SlideShare a Scribd company logo
1 of 4
Download to read offline
Applying military insights to enterprise data security: the application of time-tested milita... Page 1 of 4




    Home |   About Us

                                AccessMyLibrary      Browse      C    Computer Technology Review         JUL-04    Applying military insights
                                to enterprise data security: the application of time-tested military approaches can help address evolving
                                computer security threats for enterprises and government.(Disaster Recovery & Backup/Restore)
                                COPYRIGHT 2004 West World Productions, Inc.

                                Applying military insights to enterprise data security: the
                                application of time-tested military approaches can help address
                                evolving computer security threats for enterprises and
                                government.(Disaster Recovery & Backup/Restore)
                                Publication: Computer Technology Review

                                Publication Date: 01-JUL-04

                                Author: Brown, Kevin

                                Ads by Google
                                PDF to Image Conversion Convert PDF to Bitmap TIFF, JPEG, PNG, BMP, RAW, etc.


                                Car Rental - Avis Enjoy Faster Reservations & Rentals Lowest Mileage Cars, Special Offers


                                Free IT Policies Info Browse Our Technology & IT Articles Online. Subscribe to Weekly
                                Report!


                                Business Continuity Plan BCP/DRP Word Template $389 189 pgs CFO says quot;This saved our
                                companyquot;!

                                    Email this article   |   Print this article


                                COPYRIGHT 2004 West World
                                Productions, Inc.

                                Over the centuries, military and
                                intelligence organizations have
                                developed sophisticated doctrines and
                                procedures relating to physical and
                                information security. These doctrines
                                address a range of concerns including
                                ambush, spies, maneuver, counter-
                                intelligence, mutiny and force
                                protection.

                                Today's enterprises and government
                                agencies have migrated to highly
                                networked computing systems, with
                                nearly all critical functions reliant on
                                computing resources. This evolution
                                has delivered higher productivity, but
                                at the same time has created dramatically higher exposure to electronic attacks. Concern
                                over information assurance has never been higher, and the range of acknowledged
                                threats is growing: disgruntled insiders, viruses/ worms, corporate espionage, script
                                kiddies, cyberterrorism, and information warfare in conflicts of the future.

                                In many senses, computer security already resembles a guerrilla war. Today, largely
                                invisible enemies launch daily attacks on nearly every major corporation and government
                                agency, and rapidly adapt their tactics to address countermeasures. This article highlights
                                a number of time-tested military principles that can be applied by corporations and other
                                organizations to prepare for such electronic warfare.

                                MULTI-LEVEL SECURITY: Intelligence organizations use MLS to manage and streamline
                                access to data. By classifying each piece of data, and establishing the related levels of
                                trust among individuals (e.g., unclassified, secret, top secret), these organizations balance




http://www.accessmylibrary.com/coms2/summary_0286-13204723_ITM                                                                   8/18/2008
Applying military insights to enterprise data security: the application of time-tested milita... Page 2 of 4



                                risk with speed of information sharing.

                                Typically, civilian organizations lack the same discipline around information sharing. For
                                organizations that deal with sensitive or regulated data, a more structured approach to
                                assessing trust and granting access can be used to more tightly manage risk.

                                COMPARTMENTALIZATION: This principle is reflected in nearly every aspect of military
                                organizations. For example, a captured special ops team does not know the locations of
                                other units, in order to minimize risk. Often, analysts and planners have access to only a
                                subset of the quot;whole picturequot; and, similarly, a submarine uses physical compartments to
                                contain the damage from a hull breach.

                                With the move towards aggregated and networked storage, non-military organizations are
                                increasingly at risk of massive breaches. In fact, a single breach of networked storage can
                                yield terabytes of data and in many cases can be executed without detection. By using
                                physical or cryptographic compartmentalization, organizations can reduce the exposure of
                                any single breach. Typical approaches include compartmenting information by functional
                                area (Finance, Engineering, Executive), by business unit, or by customer.

