0% found this document useful (0 votes)
61 views30 pages

ISC2 InfoSecurityProfessional May-June-2019 F

Uploaded by

joefox
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views30 pages

ISC2 InfoSecurityProfessional May-June-2019 F

Uploaded by

joefox
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

THE NEWEST WAY TO BOOST YOUR CAREER ACCUMEN

InfoSecurity
PROFESSIONAL
MAY/JUNE 2019
A Publication for the (ISC)2‰ Membership

TIME TO
Smarten
Up Advancing consumer
AI technology while
upholding the CIA tenets
PRIVACY LESSONS
The race LEARNED
to protect A member’s
consumer data takeaways from
marches on securing a move
to microservices
isc2.org facebook.com/isc2fb twitter.com/ISC2 linkedin.com/company/isc2 community.isc2.org
The
Ultimate Guide
to Your (ISC)2 Certification

Validate Your Expertise


and prove you have what it takes to protect
your organization with a globally recognized
(ISC)2 certification.

Choose which certification is right for you and


download the Ultimate Guide for tips, tools,
and more.

Get Your Guide


contents ¦¦¦ VOLUME 12 • ISSUE 3

PAGE 21
departments
5 EDITOR’S NOTE
What This Magazine Is …
and Isn’t
BY ANNE SAITA

7 EXECUTIVE LETTER
Answering the Call for
Professional Development
BY MIRTHA COLLIN

9 FIELD NOTES
New opportunities to advance
your career; securing mobile
devices; tips before diving
into machine learning;
recommended reading
features and more.

PRIVACY 14 #NEXTCHAPTER

17
(ISC)2 Melbourne Chapter
Time to Smarten Up
Our AI devices may be giving away too much information.
29 CENTER POINTS
What should we do? BY ANITA J. BATEMAN, CISSP
Speaking the Universal
Language of Cyber Safety
GRC BY PAT CRAVEN

21 CCPA vs. GDPR


An overview of growing pro-privacy legislation in California
and across the U.S. BY JENNIFER J. SOSA, ESQ.
30 COMMUNITY
Right to be Forgotten impacts
backups; advice on a career
switch to cybersecurity.
TECHNOLOGY

24 10 Lessons Learned Securing a


Microservice Ecosystem
How cybersecurity can impact project management.
5 AD INDEX

Cover image: JOHN KUCZALA


BY EMIL P. MAN, CISSP, CCSP Illustration above: ENRICO VARRASSO

InfoSecurity Professional is produced by Twirling Tiger ‰ Media, 7 Jeffrey Road, Franklin, MA 02038. Contact by email: [email protected]. The information contained in
this publication represents the views and opinions of the respective authors and may not represent the views and opinions of (ISC)2® on the issues discussed as of
the date of publication. No part of this document print or digital may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form by
any means (electronic, mechanical, photocopying, recording or otherwise), or for any purpose, without the express written permission of (ISC)2. (ISC)2, the (ISC)2
digital logo and all other product, service or certification names are registered marks or trademarks of the International Information Systems Security Certification
Consortium, Incorporated, in the United States and/or other countries. The names of actual products and companies mentioned herein may be the trademarks of
their respective owners. For subscription information, please visit www.isc2.org. To obtain permission to reprint materials, please email [email protected].
To request advertising information, please email [email protected]. ©2019 (ISC)2 Incorporated. All rights reserved.

RETURN TO
InfoSecurity Professional | 3 | May/June 2019 CONTENTS
SUMMIT / LATAM

ENGAGE WITH LATIN AMERICA’S BEST


The (ISC)² Secure Summit LATAM 2019 will take place on
September 25-26 at Camino Real Polanco Hotel, Mexico City.
Meet the best information security and cybersecurity professionals
in Latin America and learn about the most relevant topics, innovations
and solutions to the latest cybersecurity threats. Share your expertise
with peers and develop skills that will advance your career.

(ISC)² members can earn up to 16 CPEs

R E G I STE R NOW l a t a ms u mmi t s. i sc 2 . or g

September 25-26, 2019 | Mexico City | #ISC2LatamSummit


editor’s note ¦¦¦ by Anne Saita

(ISC)2 MANAGEMENT TEAM


EXECUTIVE PUBLISHER
Timothy Garon

What This Magazine Is …


571-303-1320

E
[email protected]

and Isn’t
SENIOR MANAGER, CORPORATE
COMMUNICATIONS
Jarred LeFebvre
727-316-8129
[email protected]

EVERY TIME an issue of the magazine is published, readers email me to CORPORATE PUBLIC
RELATIONS MANAGER
let me know what they like or what they find lacking. I love hearing from Brian Alberti
people, even those delivering constructive criticism. Others prefer to speak 617-510-1540
through online forums or social media posts. Based on some recent com- [email protected]

ments, I want to explain why we produce this publication. SENIOR CORPORATE


COMMUNICATIONS SPECIALIST
This is an association magazine. Not a consumer publication, like Wired, Kaity Eagle
nor a trade publication like SC Magazine. This periodical delivers a mixture 727-683-0146
of (ISC)2 news and independently written and edited features focused pri- [email protected]
marily on professional development for cybersecurity professionals. Some MANAGER, MEDIA SERVICES
of the material may seem repetitious if you regularly follow (ISC)2 social Michelle Schweitz
727-201-5770
media. However, not everyone does; nor do they opt in for (ISC)2 emails. [email protected]
The magazine provides another channel for (ISC)2 leadership to communi-
EVENT PLANNER
cate with its growing global membership. Tammy Muhtadi
Our content is heavy on management because most members aspire to 727-493-4481
greater influence as they reach a new rung on their career ladder. We cover [email protected]
perennial threats and defenses too, like other magazines.
SALES
Our magazine, however, features member-authors writing VENDOR SPONSORSHIP
from their distinct vantage points. This, along with the out- Lisa Pettograsso
standing work from our Creative team, helps InfoSecurity [email protected]
Professional look and read a bit differently from other
EDITORIAL ADVISORY BOARD
publications.
Anita Bateman, U.S.
Then there’s the quiz to earn education credits. Some Kaity Eagle, (ISC)2
questions are easier than others by design. All are to ensure Jarred LeFebvre, (ISC)2
you understand and maybe learn something to help you Yves Le Roux, EMEA
better serve your organizations and communities. Cesar Olivera, Brazil and Canada
We’re all tested now and then—you, me, and this maga-
TWIRLING TIGER MEDIA
zine that relies on members to make it better. It’s my hope EDITORIAL TEAM
Anne Saita, editor-in- that when there’s a crisis, or a career is on the line, some-
chief, lives and works EDITOR-IN-CHIEF
on the U.S. West Coast.
thing you once read here will help you navigate those rough Anne Saita
waters, because you belong to an organization devoted to [email protected]
She can be reached at
[email protected]. helping you do just that. • ART DIRECTOR & PRODUCTION
Maureen Joyce
[email protected]

MANAGING EDITOR
Deborah Johnson

EDITOR
ADVERTISER INDEX Paul South
For information about advertising in this publication, please contact Vendor Sponsorship:
PROOFREADER
Lisa Pettograsso, [email protected].
©Rob Andrew Photography

Ken Krause
(ISC)2 Certifications..............................................2 (ISC)2 Secure Summit Denver......................... 13 Twirling Tiger ‰ Media
(www.twirlingtigermedia.
(ISC) Secure Summit LATAM..........................4
2
(ISC)2 Security Congress................................... 16
com) is certified as
(ISC)2 Secure Summit APAC..............................6 Egress..................................................................... 27 a Women’s Business
Enterprise (WBE) by
EMEA InfoSec Europe..........................................8 Cofense.................................................................. 28 the Women’s Business
Enterprise National Council (WBENC).
Duo Security.......................................................... 11 This partnership reflects (ISC)2’s
commitment to supplier diversity.

RETURN TO
InfoSecurity Professional | 5 | May/June 2019 CONTENTS
In partnership with:

REGISTRATION NOW OPEN


10–11 July 2019 | Conrad Hong Kong

2 Days • 6 Tracks
35+ Sessions • 40+ Speakers

Secure Summit APAC 2019 is the perfect


opportunity for you to gain insights from
great minds in the cybersecurity industry.
Participate in Enriching sessions, panels and best
practice sharing, designed to sharpen your skills and
hone your craft. Meet over 400 InfoSec professionals
from the region and across a range of industries and
immerse yourself in discussions that will Enable you
to better secure your organization and Excel as a
cybersecurity professional.

Tracks include:
#ISC2Summits

Identity Access
Management
Cutting Edge
Technologies
and Ideas
IoT/OT
Security 25%
discount available
for (ISC)2 members

REGISTER TODAY
Sw

is
if e

sA n
rmy K

Professional Security Governance,


Development Operations Risk and securesummitapac.isc2.org
Compliance

For sponsorship and


Industry networking reception is registration enquiries, please
open to all conference attendees contact [email protected]
executive letter ¦ ¦ ¦ THE LATEST FROM (ISC)2’S LEADERSHIP

Answering the Call for


Professional Development

(
by Mirtha Collin

(ISC)2 HAS ALWAYS stood for the advancement of


the cybersecurity profession. For the past 30 years,
that commitment has taken the form of training and
education that helps members achieve certification.
While that’s just as true today, in our constantly
changing industry, (ISC)2 also saw the need to evolve
to support the continued professional growth of our
global members as they work to acquire new skills.
After several years of work and input from many
of our member experts, we recently announced
the launch of the (ISC)2 Professional Development
Institute (PDI).
PDI is a go-to resource for timely and relevant
continuing educational opportunities to keep mem-
bers’ skills sharp and curiosity piqued. It recognizes
that cybersecurity learning is a journey, and certifi-
cation is just one step along that path. These courses
are available to members at no cost, but in order to accordingly. We will refresh the catalog of courses we
improve the educational opportunities available to provide based on ongoing dialogue with and input
our entire industry, non-members can also purchase from our membership.
access.
By the end of June, nine immersive courses will
be available, including new offerings covering such PDI is a go-to resource for
topics as leadership, cloud security and IoT. In fact, timely and relevant continuing
there are plans for as many as 30 new courses this
year alone. educational opportunities to
Staying at the top of your game as a cybersecurity keep members’ skills sharp
professional is an ongoing challenge. Doing so while
meeting the demands of a high-pres- and curiosity piqued.
sure, high-stakes security position,
working long hours and then bal- We’ve made it simple for members to get started
ancing responsibilities to family in by preloading PDI courses to our learning center, so
your personal life can be tough. Our all they need to do is log in to their account and see
hope is that by offering these courses what’s available. New courses will be added as soon
online and on-demand we can at least as they are ready, so make sure to check back often.
ease the burden of accessing useful We know that the hard work of cybersecurity
learning tools that are relevant to professionals is at the heart of what helps keep data
our profession and built with career secure and people safe. We hope that PDI will help
growth in mind. keep their cybersecurity abilities at their sharpest.
Photo: iStock

Mirtha Collin is the edu-


cation director at (ISC) .
2 Our amazing community of mem- For more information on the Professional
She can be reached at bers continues to provide feedback to Development Institute and to access online courses,
[email protected]. us, so that our PDI courses can grow please visit www.isc2.org/development. •

RETURN TO
InfoSecurity Professional | 7 | May/June 2019 CONTENTS
GET CERTIFIED.

Join (ISC)² on stand A180 at Infosecurity Europe


4 - 6 June 2019 Olympia London

(ISC)2 Member Reception on 5 June

(ISC)² members can claim CPEs for attending workshops or


educational talks taking place at Infosecurity Europe.

CPEs cannot be claimed for only visiting the expo floor.


Please refer to the CPE guidelines for information on how to submit.

www.isc2.org
© 2019 (ISC)2, Inc. All rights reserved.
field notes ¦ ¦ ¦ EDITED BY DEBORAH JOHNSON

A ROUNDUP OF WHAT’S HAPPENING IN (ISC)2 COMMUNITIES

The (ISC)2 Professional

1 IN 10
RISING RISKS

Development Institute is Growing


I
Even more opportunities for members to expand their skills

URLs are malicious

UP 33 %
N RESPONSE to the growing demand from members, (ISC)2 earlier
this year established its Professional Development Institute. The
Institute offers a variety of free online development courses to
members and associates, which are also available for purchase Mobile ransomware
by non-members.
A successful pilot launch in 2018 offered three development courses: attacks in 2018

48 %
GDPR for Security Professionals; DevSecOps; and Building a Strong Culture
of Security.
“The Professional Development Institute is a recognition that cybersecu-
rity education is a lifelong journey, and that achieving professional certifica-
tion, while important, is only one stop along the way,” says (ISC)2 CEO David
Shearer, CISSP. “These new CPE opportunities are enriching and rewarding Of malicious email
and provide valuable, topical insights that will help our members continue to attachments are Office
grow and progress.” files, up from 5% in 2017
Mirtha Collin, education director for (ISC)2, leads the Professional

2
Development Institute, including a growing team that will manage content Source: 2019 Symantec Internet Security Threat Report
https://www.symantec.com/security-center/
development, curriculum building, quality control, communications, logistics threat-report
and administration. In this edition’s Executive Letter, she describes PDI as
“a go-to resource for timely and relevant continuing educational opportuni-
ties to keep members’
skills sharp and curiosity READ. QUIZ. EARN.
“These new CPE opportunities piqued.”
are enriching and rewarding The program is Earn Two CPEs for
expected to grow quickly. Reading This Issue
and provide valuable, topical By mid-2019, there will
insights that will help our be nine courses available
Please note that (ISC)2 submits CPEs
for (ISC)2’s InfoSecurity Professional
members continue to grow covering topics including magazine on your behalf within five
leadership, cloud security business days. This will automatically
and progress.” and IoT. By the end of this assign you two Group A CPEs.
—David Shearer, CISSP, CEO, (ISC)2 year, Collin estimates that Note: To access this members-only
platform and quiz, you’ll need a Blue Sky
there will be as many as
account. If you don’t have an account, go
30 new courses offered. Her team will be looking for feedback from members to the Blue Sky homepage via the link and
as well, she explains. “We will refresh the catalog of courses we provide based click on “Create User Profile” in the upper
on ongoing dialogue with and input from our membership.” right-hand corner.
Inquiries related specifically to PDI, including topic ideas, can be directed https://live.blueskybroadcast.com/bsb/client/
CL_DEFAULT.asp?Client=411114&PCAT=7777&-
to [email protected]. For more information and to access online courses, please CAT=10814

visit www.isc2.org/development. •

RETURN TO
InfoSecurity Professional | 9 | May/June 2019 CONTENTS
¦¦¦ field notes

Time to Focus on Look, Don’t Leap: What to


Mobile Security
We may have improved information Know Before Diving into
security in the office but are we
secure on the road?
Machine Learning

I
Excerpted from the April (ISC)2 Insights e-newsletter
Mobile devices are often able to ac-
cess the most crucial company data,
but does that mobility put our data at
greater risk? Despite drums sound-
ing on mobile security for years, DC ANTICIPATES a $57.6 billion worldwide
Verizon’s Mobile Security Index 2019 investment in cognitive and artificial intel-
shows that mobile devices continue ligence (AI) by 2021, which means there’s a
to be ignored or dismissed when it good chance your company is considering,
comes to security protections. if not already buying or building, AI and machine
Verizon surveyed 700 profes- learning (ML) solutions for both business processes
sionals involved in buying, managing and security operations.
Paulo Shakarian
and securing mobile devices for their Paulo Shakarian, CEO and co-founder of
organizations. Some 67 percent ac- CYR3CON, which uses AI to predict cyberattacks,
knowledged they were less confident offers some words of advice—and a few warnings—to make sure AI and ML
about the security of mobile devices implementations and ongoing usages work as intended and do not lead to data
than other devices. Not surprising, leakage and other potential cybersecurity threats.
then, that more companies admitted
they’d suffered a compromise that Beware of the hype.
involved a mobile device—33 per- Do your homework before you spend a dime (or thousands of dimes), cautions
cent in the 2019 survey compared Shakarian. “The hype is mainly coming from vendors. … The CISOs then feel
to 27 percent in 2018. pressure from the executive suite.”
The vast majority, 83 percent of
survey respondents, though, say the What to do before you buy.
risk from mobile threats remains Shakarian recommends doing adequate due diligence before an AI/ML
high, and a similar number (85 per- purchase.
cent) say they need to take mobile
device security more seriously. Engage the board.
When companies were asked
“Board members often come across innovations. It’s up to the CISO,”
what they’re doing to improve mobile
security, more than two-thirds—69
Shakarian says, “to coach board members on the pros and cons.”
percent—said they would be spend-
Know your business needs.
ing more next year on mobile protec-
tions. At the same time, 77 percent Not every solution requires AI, Shakarian counsels. “If you’re looking to pre-
thought that the biggest barrier to dict something; if you’re looking to find something that is abnormal and that
protecting data on mobile devices would normally require human interaction; if you’re looking to optimize the
was a lack of user awareness. decision-making process in an automated way—I see those as the holy trinity
Be it money or education, the of AI, probably 90 percent of what you need AI and machine learning for.”
directive is clear, according to
Thomas T.J. Fox, SVP, Wireless Challenge the vendor.
Business Group at Verizon: “It’s When listening to a pitch from a vendor, Shakarian advises information secu-
time to close the chasm between rity professionals get answers in some crucial areas.
levels of protection.”
To read the survey in full, go to Peer review.
https://enterprise.verizon.com/re- The first question to ask, Shakarian says, is whether the underlying technol-
sources/reports/mobile-security-in- ogy in the product has undergone peer review. “If it’s not, that should be a big
dex/#report.• alarm bell if they’re vetting their own stuff.”

RETURN TO
InfoSecurity Professional | 10 | May/June 2019 CONTENTS
¦¦¦ field notes

Relevant data. can’t tell the difference between failure and your normal
Does the data fed to algorithms make sense? Shakarian error rate. Whereas, if there’s some level of transparency
posed that question in a blog post on this subject. of how it’s producing the results, the user can check up
“Regardless of how fancy an algorithm or piece of software on it.”
is, it’s making the prediction based on some piece of data—
and you should ask the vendor what that is and ask him or Updates to the machine learning model.
her why it makes sense.” “…expect that the model is being updated on a regular
basis by the vendors. If it’s not, that, I think, is a major red
Data security and reliability. flag because there’s a high chance that the product might
Unless your company is large enough to afford a data scien- not work as advertised.”
tist or data science department, you’re going to outsource
to an AI/ML provider. This raises the scrutiny required to
ensure these providers keep your data safe and available at Before succumbing to the siren song of machine learning
all times. as the business solution, Shakarian believes you should ask
if such a solution is needed at all. “Does the business need/
“Transparent” algorithms. require AI or machine learning to address it in an impact-
In order to monitor accuracy, you need transparency, ful, sustainable way?” If the answer is yes, then you have a
Shakarian warns. If the algorithm is a “black box, you roadmap here to follow. •

