-22
Cross-site scripting (XSS) vulnerability in the Collaboration Server in IBM InfoSphere Master Data Management Server for Product Information Management 9.x through 9.1 and InfoSphere Master Data Management - Collaborative Edition 10.x through 10.1, 11.0 before FP7, and 11.3 and 11.4 before 11.4 FP1 ...

CVE-2014-8898
Published: 2014-12-22
Cross-site scripting (XSS) vulnerability in the Collaboration Server in IBM InfoSphere Master Data Management Server for Product Information Management 9.x through 9.1 and InfoSphere Master Data Management - Collaborative Edition 10.x through 10.1, 11.0 before FP7, and 11.3 and 11.4 before 11.4 FP1 ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.