Friday, August 18, 2017

Trust Issues

A continuous term heard when working with non-security focused IT groups, is that anything behind the internal firewall is “trusted”.  This is somewhat of a pet peeve, and is setting back organizational security.  Depending upon the business ear the non-security focused IT group has, it can undermine the initiatives of the security group, because business tends to take the path of least resistance.  If multiple parties are assuring the business Infosec is “being paranoid”, there’s a possibility Infosec is going to lose out to keeping up front costs low, hindering innovation (this is possibly a different topic at a different point in time), and being overruled by the “trusted” mindset.  Unless there is a dedicated compliance model enforcing segmentation, encryption, etc., this can be a losing argument.

This is where Infosec teams need to take a more hands on approach to their security and their internal threat model.  The internal threat model should be assuming malicious intent (or mistakes) by employees, along with attackers living on the inside.  When threat modeling, consider bringing in and working with the non-security IT groups.  Perform planning, where an attacker has compromised an internal system with full privilege on that system. Step through the process and what areas are now exposed by that system, and what lateral movement can be achieved.  We have to do a better job of showing why things can’t be trusted.

For organizations with internal red teams (yay money!), this is easy.  Show the defenders the tools, concepts, and IOC avoidance techniques.  The blue / infrastructure groups can look at the tools and the information being gleaned from them.  For those that aren’t so lucky, where it’s a defender only environment, the blue team is going to have to do a little more work.  External tests are normally tightly scoped, and don’t give a full representation to fall back on.  Start making the assumption of compromise, and at the very least familiarize attack methodologies that can demonstrate the theory.  Simply talking about it is not enough, because the non-security focused IT groups may not understand the concepts or theories.

This is part of why this blog has been so quiet.  When afforded time to research, most free time has been spent researching attack methodologies that don’t require an installation, and makes use of nothing more than what exists already within the org.  This allows for actual demonstration on the ease of attack methodologies, for the non-security focused IT groups.  It helps if practical simplified attack methods are demonstrated, and can potentially turn that into a game changer.  In the long run, Infosec is going to need these groups working on their side, if the business culture is going to change, and the term “trusted internal system” can be put to bed.