With limited resources, funding, and expertise, focusing on protecting the Big 7 applications will enable security professionals to reduce a large portion of their attack surface

Mike Rothman, Analyst & President, Securosis

July 7, 2013

3 Min Read

I'm fascinated with more effective prioritization of security team activities. It's logical that given the constraints security folks face daily, figuring out how to maximize the impact of any activity is an important place to spend time. As legendary investor Warren Buffett has indicated, his most important responsibility is to effectively allocate the capital of Berkshire Hathaway. Your job is to most effectively allocate the resources, funding, and expertise of your security team.

As I discussed in my last Vulns and Threats post, understanding attack paths is one means of prioritizing your efforts. Reducing your applicable attack surface by locking down devices and aggressively segmenting networks is another way to control risk. You can also reduce attack surface by specifically protecting the select few applications frequently targeted by attackers. I call these the Big 7.

These are the applications that everyone has and uses every day -- you know, the apps that you cannot lock down or otherwise control. The ones that if they don't work, your employees cannot do their jobs. As such, they make the best targets for attackers since you can't just turn them off or lock them down. I'm talking about the browser, Java, Acrobat Reader, and Microsoft Office (Outlook, Word, Excel, PowerPoint). If you can control those applications, then you can probably eliminate a significant portion of the attacks that compromise your machines.

So how do you protect these applications? By granularly profiling them to understand how the applications interact with the device and then watching for activities that don't fit the profile. Does that sound familiar? Of course it does: It's how HIPS (host intrusion prevention) was supposed to work. The problem was that old HIPS tried to cover too much of the opening system (basically, everything) and, as a result, threw a bunch of false positives. Customers got pissed and stopped using it.

By focusing efforts specifically on the Big 7, it's a manageable task to build and maintain those profiles. You can tune the rules to find and block anomalous behavior in those applications and stop malicious activity. Conceptually, if you could prevent the Big 7 from being compromised and ensure that even when your employees do stupid things (and they will) it won't result in a pwned device -- that dramatically reduces your attack surface.

Notice I said "conceptually" above because the controls that implement these concepts are still maturing. It's complicated and requires significant ongoing research to keep the application profiles current. You need to pay attention to user experience and walk the tightrope between protecting the users from themselves and breaking their applications. Finally, these tools need better enterprise management, reporting, and policy capabilities to scale to protect thousands of users and devices. None of these issues are showstoppers; rather, they indicate the early stage of development for a promising technology.

These capabilities are being implemented in a number of different ways. Whether it's another "agent" that runs on the device watching for those non-normal behaviors, a microvisor that isolates processes within the operating systems, or an application isolation technology that runs the applications in protected enclaves, the approach is the same. These new defenses focus much of their efforts on the Big 7, and this will have a big impact on how devices are protected during the next few years.

Mike Rothman is President of Securosis and author of The Pragmatic CSO

About the Author(s)

Mike Rothman

Analyst & President, Securosis

Mike's bold perspectives and irreverent style are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike specializes in the sexy aspects of security, like protecting networks and endpoints, security management, and compliance. Mike is one of the most sought after speakers and commentators in the security business and brings a deep background in information security. After 20 years in and around security, he's one of the guys who "knows where the bodies are buried" in the space.

Starting his career as a programmer and a networking consultant, Mike joined META Group in 1993 and spearheaded META's initial foray into information security research. Mike left META in 1998 to found SHYM Technology, a pioneer in the PKI software market, and then held VP Marketing roles at CipherTrust and TruSecure - providing experience in marketing, business development, and channel operations for both product and services companies.

After getting fed up with vendor life, he started Security Incite in 2006 to provide the voice of reason in an over-hyped yet underwhelming security industry. After taking a short detour as Senior VP, Strategy and CMO at eIQnetworks to chase shiny objects in security and compliance management, Mike joins Securosis with a rejuvenated cynicism about the state of security and what it takes to survive as a security professional.Mike published "The Pragmatic CSO" in 2007 to introduce technically oriented security professionals to the nuances of what is required to be a senior security professional. He also possesses a very expensive engineering degree in Operations Research and Industrial Engineering from Cornell University. His folks are overjoyed that he uses literally zero percent of his education on a daily basis.

He can be reached at [email protected]. Follow him on Twitter @securityincite

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights