Wed, 10 May 2017
Episode 195 - Annual Policy Review - Making It Worthwhile
- Define policy vs. standards vs. procedures
- What is a Policy? It is a guiding principle to set the direction of an organization. High level, governing, statements. Do not include technical details.
- Example: Policy statement = Users must authenticate with a unique ID and password
- Standard: User passwords must be: # of characters, include one uppercase letter, one special character, be at least 10 characters in length. This type of information would go into an Access Control Standard.
- What is a Standard? Standards support the policy, make it more meaningful and effective.
- What is a Procedure? A procedure is a step by step, how to guide to which is consistent with the end result being the same. These are the steps for configuring your firewalls, setting up a new user, building a server, etc.
- Every policy guide everywhere says you need to review your policies regularly which almost always means annually.
- Failure to do the annual review can get you in hot water with your regulator and/or auditor.
- It just Makes Sense.
- Why review your policies?
- It’s the one time a year you can nudge the organization where it needs to go
- Past Problems
- Current Issues
- Future Challenges
- Killing off/modifying policies that get in the way of people doing work will Make Friends And Influence People
- There is no better way to ensure your team is working on what needs to be worked on than aligning with stated policy.
- Making Sense of Policy Review
- Alert The Approvers
- Line Them Up
- Divide and Conquer
- Bring The Business Into The Process
- Internal Audit
- Corporate Security
- Marketing / Public Relations
- As Needed Bring In
- Change Crosswalks FTW
- Communicate, Communicate, Communicate.
- The Review Process
- Have a process to deal with questions. Route questions to the authoritative source for an answer - don’t answer stuff you can’t/shouldn’t
- Make sure what is being added is enforceable. This is a legal document and can be used in court. Statements support what is being done today, not what you would like to do or wish the program would do in the future.
- Go back to those “parking lot” statements that were not added or removed from a draft because you couldn’t enforce them at the time. Can they be added? Don’t lose sight of them if they are important to your security program
- Does the corporate culture / C levels support statements in the policy? As a security practitioner you may firmly believe that your security program must abide by certain policy statements but the corporate culture or your CEO/CFO even CISO may not support it. They may become “parking lot” items for a future version or you may be able to successfully display that the program can support that statement without affecting the culture.
- Legal is an important reviewer. It feels nitpicky during the review but Legal knows when “should” and “must” are appropriate.
- Don’t reinvent the wheel. ISO 27001 is a good framework for your policy. Use it. Don’t try to come up with statements because you think you have to appear to be an Info Sec Policy God. KISS!
- Don’t write standards and procedures in your policy! We’ve reviewed countless policies that had what we’d consider a standard or “step by step instructions for making firewall changes. That’s a procedure! Keep it out of your policy.
Direct download: SFS_Podcast_Ep_-_195.mp3
-- posted at: 8:21pm EDT
Wed, 26 April 2017
Evaluating Security Product Vendors
In light of recent news about “Vendors Behaving Badly” we want to talk about how a security professional should evaluate vendors and their products.
Tanium exposed hospital’s IT while using its network in sales demos: https://arstechnica.com/security/2017/04/security-vendor-uses-hospitals-network-for-unauthorized-sales-demos/
Lawyers, malware, and money: The antivirus market’s nasty fight over Cylance: https://arstechnica.com/information-technology/2017/04/the-mystery-of-the-malware-that-wasnt/
- There are so many different sources of information about vendors and their products. You owe it to yourself to evaluate not just the vendor but also each source of information.
- Analyst Firms: Gartner/Forrester/etc
- Always remember they take a very generic view using a notional enterprise as the standard.
- Current customer interviews are important but, remember, those customer contacts likely came from the vendor.
- The perception of “Pay for Play” is there no matter how much the firms want to squelch that.
- These tests presume a lot so make sure you understand what the conditions of the test were.
- The “Pay for Play” perception exists here too….
- The results of the testing aren’t specific but can help show outliers in a group
- 3rd Party Testing: NSS Labs, etc.
- Obviously your best and most relevant source of information. :-)
- If you have developed a reliable network of peers you can reach out and ask folks. But, remember, buy them a beer for their troubles…
- Always remember perspective is everything. Some people just don’t like Company_Z and will always hate their products.
- Information Sources
- Start with 3rd party data and demos. This will determine if your requirements (you did write out your requirements, right?) are met by the product
- Do not allow the vendor to drive the definition of “success” in a PoC
- Try to break it. I mean REALLY try to break it.
- Remember during the PoC is going to be the best support and interaction you will ever get. If that sucks you might want to move along.
- Test *all* of your use cases. (you do have documented use cases, right?)
- Do a PoC (Proof of Concept).
- Product Evaluation Rules
- Service providers such as penetration testers and MSSPs
- Edge Cases
Direct download: SFS_Podcast_Ep_-_194.mp3
-- posted at: 9:53pm EDT
Thu, 13 April 2017
Tonight's episode is all about those learning moments.
CISOs and security orgs find new and interesting way to screw up all the time. Leaving that Any-Any rule in place on the new firewall… Disabling the CEOs account by accident… Not realizing that Shadow IT had just installed a new egress point…
Here are our stories. The name have been changed to protect the culpable.
Direct download: SFS_Podcast_Ep_-_193.mp3
-- posted at: 10:02am EDT
Wed, 15 March 2017
Today's Topic: Security Waste - Buying new tools without maximizing use of current tool set
It’s not just a security problem but we often add to our arsenal without fully (or even mostly) utilizing the tools that we do have.
Problems associated with this are:
- Have more complexity in your environment
- Needing more staff or requiring current staff to stretch themselves thin to support differing tools
- Increased cost (capital, operational, support)
- Information overload - even with a SIEM more data requires more analysis
- Increased chance of missing key events
- Increased false positives
- What am I missing?
How do we work through this when you’re not the decision maker?
- “Operational Excellence” - Martin’s story
How do we work with our vendors to ensure that we are leveraging their tools without over dependence on one tool or vendor?
Direct download: SFS_Podcast_Ep_-_192.mp3
-- posted at: 9:02pm EDT
Wed, 1 March 2017
The Southern Fried Security Podcast - Episode 191 - Gone Phishin’
Phishing your employees - Does it make them aware or do they feel mistrusted?
- Intro - Phishing - what is it typically?
- Example - Emails from a Prince in Nigeria, phished on Match.com, etc
- What is it? An email designed to get employees to click on suspicious links or give their credentials
- Discuss what I designed as part of my phishing campaign - Partnered with trusted vendor
- Designed an email, google doc, supplied AD user list, launch
- Stats from our phishing campaign
- How GMail caught it and started dumping the emails into spam but some employees even went into spam and clicked (RSA breach!)
- Employees used Slack to warn others. Can you avoid neighbors leaning over the cube telling each other? Is this when “see something, say something?” becomes a good thing? How to get employees to follow it?
- What about when you phish your employees to improve security?
- How often?
- Do you target specific areas you know are susceptible (Ex - Marketing, Finance)
- What about Engineering? How do you trick them?
- What are the benefits of a targeted phishing campaign?
- Start with education first. Then to sanctions.
- Use to teach - not ridicule.
- C-Levels *have* to be part of it.
- How do you prevent employees from feeling that Security doesn’t trust them?
- People are still the weak link! Solutions and hardware can’t prevent that one user from clicking on a link that creates havoc for the company.
- We blow holes in security to allow Phish email through. What if vendor gets compromised?
Direct download: SFS_Podcast_-_Episode_191.mp3
-- posted at: 6:55pm EDT
Tue, 14 February 2017
Episode 190 - Burnout
- Why the topic of burnout?
- Because it affects all of us, and yet it’s not talked about much in this field
- Disclaimer: We am not a doctor. Or a psychiatrist or psychologist. Nor did we stay in a holiday inn express...
- Reason for sabbatical
- Martin’s story
- Personal Connection
- Symptoms may mirror depression
- “The Creeping Malaise”
- Panic Attacks, etc
- Isolation - even while in a crowd
- Physical symptoms
- It’s been around for a long time. http://www.secburnout.org/ & http://www.slideshare.net/secburnout/burnout-in-information-security are from 2011/12
- Recognizing Burnout
- “It won’t happen to me”
- “I just have to make it through this busy season and this end of quarter and the end of FY and…”
- “Everybody else is exactly the same…”
- Conferences are not vacations and shouldn’t be seen that way. Cons can be very hard work.