                                NEED-TO-KNOW: Military planners understand that the risk of leaks increases
                                exponentially with the number of people who have information. Accordingly, sensitive data
                                is distributed to only those who need it, and access to data is documented and audited.

                                According to the FBI, 50%-80% of electronic attacks originate inside the firewall. Even
                                though the vast majority of employees are honest and trust-worthy, a single hostile
                                individual can inflict massive damage. Instead of starting with the assumption that all data
                                should flow freely among employees, organizations should invest in processes and
                                systems to manage access to sensitive data, and ensure accountability. Fine-grain access
                                controls can be used to provide flexible access to the data without disrupting user
                                workflow or applications.

                                [ILLUSTRATION OMITTED]

                                CRYPTOGRAPHY: As early as the Roman Empire, military organizations have used
                                cryptography to protect sensitive data. Traditionally, cryptography was applied primarily
                                to communications and data in flight; increasingly, sensitive data at rest is being
                                protected with cryptography. For highly networked environments facing a variety of
                                external and internal threats, cryptographic security is a necessity.

                                In today's networks, the volume of data in transit (megabytes) is dwarfed by the volume
                                of data in storage (terabytes). Computer security experts increasingly recommend
                                encryption for protecting stored data.

                                DEFENSE IN DEPTH: Realizing that any single layer of defense can be defeated, military
                                and intelligence security experts typically deploy layered defense strategies.

                                In light of the growing insider threat, and the growing number of holes in the network
                                perimeter (VPNs, contractors, partner networks), enterprises can no longer assume that
                                their firewall or intrusion detection system is sufficient. Critical data and systems must be
                                compartmentalized and protected within the perimeter. This is a challenging proposition
                                since certain insiders, typically IT administrators, enjoy quot;super-userquot; privileges and
                                unlimited access to data and systems. Organizations should closely review their
                                infrastructure and implement security in layers, ensuring that sensitive information is fully
                                protected.

                                CONCENTRATION OF FLOW: Military checkpoints and border crossings funnel all traffic
                                through aggregated control points. These locations typically have a concentration of
                                security forces, and the ability to authenticate and document all traffic.

                                Simplicity equals security. Many system vulnerabilities today stem from complexity;
                                administrators cannot watch all of the different attack vectors. Security approaches that
                                can simplify the security model and close down attack vectors can reduce an
                                organization's risk of attack, while improving the chances of catching the attacker. Best
                                case scenario: one way in, one way out.

                                ROLE SEPARATION: Many military procedures include checks and balances among
                                multiple individuals to ensure that no single individual can sabotage or usurp the mission
                                of the organization. Critical functions such as nuclear weapons command or air strike
                                operations require multiple people in different functions to concur and approve an action.

                                Organizations with sensitive data may wish to eliminate single points of vulnerability, but
                                many security managers today find that they do not have the tools to extend security
                                policies into the storage infrastructure. Implementing role separation can help. For
                                example, an IT organization may establish separate roles for security administrators and




http://www.accessmylibrary.com/coms2/summary_0286-13204723_ITM                                                    8/18/2008
Applying military insights to enterprise data security: the application of time-tested milita... Page 3 of 4



                                system administrators. Access to sensitive customer data, or sensitive administrative
                                changes to systems, should require approval from multiple functional managers.

                                TWO-MAN RULE: This is a corollary to the Role Separation doctrine. For critical operations,
                                two individuals must exercise authority to act. The classic example: nuclear silo operators
                                turning two keys simultaneously to launch a missile.

                                Critical systems should never be designed with single points of failure or vulnerability. For
                                sensitive operations, such as accessing archived data or recovery of failed systems, a
                                quorum of trusted employees can be used to ensure that no individual can defeat security.