Duo’s Trusted Access solutions

• Agentless device insight and


trusted access policies

• Secure BYOD devices and GFE

• Cloud first with support for


on-premises apps

• Helps to meet NIST 800-53/63/171

• Supports NIST SP-800-63-3

-2 validated) tokens

Sign up for a
free trial at duo.com

RETURN TO
InfoSecurity Professional | 11 | May/June 2019 CONTENTS
¦¦¦ field notes

¦¦¦ RECOMMENDED READING


(ISC)2 Security
Suggested by Larry Marks, CISSP, CISA, CISM, CFE, PMP, CRVPM, CRISC, CGEIT, ITIL
Congress 2019
Analogue Network Security: Time,
Broken Stuff, Engineering, Systems,
My Audio Career, and Other Musings
on Six Decades of Thinking About It All
By Winn Schwartau

C
(SchwartauHaus, 2018)

YBERSECURITY VETERAN Winn


Schwartau asks us to rethink how
Orlando
A reminder that early bird registra-
we approach security. Rather than tion for this year’s Security Congress,
focusing on the standby clichés which will be held in Orlando from
like “A user cannot be 100 percent hacker proof,” and October 28 to 30, is open through
“Vendors don’t guarantee their products,” or “Firms August 15. If you’re interested in
can’t measure the effectiveness of the security they already have in place,” hearing from fellow member experts
he suggests a more active approach. In Analogue Network Security, Schwartau about the latest trends, networking
advocates faster detection time, and faster response time with highly auto- with colleagues and partners in the
mated policy-driven planning. cybersecurity industry, and earning
Schwartau’s analog review relies on a time-based, out-of-band review of CPEs while you do it, click here to
authentication. DDoS can be mitigated, he maintains, with graceful deg- register today. •
radation. He provides a survey form to help the security professional track
designed times and designated times. Implementing redundant mirroring,
reaction matrix command and control servers and real-time information
sharing can provide several answers for security professionals to consider.
Same goes for machine learning and probability models created by vendors
PAYOFF
and firms that can help analyze their threats and risk and actions that are

considered.
Schwartau acknowledges that we are not perfect and we can’t be right in
all circumstances, but we must try to measure with a level of precision and
granularity. He doesn’t advise the best security tools for specific circum-

$6.5
stances but, rather, tackles the current issues with a more holistic approach.
Winn Schwartau has been honored as a “Power Thinker” and one of the
50 most powerful people in networking by the online resource Network World.
He was voted one of the 25 most influential people in the security industry
by Security Magazine. Schwartau is the founder and president of the Security
Awareness Company (formerly Interpact, Inc.) and is the chairman of the

BILLION USD
board of security and compliance company Mobile Active Defense.
Security professionals looking for quick checklists for actions that can
be implemented should consider some of the author’s approaches. Thanks,
Winn, for giving us the alternatives. • Paid in 2018 in response
Image: iStock

to SamSam ransomware
The author of Recommended Reading did not receive financial compensation from the book attacks
publisher, nor a free copy of this book. All opinions are his alone. Source: Sophos Labs 2019 Threat Report

RETURN TO
InfoSecurity Professional | 12 | May/June 2019 CONTENTS
SUMMIT / DENVER

JUNE 28, 2019

Defining Cybersecurity
Join us in Denver for Official (ISC)² Pre-Conference Training.
2-Day and 5-Day courses offering more education
opportunities, more CPEs, and a discount on registration
if you attend classes and the Summit.

Secure Summit Denver


will feature these four topics:
• Defining the profession
and your responsibilities
• Defining threats
Why You Should Attend • Defining new technologies
• Gain tools and resources to • Defining industrial control
become a more effective and systems and IoT
well-rounded practitioner
• Complement broad understanding
of cybersecurity strategies
and principles
• Strengthen your organization’s
security posture

Register Now
• Network with like-minded
professionals
• Earn valuable CPE credits
#nextchapter ¦ ¦ ¦ EDITED BY DEBORAH JOHNSON

¦¦¦ (ISC) 2 MELBOURNE CHAPTER

Engaging the Community in Cybersecurity


(ISC)2 Melbourne Chapter uses its meetings to spread the word on current needs

(ISC)2 Melbourne Chapter


meeting: “Cloudy with a
Chance of Hackers”

“CLOUDY WITH A CHANCE OF HACKERS”—that’s one of


the recent presentations hosted by the (ISC)2 Melbourne
Chapter as part of its bimonthly meetings. Focusing on key
security challenges and perimeter controls, the meeting is
typical of the knowledge-packed sessions the chapter hosts.
“As an official chapter of (ISC)2, we’re keen on ensuring
quality cybersecurity is brought to the community, keeping
in mind the essence of knowledge sharing,” says chapter
president Dhananjaya “DJ” Naronikar.
The chapter, with 641 members currently (and growing
rapidly), relies on its meetings and presentations to attract
a wide variety of attendees, including university students
pursuing cybersecurity programs, graduates keen to pursue
a career in cybersecurity, experienced professionals and
even CISOs from organizations who attend not only for the
knowledge shared, but also to network for talent. Adds DJ, Chapter President Dhananjaya
“Our meetings are hugely popular as the chapter looks to Naronikar leading a discussion.
bring in the best speakers from around Australia to present
about very topical areas of cybersecurity.”
Another incentive is that the chapter does not charge events, which is enabled by strong partnerships with local
members for attending the knowledge sessions/networking sponsors, including E&Y and PwC and other Melbourne
firms.
Getting the word out to the community is key. The
(ISC)2 MELBOURNE CHAPTER chapter uses social media platforms like LinkedIn,
Contact: Dhananjaya Naronikar, President, (ISC)2 Melbourne Facebook, Twitter, Eventbrite and the chapter’s own web-
Chapter site. The chapter board is committed to presenting topics
Email: [email protected] that are timely and critical to members and other attendees,
from cloud security, to DevSecOps, OT/ICS security and
Website: http://isc2melbourne.com
beyond. •

RETURN TO
InfoSecurity Professional | 14 | May/June 2019 CONTENTS
¦¦¦ #nextchapter

Q&A
This is to provide equal opportunity
and encourage more participation in
the chapter activities.

