Secure Coding mailing list archives
Re: ZDNnet: Securing data from the threat within [by buying products]
From: "Kenneth R. van Wyk" <Ken () krvw com>
Date: Tue, 18 Jan 2005 04:00:23 +0000
On Monday 17 January 2005 14:55, Crispin Cowan wrote:
I participated in a workshop on on insider attacks several years ago. We identified 2 kinds of insider attacks:
(Was this Mike Skroh's (DARPA) workshop out at RAND? If so, I also participated in this. In fact, it's where I met you, Crispin. You demo'd VMware on your laptop for me and made me a VMware believer...:-)
* authorized users: [snip...] * non-authorized users: [snip...]
Agreed.
So we agree that more secure systems such as RBAC and Immunix do help to address the problem of insider attackers. What they don't do is address the problem of authorized insiders abusing their authority. That is where this new class of products comes in: they track the movement of sensitive organizational data by /content/ rather than by access control, and complain when content crosses a barrier that it should not.
Understood, and at least much of this new class of products is based on statistical analysis of event logs. Certainly, products simplify that scenario, but it can also be done without add-on products.
But as I wrote before, such products, especially network-based products, will fail to detect an authorized user accessing data and then dumping it to CDR or USP memory stick and walking it out of the building in their underwear.
There is also a new class of products that do access control and logging at the PC client level, so that things like USB stick access can be (nominally) controlled and logged, FWIW. I'll bet that a determined, authorized adversary can find ways of circumventing, though...
Because the end-game of covert channel prevention always leads to an anal cavity search :)
ACK....and ick! So, where's the Software Security lesson in all of this? IMHO, it's to ensure adequate application-level event logging and data access control capabilities. Cheers, Ken van Wyk -- KRvW Associates, LLC http://www.KRvW.com
Current thread:
- ZDNnet: Securing data from the threat within [by buying products] Kenneth R. van Wyk (Jan 11)
- RE: ZDNnet: Securing data from the threat within [by buying products] Michael S Hines (Jan 11)
- Re: ZDNnet: Securing data from the threat within [by buying products] Rob, grandpa of Ryan, Trevor, Devon & Hannah (Jan 11)
- Re: ZDNnet: Securing data from the threat within [by buying products] Crispin Cowan (Jan 17)
- Re: ZDNnet: Securing data from the threat within [by buying products] Kenneth R. van Wyk (Jan 17)
- Re: ZDNnet: Securing data from the threat within [by buying products] Crispin Cowan (Jan 17)
- Re: ZDNnet: Securing data from the threat within [by buying products] Kenneth R. van Wyk (Jan 17)
- Re: ZDNnet: Securing data from the threat within [by buying products] Crispin Cowan (Jan 17)
- Re: ZDNnet: Securing data from the threat within [by buying products] Kenneth R. van Wyk (Jan 17)