Category Archives: Security

Time to encrypt internal traffic?

The article in the WSJ seems to accuse the PCI of lacking sufficient security.

In both the Hannaford and Okemo heists, hackers attacked an area that previously had been thought impenetrable — a company’s private internal computer network. Many previous breaches involved wireless network systems.

PCI mandates that all transaction data sent over networks that are publicly accessible — such as in coffee shops — be encrypted, but it doesn’t require that for transmissions over internal private lines.

At Hannaford and Okemo, hackers managed to install malicious software into the companies’ private networks to steal credit-card information being transmitted to processors for approval.

Previously thought impenetrable? By whom? Everyone I know who is familiar with PCI, or even general security audits for that matter, has been talking about the perimeter fallacy for more than a decade.

More to the point, why does the PCI specify public networks only? It is hard to guess motive without speaking to the authors, but the reality is that you have to start somewhere. The authors made many omissions and mistakes, but the standard is a starting point and it has unquestionably had a positive impact in many areas of security.

Don’t try to boil the ocean.

In addition to the slow pace of security progress in the world of credit card commerce, compliance success should not be an end but rather a starting point. Every time I drive my car I wonder who on earth gave the other drivers their license. Similarly, each time we shop at a store we place ourselves (e.g. our financial identity) in the hands of a management team that we usually can not see or judge ourselves. A company might have achieved various compliance awards (e.g. technical ability, process maturity, cleanliness, credit-card security) but we should not forget that “compliant” and “well-managed” are not intrinsically the same.

The good news is that the bar is rising.

In January, Visa announced that 77% of its largest U.S. merchants became PCI compliant in 2007, up from 12% in 2006. Compliance among midsize merchants grew to 62% last year from 15% the year before.

This means the “above and beyond” internal traffic encryption might be a worry, but if 33% of the largest merchants still are not PCI compliant then there are still a whole lot of companies not even reaching baseline measures in multiple areas.

Did you notice the detail in the Hannaford and Okemo cases suggests that internal computers were compromised via malicious software?

At Hannaford and Okemo, hackers managed to install malicious software into the companies’ private networks to steal credit-card information being transmitted to processors for approval.

So here are alternative solutions, perhaps more practical for most retailers: segment sensitive data from systems that have public/Internet access, monitor for malicious/unauthorized software being installed, and block control/command communication to non-authorized systems (e.g. proxy the traffic and inspect packets).

Don’t get me wrong, I have long advocated for internal encryption of sensitive data when it is in transit. In fact, I led the design and deployment of exactly such a system for a retailer several years ago. That work led me to the OASIS EKMI project where I work with others on a global standard so the encryption of internal traffic will be made even easier/cheaper.

However, I also understand that there are areas where this is an impracticality today (e.g. no standards) or another control is better suited to solve the same problem.

After reading the WSJ version of events, I find it sad that host-based monitoring was not mentioned at all.

Eventually people may realize that there is no silver bullet to achieving compliance in information security.

Is there a silver bullet for keeping a kitchen clean or being a good driver?

False hope is everywhere, even in the “big name” analysts:

“This kind of attack would not have been possible if the credit-card data had been encrypted,” says Avivah Litan, a security analyst for Gartner Inc. in Stamford, Conn.

Sorry Gartner, that’s not a fair assessment. Why? Because even with encryption, the keys have to be managed properly. And without baselines for good management infrastructure or standards, the probability of a company going “above and beyond” to protect their keys is very low. So this kind of attack would have only had one or two additional steps to execute the same vector successfully.

The real problem, IMHO, is that a system was compromised within the company and no one noticed in time to stop it from reaching sensitive data. Event monitoring and correlation, as well as the host and network-based controls mentioned above, need to be in the picture.

Microsoft General Counsel Compares Windows Success to Urban Crime

Oh, ok, not really. But close…

He actually says the “digital population growth” is the problem.

Microsoft General Counsel Brad Smith used the rapid urban population growth in the 19th century to illustrate how COFEE is supposed to work. As more packed cities led to an increase in urban crime, digital population growth today creates the same nooks and crannies for the seedier elements of a society. Microsoft’s goal in partnering with various law enforcement agencies is to give police officers more effective tools for peering into such dark spaces; hopefully preventing predatorial attacks before they begin.

Not sure about you, but a more appropriate analogy for COFEE might be a safe manufacturer selling backdoor keys to “partners”.

Seriously, though, this is a sales/marketing strategy to provide a sense of security? It’s like Microsoft might actually believe the broken-window theory of economics works, rather than being a fallacy. I mean who qualifies as a partner?

Here’s a real gem from the Microsoft marketing team:

One area we are clearly having successes in is our work to identify and anticipate new trends in cybercrimes.

Really? Would those trends have anything to do with operating systems that are released to the public full of security bugs and weak configurations?

At least they came up with a cute acronym. Everybody loves coffee.

How the FDA squashed the miracle berry

This is not about the Blackberry. A conspiracy-theory laden report in the BBC tells how the US sweetener (corn?) industry manipulated the FDA to crush competition:

Legal advice and contact with the FDA had led Harvey to believe that the extract from the berry would be allowed under the classification “generally recognised as safe”. Having been eaten for centuries in Africa, without anecdotal reports of problems, it could be assumed not to be harmful.

But the FDA decided it would be considered as an additive which required several years more testing. In the poor economic climate of 1974, this could not be funded and the company folded.

“I was in shock,” says Harvey. “We were on very good terms with the FDA and enjoyed their full support. There was no sign of any problem. Without any opportunity to know what the concern was and who raised it, and to respond to it – they just banned the product.”

One might also suspect Harvey was naive, or there was a general lack of planning on his part, or his financial backers threw in the towel. However, other aspects of the story suggest industrial interference played a role.

A car was spotted driving back and forwards past Miralin’s offices, slowing down as someone took photographs of the building. Then, late one night, Harvey was followed as he drove home.

“I sped up, then he sped up. I pulled into this dirt access road and turned off my lights and the other car went past the end of the road at a very high speed. Clearly I was being monitored.”

Finally, at the end of that summer, Harvey and Emery arrived back at the office after dinner to find they were being burgled. The burglars escaped and were never found, but the main FDA file was left lying open on the floor.

A few weeks later the FDA, which had previously been very supportive, wrote to Miralin, effectively banning its product. No co-incidence, according to Don Emery.

“I honestly believe that we were done in by some industrial interest that did not want to see us survive because we were a threat. Somebody influenced somebody in the FDA to cause the regulatory action that was taken against us.”

All questions of “if you suspected foul play why didn’t you plan to defend yourself” aside, I have to wonder why it was only a product marketed for the US. Barclays was a backer, so surely they were aware of market options in Europe, let alone Asia.

CA regulates cell-phone use in cars

Cell-phones will be regulated in CA for drivers starting July 1, 2008:

The first [law] prohibits all drivers from using a handheld wireless telephone while operating a motor vehicle, (Vehicle Code (VC) -23123). Motorists 18 and over may use a “hands-free device.” [The second law states] drivers under the age of 18 may NOT use a wireless telephone or hands-free device while operating a motor vehicle (VC -23124).

The Q&A section is fascinating. Note that texting and dialing are not regulated, only speaking with one hand next to your head.

Q: Does the new “hands-free” law prohibit you from dialing a wireless telephone while driving or just talking on it?
A: The new law does not prohibit dialing, but drivers are strongly urged not to dial while driving.

“Strongly urged”? Compliance authoring is definitely not an exact science.

Q: Will it be legal to use a Bluetooth or other earpiece?
A: Yes, however you cannot have BOTH ears covered.

Q: Does the new “hands-free” law allow you to use the speaker phone function of your wireless telephone while driving?
A: Yes.

Q: Does the new “hands-free” law allow drivers 18 and over to text message while driving?
A: The law does not specifically prohibit that, but an officer can pull over and issue a citation to a driver of any age if, in the officer’s opinion, the driver was distracted and not operating the vehicle safely. Sending text messages while driving is unsafe at any speed and is strongly discouraged.

Texting is surely more dangerous than speaking, as is dialing. I guess it’s a start.