Subversive Music

Posted September 14th, 2007 by

They just don’t make bands like this anymore. Anyway, the Talking Heads are still relevant even today: “We got computers. We’re tapping phone lines. You know that that ain’t allowed.”

I think one day we’ll all wake up to find out that the security industry has just been rehashes of Talking Heads songs all along and that nobody has had an original idea since 1982.



Similar Posts:

Posted in Odds-n-Sods, The Guerilla CISO | 5 Comments »

Backhanded Compliments

Posted September 13th, 2007 by

We’re laying people off, have been for several months. It makes life interesting–IT operations has high churn anyway (over half of the NOC staff was hired in the past 9 months), much less worrying about managing attrition for all the people you are chopping off the bottom of the heap. At any rate, we’re all constantly evaluating our chances of getting the axe on the next go-around. It’s all based in morbidly fascinating metrics and superstition, like how I imagine troops were in the days before the Normandy invasion.

I was told the following today by the manager for our server team:

Rich: “We’re never going to lay you off because nobody wants your job.”

Me: “Well, what if we decide that my job doesn’t need to be here?”

Rich: “You save us more than we pay you for your salary several times over. If we get rid of you, we’ll be spending 3 times your paycheck paying for all the things we got caught on during the next audit.”

Me: “Uh, thanks.”

I’m still not sure that having a job that nobody wants to do is a good thing. =)



Similar Posts:

Posted in Odds-n-Sods, The Guerilla CISO | 4 Comments »

Yet More Security Controls You Won’t See in SP 800-53

Posted September 12th, 2007 by

MP-52 Self-Destructing RFID Implants
Control:
The organization equips all employee-integrated storage media with self-igniting RFID devices so that they can be tracked throughout any government facility and destroyed upon command.

Supplemental Guidance:
All CISOs know that the information inside their employees’ heads is the real culprit.  When they get a new job, they take that information–all learned on the taxpayers’ dime–with them.  This is a much bigger security risk than the data on a USB drive could ever be.  Instead of denying the obvious truth, why don’t we implement security controls to minimize the impact of out-of-control employees?

Control Enhancements:
(1) The organization destroys the information inside an employee’s head when the employee leaves the organization, much like hard drives need to be degaussed before they are sent for maintenance.
Low: MP-52 Moderate: MP-52(1) High: MP-52(1)



Similar Posts:

Posted in BSOFH, FISMA, NIST, The Guerilla CISO | 3 Comments »

Blow-By-Blow Commentary

Posted September 7th, 2007 by

Now that we’ve talked you through building your own business reference model and building a data criticality matrix, we’re now going to tie it all together and give you the one true secret of information assurance: matching it all up with a security control baseline.

Now the way that NIST has things set up, it works like this:

  • Determine the data types (BRM and SP 800-60)
  • Determine the criticality for each data type (SP 800-60 and FIPS-199)
  • Selecting a security control baseline (SP 800-53)
  • Tailoring like a madman

We just did the first 2 steps. Now on to select a control baseline. In the NIST world, it’s easy: pick the right appendix (low, moderate, and high security control baselines) from SP 800-53 and get busy. The part that you don’t see is where NIST took all the applicable regulations and mushed them together into one solid catalog of controls to make it easy for you: do you want vanilla, chocolate, or rocky road? They added in internal controls (ala SoX), regulatory controls from laws like the Privacy Act of 1974, and controls from similar frameworks like BS7799. I should probably say “best practices” in there somewhere but I don’t believe in saying that phrase so I won’t. =)

But we’re now guerillas slaving away in the jungles of information assurance, we cut corners where we need to, and take more time than usual when we need to. We’ve gone fast and furious so far, but this is one step where we don’t need to go fast because what we do next directly determines how much money we spend. Because now we’re going to match up security needs and control requirements into something buildable. We’re going to do some regulatory c*mpliance tracing and control tailoring.

Now have a look at the data criticality matrix we made. See where I started to identify where the various data locations are? This is important, let’s take a look at these columns. Take a system, say, the Knowledge Management System. It’s Column Y, and it can be either a single server, a group of servers, or a whole DMZ set up exclusively for knowledge management–it doesn’t matter as long as we in the end tie it back into pieces of hardware and/or software. It doesn’t have client or incident data on it, which is a good thing. It does have HR data on it (really, what were we thinking when we put it there?) so the overall categorization of the system is MML and the system itself has to c*mply with SoX, Breach Laws, and our internal information security policy. That’s nice, we can deal with that–it’s better than doing Breach Laws for every IT system we have, no matter how big or small.

Need more examples? How about Column X, the Trouble Ticket System. It has trace amounts of client mission data and security incident data which happen to end up there–usually from the help desk who put it in there when a user calls in with a problem or when a tool captures the content of a TCP/IP packet when it triggers on an event like an IDS signature match. Since this is trace amounts of data, what I do is as the client if they are concerned about it. Usually they’re not–the data is not in a high enough aggregate to warrant any kind of controls above and beyond what I do for all my systems–anything else just isn’t that cost-effective to worry over.

