Client-Side JavaScript Risks & the CCPA
How California's new privacy law increases the liability for securing Web-facing user data, and what enterprises can do to mitigate their risk.
On January 1, 2020, California's new privacy law took effect, which will dramatically increase security risks for any company operating there as well as for third parties that might have access to your data. This is a problem because one of the fastest-growing types of cyberattacks — client-side JavaScript attacks — often targets third-party services. Magecart attacks, for example, frequently focus on compromising plug-ins to major e-commerce platforms such as Magento and Shopify or other popular publishing platforms like WordPress to surreptitiously skim customer data.
The California Consumer Privacy Act (CCPA), which dictates how companies and organizations need to secure the data of users, could drive heavy fines against sites that fail to protect against these attacks. The act can also be a positive force to drive major improvements in your web application security approach.
Why Website Issues Are a CCPA Risk
While the CCPA is the strongest state consumer privacy legislation in the United States, the law also has global reach. A French or a Chinese company that has customers, partners, service providers, or offices in California could be fined if its website is breached and California residents are affected.
However, the exposure is broader than data breaches. CCPA extends liability for compromises of user data to third-party services that web application publishers and operators use. This can include payment processors, chatbot operators, and any other provider of third-party services that integrate with web applications. This could mean large financial exposure if California, which has a track record of aggressive enforcement, pursues fines.
In the European Union, recent interpretations of the 2016 General Data Protection Regulation (GDPR) found that JavaScript attacks by malicious third parties to skim sensitive user data that are not promptly spotted and halted constitute GDPR violations. In these instances, the databases and internal systems were never breached; site code was modified, but not by the site's owner. California adopting this view sets a high bar for website operators.
CCPA also sets up a provision under which people whose data is stolen can sue businesses "as a result of the business's violation of the duty to implement and maintain reasonable security procedures and practices appropriate to the nature of the information." This is a broad mandate to litigation in the event of any type of security incident.
The upshot? CISOs, CMOs, site reliability engineers, and CROs at companies with even small exposure to California should care about liabilities conferred by CCPA on web applications and site code.
CCPA Risks from Third-Party JavaScript Code
Nearly all web applications (including web, mobile web, and hybrid mobile applications) use JavaScript. Increasingly, these applications also use third-party JavaScript libraries and services that are added to their web application. These third-party JavaScript inclusions enhance site functionality in many ways. They also accelerate the speed at which web applications can be constructed, and enable better web application performance by off-loading computationally intensive tasks to third parties.
Unfortunately, it's become hard for companies to keep track of all the third-party JavaScript on their web applications. In a survey of 230 companies averaging 1,000 employees conducted by PerimeterX, 55% of respondents said that more than 50% of their site code is from third parties. Roughly one-fifth said that over 70% of their site code was from third parties, and a surprising 8.3% said they had no idea how much of their site code was third-party code.
Having trouble tracking what third-party services and code companies use complicates auditing for CCPA liabilities. Worse, when third-party libraries and services are hacked or suffer security breaches, the owners of these third-party elements may not notify all website owners that use these libraries and services promptly. The PerimeterX survey found that 42% of respondents have no way to know when and if their site code was changing without their proper authorization.
How to Reduce Risks from Third Parties
Some basic steps can significantly reduce your risk, or, at a minimum, show you performed solid due diligence into the risks third parties confer on your organization (and by extension, on your customers). First, identify all instances of third-party code running on your site. If this code is from third-party open source libraries, then you must treat it as if it's your own code and analyze it for security risks. This includes static code analysis.
For JavaScript from service providers, ask the following questions to gauge their own CCPA risk to you:
Do you capture our user data in any way? If yes, please give a detailed explanation how you capture this data.
If you capture our data, who has access to that data (additional parties) and how is it secured?
How are you checking your code for unauthorized changes? (They should be able to give you a list of steps such as static code analysis and live application scanning.)
Do you have full (not partial) SOC 2 or ISO 27001 compliance?
The best offense against CCPA, however, is a good defense. To that end, verify that all your public-facing applications and APIs are properly locked down. All public apps must be guarded by firewalls and other security measures with updated configurations.
To spot any JavaScript attacks early and head off a CCPA risk, deploy a modern artificial intelligence-based anomaly detection platform on real-time data collected in runtime from site visitors, that locates strange code behavior indicating user data is being harvested. [Editor's note: PerimeterX is one of several providers that offer such detection solutions.] These solutions can also give you a real-time updated view of which scripts on your site are actually accessing and collecting personal data, which could provide compliance air cover, as well.
Even if the script is actually a legitimate and uncompromised library or service, compliance rules around data gathering and ability to provide any information on how data is used mandate that site operators must be able to identify every third-party that has access to data, in any way, shape, or form.
Related Content:
Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Disarming Disinformation."
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024