Perimeter

8/3/2012
09:46 AM
50%
50%

Compliance And Proofreading: A Fresh Perspective Is Required

It can be difficult to see the errors we've made

Think about how often someone proofreading your writing finds a mistake. The exact same idea applies to the far more complex processes and procedures required for robust security and compliance.

In a recent assessment project, our client’s IT staff had done a fine job of considering security issues and compliance processes for the company’s computer systems. They had documented the technical tasks, had a regular review process, and continually considered appropriate security issues.

What they failed to notice were some dangerous flaws in their backup processes. As we see way too often, this client relied on the backup software’s confirmation that these backups were successful. Since they trusted the software, they never restored any data from a backup drive in order to confirm beyond a doubt the backup had really worked. A common line of thinking, even if never admitted, is, “The computer said it worked, so it must have been successful.”

If you think this is something that only happens at small or marginal businesses, then you are in for a surprise. This is a common mistake, often made at companies you might assume are too large to make such small-time errors. And with increasingly short-staffed IT teams, these mistakes are even easier when everyone has more work than they can do. When a staff is short on time, checking backups, logs, and monitoring systems is often done haphazardly -- and sometimes not at all.

Through the years, our team has often been called in to try to help restore a failed backup that was managed by someone else. This call often comes from small and midsize businesses with small or outsourced IT staff, but we’ve also seen this situation at large organizations, too. Any company can fall prey to complacency, apathy, or ignorance.

Without fail, the person responsible for these backups trusted the software and did not perform routine, methodical testing, restoring data from the backup devices to ensure the backup was working as expected. Because this employee did not have our broad experience with many different organizations, backup failure wasn’t considered a major risk. Or perhaps the risk was known, but the staff member deferred the work until “they weren’t so busy.” From our experience and perspective, we always know the risk involved in this scenario, and also what a common and easily avoidable risk it is.

This is a classic example of how using a compliance and security “proofreader” can be invaluable: a fresh perspective, one with different experiences, to look over the operations and find the glaring holes that can be easily missed and subsequently remain unknown. This proofreading of your compliance can involve more than simple backups, of course. It works best when it is designed as an objective review of all your work. After all, proofreading only one chapter won’t actually improve a book at all.

The more removed from the day-to-day aspects of a business or department, the easier it is to spot issues and mistakes. Even if it's not required, an outside auditor (or even simply someone from another department) may be more effective (and more economical) than your own staff spending hours hoping to find the mistakes they didn’t see the first time.

Glenn S. Phillips, the president of Forte' Incorporated, works with business leaders who want to leverage technology and understand risks within. He is the author of the book Nerd-to-English and you can find him on twitter at @NerdToEnglish.

Glenn works with business leaders who want to leverage technology and understand the often hidden risks awaiting them. The Founder and Sr. Consultant of Forte' Incorporated, Glenn and his team work with business leaders to support growth, increase profits, and address ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.