One more trick of the trade: identify the governance drivers that apply to all the systems on your matrix. You’ve now just identified the common controls that need to be built for every system no matter what.

Now for each IT system/asset that we’ve identified (and the set of common controls), we can make a list of all the controls that that system has to have, then tailor those to engineering requirements that we can build. I have the start of an example in the CISO Book of Death under the tab “System 0001 Control Matrix”. Basically you put the control objective, where it comes from, and how you intend to build it. It’s exactly like a requirements traceability matrix only with some security words thrown in there. One pet peeve of mine: don’t call security controls requirements, you just confuse and frustrate the people who have to build them.

Now think about it for a minute. Why do we do all this? Well, somewhere in there is savings on licenses, hardware, redundancy, and audits because we just learned how to scope security controls. Less is always better, and what we’ve really done is to tell us where we need more security and where we need less.

Take a step back and guess what? We’ve now just reverse-engineered the beginning to the FISMA approach to information security:

  • Break the enterprise down into bite-size pieces
  • Determine criticality for each piece
  • Determine security control requirements for each piece
  • Determine something buildable and testable for each control requirement via tailoring and further definition
  • Test to see if all the controls have been built
  • Plan to fix the controls that don’t exist or are broken

But you all knew this was where we were headed with this business, didn’t you? The naysayers can now comment on how FISMA and Certification and Accreditation sucks. =)

I also think that maybe I need to spend some more time fishing because I’ve spent way too much time thinking about the BRM and data types.  Sounds like a plan for this weekend.



Similar Posts:

Posted in FISMA, The Guerilla CISO, What Works | 4 Comments »

And in This Corner, Special Publication 800-60

Posted September 6th, 2007 by

Remember the last post I did about the Business Reference Model? If you don’t, go read it now. We’re about to get freaky on it.

Have you ever had a chance to give everybody the opportunity to categorize their business functions for confidentiality, integrity, and availability as high, moderate, and low ala FIPS-199? You’ll know the effect if you’ve ever had to build a corporate website–everybody wants a link on the front page. The purchasing team wants a link on the front page so that prospective vendors can reach them, the HR people want the entire corporate employees’ manual online.

It’s a little organizational behavior factoid: everybody thinks that the silo that they operate in makes the business run. Translate that into security and we’ll find out that, left to their own devices to determine criticality, every business department lists its IT systems as high-criticality. Don’t tell my HR department, but if the personnel management system disappeared for a week, we would still continue to monitor networks. Even if the payroll system were to implode and we had to rebuild it from scratch, it wouldn’t matter unless it happened on or just before a payday–we would still be making money as a business. Yes, have an outage for 2 weeks and our employees would pretend to work because we’re pretending to pay them, and it would be just like the Brezhnev era. =)

Add in to the mix the fact that if your system is high-criticality, you get more money (in theory, that’s how the government determines the budget, reality may be a little different), and everybody in the government has a high-criticality system. In a classic case of “NIST to the rescue”, they have developed a totally awesome document that nobody reads called Special Publication 800-60. It’s more than everything a data and system classification geek would need to fall in love with.

Don’t try to read it from cover to cover. You won’t make it through. =) Instead, SP 800-60 is a reference to determine the criticality of systems using… wait for it… the BRM. As you might expect, it’s a good reference material like a government-wide data criticality dictionary. It level-sets the security expectations and definitions of what criticality is government-wide.

How do we use this thing? Well, the SP has a “stuffy” process description complete with phrases like “provisional impact level”, this is the Guerilla’s Guide to Data Categorization, so we’ll keep it simple:

  • Take a business function.
  • Locate it on the BRM. It might be in as many as 15 different places.
  • Find the BRM section in 800-60.
  • Read the description of the data, see if it fits what you’re looking for
  • Look at the criticality description. Usually it’s a “fielder’s choice”: if the data matches <this description>, then it’s <this> critical, if it matches <this description>, then it’s <this> critical.
  • Assign a criticality based on the 800-60 definitions.
  • Use the “Common Sense Test”–does what you’ve assigned make sense? You might have other factors such as data aggregation that might make it worth more to you. Feel free to deviate.

