Category Archives: Security

Ex-Vormetric Execs Start High Cloud

Bill Hackenberger (VP of Engineering at Vormetric) and Steve Pate (CTO at Vormetric) quit the company in 2009 and have now started…an encryption company. Steve Pate also claims to have been a founder of HyTrust, which could explain why they have named their new company High Cloud.

They are offering “early access to a Beta version of our solution” (early Beta = Alpha?) so they are far from ready for prime-time, but they appear to be in the right mindset and offer a variation of proxy architecture, similar to HyTrust. Here is a diagram presented by the CTO in 2008 that has a dedicated/physical key management server.

They list the capabilities that auditors have been asking for from cloud providers for years…the following functionality, for example, maps to some of the old text of PCI DSS compliance requirements.

  • Selected elements of the VM are encrypted.
  • VMs are encrypted in storage, in transit, and in backups.
  • VMs are protected in the data center, outside when run on a remote server, or in the Cloud.
  • Keys are not visible to anyone.
  • Separation of duties guarantees that no single person can cause catastrophic damage.
  • Key rotation to satisfy regulatory bodies is performed automatically without the need to shut down the VM.

Although I have to say, the line “keys are not visible to anyone” is poorly written and suggests vaporware. I would have expected better given how long the founders have been in the industry and the text provided by regulatory bodies. Here are the PCI DSS Requirement 3.5 testing procedures, for reference.

  • 3.5.1 Examine user access lists to verify that access to keys is restricted to the fewest number of custodians necessary
  • 3.5.2.a Examine system configuration files to verify that keys are stored in encrypted format and that key-encrypting keys are stored separately from data-encrypting keys.
  • 3.5.2.b Identify key storage locations to verify that keys are stored in the fewest possible locations and forms.

The regulations will specify need-to-know, not invisible to anyone. I also noted a mistake in reference to the ISO requirements. It’s still early so maybe these issues will be worked out by the time they have a non-early Beta available.

Breaches Down for Third Year

A quick look at the all time datalossdb.org chart of breaches tells you something is up with the data…or down.

The past several conferences I have presented at I explain why the breaches are down but attacks of a certain type on a certain industry are up. But maybe I should start a series called ZOMG BREACHES DOWN 40% FROM 2008, given today’s bone-rattling story from the Washington Business Journal called “Computer security incidents reported by federal agencies increase 650%”

Federal agencies reported more than 40,000 security incidents that placed sensitive information at risk during 2010 — a 650 percent increase compared to five years ago, according to a new report from the Government Accountability Office.

First of all, I think it’s fantastic that more incident reporting is happening and the GAO is on top of reporting progress to the public. But that doesn’t mean a reporter should just throw that number out unwashed and imply the incidents “placed sensitive information at risk”.

Such an implication will confuse readers including me because…second of all, their very next paragraph says incidents are a very, very broad area of concern way beyond just risk of disclosure.

…”security incidents” don’t always equate to an all-out breach. (According to US-CERT, they include successful and failed attempts to gain unauthorized access to a system or its data, unwanted disruption, unauthorized use of a system for the processing or storage of data, and changes to system hardware, firmware, or software characteristics without the owner’s knowledge.)

The big story is that the GAO is seeing the kind of curve in data that the datalossdb project saw right after 2004, the year following the California Breach Notification Law SB 1386. I could talk all day on what we have learned since then about breaches and reporting incidents since 2003. But let’s just say I am disgruntled to see in 2011 a reporter would toss out a headline grenade of 650% increase in incidents while ignoring that overall breaches (not incidents reported, breaches) are in decline.

Here’s a classic quote

The four most prevalent types of security incidents reported to US-CERT during fiscal 2010 include the detection of malicious code, improper usage and unauthorized access, and detected anomolies that warrant further review.

I see that as three types of security incidents and an additional category of stuff not yet figured out. Imagine if the headline was instead reporting a 650% increase in stuff not yet figured out.

Update: I should have also mentioned my earlier post that California has taken a big step forward again with SB 24 and the push for a centralized breach data repository. This issue just came up again at the federal level and the emphasis is clearly on better oversight.

If you can read past the unsubstantiated barking by fearful politicians about “precedent in history for such a massive and sustained intelligence effort” (you obviously don’t have to know history to get elected) there are some actual good nuggets like this advice from RSA

Asked for suggestions on improving U.S. cybersecurity, [Art Coviello, executive chairman of RSA Security] called on Congress to pass a national data breach notification law, and he called on the U.S. government to share more information about cyberattacks with private companies. A quicker method of sharing information between the government and businesses is needed, he said, because in a large majority of successful cyberattacks, businesses don’t know they were breached until the U.S. Federal Bureau of Investigation or some other third party tells them.

A national breach notification law would help reduce much of the confusion about attack source and consequences; perhaps it would even allow us to better settle the debate over what constitutes a “sophisticated” attack. Speaking of RSA, see you all next week at the conference where I’ll discuss many of the above issues.

FOX News Gets Stuffed on Wall Street

The FOX reporter seems unprepared and hesitant in the following video posted by the New York Observer (a paper founded by a former investment banker).

He does a horrible job asking questions and lobs glacially-slow softballs to a man from the Occupy Wall Street protest. No surprise then who dominates the topic, but how well the protestor dominates it is a surprise. It looks so lopsided it’s like the whole thing was staged; maybe they kidnapped a FOX reporter and forced him into an awkward moment.

FOX starts by asking if protests in America are just a copy-cat movement, part of an international conspiracy

Your colleague, she’d seen the protests in Greece and Europe and elsewhere. Did you guys take your cue from that? Are you hoping to cite certainly what was a lot of the tension, if not police activity. I know over the weekend there were over 100 arrests and you guys got things fired up. Are you taking your cues from the international movement and how do you want to see this? If you could have it in a perfect way, how would it be?

And then the protestor retorts with a cruise missle of logic that obliterates the reporter’s question on every angle

its really difficult to answer questions leading to those conclusions. I’d say that we didn’t take our cue leading off of anybody really. It became a more spontaneous movement. As far as seeing this end, I wouldn’t like to see this end. I would like to see the conversation continue. This is what we should have been talking about in 2008 when the economy collapsed. We basically patched a hole on the tire and said let the car keep rolling. Unfortunately it’s fun to talk to the propaganda machine and the media especially conservative media networks such as yourself, because we find that we cant get conversations for the department of Justice’s ongoing investigation of News Corporation, for which you are an employee. But we can certainly ask questions like you know, why are the poor engaging in class warfare? After 30 years of having our living standards decrease while the wealthiest 1% have had it better than ever, I think it’s time for some maybe, I don’t know, participation in our democracy that isn’t funded by news cameras and gentlemen such as yourself.

It would appear that FOX is no longer in the hen house.

Note: also interesting to see someone protesting Wall Street in a forage cap. Maybe it is a sign of interest returning to the People’s Party and the great bank bail-out of 1893.

Panic in 1893

Similar to the Panic of 1873, this panic was marked by the collapse of railroad overbuilding and shaky railroad financing which set off a series of bank failures. Compounding market overbuilding and the railroad bubble, was a run on the gold supply (relative to silver), because of the long-established American policy of bimetallism, which used both silver and gold metals at a fixed 16:1 rate for pegging the value of the US Dollar.

Has someone yet adapted the Wizard of Oz secret story to the modern context? What would we have today instead of Dorothy’s silver shoes (silver standard) and the Wizard’s yellow brick (gold standard) road?

USCG seizes squid boat after failed identity test

News from the waters near Alaska. A large fishing boat about 3,000 miles from the coast of Alaska was asked to identify itself was unable to do so. It was seized by the US Coast Guard but not brought to shore because of a rat infestation.

The vessel Bangun Perkasa didn’t have a valid flag state registration, and Coast Guard spokeswoman Lt. Sara Francis said it was seized Sept. 7 as a stateless vessel for allegedly violating U.S. laws.

[…]

…crewmen were trying to dump the net when the Coast Guard boarded the ship about 2,600 miles southwest of Kodiak. The Coast Guard retrieved the net, and then found 30 tons of squid and 30 shark carcasses on board, she said.

Officials did not find proper documentation on board, however.

“No license or permits, and no records of their catch,” Francis said.

The Coast Guard also discovered rats on board.

30 tons of illegal squid! That’s just what they kept on board. Illegal giant drift nets kill huge numbers of fragile marine life so who knows what the true toll was. Whales and turtles are devastated by these boats.

Dumping 10 miles of net like a piece of garbage overboard also is an incredibly malicious maneuver. All that aside I find the most interesting part of this story in the failure to provide a valid certificate and then the failed authentication process.

The ship’s crew initially claimed Indonesia as their flag state.

“When we contacted Indonesia, they said, ‘Nope, not ours,'” Francis said. “They became flagless at that point, and that’s when we seized them.”

Although, in terms of analysis, I also find this part amusing

“Given the catch they had, I would assume they were a squid boat.”

Not a rat boat?