                                TWO-FACTOR AUTHENTICATION: Access to secure facilities almost always requires both
                                knowledge (what you know, e.g. passwords) and official identification (what you have).
                                Increasingly, token-based or biometric systems (who you are) are used to prevent forgery
                                of credentials.

                                For sensitive systems, traditional username/password mechanisms are too weak. Humans
                                are simply not good at choosing strong passwords, and there are many well-known
                                instances of this sort of attack. In the case of computer systems, administrative functions
                                are the most sensitive, because they typically enjoy access to all data and security
                                measures. Implementing two-factor authentication methods can significantly reduce the
                                possibility of common spoofing attacks.

                                KEY ROTATION: Physical and cryptographic keys are regularly rotated to limit the duration
                                of exposure in case of a breach. Following a confirmed or suspected breach, keys can be
                                instantly revoked or invalidated.

                                Enterprise and government security systems must have the infrastructure to regularly or
                                instantly rotate keys, including both physical tokens and electronic or cryptographic keys.

                                This infrastructure includes mechanisms for cataloguing the database of keys needed to
                                access archived data.

                                KILL-SWITCH: In military practice, it is common to protect systems that can be physically
                                breached or overrun with some type of kill-switch mechanism to instantly destroy
                                sensitive data or technology. The U.S. spy plane that was forced to land in China provides
                                a good example of the need for electronic kill-switch capabilities.

                                Computers and storage systems that are physically insecure pose a difficult challenge to
                                enterprises as well. Even the best firewall settings are irrelevant if an attacker can simply
                                remove terabytes of cleartext data on disk drives. For physically insecure systems, it is
                                advisable to make the default state of data secure, using encryption. Smart cards and
                                cryptographic keys can be destroyed much more quickly and reliably than terabytes of
                                cleartext data.

                                DOCUMENTATION AND AUDITING: Military organizations are notorious for extensive
                                paperwork and documentation. However, when dealing with sensitive information that
                                could cost lives or lose a war, this layer of accountability and deterrent is a smart
                                investment.

                                Organizations must find ways to automate and harden their systems that track access to
                                sensitive data. In the case of typical Unix and Windows systems, electronic logging and
                                auditing functions are easily defeated by any user with quot;rootquot; or administrator privileges.
                                Secure logging and auditing systems that are tamper-resistant and cryptographically
                                signed add a layer of deterrent on top of actual security.

                                Organizational Implications

                                Security-conscious organizations must create processes to constantly evaluate systems,
                                evolving attack tactics, and overall risk profile. Several practical implications emerge:

                                * Designate a quot;Chief Security Officerquot; that has the training and resources to manage
                                security on an ongoing basis. Security is a process, not a one-time project.

                                * For individual operating units, designate a trusted quot;security administratorquot; to manage
                                sensitive systems that protect the overall organization. For smaller organizations, this role
                                may overlap with other responsibilities, but ideally this role separation can create checks
                                and balances for administrative staff. Use strong authentication to ensure the integrity of
                                this role separation.

                                * Design systems that can shield sensitive data from administrators. In light of the
                                growing insider threat, and the almost unlimited system privileges that root users enjoy,
                                this is a major exposure point for every organization.




http://www.accessmylibrary.com/coms2/summary_0286-13204723_ITM                                                    8/18/2008
Applying military insights to enterprise data security: the application of time-tested milita... Page 4 of 4




                                          Centuries of experience, high stakes, and organizational discipline have helped military
                                          and intelligence organizations create sophisticated security doctrines. The design and
                                          execution of these doctrines is never perfect, but they nonetheless hold valuable lessons
                                          for organizations that are increasingly sensitized to the importance of security. Through a
                                          combination of strategy, process, and systems, civilian organizations can use these
                                          lessons to make profound improvements in their security posture.

                                          www.decru.com

                                          [c]2004 Decru, Inc.

                                          Used by permission.

                                          Kevin Brown is vice president of marketing at Decru. Inc. (Redwood City, CA)




                                          More Articles from Computer Technology Review
                                          Continuous data access: enterprise-level high availability using iSCSI...
                                          July 01, 2004
                                          SAS: now and in the future.(Connectivity)(Serial Attached SCSI)(Panel ...
                                          July 01, 2004
                                          Storage infrastructure requires defense in depth.(Disaster Recovery & ...
                                          July 01, 2004
                                          The cost benefits of a SAN: an analysis of total cost of ownership (TC...
                                          July 01, 2004



     Ā© 2008 Gale, a part of Cengage Learning | All Rights Reserved | About this Service | About The Gale Group, a part of Cengage Learning
                                                                      Privacy Policy | Site Map | Content Licensing | Contact Us | Link to us
                                               Other Gale sites: Books & Authors | Goliath | MovieRetriever.com | WiseTo Social Issues




http://www.accessmylibrary.com/coms2/summary_0286-13204723_ITM                                                                        8/18/2008

More Related Content

Viewers also liked

What is a Blog?
What is a Blog?What is a Blog?
What is a Blog?bcamli33
Ā 
Turning Technologies Proven Methods For Success
Turning Technologies Proven Methods For SuccessTurning Technologies Proven Methods For Success
Turning Technologies Proven Methods For SuccessDr. Tina Rooks
Ā 
UA testing with Selenium and PHPUnit - PHPBenelux Summer BBQ
UA testing with Selenium and PHPUnit - PHPBenelux Summer BBQUA testing with Selenium and PHPUnit - PHPBenelux Summer BBQ
UA testing with Selenium and PHPUnit - PHPBenelux Summer BBQMichelangelo van Dam
Ā 
Aviary suite tutorial feb 2012
Aviary suite tutorial feb 2012Aviary suite tutorial feb 2012
Aviary suite tutorial feb 2012Karen Brooks
Ā 
How the law protects investment in technology - trade secrets, patents, desig...
How the law protects investment in technology - trade secrets, patents, desig...How the law protects investment in technology - trade secrets, patents, desig...
How the law protects investment in technology - trade secrets, patents, desig...Jane Lambert
Ā 

Viewers also liked (7)

What is a Blog?
What is a Blog?What is a Blog?
What is a Blog?
Ā 
Shkodra guide vol.2
Shkodra guide vol.2Shkodra guide vol.2
Shkodra guide vol.2
Ā 
Turning Technologies Proven Methods For Success
Turning Technologies Proven Methods For SuccessTurning Technologies Proven Methods For Success
Turning Technologies Proven Methods For Success
Ā 
UA testing with Selenium and PHPUnit - PHPBenelux Summer BBQ
UA testing with Selenium and PHPUnit - PHPBenelux Summer BBQUA testing with Selenium and PHPUnit - PHPBenelux Summer BBQ
UA testing with Selenium and PHPUnit - PHPBenelux Summer BBQ
Ā 
Aviary suite tutorial feb 2012
Aviary suite tutorial feb 2012Aviary suite tutorial feb 2012
Aviary suite tutorial feb 2012
Ā 
Ssworkgroup
SsworkgroupSsworkgroup
Ssworkgroup
Ā 
How the law protects investment in technology - trade secrets, patents, desig...
How the law protects investment in technology - trade secrets, patents, desig...How the law protects investment in technology - trade secrets, patents, desig...
How the law protects investment in technology - trade secrets, patents, desig...
Ā 

More from digital.signage

Vancouver Int Airport
Vancouver Int AirportVancouver Int Airport
Vancouver Int Airportdigital.signage
Ā 
Hyatt Regency Chicago Success
Hyatt Regency Chicago SuccessHyatt Regency Chicago Success
Hyatt Regency Chicago Successdigital.signage
Ā 
Web Security For Enterprise
Web Security For EnterpriseWeb Security For Enterprise
Web Security For Enterprisedigital.signage
Ā 
Ultraclientbrochure 1
Ultraclientbrochure 1Ultraclientbrochure 1
Ultraclientbrochure 1digital.signage
Ā 
Thru Glass Touch Screen
Thru Glass Touch ScreenThru Glass Touch Screen
Thru Glass Touch Screendigital.signage
Ā 
This Digital Signage Player Solution (Vga325)
This Digital Signage Player Solution (Vga325)This Digital Signage Player Solution (Vga325)
This Digital Signage Player Solution (Vga325)digital.signage
Ā 
The Ultimate Win Win Win Win
The Ultimate Win Win Win WinThe Ultimate Win Win Win Win
The Ultimate Win Win Win Windigital.signage
Ā 
Telecom Policy 2006 Eng
Telecom Policy 2006 EngTelecom Policy 2006 Eng
Telecom Policy 2006 Engdigital.signage
Ā 
Technology Planning
Technology PlanningTechnology Planning
Technology Planningdigital.signage
Ā 
Technology Planning Document V1.1small
Technology Planning Document V1.1smallTechnology Planning Document V1.1small
Technology Planning Document V1.1smalldigital.signage
Ā 
Technology Planning Document V1.1
Technology Planning Document V1.1Technology Planning Document V1.1
Technology Planning Document V1.1digital.signage
Ā 
Technology Planning Document V1.1
Technology Planning Document V1.1Technology Planning Document V1.1
Technology Planning Document V1.1digital.signage
Ā 
Technology Planning Document
Technology Planning DocumentTechnology Planning Document
Technology Planning Documentdigital.signage
Ā 
Screen White Paper Audience Measurement
Screen White Paper Audience MeasurementScreen White Paper Audience Measurement
Screen White Paper Audience Measurementdigital.signage
Ā 

More from digital.signage (20)

Bi Mtvb Ps
Bi Mtvb PsBi Mtvb Ps
Bi Mtvb Ps
Ā 
Vancouver Int Airport
Vancouver Int AirportVancouver Int Airport
Vancouver Int Airport
Ā 
Hyatt Regency Chicago Success
Hyatt Regency Chicago SuccessHyatt Regency Chicago Success
Hyatt Regency Chicago Success
Ā 
Display3
Display3Display3
Display3
Ā 
The Screen
The ScreenThe Screen
The Screen
Ā 
Web Security For Enterprise
Web Security For EnterpriseWeb Security For Enterprise
Web Security For Enterprise
Ā 
Vu
VuVu
Vu
Ā 
Ultraclientbrochure 1
Ultraclientbrochure 1Ultraclientbrochure 1
Ultraclientbrochure 1
Ā 
Via 1giga
Via 1gigaVia 1giga
Via 1giga
Ā 
Thru Glass Touch Screen
Thru Glass Touch ScreenThru Glass Touch Screen
Thru Glass Touch Screen
Ā 
This Digital Signage Player Solution (Vga325)
This Digital Signage Player Solution (Vga325)This Digital Signage Player Solution (Vga325)
This Digital Signage Player Solution (Vga325)
Ā 
The Ultimate Win Win Win Win
The Ultimate Win Win Win WinThe Ultimate Win Win Win Win
The Ultimate Win Win Win Win
Ā 
Telecom Policy 2006 Eng
Telecom Policy 2006 EngTelecom Policy 2006 Eng
Telecom Policy 2006 Eng
Ā 
The Godfrey Group
The Godfrey GroupThe Godfrey Group
The Godfrey Group
Ā 
Technology Planning
Technology PlanningTechnology Planning
Technology Planning
Ā 
Technology Planning Document V1.1small
Technology Planning Document V1.1smallTechnology Planning Document V1.1small
Technology Planning Document V1.1small
Ā 
Technology Planning Document V1.1
Technology Planning Document V1.1Technology Planning Document V1.1
Technology Planning Document V1.1
Ā 
Technology Planning Document V1.1
Technology Planning Document V1.1Technology Planning Document V1.1
Technology Planning Document V1.1
Ā 
Technology Planning Document
Technology Planning DocumentTechnology Planning Document
Technology Planning Document
Ā 
Screen White Paper Audience Measurement
Screen White Paper Audience MeasurementScreen White Paper Audience Measurement
Screen White Paper Audience Measurement
Ā 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
Ā 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜RTylerCroy
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
Ā 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
Ā 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
Ā 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
Ā 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
Ā 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
Ā 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
Ā 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Ā 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Ā 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Ā 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Ā 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Ā 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Ā 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Ā 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Ā 

