Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Connect Directly
E-Mail vvv

What the World's Elite Protectors Teach Us about Cybersecurity

How to protect anyone and anything, from the perspective of a career Secret Service agent and former special operations marine.

First of a two-part series.

When it comes to security in general, there are fundamental principles that apply across domains, environments, and disciplines. In the general sense, good security — sufficient protection from immediate harm and adequate mitigation of long-term risks — depends on common aspects of strategy, mindset, operations, and training, wherever you may work.

There are stark differences, of course, in the nature of threats and the focus of protectors across elite protection and cybersecurity disciplines. Armed assassins targeting the president during a public speech pose a different type of threat than malicious code delivered across the Internet by a compromised website. Hardening a forward operating base in hostile territory against rocket propelled grenades is a different type of work than hardening the operating system of a critical server.

Nonetheless, four common principles of planning and preparation exist across elite protection and cybersecurity disciplines that deserve consideration by anyone who takes security seriously.

Principle 1: Know What You're Protecting
At the outset, understanding mission and scope is essential. Protectors must have absolute clarity on who and what they are expected to protect. They need to understand what the ultimate desired outcomes are and what they are willing to sacrifice if forced to make trade-offs. Military planners, for example, conduct extensive "mission analysis" to ensure clarity on objectives, responsibilities, and authorities so that everyone is in sync before the operation begins. For cybersecurity professionals, this translates to understanding scope and prioritizing security controls accordingly.

Law enforcement professionals in executive protection are trained to do something no other law enforcement professionals will do: leave a fellow officer behind. During the critical seconds of an attack, protection teams will "cover and evacuate" their principal, getting them out of harm's way toward a designated safe room or armored vehicle. Only after the principal is secure will they tend to their teammates. Similarly, cybersecurity teams need to determine — ahead of time — which assets and business functions they are willing to shut down, if necessary, to contain a breach.

Principle 2: Plan Obsessively
From Secret Service agents "advancing" a presidential trip to Marine Raiders gearing up for a night reconnaissance patrol, planning is an obsession. So, too, for cybersecurity professionals. Every detail must be studied, and every contingency planned for, with proper personnel, equipment, and procedures in place to ensure success.

Even so, no plan ever survives real-life execution completely intact. There are just too many factors beyond the control of planners, chief among them the behavior of adversaries. So, why spend so much time and effort in planning? Because the planning process itself is so valuable. As a general, and later president, Dwight Eisenhower said, "Plans are useless, but planning is indispensable." Detailed cybersecurity plans, including elements from compliance requirements and best-practice frameworks to security operations center (SOC) workflows and response guidelines, are difficult to draft and even harder to implement. But the planning process itself has many benefits, often unforeseeable at the time the plans are written. 

Principle 3: Harden the Target
Making a physical target more difficult to harm is a well-understood principle applied by elite protectors. Typically, this begins with hardening the target itself, or the environment in which the target resides, so that it can withstand attacks. Whether securing presidential mansions or forward operating bases, this effort includes improving building design and erecting barriers. The goal is to better withstand the most common types of attack.

In cybersecurity, this means improving system security by modifying configurations — those pre-existing options for customization. Secure configuration standards such as CIS Security Benchmarks and DISA STIGS provide essential guidance in this area. It's the basic work of locking existing doors, turning on cameras, and setting the alarm. Mitigating evolving vulnerabilities via vulnerability assessment, patching, and remediation is also essential to hardening the target.

Another aspect of target hardening is controlling access, since no principal (or web application server) can perform their function without interacting with others. Because it's impossible to know the threat level of every person requesting access, we must choose a strategy for mitigating risk by managing access proactively, either by blacklisting or whitelisting. Blacklisting is the equivalent of the TSA no-fly list (a list of known individuals who are denied access) and corresponds to antivirus software. Whitelisting, on the other hand, is the equivalent of an invitation to a White House event (a list of known individuals who are granted access) and corresponds to application whitelisting. The latter is much more secure but much more disruptive to operations.

Principle 4: Study the Threat but Don't Obsess
Elite protectors know that threat intelligence is important. Knowing who is trying to harm you, what their capabilities are, and how they plan to attack is very useful. But protectors also know that obsessing about threat intelligence is not good, either. There will always be unknowns and surprises. Rather than defensive actions driven by knee-jerk reactions to the latest threat report, seasoned protectors will leverage comprehensive threat intelligence to inform and improve defenses as part of an ongoing effort.

Similarly, cybersecurity professionals implement threat-informed defensive recommendations, such as the MITRE ATT&CK framework. This approach reduces the tendency to make endless changes, undermining the cohesion of a sound strategy. 

Read Part 2, "How Elite Protectors Operationalize Security Protection," for more on how principles of elite protection can inform cybersecurity. 

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "The Entertainment Biz Is Changing, but the Cybersecurity Script Is One We've Read Before."

Maurice Uenuma, Vice President, Federal & Enterprise, Tripwire Maurice Uenuma is vice president, federal & enterprise at Tripwire. He was vice president at the Center for Internet Security (CIS), and Workforce Management co-chair of the National Initiative for Cybersecurity ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. T...
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. Howeve...
PUBLISHED: 2020-09-23
An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasing an RCU reference, which is conceptually similar...
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory a...
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains...