WEBINAR: Live Event Date: September 20, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT
Designing a Proactive Approach to Information Security with Cyber Threat Hunting REGISTER >
Its often been said the lawlessness of the Internet is similar to the American Wild West. I have always cringed when hearing that, because its just too much of a stretch for me, but theres at least one aspect of it that is worthy of consideration when it comes to securing our data systems. In this case, guilty until proven innocent may actually have some merit after all.
No, Im not talking about applying this notion to humans. Most of you reading this live in places where the opposite is applied in our court systems: innocent until proven guilty. And, its likely we all value that principle very highly for all the right reasons. But thats not what Im talking about.
Im talking about applying the opposite principle to shoring up our information security practices. We already see it applied in some places, such as setting firewall rules and such, but we need to take it further.
Firewall rules. As I said above, this is a great example of applying the guilty until proven innocent principle. Most firewalls today are configured to only allow authorized services, and to disallow all others. Im sure this is mostly a result of the security community rallying during the 1990s to enforce this sort of positive validation model, sometimes to the dismay of the application developers who wanted to run their software over network services that were being blocked. Unfortunately, we havent been consistent at applying the same principle in enough other areas.
Input validation. The cornerstone to secure software, input validation, when done poorly is the root cause of many of todays most prevalent security defects. This includes buffer overflows, cross-site scripting (XSS), and injection flaws such as SQL injection. Input validation is most often the purview of the application itself, and not (just) the firewall protecting it. For input validation to be as robust as our firewall rules, we have to code the guilty until proven innocent principle into our applications, and thats where we all too often fail. That is, our software must use positive validation on all of its inputs, throwing away anything that cant be validated on the presumption of guilt. That, Ive found, is a concept few software developers take to easily, but it is vital. Were seeing Web application firewalls (WAFs) trying to ease this burden by doing the application-layer input validation in a separate security component (installed and configured by the security team), but thats not a long-term solution for all sorts of good reasons.
Anti-virus scanners. Heres a classic failure of the principle. From the earliest days of the anti-virus scanner, a negative validation model has been used. That is, scanned software is assumed to be safe unless it matches a signature of a known bad thing. Were living with this failure every day in combating email-borne malware, viruses, etc. A fairly recent trend has been the so-called whitelisting of presumably safe applications, but that too is not a long-term solution.
Application vulnerability scanners. Much like their anti-virus counterparts, vulnerability scanners, including application scanners, use a negative model to detect bad things on our systems and in our applications. Although this approach no doubt finds plenty of low hanging fruit, it is superficial and insufficient in the long term.
Intrusion detection/prevention systems. Same old same old here. The vast majority of deployed IDS and IPS installations operate on a negative model that is doomed to failure and at the worst possible momentswhen novel attacks are discovered and launched on our unprepared systems.
So where do we go from here? Well, lets revisit our principle: guilty until proven innocent. It is a design principle that must be considered against every single aspect of our data processing systems in order to be effective. That means we cant stop at just the firewall.
In my Web application security classes, I always tell my students they must never trust anything coming in an HTTP Request (that is, from the user). On day 1, they always giggle or just kind of scratch their heads in confusion when I say this, but by the time theyve seen the likes of cross-site scripting in action, they begin to believe. By the time they leave the class, the number one comment I get from them is how eye opening this notion was for them.
Weve got to inculcate a culture of guilty until proven innocent in our digital world throughout our organizations, from our information security staff through our software developers. Only then will our softwarewhether in the form of operating system kernel code or web applicationsbe resilient and worthy of trusting our businesses to.