Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

6/4/2020
02:00 PM
Ameesh Divatia
Ameesh Divatia
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Strengthening Secure Information Sharing Through Technology & Standards

How data sharing, innovation, and regulatory standardization can make it easier for organizations to both contribute and consume critical threat intelligence.

In March, the US Cyberspace Solarium Commission report punctuated the urgent need for a stronger cybersecurity posture for our country and the private companies within. The report outlines more than 70 recommendations to help C-suite executives get up to speed on cybersecurity measures.

I believe one of the most important recommendations outlined in the report is the need for greater information sharing between security experts in order to help organizations counter new and emerging security challenges. The report also proposes the development of stronger standards and policies to ensure a stronger baseline security posture from organization to organization.

The report points out that information sharing represents a critical strategy to "strengthen and enforce cyber norms and to identify common intelligence gaps and areas of critical risk or vulnerability so that the intelligence community can provide focused and actionable intelligence." I would take that assertion one step further: Information sharing is the single most important tool to identify a vulnerability, attack, or disease outbreak that would most likely target multiple markets, such as finance, healthcare, government, and critical infrastructure.

For example, when a novel network anomaly is identified, determining how to contain it can take time, as there is no existing road map for doing so. One of the best ways to quickly mitigate potential risk in this situation is by gaining insight on information-sharing platforms from peers who have dealt with the same intrusion and can offer proven tactics to solve the problem.

However, the security and privacy defenses protecting today's modern information supply chain are woefully inadequate. Security questionnaires and Standard Information Gathering assessments do not prevent data breaches or data leakage. The risk of exposing their own security vulnerabilities, proprietary information, customer data, or other sensitive data outweighs the prospect of sharing critical insights. As a result, most organizations prefer to be consumers of information instead of contributors.

What's needed is a secure data-sharing strategy that allows organizations to share threat intel and aggregate analysis across multiple parties without revealing the underlying data values or violating the data privacy contract. The good news is that we are seeing greater availability of solutions that facilitate secure data sharing. Such tools mask a user's identity and protect sensitive data that could put organizations at a competitive disadvantage, expose security weaknesses, or divulge regulated information.

Implementing Standards and Regulations
While the momentum around secure data-sharing technology can further propel the practice of threat intel sharing, the practice could be even more effective with the assistance of regulatory standards. In fact, the US Cyberspace Solarium Commission suggests that the measures outlined in the report hedge on one key area: a commitment to strong encryption standards that support personal privacy.

Measures that require more stringent encryption capabilities can help alleviate some of the concerns that organizations have about information sharing, as it will require solutions to implement a privacy benchmark to better protect sensitive data. Such a standard would prove vitally important during crises, such as the COVID-19 pandemic, when healthcare organizations are sharing information across organizations and industries in an effort to slow the spread of the virus, identify outbreaks and research treatment, all while attempting to protect patient privacy.

The report also suggests movement for a federal data privacy standard and calls for a national data security and privacy law comparable to the EU's General Data Protection Regulation. Such a regulation would also remove concerns around threat intel sharing by more stringently securing data in stores, such as in databases, and accelerating the adoption of technologies that aid in protecting sensitive consumer data.

To be effective, a national data security and privacy protection act should include the following measures:

  • A data privacy bureau that defines requirements and standards and liaises with businesses
  • A personal records opt-in mechanism that gives users methods to authorize sharing with entities
  • Financial penalties for noncompliance and data breaches as well as requirements for disclosure

Every organization has critical information that can help solve a greater security puzzle, but the potential consequences of sharing it represent a serious obstacle. It does not have to be that way. Secure data-sharing innovation and the implementation of standard regulations can alleviate the apprehension related to information sharing, so organizations can feel more comfortable being both contributors and consumers of threat intel information.

Related Content:

 

 
 
 
 
 Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really  bad day" in cybersecurity. Click for more information and to register

 

Ameesh Divatia is Co-Founder & CEO of Baffle, Inc., which provides encryption as a service. He has a proven track record of turning technologies that are difficult to build into successful businesses, selling three companies for more than $425 million combined in the service ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
someshmp
50%
50%
someshmp,
User Rank: Apprentice
6/5/2020 | 7:26:15 AM
Security concern
nicely explained article 
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34390
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow on the size parameter of the tz_map_shared_mem function.
CVE-2021-34391
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel�s tz_handle_trusted_app_smc function where a lack of integer overflow checks on the req_off and param_ofs variables leads to memory corruption of critical kernel structures.
CVE-2021-34392
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map_shared_mem function can bypass boundary checks, which might lead to denial of service.
CVE-2021-34393
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in TSEC TA which deserializes the incoming messages even though the TSEC TA does not expose any command. This vulnerability might allow an attacker to exploit the deserializer to impact code execution, causing information disclosure.
CVE-2021-34394
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in all TAs whose deserializer does not reject messages with multiple occurrences of the same parameter. The deserialization of untrusted data might allow an attacker to exploit the deserializer to impact code execution.