Enterprise cybersecurity technology research that connects the dots.

Analysis: Log4j Vulnerability Highlights the Value of Defense-in-Depth, Accurate Inventory

The early lessons from Log4j indicate that key security principles can help better handle these high-risk software supply chain security incidents if teams have proper support.

Fernando Montenegro, Senior Principal Analyst, Omdia

December 15, 2021

5 Min Read
Locks on a digital background
Source: Aleksey Funtap via Alamy Stock Photo

Many security teams have been running hard for past few days looking to assess and address their organizations' exposure to CVE-2021-44228, aka "Log4Shell," a flaw disclosed within the popular Log4j Java-based logging library. While there is a significant and welcome amount of tactical information available from vendors and from collaborations on social media, there’s also an opportunity to take a broader view of this incident.

The vulnerability has been widely discussed, but in brief, code within Log4j was found to be susceptible to a remote code-execution exploit technique. By employing a unique code string, an adversary may be able to gain full access to a target system running Log4j.

An initial software patch was released on Dec. 6. However, as with other recent flaws in widely used software components, there have been significant ramifications for downstream third-party software makers that incorporate Log4j. Dozens, if not hundreds, are affected, including Apple, Amazon, and Google; those vendors have been working to update vulnerable software.

As with any incident response, it’s important to acknowledge that early information can often be supplemented by better insights later — indeed, as this piece was being written, a second vulnerability was uncovered, logged as CVE-2021-45046. With it comes updated guidance to upgrade to Log4j version 2.16.0. Meanwhile, numerous reports have surfaced of malicious actors using this vulnerability to trigger ransomware and other attacks, and Omdia expects further developments. But even now, we're able to start to gather important lessons.

Software Supply Chains Need Documentation
This incident is one more in a long line of supply chain attacks, most likely surpassing the SolarWinds software supply chain compromise of late 2020 in terms of its overall impact. The nature of today's globally interconnected software supply chain means vulnerable software components are likely to be a recurring threat for the foreseeable future.

This highlights the immense value of accurate and timely inventories, at multiple levels of abstraction. Specifically, as it relates to Log4j, the challenge is significant; it is a widely deployed library that can often exist not only on multiple systems but can also be invoked from different locations.

With software component inventories, software makers can take steps to quickly identify these issues, and one such method is a concept called a software bill of materials (SBOM) — an accurate, timely, and easily consumable description of the fundamental building blocks of software components.

For vendors, an SBOM can help them get timely information out to their customers on whether specific products are affected. For end users, having proper SBOMs for key applications significantly shortens the triage cycle, as they can potentially take action to restrict access to an affected application, or even take it offline, until a fix is made available.

The Cybersecurity and Infrastructure Security Agency (CISA) has been spearheading efforts around the development and use of SBOMs and has been providing updated information on the Log4j vulnerability. In a sad coincidence, the agency had previously scheduled an SBOM-centric event for this week.

Having an SBOM is not a panacea, but it can greatly help organizations avoid falling victim to exploits caused by software supply chain vulnerabilities.

For security teams looking to determine if they're exposed to this, a good inventory of systems/applications is the first step in determining whether they use the library in question. Here, teams should beware the challenge of striving for a "perfect" inventory: It's inevitable that environments change, so inventory information should be dynamic.

Least Privilege, Defense-in-Depth Remain Critical
Proven security principles, such as defense-in-depth and least privilege, also have a strong role to play. Many security teams understand these concepts well and wish to apply them to their organizations' software and solution deployments, but they are often met with resistance from other stakeholders, or lack the resources to deploy them.

The increased use of automation in IT — such as infrastructure as code, particularly when used in modern pipelines built around CI/CD — makes it possible for security teams to cooperate with developers to build more secure solutions from the start, and across multiple systems.

Least privilege also plays a key role, at the host, application, and network levels. At the host level, what actual privileges and capabilities does the process leveraging Log4j really need to have? Increasingly, the use of least privilege principles plus behavior monitoring alongside runtime protection can act as a powerful combination to contain the impact of an exploited system. Similar considerations apply to securing the Java applications themselves via features, such as controlling the use of remote codebases.

Importantly, at the network level, least privilege manifests itself via methods such as egress control. With Log4Shell being a two-stage attack — where the payload has to be downloaded from an attacker-controlled system — being able to lock down which systems the infected system can even initiate connections to is particularly useful.

Security Researchers Saw Potential for Log4j Vulnerability Coming
Lastly, there's also the reminder that it's wise to pay attention to security research. Back at Black Hat 2016, Alvaro Muñoz and Oleksandr Mirosh presented research on issues with JNDI — the underlying interface that Log4j uses — and is eerily prescient of today's crisis, though not naming Log4j specifically. That credit falls to Jeff Williams, from Contrast Security, who wrote here in 2018: "If an attacker was able to infiltrate a popular library like log4j, they would very quickly be running with privilege inside most data centers in the world."

This is, of course, little comfort now to teams running at 110% looking to address these issues, but it highlights the importance of giving security teams not only the access to relevant information from research but also the resources — time, money, political support, and more — needed to apply these lessons to an organization's own infrastructure and practices.

None of the lessons here should detract from the herculean work that security teams are undertaking to address this. More than anything else, they need support both through this crisis and beyond as they continue to help their organizations. Let's never forget that security is, undoubtedly, a team sport.

About the Author

Fernando Montenegro

Senior Principal Analyst, Omdia

Fernando Montenegro joined Omdia in 2021 as a Senior Principal Analyst on the Omdia Cyber research team, based in Toronto, Canada. He focuses on the Infrastructure Security Intelligence Service, which provides vendors, service providers, and enterprise clients with insights and data on network security, content security, and more.

Fernando’s experience in enterprise security environments includes network security, security architecture, cloud security, endpoint security, content security, and antifraud. He has a deep interest in the economic aspects of cybersecurity and is a regular speaker at industry events.

Before joining Omdia in 2021, Fernando was an industry analyst with 451 Research. He previously held a variety of operations, consulting, and sales engineering roles over his 25+ years in cybersecurity, always focusing on enterprise security at organizations including vArmour, RSA, Crossbeam, Hewlett Packard, and Nutec/Terra. Fernando holds a Bachelor of Science in computer science and different industry certifications.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights