Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:08 PM

You Can't Always Be Proactive

Having your car serviced regularly, stretching before working out, and visiting the dentist twice a year are known to prevent engine failure, physical injury, and potentially life-threatening gingivitis. In addition, being proactive also extends to the world of information security.

Having your car serviced regularly, stretching before working out, and visiting the dentist twice a year are known to prevent engine failure, physical injury, and potentially life-threatening gingivitis. In addition, being proactive also extends to the world of information security.Indeed, experience teaches us that addressing small problems before they become large ones or multiply is the smart thing to do. But whether we actually do the smart thing is another matter entirely.

The use of strong passwords, antivirus, and system-hardening all can help prevent security disaster. Failure to do any one of these, or a myriad of other best practices, can lead directly to a data breach. Cleaning up after a data breach is much more costly and time- consuming than performing the aforementioned proactive measures. Case in point: Heartland Payment Systems says it has spent more than $32 million in response to its 2008 data breach incident. It is hard to imagine that proactively finding and fixing its SQL injection issues (the source attack-vector) would have cost even a fraction of that amount.

Basically every security measure can be argued as being both proactive or reactive, depending on a particular point of reference. Our industry's highly effective marketing efforts have many information security pros automatically associating certain solution classes and best practices as proactive, deserving or not, and others as reactive (a negative connotation) without really understanding why. Again, consider the Heartland Payment Systems compromise. While many details are fuzzy, basically a SQL injection vulnerability exploited by an external attacker led to further compromise of its internal network, and eventually provided access to the entire credit-card transaction system.

It is common knowledge that SQL injection attacks are extremely prevalent today because this vulnerability is quite pervasive, the exploit is easy to perform with readily available tools, and it is highly lucrative when exploited. Credit card and personal information are easily monetized, making them valuable attack targets. Therefore, it can be reasonably argued that organizations should be proactively monitoring their Web-enabled applications to spot and block these attacks with an intrusion prevention system (IPS) or Web application firewall (WAF). Right?

Not so fast. It can also be argued that IPS amd WAFs are by nature reactionary technologies. It would be more proactive to identify your vulnerabilities ahead of time, especially SQL injection, by performing a vulnerability assessment. Hack yourself first. Or is that reactionary, as well, since you obviously already have an application security problem?

Highly publicized reports, statistics, media coverage, and anecdotal information all say Web application code is prone to SQL injection flaws. So it would truly be proactive to conduct source-code reviews prior to production release during the QA phase.

Then again, the real root of the problem is the person writing the code. Developers must be proactively trained, either on the job or in college, about secure development practices from the very beginning. Is this proactive? Maybe. At the same time, we also haven't considered that there are already more than 200 million Websites and 17 million developers. Most of those sites are seriously vulnerable. The fact is we can't turn back the clock, and you can only be proactive once the problem is understood.

Maybe the core problem was the technology selection that allowed developers to make simple mistakes; a lack of proper database permissions that prohibit system calls; or poor system configuration management. Maybe the Payment Card Industry Data Security Standard (PCI DSS) needs to be tougher or the QSAs need to be more thorough. Any of these might have prevented the Heartland incident.

The point is the whole proactive versus reactive argument just does not make sense to me. Being proactive, whatever that really means, is not a luxury many possess in information security. Good idea or not, security is often introduced after enough value has been built into an application to justify the investment and after years of coding mistakes have already been made. We are charged with handling today's problems and advising others about how to limit the introduction of more flaws in the future. To get there, sometimes you have to put duct tape on a tail light, strap on a knee brace, or take some painkillers to deal with the problems at hand. There is nothing wrong with that, as long as we try not to make it a habit and make an effort to improve over time.

Jeremiah Grossman is CTO and founder of WhiteHat Security. Special to Dark Reading Jeremiah Grossman, Chief of Security Strategy, SentinelOne, Professional Hacker, Black Belt in Brazilian Jiu-Jitsu, & Founder of WhiteHat Security. Jeremiah Grossman's career spans nearly 20 years. He has lived a literal lifetime in computer security to become one of the ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-27
Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) vulnerability in Micro Focus products products Operation Bridge Manager, Operation Bridge (containerized) and Application Performance Management. The vulneravil...
PUBLISHED: 2020-10-27
Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 ...
PUBLISHED: 2020-10-27
A SQL injection vulnerability exists in Victor CMS V1.0 in the cat_id parameter of the category.php file. This parameter can be used by sqlmap to obtain data information in the database.
PUBLISHED: 2020-10-27
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
PUBLISHED: 2020-10-27
Check Point ZoneAlarm before version allows a local actor to escalate privileges while restoring files in Anti-Ransomware.