- Easy Traps
- Outdoor hobbies
- Just get outside and away from screens
- A physical, people you can talk to in person community
- Exercise & diet
- Creating and enforcing boundaries (emotional and physical)
- Mitigation Strategies
- Not liking your job or employer (that’s quite the opposite problem, actually)
- Just hard work for a little while
- What burnout isn’t…
Direct download: SFS_Podcast_-_Ep_190.mp3
-- posted at: 6:35pm EDT
Wed, 8 February 2017
In this inaugural bonus track we release the interview we did with Nick Selby (@nselby) on his experience validating the work of MedSec on St. Medical devices.
Direct download: SFS_Podcast_-_Episode_189_Bonus_Track.mp3
-- posted at: 7:55am EDT
Tue, 31 January 2017
SFS Podcast Episode: 189
Medical Device Security
- Hospital devices (infusion pumps, CT, MRI, etc)
- Personal devices (pacemaker, insulin pumps, etc)
- Medical Devices are a broad category
- Discussion of Sentinel Events...
- This has some of the same threat landscape as the IoVCT, but the consequences can be much more serious.
- Lead times for device approval
- Fixed configurations / FDA compliance
- Working life of devices
- “Well just replace them all!” Cost of devices (esp for small/struggling hospitals)
- Sheer number of devices can be overwhelming when looking to upgrade/replace
- Vendors that bring in things for a trial w/o involvement of IT/IS
- Challenges to Fixing The Problem:
- Vuln Disclosure
- Muddy Waters / St Jude
- Problem there wasn’t disclosure it was the look of the profit motive
- August 25, 2016 > http://www.muddywatersresearch.com/research/stj/mw-is-short-stj/
- SJM sued in early September >> http://www.wsj.com/articles/st-jude-medical-sues-short-seller-over-device-allegations-1473258343
- Goes beyond Vulnerability Disclosure and Muddy Waters claims SJM is attacking their First Amendment - Right to Free Speech - rights >> https://www.bloomberg.com/news/articles/2016-10-24/muddy-waters-fights-st-jude-lawsuit-over-pacemaker-reports
- Muddy Waters report from Bishop Fox >> http://www.reuters.com/article/us-st-jude-medical-cyber-muddywaters-idUSKCN12O1O1
- Bug Bounties
- FDA Task Force - http://www.fda.gov/NewsEvents/Newsroom/PressAnnouncements/ucm481968.htm
- I Am The Cavalry - https://iamthecavalry.org/oath
- HIMSS Cyber Security Community - http://www.himss.org/get-involved/community/cybersecurity
- Archimedes Center for Medical Device Security - https://secure-medicine.blogspot.com
- NH-ISAC - http://www.nhisac.org/
- MDISS - http://www.mdiss.org
- Other interest groups
- Other groups
- How Can it Get Better
- Sometime, somewhere, somehow something bad is going to happen and somebody is going to die.
- There will need to be more market pressure - http://thehill.com/blogs/congress-blog/technology/278712-a-new-narrative-on-cyber-security
- What will regulators do? (eg DLink and the FTC)
- What’s the Future?
- Outro & Credits
Direct download: SFS_Podcast_-_Episode_189.mp3
-- posted at: 7:56pm EDT
Tue, 22 November 2016
Andy and Martin close out 2016 with a quick run through of the major stories of the year and look forward to what's to come in 2017.
Thanks to everyone who came to BSides Atlanta!
Direct download: SFS_Podcast_-_Episode_188.mp3
-- posted at: 11:10am EDT
Mon, 24 October 2016
Martin, Steve, and Yvette discuss the recent DDoS of the DNS provider Dyn and what information security people should be considering in a world where terabit DDoS is a reality.
Direct download: SFS_Podcast_-_Episode_187.mp3
-- posted at: 8:10pm EDT