Perimeter
8/3/2012
09:46 AM
50%
50%

Compliance And Proofreading: A Fresh Perspective Is Required

It can be difficult to see the errors we've made

Think about how often someone proofreading your writing finds a mistake. The exact same idea applies to the far more complex processes and procedures required for robust security and compliance.

In a recent assessment project, our client’s IT staff had done a fine job of considering security issues and compliance processes for the company’s computer systems. They had documented the technical tasks, had a regular review process, and continually considered appropriate security issues.

What they failed to notice were some dangerous flaws in their backup processes. As we see way too often, this client relied on the backup software’s confirmation that these backups were successful. Since they trusted the software, they never restored any data from a backup drive in order to confirm beyond a doubt the backup had really worked. A common line of thinking, even if never admitted, is, “The computer said it worked, so it must have been successful.”

If you think this is something that only happens at small or marginal businesses, then you are in for a surprise. This is a common mistake, often made at companies you might assume are too large to make such small-time errors. And with increasingly short-staffed IT teams, these mistakes are even easier when everyone has more work than they can do. When a staff is short on time, checking backups, logs, and monitoring systems is often done haphazardly -- and sometimes not at all.

Through the years, our team has often been called in to try to help restore a failed backup that was managed by someone else. This call often comes from small and midsize businesses with small or outsourced IT staff, but we’ve also seen this situation at large organizations, too. Any company can fall prey to complacency, apathy, or ignorance.

Without fail, the person responsible for these backups trusted the software and did not perform routine, methodical testing, restoring data from the backup devices to ensure the backup was working as expected. Because this employee did not have our broad experience with many different organizations, backup failure wasn’t considered a major risk. Or perhaps the risk was known, but the staff member deferred the work until “they weren’t so busy.” From our experience and perspective, we always know the risk involved in this scenario, and also what a common and easily avoidable risk it is.

This is a classic example of how using a compliance and security “proofreader” can be invaluable: a fresh perspective, one with different experiences, to look over the operations and find the glaring holes that can be easily missed and subsequently remain unknown. This proofreading of your compliance can involve more than simple backups, of course. It works best when it is designed as an objective review of all your work. After all, proofreading only one chapter won’t actually improve a book at all.

The more removed from the day-to-day aspects of a business or department, the easier it is to spot issues and mistakes. Even if it's not required, an outside auditor (or even simply someone from another department) may be more effective (and more economical) than your own staff spending hours hoping to find the mistakes they didn’t see the first time.

Glenn S. Phillips, the president of Forte' Incorporated, works with business leaders who want to leverage technology and understand risks within. He is the author of the book Nerd-to-English and you can find him on twitter at @NerdToEnglish.

Glenn works with business leaders who want to leverage technology and understand the often hidden risks awaiting them. The Founder and Sr. Consultant of Forte' Incorporated, Glenn and his team work with business leaders to support growth, increase profits, and address ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7830
Published: 2014-11-24
Cross-site scripting (XSS) vulnerability in mod/feedback/mapcourse.php in the Feedback module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 allows remote authenticated users to inject arbitrary web script or HTML by leveraging the mod/feedback:mapcourse cap...

CVE-2014-7831
Published: 2014-11-24
lib/classes/grades_external.php in Moodle 2.7.x before 2.7.3 does not consider the moodle/grade:viewhidden capability before displaying hidden grades, which allows remote authenticated users to obtain sensitive information by leveraging the student role to access the get_grades web service.

CVE-2014-7832
Published: 2014-11-24
mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by vi...

CVE-2014-7833
Published: 2014-11-24
mod/data/edit.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 sets a certain group ID to zero upon a database-entry change, which allows remote authenticated users to obtain sensitive information by accessing the database after an edit by a teacher.

CVE-2014-7834
Published: 2014-11-24
mod/forum/externallib.php in Moodle 2.6.x before 2.6.6 and 2.7.x before 2.7.3 does not verify group permissions, which allows remote authenticated users to access a forum via the forum_get_discussions web service.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?