Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:56 AM
John H. Sawyer
John H. Sawyer

Make Security About Security, Not Compliance

The lack of follow-through and belief in any type of lifecycle for security is one that really bothers me when working with clients who are looking only to meet the minimum compliance requirements.

The lack of follow-through and belief in any type of lifecycle for security is one that really bothers me when working with clients who are looking only to meet the minimum compliance requirements.If you're a security consultant, you've probably experienced at some point, or will in the future, a client that wants you to perform a penetration test or wireless survey in order to check off a box to make the auditors happy. While you'll be happy to do it because you're getting paid, the unfortunate thing you'll come to realize is this is the only time they think about security. After the penetration test is performed, they'll work to correct the issues found and then they're done thinking about security until the following year.

What's wrong with this picture? Heartland Payment Systems comes to mind. They suffered a huge breach in 2008 at a time when they were considered PCI-compliant with the PCI DSS. And I'm guessing they checked off all the little boxes on their PCI compliance checklist saying they met the requirements but never bothered to be sure they were actually secure.

While that's probably the last time Heartland will make this mistake, it's the problem that many security professionals cite with compliance--companies assume being compliant means they are secure--and as we've seen numerous times, that's not the case. Security needs to be baked into IT and business operations from the start, and security needs to be something ongoing and not just a concern when it's time to fill out the auditors' checklists.

So what can be done? Well, obviously, having a penetration test done every month is unreasonable and costly, but what about the other tasks that are only required a few times or less each year? The requirement for quarterly wireless scanning is one example. Instead of performing a wireless survey every few months, the PCI DSS states that a wireless intrusion detection system can be put in place as long as it is properly configured to send alerts to staff.

Often small companies shy away from the wireless IDS option because of the cost, but cost doesn't have to be the limiting factor. For example, low-cost DIY options exist such as the free and open source software Kismet. Combined with consumer-grade hardware, Kismet can be configured as a distributed wireless IDS. The drones can monitor for new wireless networks and wireless attacks, then report the information back to a central Kismet console.

Of course, there are plenty of commercial solutions from companies like AirMagnet, AirTight Networks, and Cisco, but they often come with a hefty price tag that small companies can't afford.

My best advice for companies seeking compliance is to not get stuck thinking inside the box. In other words, think creatively to solve the compliance riddle while making sure that it's bringing you closer to being secure -- and not just closer to the final check box on your checklist.

John H. Sawyer is a senior security engineer on the IT Security Team at the University of Florida. The views and opinions expressed in this blog are his own and do not represent the views and opinions of the UF IT Security Team or the University of Florida. When John's not fighting flaming, malware-infested machines or performing autopsies on blitzed boxes, he can usually be found hanging with his family, bouncing a baby on one knee and balancing a laptop on the other. Special to Dark Reading.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version allows unauthenticated remote attackers to start a telnetd service on the device.