A Segmented Home
Given the importance of the pre-entry authentication, Tripwire's Reguly says processes must be in place to prevent unauthorized intruders from tailgating Santa down the chimney. And once the big man is inside, the security issues are not laid to rest.
"You have to watch internal lateral movements, so it's privileged access to a specific area. It's not really easy access to the entire house," Vectra's Sheu says. "You know, the key is keeping Santa Claus within a specified radius of the designated gift reception area."
The goal then being is to corral Santa to the tree, the stocking-hanging center, and wherever the cookie-and-milk bribe has been left. And to ensure compliance, Reguly suggests a comprehensive logging regimen taking into account every internal stop Santa makes, along with the activity at each.
Virsec's Leichter takes a comprehensive view of a solution, with better real-time monitoring and forensics of what Santa actually does.
"While some believe he comes and goes too quickly to track — realistically, delivering to billions of households only leaves micro-seconds per visit — more advanced security technology can deliver this kind of split-second detection, threat analysis, and, if required, automatic protection actions — closing the chimney flue before to prevent him from escaping after misdeeds," Leichter says. "This may sound harsh, but mythical figures who have nothing to hide should not object to visibility and accountability.
"If we don’t enforce zero-trust consistently, good luck cleaning up after the Easter Bunny," he adds.
About Those Gifts
Kiersten Todt, managing director of the Cyber Readiness Institute, points out that the gifts themselves carry risk, especially if they're wrapped — a physical form of encryption that hides the true contents of the package. Sheu says some would suggest an authorized man-in-the-middle attack — unwrapping, verifying, and rewrapping each gift — but he says that technology has provided us with a better approach.
"If you give Santa a public key and you have a private key, he can insert the public key at the time of wrapping, and you can validate it," he says. And keeping track of all the certificates for all the gifts delivered around the world on Christmas Eve? The perfect application, Sheu says, for the distributed ledger of a blockchain.
Naughty and Nice
Once experts began looking at Santa from a zero-trust perspective, every aspect of his "operation" came under scrutiny. One of those aspects is the naughty and nice list (checked twice!) that forms the basis of the delivery schedule.
"Who created that naughty or nice list? Did the parents create it or did some 4-year-old create it and hand it off to Santa Claus?" Sheu asks. In order to make sure that the critical list has been created and stored properly, he says, "you would you need to verify the validity with a blockchain."
Further, if this naughty-and-nice list were to be exposed in a data breach, the impacts would be far-reaching.
Todt imagines that an up-to-date list might be stored on Santa's smartphone, which leads to a whole new level of security concern. "There is technology that exists that encrypts not just messaging but video, phone, etc., and that's where we have to go," Todt says. "It's also about mobile security."
She continues, "You can no longer absolve yourself of responsibility in the tech space if you're using a phone to do anything. If Santa isn't taking the appropriate precautions, then yes, that would be an issue."
The Risk Profile
Ultimately, experts agreed that Santa's visit could be conducted under a zero-trust model, but said that a risk assessment would be appropriate before investing in the process.
As with any new security scheme, moving to zero trust for Santa should start with a risk assessment. NormShield's Maley says that despite the myriad attack possibilities, existing data shows that the probability of Santa committing theft is virtually nonexistent. So is the risk truly high enough to merit the investment?
If zero trust is enacted, says Maley, we may also need to "tell our kids that, well, Santa is not coming to our house. That's an example of, well, I think we have gone overboard with zero trust, perhaps."
Maley defines "overboard" in stark terms. "And the pain is real because if we tell our kids Santa is not coming ... I wouldn't want to be in that house," he says.
Related Content:
- Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition
- Edge Cartoon Contest: You Better Watch Out
- Video: Santa Gets Hacked! (from Twist and Shout)
- Financial Institutions on the Hook for Data Breaches this Holiday Shopping Season
- Mega-Breaches are Forcing Us to a Passwordless World: Are We Finally Ready?