So now, going back to my own private list of data types, let’s assign a criticality and a justification:

  • Customer Mission Data–this inherits the criticality from what the customer says it is, which is usually MMM. But then again, I rate the criticality for my company and my business unit, which might be different from what the government thinks it’s worth.
  • Security Incident Data–we own the systems that this data is on, but the government says that it’s high for criticality because they do not want to expose this data to the press until they’re ready and they have high integrity requirements so they can produce it as evidence and send the perpetrator to a “Federal Pound You .* Prison”. We segregated this data type from network monitoring and performance data because doing so means that we have a smaller pool/quantity of high-criticality data. Criticality is HHM.
  • Internal Purchasing Data–usually LML criticality except for the SoX separation of duty for purchasing, etc. I don’t typically deal with this kind of data and rely on my company as a support vendor, so I have trace amounts under my control. Note that if your sole business is purchasing things for other people, this is probably MMH or thereabouts.
  • IT Infrastructure Management Data–network monitoring data. Usually MML but inherits some criticality from the clients’ systems in that a monitoring system for a classified system is also classified even though it has trace amounts of mission data on it.
  • Contracts Collateral Data–proposals and the like. This is MLL for CIA because we work with the government and most of it is public record but we still want to be able to keep our trade secrets secret if we’re working on a bid.
  • Billing Data–MML. Our rates, where they came from, and the markup is for internal use only. It’s bad manners to show the customer your financial guts. =)
  • HR Data–MML only because it contains private information that is the basis for data breach nightmares.

Notice what I didn’t explicitly state but I hinted around? You can have types of data that are covered under some regulation (yes, the infamous c*mpliance buzzwords). These can become data types in itself. For example, health information covered under HIPAA should be its own category of data.

Carrying this a bit further, I have my matrix which has the data types running down the left side with the following columns across the top:

  • Criticality for client, corporation, and business unit
  • Location of the data by IT system type (laptops, trouble ticket system, shared files, etc)
  • Governing regulations (FISMA, NISPOM, Privacy Act, specific classifications)

Here, I think it’s hard to describe, I’ve posted it online for the world to see. I’ll add this into my “Book of Death” for the next revision. No, I didn’t spill the whole cookie jar, just give you a framework to build your own. If you want to pay me obscene amounts of money to come fill out a spreadsheet for you, I would be glad to, but you shouldn’t need that much help.

So what have we accomplished with this BRM exercise? Well, for a couple hours’ worth of work, I have the following things:

  • A data criticality classification guide that I can hand to the security engineers to match up with security controls
  • A security business impact assessment that I can hand to managers
  • An azimuth check on which assets have the most value for us as a company
  • A prioritization on who gets the biggest security budget
  • A governance list to tell me which data types are governed by which regulations
  • A list to exclude some assets from some types of regulations (ie, smaller scope means less audit when I have to pay for one)
  • The start of a way to break down my enterprise into “bite-sized pieces”

And that’s a beautiful thing.



Similar Posts:

Posted in FISMA, The Guerilla CISO, What Works | 1 Comment »

In This Corner, the Business Reference Model

Posted September 5th, 2007 by

He’s a bit bloated but still remains the undeniable champion of business lines that the US Government operates. It’s the “business driver” of the Federal Enterprise Architecture. He’s the Business Reference Model and he’s not just for the federal-types to justify their existence. Let me explain….

The Business Reference Model is basically a hierarchy of all the functions that the US Government performs. The “short list” is the following:

  • Services for Citizens
  • Mode of Delivery
  • Support of Delivery
  • Management of Government Resources

And then underneath these broad headings is the fun things that we’re really interested in:

  • User Fee Collection
  • Contingency Planning
  • IT Security
  • Accounts Receivable

The BRM is fairly exhaustive so if you take any given government agency and what they do will fit somewhere on the chart. Every IT system I’ve seen fits somewhere, usually about 10 different places.

Now that we know how the government is supposed to work, I know what you’re thinking: how does this pass the “Dilligaf test?

Well, to you and me, security dweebs at the core, a list of business functions means different types of information that each business activity needs. The BRM is in actuality a guide to the various data types that you’ll find throughout the government. When I say “Central Records and Statistics” what I really mean to say is “Data that supports Central Records and Statistics”.

But why do we care? We’re not the government, right? Well, we can take the same approach for a commercial enterprise.

Armed with this little bit of knowledge, I have my own business reference model and data types for what I do on a daily basis:

  • Customer Mission Data
  • Security Incident Data
  • Internal Purchasing Data
  • IT Infrastructure Management Data
  • Contracts Collateral Data
  • Billing Data
  • HR Data

This started out as the “holy three”: customer data, contracts/collateral data, and NOC/SOC data. Then I expanded from there. You could just as easily start with something like this: purchasing, selling/marketing, and billing. Or maybe something like this: making money, spending money, and order fulfillment.

And then I have a matrix that says where this data is, here are some of the obvious locations:

  • Corporate Email System
  • Knowledge Management System
  • Shared Directories
  • Laptops
  • Web Site
  • Trouble Ticket System

Well, once you define what things you accomplish as a business, you can start to list where it’s at, or at least the majority of it. Occasionally you’ll get a shocker. =)

Coming up next: What you can do with BRM and Data Types and the fait accompli.



Similar Posts:

Posted in FISMA, The Guerilla CISO, What Works | 4 Comments »

« Previous Entries Next Entries »


Visitor Geolocationing Widget: