|By Vormetric Blog||
|January 7, 2015 10:00 PM EST||
What We Talk About When We Talk About Insider Threats
What does the term “insider threat” mean to you? It would be fair to assume Edward Snowden might be one of the first names or faces to pop into your head. Snowden was an insider, and he proved to be a threat. He also had malicious intentions.
But, you would be shortsighted in thinking that malicious insiders are the biggest risk to your data. While Edward Snowden may be considered the “insider threat” poster child, not all employees have malicious intentions. In fact, it’s likely the vast majority of your employees have completely innocuous intentions (after all, most of us like our paychecks and want to keep them coming!) Counted among those employees, however, are your “privileged users.”
Here at Vormetric, we define privileged users as high-level computer operators who often have powerful, privileged access rights. They can include – but are not limited to – root users, domain administrators and system administrators.
Simply by having access, privileged users may unwittingly put data at risk – or be used by an outside actor as a conduit for siphoning data. Unsurprisingly, privileged accounts are very attractive targets for attackers seeking to leverage access privileges for their own nefarious purposes. Therefore, it’s completely accurate to say that all privileged users – regardless of whether or not they have bad intentions – can be considered an “insider threat.”
Let’s take a look at a couple examples of high-profile data breaches and see where insider chips fell:
While there are still questions to be answered, CNN has reported hackers infiltrated the system by stealing the computer credentials of a Sony systems administrator. That’s right, a systems administrator. Although investigators have not ruled out the involvement of a malicious insider or former employee, they have not found evidence to indicate this was the case.
The ramifications for Sony from a financial, legal, and professional standpoint are unprecedented. Leaked information includes medical records, Social Security Numbers, birth dates, personal emails, home addresses, salaries, tax information, employee evaluations, disciplinary actions, criminal background checks, severance packages, and family medical histories.
Sony employees now suing the company for negligence have termed the hack an “epic nightmare.” This dramatic language is being echoed by Gartner cybersecurity analyst Avivah Litan, who believes the breach may very well be “the costliest ever for a U.S. company” and one that “went to the heart and core of Sony’s business.”
The attack also stirred unwanted memories for South Carolinians, which brings me to the next “insider” breach.
The South Carolina Department of Revenue
In October 2012, more than 3.3 million unencrypted bank accounts and 3.8 million tax returns were stolen in an attack against the South Carolina Department of Revenue. The attack started when a state employee responded to a phishing attack that enabled cyber criminals to use the employee’s (a privileged user) credentials, access the state’s databases, and steal sensitive data. While almost all of the credit and debit card numbers were encrypted, the social security numbers were not – leaving South Carolina citizens vulnerable to identity theft scams.
Did the employee intend for this to happen? No. Did the employee have access to a host of very critical, private data? Yes.
Where Do We Go From Here?
The breadth and depth of private and public sector breaches in the past few years further indicates there is a major disconnect when it comes to organization’s handling of data security – and how they treat insiders. Breach after breach we’ve seen insiders, or someone who has obtained insider privileges, wreak havoc.
Organizations that don’t properly control privileged user or system administrator access are setting themselves up for infiltration by malicious insiders or crafty outsiders looking to take advantage of the wealth of data at their disposal. Our 2013 Insider Threat data report found that only 27% of US organizations blocked privilege user access to sensitive data, whereas our 2014 European version of the report saw that number basically double. There is increased focus on the insider and their behavior within the organization, yet there is far too little emphasis on the data an insider can access with their privileged account access.
Here’s a hypothetical: an interviewee comes in with the desired experience and background a company is looking for, but they’re secretly hell-bent on eventually pulling a Snowden. Do you think it will be easy to identify them as a malicious insider during the vetting and hiring process? Smart agents aren’t going to give something away that would arouse suspicion; it’s pretty unlikely they will walk in brandishing, say, the North Korean flag or talking about their love of a Chinese competitor.
At the end of the day, once a malicious insider is in, he or she is in. What matters is the type of data said insider has access to.
This mantra also applies to non-malicious insiders. Like privileged user Susan up on the 9th floor. Susan, a systems administrator, is as loyal as they come. She feels passionate about her company, its ethos and her work. She’s smart, hardworking and would never intend to do something that would put company data in jeopardy.
While we can sing Susan’s praises all day long, it’s not her attitude that matters. It’s her access. It’s that she has the keys to her company’s kingdom, and if her company don’t have the proper precautions in place, there’s only so much she can do to hold onto them.
Compliance as a Crutch
“But, my company is up-to-date on compliance standards!” you say. Well, congratulations. You get to dodge government fines for at least another year. And by the way, so was Target.
If you really think being compliant means your data is safe, well, I have a bridge to sell you in China.
Since I’m on the subject of bridges, I’ll try to put this in terms that are easily understandable. Think of compliance as a bridge. It’s the bridge that allows your company to cross the water and enter into the castle. But, what’s protecting invaders from also crossing that bridge? That’s right, you need guards, and a moat, cannons, and maybe some dragons if you’re into that sort of thing.
My point is that compliance is not enough. It remains and will likely always remain a baseline standard for protecting information. But it should never be confused with security.
Oh, This Again: Encrypt Everything
If I sound like a broken record, it’s because this isn’t my first time at the rodeo. How many more of these breaches are we going to tolerate before we start to make changes to how we handle our data?
Back in October, I wrote a post about the strategy of “encrypting everything.” While I certainly won’t recap all of it, my opinion about the below adages remain the same:
- Realize that your data is the target, not your network. Yes – attackers do penetrate firewalls and exploit application security holes, but they do so to get to high value data, just as an inside attacker would
- Rein in your privileged users: if your employee doesn’t need access, they shouldn’t have it just because they have a certain title
- Solutions exist that allow you to restrict access to sensitive information while still giving privileged users to the tools they need to perform their work, such as encryption with access controls linked to your identity management systems
- While no company or CEO wants to discuss a data breach, having a broad-based “data first” protection strategy plays well from both a security and marketing perspective. It’s important to keep your fiscal and reputational house in order. If you need more assurances of this, I suggest you speak to a C-level executive at Sony, Target or Home Depot. While you’re at it, you might want to sit in on one of the many post-data-breach-government-oversight-committee-hearings on Capitol Hill. Pick your poison; you’ve probably got a few options.
Bottom line? With proper data controls, you can have your cake (sufficient use of privileged accounts) and eat it too (simultaneous protection of the data).
To close out, earlier I noted our 2013 Insider Threat report found that U.S. businesses were sorely lacking when it came to privileged user access restrictions. We’re excited to report we’ll soon be able to tell you if that statistic has changed in the past two years. But in the meantime, you’ll have to wait to just a little bit longer…
The post What We Talk About When We Talk About Insider Threats appeared first on Data Security Blog | Vormetric.
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
Mar. 29, 2017 12:15 PM EDT Reads: 7,866
SYS-CON Events announced today that Auditwerx will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Auditwerx specializes in SOC 1, SOC 2, and SOC 3 attestation services throughout the U.S. and Canada. As a division of Carr, Riggs & Ingram (CRI), one of the top 20 largest CPA firms nationally, you can expect the resources, skills, and experience of a much larger firm combined with the accessibility and attent...
Mar. 29, 2017 12:00 PM EDT Reads: 611
SYS-CON Events announced today that T-Mobile will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. As America's Un-carrier, T-Mobile US, Inc., is redefining the way consumers and businesses buy wireless services through leading product and service innovation. The Company's advanced nationwide 4G LTE network delivers outstanding wireless experiences to 67.4 million customers who are unwilling to compromise on ...
Mar. 29, 2017 11:45 AM EDT Reads: 2,556
SYS-CON Events announced today that Infranics will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Since 2000, Infranics has developed SysMaster Suite, which is required for the stable and efficient management of ICT infrastructure. The ICT management solution developed and provided by Infranics continues to add intelligence to the ICT infrastructure through the IMC (Infra Management Cycle) based on mathemat...
Mar. 29, 2017 11:00 AM EDT Reads: 3,407
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 20th Cloud Expo, which will take place on June 6-8, 2017 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 add...
Mar. 29, 2017 10:15 AM EDT Reads: 1,688
SYS-CON Events announced today that Cloudistics, an on-premises cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloudistics delivers a complete public cloud experience with composable on-premises infrastructures to medium and large enterprises. Its software-defined technology natively converges network, storage, compute, virtualization, and management into a ...
Mar. 29, 2017 10:00 AM EDT Reads: 2,327
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), will provide an overview of various initiatives to certifiy the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldw...
Mar. 29, 2017 08:45 AM EDT Reads: 921
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
Mar. 29, 2017 08:00 AM EDT Reads: 7,506
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
Mar. 29, 2017 06:00 AM EDT Reads: 9,062
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Mar. 29, 2017 04:00 AM EDT Reads: 15,114
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Mar. 29, 2017 03:45 AM EDT Reads: 2,162
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Mar. 29, 2017 03:30 AM EDT Reads: 3,253
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Mar. 29, 2017 03:00 AM EDT Reads: 6,096
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
Mar. 29, 2017 01:15 AM EDT Reads: 2,523
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
Mar. 29, 2017 01:00 AM EDT Reads: 1,131
In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects).
Mar. 28, 2017 11:15 PM EDT Reads: 3,529
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Mar. 28, 2017 09:30 PM EDT Reads: 3,912
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, will discuss some of the security challenges of the IoT infrastructure and relate how these aspects impact Smart Living. The material will be delivered i...
Mar. 28, 2017 09:30 PM EDT Reads: 2,268
SYS-CON Events announced today that Ocean9will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Ocean9 provides cloud services for Backup, Disaster Recovery (DRaaS) and instant Innovation, and redefines enterprise infrastructure with its cloud native subscription offerings for mission critical SAP workloads.
Mar. 28, 2017 08:15 PM EDT Reads: 2,393
Your homes and cars can be automated and self-serviced. Why can't your storage? From simply asking questions to analyze and troubleshoot your infrastructure, to provisioning storage with snapshots, recovery and replication, your wildest sci-fi dream has come true. In his session at @DevOpsSummit at 20th Cloud Expo, Dan Florea, Director of Product Management at Tintri, will provide a ChatOps demo where you can talk to your storage and manage it from anywhere, through Slack and similar services ...
Mar. 28, 2017 07:00 PM EDT Reads: 4,562