Applying Military Insights To Enterprise Data Security

  • 1. Applying military insights to enterprise data security: the application of time-tested milita... Page 1 of 4 Home | About Us AccessMyLibrary Browse C Computer Technology Review JUL-04 Applying military insights to enterprise data security: the application of time-tested military approaches can help address evolving computer security threats for enterprises and government.(Disaster Recovery & Backup/Restore) COPYRIGHT 2004 West World Productions, Inc. Applying military insights to enterprise data security: the application of time-tested military approaches can help address evolving computer security threats for enterprises and government.(Disaster Recovery & Backup/Restore) Publication: Computer Technology Review Publication Date: 01-JUL-04 Author: Brown, Kevin Ads by Google PDF to Image Conversion Convert PDF to Bitmap TIFF, JPEG, PNG, BMP, RAW, etc. Car Rental - Avis Enjoy Faster Reservations & Rentals Lowest Mileage Cars, Special Offers Free IT Policies Info Browse Our Technology & IT Articles Online. Subscribe to Weekly Report! Business Continuity Plan BCP/DRP Word Template $389 189 pgs CFO says quot;This saved our companyquot;! Email this article | Print this article COPYRIGHT 2004 West World Productions, Inc. Over the centuries, military and intelligence organizations have developed sophisticated doctrines and procedures relating to physical and information security. These doctrines address a range of concerns including ambush, spies, maneuver, counter- intelligence, mutiny and force protection. Today's enterprises and government agencies have migrated to highly networked computing systems, with nearly all critical functions reliant on computing resources. This evolution has delivered higher productivity, but at the same time has created dramatically higher exposure to electronic attacks. Concern over information assurance has never been higher, and the range of acknowledged threats is growing: disgruntled insiders, viruses/ worms, corporate espionage, script kiddies, cyberterrorism, and information warfare in conflicts of the future. In many senses, computer security already resembles a guerrilla war. Today, largely invisible enemies launch daily attacks on nearly every major corporation and government agency, and rapidly adapt their tactics to address countermeasures. This article highlights a number of time-tested military principles that can be applied by corporations and other organizations to prepare for such electronic warfare. MULTI-LEVEL SECURITY: Intelligence organizations use MLS to manage and streamline access to data. By classifying each piece of data, and establishing the related levels of trust among individuals (e.g., unclassified, secret, top secret), these organizations balance http://www.accessmylibrary.com/coms2/summary_0286-13204723_ITM 8/18/2008
  • 2. Applying military insights to enterprise data security: the application of time-tested milita... Page 2 of 4 risk with speed of information sharing. Typically, civilian organizations lack the same discipline around information sharing. For organizations that deal with sensitive or regulated data, a more structured approach to assessing trust and granting access can be used to more tightly manage risk. COMPARTMENTALIZATION: This principle is reflected in nearly every aspect of military organizations. For example, a captured special ops team does not know the locations of other units, in order to minimize risk. Often, analysts and planners have access to only a subset of the quot;whole picturequot; and, similarly, a submarine uses physical compartments to contain the damage from a hull breach. With the move towards aggregated and networked storage, non-military organizations are increasingly at risk of massive breaches. In fact, a single breach of networked storage can yield terabytes of data and in many cases can be executed without detection. By using physical or cryptographic compartmentalization, organizations can reduce the exposure of any single breach. Typical approaches include compartmenting information by functional area (Finance, Engineering, Executive), by business unit, or by customer. NEED-TO-KNOW: Military planners understand that the risk of leaks increases exponentially with the number of people who have information. Accordingly, sensitive data is distributed to only those who need it, and access to data is documented and audited. According to the FBI, 50%-80% of electronic attacks originate inside the firewall. Even though the vast majority of employees are honest and trust-worthy, a single hostile individual