Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Is Public Sector Cybersecurity Adequate?
Newest First  |  Oldest First  |  Threaded View
imispgh
imispgh,
User Rank: Strategist
9/8/2017 | 4:27:39 PM
Lockheed Whistleblower-(CyberArk) - Most organizations avoid key best cybersecurity practices
Privileged Account Security – The massive hole in most organizations cybersecurity. Why isn't it being addressed?  Lack of Courage

 

Organizations are avoiding this key best practice on purpose!!!!!!!!!!

 

My name is Michael DeKort. I am a former systems engineer, engineering and program manager for Lockheed Martin. I worked in aircraft simulation, the Aegis Weapon System, NORAD and on C4ISR for the US Coast Guard and DHS.  I also worked in Commercial IT. Including at CyberArk and in banking, healthcare and insurance.  I also received the IEEE Barus Ethics Award for whistleblowing regarding the DHS/USCG Deepwater program post 9/11.

https://www.thenation.com/article/will-botched-coast-guard-contract-come-back-bite-james-comey

 

The overwhelming majority of companies and government organizations are avoiding the most critical cyber-security practice of all. Dealing with privileged account security. It's the biggest dirty secret in cybersecurity. Which is extremely unfortunate because virtually every hack on record was accomplished by someone gaining access to a privileged account then moving through the system. This usually occurs due to a successful phishing expedition. (Of which 22% are successful. Keep in mind only one is needed).

 

Of the small fraction of companies that even deal with this area and purchase products few of them actually use the products they purchase properly. Many install them then slow roll actually using them to any significant degree for decades. Often this is meant to purposefully deceive C-Suite and regulators. This puts everyone at risk.

 

Here is how bad things are. CMU CERT is the premier authority on cyber-security best practices. Especially for DoD. I found out that CMU CERT has no solution for themselves in this area. They actually defer to CMU IT for their own security and they have no solution in this area. Shouldn't the organization responsible for telling others what best practice is use best practices for its own security?

 

Why is this happening? These products inadvertently expose several huge best practice gaps. Examples include having 4X more accounts than people, non-encrypted password files or spreadsheets, emails with passwords and software programs with passwords hard coded in them and many not knowing where they all are. And having local admin permissions available on laptops and end points and not knowing where they all are either.

 

Why don't these folks address this? Because it means pushing the culture to change bad habits and admit to their executives and boards they even existed in the first place. Governing bodies and regulators mean well but they don't help much. This is because the relevant regulations, SOC, HiTrust etc are too trusting and don't specify enough detail. This gives organizations far too much room to wiggle. This all results in most companies and organizations not utilizing best practices or readily available of off the shelf products that can significantly reduce the threat.

 

This is not a technical issue. It's one of Courage. Courage to admit the root causes exist, To deal with the culture and lead them to fix them. To not sacrifice customers to protect egos or let the bean counters justify it's cheaper to harm customers than the bottom line. 
imispgh
imispgh,
User Rank: Strategist
9/8/2017 | 4:27:37 PM
Lockheed Whistleblower-(CyberArk) - Most organizations avoid key best cybersecurity practices
Privileged Account Security – The massive hole in most organizations cybersecurity. Why isn't it being addressed?  Lack of Courage

 

Organizations are avoiding this key best practice on purpose!!!!!!!!!!

 

My name is Michael DeKort. I am a former systems engineer, engineering and program manager for Lockheed Martin. I worked in aircraft simulation, the Aegis Weapon System, NORAD and on C4ISR for the US Coast Guard and DHS.  I also worked in Commercial IT. Including at CyberArk and in banking, healthcare and insurance.  I also received the IEEE Barus Ethics Award for whistleblowing regarding the DHS/USCG Deepwater program post 9/11.

https://www.thenation.com/article/will-botched-coast-guard-contract-come-back-bite-james-comey

 

The overwhelming majority of companies and government organizations are avoiding the most critical cyber-security practice of all. Dealing with privileged account security. It's the biggest dirty secret in cybersecurity. Which is extremely unfortunate because virtually every hack on record was accomplished by someone gaining access to a privileged account then moving through the system. This usually occurs due to a successful phishing expedition. (Of which 22% are successful. Keep in mind only one is needed).

 

Of the small fraction of companies that even deal with this area and purchase products few of them actually use the products they purchase properly. Many install them then slow roll actually using them to any significant degree for decades. Often this is meant to purposefully deceive C-Suite and regulators. This puts everyone at risk.

 

Here is how bad things are. CMU CERT is the premier authority on cyber-security best practices. Especially for DoD. I found out that CMU CERT has no solution for themselves in this area. They actually defer to CMU IT for their own security and they have no solution in this area. Shouldn't the organization responsible for telling others what best practice is use best practices for its own security?

 

Why is this happening? These products inadvertently expose several huge best practice gaps. Examples include having 4X more accounts than people, non-encrypted password files or spreadsheets, emails with passwords and software programs with passwords hard coded in them and many not knowing where they all are. And having local admin permissions available on laptops and end points and not knowing where they all are either.

 

Why don't these folks address this? Because it means pushing the culture to change bad habits and admit to their executives and boards they even existed in the first place. Governing bodies and regulators mean well but they don't help much. This is because the relevant regulations, SOC, HiTrust etc are too trusting and don't specify enough detail. This gives organizations far too much room to wiggle. This all results in most companies and organizations not utilizing best practices or readily available of off the shelf products that can significantly reduce the threat.

 

This is not a technical issue. It's one of Courage. Courage to admit the root causes exist, To deal with the culture and lead them to fix them. To not sacrifice customers to protect egos or let the bean counters justify it's cheaper to harm customers than the bottom line. 
REISEN1955
REISEN1955,
User Rank: Ninja
9/8/2017 | 12:36:36 PM
Re: Sadly, the article title is not a joke
True indeed - basics are a good place to start, usually the ONLY place to start.  The trick is that now government, public houses are under orders for a massive re-vamp to bring them out of the 1970s and 80s to the twenty first century and THAT'S THE HARD PART.  Piling security and cyber on top of that would tax the mind of even the most able cyber specialist these days.  
jjcouch
jjcouch,
User Rank: Author
9/8/2017 | 10:35:28 AM
Re: Sadly, the article title is not a joke
Thanks for your comment - I completely agree. I went more in-depth originally, but I'm limited by the length of the article I can post so I had to cut it down. The issues that government security organizations face is significant and can't be easily solved - my main point, I guess, is just that these organizations need to get back to the basics and just do "leading practices." While it won't fix everything, it is a huge step in the right direction.
SchemaCzar
SchemaCzar,
User Rank: Strategist
9/8/2017 | 9:29:34 AM
Sadly, the article title is not a joke
Nor do you even need to read the text to know the answer.  The statistics given are sobering confirmation of the bleak hypotheses security professionals like myself have drawn.  I wish it had gone a bit deeper before turning into a "win one for the Gipper" cheer.
REISEN1955
REISEN1955,
User Rank: Ninja
9/8/2017 | 8:02:17 AM
Equifax answered my own post
Presuming that Equifax hack was due to an outsouricng of IT ---- YES!!!  They outsourced support to good old true blue IBM - the once great firm that has multiple outsourced failures, lawsuits and blown data centers around the world.  (They are not welcome in Australia anymore).
REISEN1955
REISEN1955,
User Rank: Ninja
9/7/2017 | 3:07:41 PM
Private or Public?
Does not matter to the degree that both tend to farm out IT staffing and controls to CSRA (what used to be part of CSC to the public sector) and good old Infosys, Tata, Wipro, IBM et al.  The outsourcing firms do NOT have client's best interest at heart.  I have come from a Wipro shop and it was a horror show.  What outsourcing firms DO care about is INVOICE MANAGEMENT and cybersecurity??? HAHAHAHA not a tinker's damn of care.  Oh lip sevice of course but you don't get great talent through outsourcing rules, protocols and staffing.   Some, yes a few individuals, in an outsourced shop do know their stuff.  They are generally rare.  And over-worked as a result.  

Big government however is reported to driving some very very old hardware, going back to the 1970s (such as a nuclear command and contrl which should scare the hell out of anybody).  Nobody is writing malware for IBM System/370 systems anymore but they are probably easy to crack into and THAT should be frightening indeed. 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file