can inflict massive damage. Instead of starting with the assumption that all data should flow freely among employees, organizations should invest in processes and systems to manage access to sensitive data, and ensure accountability. Fine-grain access controls can be used to provide flexible access to the data without disrupting user workflow or applications. [ILLUSTRATION OMITTED] CRYPTOGRAPHY: As early as the Roman Empire, military organizations have used cryptography to protect sensitive data. Traditionally, cryptography was applied primarily to communications and data in flight; increasingly, sensitive data at rest is being protected with cryptography. For highly networked environments facing a variety of external and internal threats, cryptographic security is a necessity. In today's networks, the volume of data in transit (megabytes) is dwarfed by the volume of data in storage (terabytes). Computer security experts increasingly recommend encryption for protecting stored data. DEFENSE IN DEPTH: Realizing that any single layer of defense can be defeated, military and intelligence security experts typically deploy layered defense strategies. In light of the growing insider threat, and the growing number of holes in the network perimeter (VPNs, contractors, partner networks), enterprises can no longer assume that their firewall or intrusion detection system is sufficient. Critical data and systems must be compartmentalized and protected within the perimeter. This is a challenging proposition since certain insiders, typically IT administrators, enjoy quot;super-userquot; privileges and unlimited access to data and systems. Organizations should closely review their infrastructure and implement security in layers, ensuring that sensitive information is fully protected. CONCENTRATION OF FLOW: Military checkpoints and border crossings funnel all traffic through aggregated control points. These locations typically have a concentration of security forces, and the ability to authenticate and document all traffic. Simplicity equals security. Many system vulnerabilities today stem from complexity; administrators cannot watch all of the different attack vectors. Security approaches that can simplify the security model and close down attack vectors can reduce an organization's risk of attack, while improving the chances of catching the attacker. Best case scenario: one way in, one way out. ROLE SEPARATION: Many military procedures include checks and balances among multiple individuals to ensure that no single individual can sabotage or usurp the mission of the organization. Critical functions such as nuclear weapons command or air strike operations require multiple people in different functions to concur and approve an action. Organizations with sensitive data may wish to eliminate single points of vulnerability, but many security managers today find that they do not have the tools to extend security policies into the storage infrastructure. Implementing role separation can help. For example, an IT organization may establish separate roles for security administrators and http://www.accessmylibrary.com/coms2/summary_0286-13204723_ITM 8/18/2008
  • 3. Applying military insights to enterprise data security: the application of time-tested milita... Page 3 of 4 system administrators. Access to sensitive customer data, or sensitive administrative changes to systems, should require approval from multiple functional managers. TWO-MAN RULE: This is a corollary to the Role Separation doctrine. For critical operations, two individuals must exercise authority to act. The classic example: nuclear silo operators turning two keys simultaneously to launch a missile. Critical systems should never be designed with single points of failure or vulnerability. For sensitive operations, such as accessing archived data or recovery of failed systems, a quorum of trusted employees can be used to ensure that no individual can defeat security. TWO-FACTOR AUTHENTICATION: Access to secure facilities almost always requires both knowledge (what you know, e.g. passwords) and official identification (what you have). Increasingly, token-based or biometric systems (who you are) are used to prevent forgery of credentials. For sensitive systems, traditional username/password mechanisms are too weak. Humans are simply not good at choosing strong passwords, and there are many well-known instances of this sort of attack. In the case of computer systems, administrative functions are the most sensitive, because they typically enjoy access to all data and security measures. Implementing two-factor authentication methods can significantly reduce the possibility of common spoofing attacks. KEY ROTATION: Physical and cryptographic keys are regularly rotated to limit the duration of exposure in case of a breach. Following a confirmed or suspected breach, keys can be instantly revoked or invalidated. Enterprise and government security systems must have the infrastructure to regularly or instantly rotate keys, including both physical tokens and electronic or cryptographic keys. This infrastructure includes mechanisms for cataloguing the database of keys needed to access archived data. KILL-SWITCH: In military practice, it is common to protect systems that can be physically breached or overrun with some type of kill-switch mechanism to instantly destroy sensitive data or technology. The U.S. spy plane that was forced to land in China provides a good example of the need for electronic kill-switch capabilities. Computers and storage systems that are physically insecure pose a difficult challenge to enterprises as well. Even the best firewall settings are irrelevant if an attacker can simply remove terabytes of cleartext data on disk drives. For physically insecure systems, it is advisable to make the default state of data secure, using encryption. Smart cards and cryptographic keys can be destroyed much more quickly and reliably than terabytes of cleartext data. DOCUMENTATION AND AUDITING: Military organizations are notorious for extensive paperwork and documentation. However, when dealing with sensitive information that could cost lives or lose a war, this layer of accountability and deterrent is a smart investment. Organizations must find ways to automate and harden their systems that track access to sensitive data. In the case of typical Unix and Windows systems, electronic logging and auditing functions are easily defeated by any user with quot;rootquot; or administrator privileges. Secure logging and auditing systems that are tamper-resistant and cryptographically signed add a layer of deterrent on top of actual security. Organizational Implications Security-conscious organizations must create processes to constantly evaluate systems, evolving attack tactics, and overall risk profile. Several practical implications emerge: * Designate a quot;Chief Security Officerquot; that has the training and resources to manage security on an ongoing basis. Security is a process, not a one-time project. * For individual operating units, designate a trusted quot;security administratorquot; to manage sensitive systems that protect the overall organization. For smaller organizations, this role may overlap with other responsibilities, but ideally this role separation can create checks and balances for administrative staff. Use strong authentication to ensure the integrity of this role separation. * Design systems that can shield sensitive data from administrators. In light of the growing insider threat, and the almost unlimited system privileges that root users enjoy, this is a major exposure point for every organization. http://www.accessmylibrary.com/coms2/summary_0286-13204723_ITM 8/18/2008
  • 4. Applying military insights to enterprise data security: the application of time-tested milita... Page 4 of 4 Centuries of experience, high stakes, and organizational discipline have helped military and intelligence organizations create sophisticated security doctrines. The design and execution of these doctrines is never perfect, but they nonetheless hold valuable lessons for organizations that are increasingly sensitized to the importance of security. Through a combination of strategy, process, and systems, civilian organizations can use these lessons to make profound improvements in their security posture. www.decru.com [c]2004 Decru, Inc. Used by permission. Kevin Brown is vice president of marketing at Decru. Inc. (Redwood City, CA) More Articles from Computer Technology Review Continuous data access: enterprise-level high availability using iSCSI... July 01, 2004 SAS: now and in the future.(Connectivity)(Serial Attached SCSI)(Panel ... July 01, 2004 Storage infrastructure requires defense in depth.(Disaster Recovery & ... July 01, 2004 The cost benefits of a SAN: an analysis of total cost of ownership (TC... July 01, 2004 Ā© 2008 Gale, a part of Cengage Learning | All Rights Reserved | About this Service | About The Gale Group, a part of Cengage Learning Privacy Policy | Site Map | Content Licensing | Contact Us | Link to us Other Gale sites: Books & Authors | Goliath | MovieRetriever.com | WiseTo Social Issues http://www.accessmylibrary.com/coms2/summary_0286-13204723_ITM 8/18/2008