You mentioned that you have quite


Dhananjaya “DJ” a few students attending the chapter
presentations. Given the predicted
Naronikar shortfall in cybersecurity profession-
als, how does the chapter encourage
President, (ISC)2 Melbourne Chapter “The board has more students to become members
representation from a of the tech community?
The Melbourne Chapter is working
What tactics do you use to attract top
cybersecurity startup with many universities locally (e.g.,
speakers as well as strong sponsors? company, Big Four La Trobe University). We’re plugged
One of the key factors to attract speakers consulting firms, into working directly with the profes-
and sponsors alike is the composition sors/lecturers of these universities to
of (ISC)2 Melbourne Chapter’s board of professional services increase student memberships into
directors. We have diverse representa- firms and industry the local chapter and participation
tion from across the industry that helps in chapter meetings. The Melbourne
in reaching out to talented professionals
verticals.” Chapter also works with Tony Vizza,
(CISOs, cyber specialists, etc.). The —Dhananjaya “DJ” Naronikar CISSP, (ISC)2 director of cybersecurity
board has representation from a cyber- advocacy for the APAC region, when it
security startup company, Big Four comes to establishing connections with
consulting firms, professional services firms and industry various universities and their students.
verticals. This helps in initiating conversations necessary
to rope in speakers and sponsors. Where necessary, we also Looking at the future, what are the key cybersecurity
post a call for speakers through our social media channels. challenges facing members?
This is to make sure we have speaker representation from Key challenges are:
across the spectrum. • Easy access to certification study material.
• (ISC)2 memberships (to enable students to access
What methods do you use to gauge members’ interests in member-only material).
various topics? • Training costs for students (and professionals) who
We use several methods: the interactions the board mem- are looking to pursue various (ISC)2 certifications.
bers have with the wider security community, the trends • The availability of too many security programs/cer-
that we notice on social media, and when we come across tifications in the market, often making it difficult or
a talented and skilled professional who is keen to share his/ confusing to students/graduates when trying to select
her knowledge, then we tailor the topic to suit their skills. the appropriate program. •

STRATEGIES NEEDED AFTER THE BREACH DANGER ABOUNDS

55 76

% % 6.4 BILLION
Fake emails sent
worldwide every day
Of organizations do not Of organizations increased
Source: Ernst & Young Global Information
make “protecting” part their cybersecurity budget Security Survey 2018-19 of 1,400 respondents
of their strategy after a serious breach including CISOs, CIOs and other managers

RETURN TO
InfoSecurity Professional | 15 | May/June 2019 CONTENTS
EARLY BIRD
PRICING
through August 15
Oct. 28 - 30 • Orlando, FL • Swan & Dolphin
(ISC)² Members 4000+ Attendees Earn up to
SAVE $200 & 100+ Sessions 46 CPEs
All Access Pass Benefits:
• Educational Sessions, Keynotes • Town Hall & Career Center
& Workshops • Networking Night
• Networking Luncheons • CSA Summit &
• Expo Hall Expo Hall Pub Crawl

SAVE $50
Off All Access Pass
with code:

INFOSECD18
REGISTER TODAY!

congress.isc2.org
#ISC2Congress
¦¦¦ PRIVACY

TIME TO
Smarten Up BY ANITA J. BATEMAN, CISSP

Our AI devices may be giving


away too much information.
What should we do?
IT WAS THE DISCUSSION about hardwood floors that finally
convinced an Oregon couple that their private conversations
were not only being recorded, but sent to a random contact in
Seattle, courtesy of Amazon’s Echo Dot.
The contact, one of the man’s co-workers, warned them to
unplug their smart devices. “You’re being hacked,” he told them.
They didn’t believe him until he replayed part of a recent con-
versation about hardwood floors.

IMAGERY BY JOHN KUCZALA

RETURN TO
InfoSecurity InfoSecurity | 17 | May/June
Professional Professional | 17 | 2019
May/June 2019 CONTENTS
Amazon called it an isolated incident, most likely CONFIDENTIALITY AND PRIVACY
triggered by someone using words that were interpreted Smart speaker vendors provide access to your audio files in
by the machine as “record” and “send.” several ways. Amazon and Google provide you with access
As with most new technology areas, the smart speaker to your recording history for replay and allow you to delete
and AI home device market has quickly accelerated over the recordings. Apple analyzes logs and then erases them,
the past five years since Amazon introduced the Alexa and so there is no history for you to replay or erase.
Echo in November 2014. The major players—Amazon, The question around confidentiality comes down to how
Google, Microsoft and Apple—have a large range of prod- much we trust our device vendors to abide by their privacy
ucts, and other global vendors have rolled out new solutions and security claims. In addition to your audio files, these
in the past two years (see A Timeline of Voice Assistant and devices connect to your other personal accounts, such as
Smart Speaker Technology From 1961 to Today). your Amazon Prime account with credit card and other
We are challenged as consumers and as cybersecurity sensitive data, or your Google email account and other
professionals to keep up with this technology pace. Beyond Google services. We need to hold vendors accountable to
the challenges for end users to understand these devices, make sure that they protect our sensitive data, especially
the growth of the technology in this space provides inter- when a device can be accessed by multiple users.
esting legal, ethical and personal The confidentiality topic is
dilemmas for us to examine with closely tied to privacy. Capturing
our cybersecurity “hats” fully on.
From music and weather to “Those who audio data to learn about us as
consumers is critical to the business
home security, thermostats,
appliances, smart offices, health- choose to use this models of Amazon and Google, as
well as other vendors. The sharing
care and even fashion advice, the
use cases are multiplying rapidly technology can’t of our data with third parties is
broader and wider than we might
for smart speakers and other smart
assistant devices (see “The Buzz” and shouldn’t have initially imagined.
Bill Brenner, now a research
on p. 19).
So, how do we approach this expect 100 director at IANS, wrote in a 2017
NakedSecurity blog post: “Those
broad topic as cybersecurity
professionals? percent privacy.” who choose to use this technology
can’t and shouldn’t expect 100
Let’s look at how smart speaker percent privacy. If not for the
—Bill Brenner, research director, IANS
devices are handling the cyberse- ability of Amazon Echo and Google
curity CIA triad of confidentiality, Home to listen, these things would
integrity and availability, and let’s become nothing more than doorstoppers and paperweights.”
add privacy as a component of confidentiality for this dis- Brenner provided a few recommendations to protect
cussion. Most of us are familiar with these critical tenets, ourselves when using these devices.
but to help ground us, here is a quick refresher from the
• Mute your device when you are not using it. Or even
Infosec Institute.
better, consider unplugging it.
Confidentiality “…states that access to information,
• Don’t connect your sensitive accounts to your device.
assets, etc. should be granted only on a need to know basis
so that information that is only available to some should not • Erase your old recordings on a regular basis.
be accessible by everyone. • Tighten up and review your device security settings.
Integrity makes sure that the information is not tam-
pered [with] whenever it travels from source to destination Dr. Florian Schaub, an assistant professor at the
or even stored at rest. University of Michigan, is focusing his research around
understanding privacy and security behaviors and percep-
Availability [as a] concept is to make sure that the tions in order to identify the security flaws in these prod-
services of an organization are available.” ucts. In a recent article, Schaub and his co-authors make
Privacy, as defined by the Merriam-Webster the case for “strong standards for IoT security and privacy
dictionary, is “freedom from unauthorized intrusion,” protections … in order to establish a reasonable baseline
whereas the legal interpretation of privacy includes a consumers can rely on. Security certifications of devices
person’s right to control how their information is could further ensure that certain standards are met by a
collected and used. device … similar to safety seals for electronics products.

RETURN TO
InfoSecurity Professional | 18 | May/June 2019 CONTENTS
H
THE BUZZ
HERE ARE SOME recent news stories and usage scenarios that have everyone talking:
• Amazon Workers Are Listening to What You Tell Alexa
• Google Nest Secure home security system revealed to have a microphone that can be enabled as a smart
assistant.
• Did Alexa Hear a Murder? We May Finally Find Out
• Alexa and Third Parties’ Reasonable Expectation of Privacy
• CSI Alexa: The Smart Home Has Become the New Crime Scene Witness
• Amazon Alexa Will Come Built-In to All New Homes from Lennar
• Toyota and Lexus Vehicles Will Add Amazon Alexa This Year
• Panasonic Adding Google Assistant and Amazon Alexa to Future In-car Infotainment
• Kia adds Google Assistant to Infotainment System
• Google Assistant Is Coming to Android Auto
• Amazon’s Blockbuster Alexa Event Made Zero Mention of Privacy Concerns
• Research has demonstrated an approach for how to attack smart speaker systems using directional sound
beams.1
• The Amazon Echo Look with Alexa provides fashion advice.
• Smart speakers in healthcare remind patients to take medication, check blood sugar or provide other daily
activity reminders.
• Additional research projects are branching out into voice recognition of individuals, sentiment recognition,
inferring child behavior, keyword identification (for advertising, law enforcement or other use) and leverag-
ing wearable technology for security improvements. 2, 3

FOOTNOTES:
1
“POSTER: Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams,” CCS ’18, October 15-19, 2018,
Toronto, ON, Canada; By Ryo Iijima, Shota Minami, Zhou Yunao, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa and Tatsuya Mori
2
“Understanding the Long-term use of Smart Speaker Assistants,” by Frank Bentley, Chris Luvogt, Max Silverman, Rushani Wirasinghe,
Brooke White, Danielle Lottridge; Proc ACM Interact. Mob.
3
“Wearable Technology Brings Security to Alexa and Siri,” GetMobile, March 2018, Volume 22, Issue 1, pages 35-38.
—A. Bateman

Companies need to truly provide transparency about smart concrete information or assurance about how their data is
speakers’ data practices to consumers, including what data being stored, accessed, used or protected. Many of us may
is collected, how long it is stored, who has access to it and not realize that our voice data may reveal a great deal about
how it is protected.” us—including gender, age, nationality or even mental state.
In a recent discussion with Schaub, he highlighted that We need to pay attention to how our personal data is being
most smart speaker vendors’ privacy policies and terms of used and shared.
service are vague and do not provide consumers with much Consider the scenario in which you have a smart speaker

RETURN TO
InfoSecurity Professional | 19 | May/June 2019 CONTENTS
in your home and you have a visitor. Then ask yourself: the main intent for smart speakers is to be available to you
• Where is your smart speaker located in your home? when you want to use them. The devices are “always on”—
waiting for their special “wake word” or keyword. The
• What is your visitor’s expectation of privacy?
ability to change the wake word is available from Amazon
• What is your obligation to them? and Google; however, Apple has not caught up yet (you are
• Are you obligated to inform them of the presence of not allowed to rename Siri).
a smart speaker and its on/off status? The ability to easily turn your device off and back on is
• What about other audio-enabled devices, like thermo- another feature to consider. Most products provide a physi-
stats or appliances, that you have in your home? cal button that will mute the device or disable the speaker;
however, you must physically take action to use it. The
There are plenty of positive use cases for these devices, ability to issue a voice command to turn off or mute your
including providing more accessible technology for those speaker has not been implemented.
with disabilities. However, we must also consider our In general, if you are concerned about availability, the
individual responsibilities and the default settings will provide
expectations of privacy for visitors what you need. If you are more
concerned about privacy than
to our homes. This technology is
recently starting to make its way This technology is availability, you might consider
when to mute or even unplug
into the business office environ-
ment, introducing more confidenti- recently starting your smart speaker devices in
your home.
ality challenges to consider.
to make its way Availability can also be bal-
anced with providing the neces-
INTEGRITY into the business sary parental control capabilities.
Google and Amazon both have
Integrity involves the assurance
that information is not tampered office environment, options that support content
filtering and profile setup for
with in transit or at rest. Tampering
with voice data requires more tech- introducing more kids’ use. The Amazon Echo
Kids Edition even includes a
nical know-how but is still feasible.
Research from October 2018 confidentiality manners setting that requires
the speaker to say “please” and
in Japan was able to demonstrate
the ability to insert inaudible voice challenges to “thank you.”
We have taken a very brief
commands into the environment
and manipulate the behavior of consider. look at smart speakers and how
both Amazon Echo and Google they support confidentiality,
Home devices. privacy, integrity and availabil-
Other research has looked at possible attack vectors ity today. This article did not delve into third-party data
for the Amazon Echo. The multiple user scenario can be sharing or third-party “skills” for Amazon devices or Google
problematic when it comes to integrity, as a guest could Play apps. Those are topics for another day and are addi-
get access to information on a device for which they are tional threat vectors for smart speaker devices.
not authorized. I expect some of us in the cybersecurity community
Amazon and Google allow their devices to be configured are involved directly in product development for smart
to access multiple, different accounts. While Amazon and speaker technology, and more of us may be involved in the
Google devices can be trained to recognize your voice, this expanded use cases described earlier. We are beholden to
does not appear to be the default configuration. “An amus- our community and for the greater good to work diligently
ing story of an African grey parrot able to mimic its owner’s to continue to advance smart speaker technology and
voice activating a smart speaker and conducting internet uphold the CIA tenets within our spheres of influence. •
shopping illustrates some of the technical limitations of
smart speakers,” according to a health law blog post.

ANITA BATEMAN, CISSP, is director of IT services for Ohio-based


AVAILABILITY automotive manufacturer Dana and a past contributor to InfoSecurity
Availability is an interesting characteristic to examine as Professional.

RETURN TO
InfoSecurity Professional | 20 | May/June 2019 CONTENTS
¦¦¦ GRC

CCPA vs. GDPR


An overview of growing pro-privacy legislation
in California and across the U.S.
BY JENNIFER J. SOSA, ESQ.

PERSONAL DATA is a critical asset for many companies, and governments are requiring greater
transparency and accountability in how they use and manage it.
Last May, the European Union’s General Data Protection Regulation (GDPR) came into effect
after being highly anticipated by both domestic and international businesses. GDPR unified the
data privacy laws of EU-member countries through a wide-ranging piece of legislation that affects
companies doing business with any citizen of an EU country. The regulation is designed to expand
consumer rights and control over personal information and require transparency in how companies
treat personal data.

ILLUSTRATION BY ENRICO VARRASSO

RETURN TO
InfoSecurity Professional | 21 | May/June 2019 CONTENTS
The CCPA is often
described as being
modeled after the
Many organizations felt compelled, resident is currently obligated to develop,
even prior to the enactment of GDPR, GDPR and shares implement and maintain a compre-
to evaluate their business processes hensive written information security
and policies regarding the use of data many similarities program that incorporates the pre-
and proactively implement programs to
facilitate regulatory compliance with
with its EU scriptive requirements contained in the
regulation.”
the regulation. That trend should now counterpart. An important takeaway here is that
accelerate. states seem to be evaluating their privacy
Nearly a year later, several U.S. states regulations and are likely to require com-
have not only taken notice of GDPR, but they also have panies to adopt or update their data governance programs.
drafted or adopted legislation that mimics or even extends As legislation spreads throughout the United States,
the EU regulations. As the regulatory landscape surround- it will become more difficult to recommend or rely on
ing data security and privacy continues to expand beyond one rigid set of practices for data privacy compliance.
GDPR, the critical question becomes: What more is needed Companies should not rely on piecemeal preparation for
to be compliant, or prepare for compliance, with such compliance, but rather should aim to create a baseline
regulations? information governance program that can be adapted to
California is currently at the forefront of state data meet unique state requirements.
privacy law efforts. As a hub for many science and technol- Although it is unclear at this time how a company can
ogy leaders, California developed legislation to prioritize demonstrate complete compliance with the CCPA and
consumer rights concerning the privacy of collecting and other new regulations, entities should make reasonable
using personal information. To that end, on June 28, 2018, efforts to leverage their GDPR compliance work and other
California hurriedly enacted the California Consumer existing data management policies to install programs that
Privacy Act of 2018 (CCPA). The CCPA takes effect on will help them prepare for data breaches and data requests
January 1, 2020 and aims to create new and powerful con- before they occur.
sumer rights over personal data and to set data protection Features of an effective and defensible data management
standards for businesses. program should include:
The CCPA is often described as being modeled after the • Understanding what data is being collected, from
GDPR and shares many similarities with its EU counter- whom it is being collected, the purpose of the
part. For instance, both regulations encourage transparency, collection, where the data is stored and the
require businesses to report data breaches, and attempt to lifecycle of the data;
provide greater security for personal information. • Creating and implementing best practices to respond
However, there are a number of differences between the to requests for access, deletion and opt-out;
two regulations. Organizations that took steps to comply • Creating universal privacy policies and implement-
with GDPR will now need to assess whether additional ing them companywide to ensure consistent best
processes should be added to their current compliance pro- practices;
grams in order to be better prepared for CCPA enactment. • Implementing data security protocols to prevent and
The chart (see next page) highlights certain differences be alerted to data breaches;
between the GDPR and the CCPA. • Creating systems and protocols for responding to
The implementation of the CCPA will create challenges emergency security incidents; and
for businesses attempting to translate its requirements • Instituting straightforward methods of communicat-
into business operations, policies and practices to facilitate ing about data privacy issues and problem solving.
compliance. The importance of developing such processes
cannot be overlooked, as potential civil fines and damages Data privacy should be central to a company’s infor-
arising from private action have the potential to quickly mation security and compliance program. It is critical for
become significant. legal, IT, business, human resources, marketing and secu-
The requirements of the CCPA are likely to be replicated rity compliance teams to work together to identify changes
or even expanded throughout the United States. At last in requirements of existing and new regulations and contin-
count, nine states have either amended or introduced bills ually update the company’s data risk control mechanisms. •
concerning data privacy and data security. For example, on
January 19, 2019, Massachusetts amended the state’s data
breach law, providing in part that “any entity that owns JENNIFER J. SOSA, Esq., is the director of information security and
or licenses personal information about a Massachusetts compliance services at TransPerfect Legal Solutions.

RETURN TO
InfoSecurity Professional | 22 | May/June 2019 CONTENTS
CCPA GDPR
WHO IS REGULATED
Any for-profit entity doing business in California that satisfies Data controllers and data processors that are either:
one of the following tests: • Established in the EU and process personal data in the
• Has gross annual revenue in excess of $25 million; or context of the activities of an establishment in the EU, regard-
• Annually buys, receives, sells or shares the personal less of whether the data processing occurs in the EU; or
information of more than 50,000 consumers, households • Not established in the EU that process the personal data of
or devices for commercial purposes; or EU data subjects in connection with offering goods or
• Derives 50 percent or more of annual revenue from selling services in the EU or monitoring their behavior.
personal information.
The law also applies to any entity that either:
• Controls or is controlled by a covered business; or
• Shares common branding with a covered business.

WHO IS PROTECTED
Consumers—a natural person that is either: Data subjects, defined as identified or identifiable persons to
• In California for other than a temporary or transitory purpose; whom personal data relates.
or
• Domiciled in California but outside of California for a tempo-
rary or transitory purpose.

WHAT INFORMATION IS PROTECTED


Personal information that identifies, relates to, describes, is Personal data is any information relating to an identified or
capable of being associated with or could reasonably be linked, identifiable data subject.
directly or indirectly, with a particular consumer or household.

PRIVACY NOTICE
Businesses must notify consumers of: At the time that personal data is obtained, the data controller
• The categories of personal information collected; and must provide information about its personal data collection and
• The purpose for which the categories will be used. processing. The notice must include specific information that
is dependent on whether the data is collected directly from
the data subject or from a third party.

OPT-OUT RIGHT
Businesses must notify consumers of their right to opt-out of the The GDPR does not enumerate a specific right to opt-out of
sale of personal information to third parties, and must comply personal data sales.
with consumers’ opt-out requests.

RIGHT OF ACCESS
Consumers have a right to obtain their personal information Data subjects have a right to access personal data that is being
collected by any regulated entity, as well as additional informa- processed, and data controllers are obligated to provide a copy
tion, including the business or commercial purpose for collecting of the personal data undergoing processing and disclose certain
or selling the information and categories of third parties with information about the processing.
whom the business shares information.

RIGHT TO DELETION
A consumer has the right to request that a business delete any Data subjects have the right to request erasure of personal data
personal information about the consumer that the business has from the controller under six circumstances.
collected, subject to certain exceptions. Data controllers who have made personal data public must
Upon receipt of such a request, the business must delete the take reasonable steps, including technical measures to inform
consumer’s personal information from its records and direct its controllers that are processing the personal data that the data
service providers to delete the data. subject has requested the erasure.

CIVIL FINES
The California Attorney General can bring an action for up to Administrative fines can reach ¤20 million or 4 percent of annual
$7,500 per violation of the CCPA if a business does not cure global revenue, whichever is higher.
its violations within 30 days of being notified.

PRIVATE RIGHT OF ACTION


The CCPA provides a private right of action for certain data The GDPR recognizes a private right of action for any person
breaches of nonencrypted or nonredacted personal information. who has suffered damage caused by a data controller or data
Consumers may seek the greater of actual damages or statutory processor’s infringement of the GDPR.
damages ranging from $100 to $750 per consumer per incident.
Companies are given a 30-day window to cure violations, if
possible.

RETURN TO
InfoSecurity Professional | 23 | May/June 2019 CONTENTS
¦¦¦ TECHNOLOGY

10 LESSONS LEARNED

MICROSERVICE ECOSYSTEM
SECURING A

BY EMIL P. MAN, CISSP, CCSP

DRIVEN BY THE NEED to remain competitive and to meet today’s consumer


expectations, organizations modernizing their IT infrastructure are rapidly
adopting decentralized software architectures and adding layers to the tech
stacks. Factor in reliance on public, cloud-hosted applications, and the ever-in-
creasing complexity can be quite daunting.
While every path to modernization can be quite different, my team is man-
aging such a digital transformation, and perhaps the lessons we’ve learned will
benefit your organization in building and securing your microservice ecosystems.

ILLUSTRATIONS BY BEN O’BRIEN

InfoSecurity Professional | 24 | May/June 2019


1. Software supply chains and the entire infrastructure Image repositories and secure images. A lightweight
have become more complex. image that has a minimal footprint, with just the bare
Concerns run the gamut from the mobile client that runs essential packages to run your component, is absolutely
your app and how it authenticates and authorizes, all the essential. Once that image is built with your software, it
way to the back-end identity and access management. needs to be stored in a repository if you want other teams
Furthermore, automated software deployments can allow to use that component or to ensure you are using the latest
a bad actor to make a change much faster, making it harder version. Keep up with your images in the repository by
to detect. The speed at which an internal threat becomes using tagging methodologies and eliminate stale images
a public vulnerability is growing in velocity. that may contain vulnerabilities.
Persistence and immutability of the image you have
2. The entire ecosystem needs to be on your radar. built. A core concept of microservice architecture environ-
For example, an automated method to increase deployment ments, it’s essential to have a clean image and not store data
speed brings increased risk. By adding functionality so that within it.
new features can be A/B tested and customers can start
seeing improvements earlier, more of your continuous inte- 3. Revisit your API security strategy.
gration/continuous development (CI/CD) pipeline needs to Application workloads increasingly are moving to the
be automated. cloud. Carefully consider your API security strategy for the
This also increases the potential for a small piece of framework DevSecOps teams will use to do their work and
malware to “sneak” into production. Despite static code deliver products to your customers.
analysis at build time, or even dynamic and penetration Teams should not publish public APIs without at least
testing before a build is released, the predominance of the following: (a) authentication; (b) load balancing; (c) a
“shadow IT” tools hiding in your organization makes it web application firewall; and (d) input and output valida-
simple enough for an attacker to inject malware that can tion of the data that is moving in and out of your applica-
turn into a side-channel attack on your entire infrastruc- tion through that API. It would be best to map and correlate
ture without your knowledge. this to a data dictionary that was defined by the team, but
This is why it is absolutely critical to monitor: it is often not available, or is constantly changing. A data
The source code and device being used to develop that dictionary can also be used by the analytics group and
code. Picture a star developer who has shadow IT software data scientists to build their models, so it serves multiple
on his laptop and gets infected with malware that makes it purposes.
into the source at build time. This is what it means to mon-
itor the entire software supply chain. One recent example 4. A compromised container can be extremely dangerous.
was the “BitPay wallet vulnerability” in which a node.js Analyzing “east-west” traffic is complex in a containerized
library was used to specifically target crypto wallets. The environment running hundreds or thousands of micro-
library in question was an “event-stream” used for stream- services. A compromised container means an attacker
ing data in all node.js applications and had a wide reach could have visibility to inter-container traffic, or possibly
but targeted crypto wallets specifically. to extract sensitive data. It also means that a container
The build server. Not many methods are easier than could be dead (containers are supposed to be short-lived)
compromising a company or an application than by simply before necessary logs are retrieved to do a forensic analysis.
injecting malware at the build server where often it will Centralized logging can help while you send container and
automatically get pushed to deployment after validation. application logs to a central repository outside of the con-
Test infrastructure. A prime target for attackers, it will tainer. Look at Fluentd as a possible solution and combine
most likely have the necessary permissions to push infected it with Prometheus.
code down the supply chain into production, enabling them
to push their malware further downstream. 5. Implement a service mesh.
Deployment tools such as Ansible or Puppet. Through At a high level, a service mesh within a microservice
automation, these servers usually have the necessary architecture provides a dedicated infrastructure layer built
permissions to push whatever code makes it to this stage. into an app to allow more control over how data is shared
If necessary controls aren’t in place, attackers can insert between apps in this environment. This adds a layer of
malware into applications here and use often-undetected complexity, but without a service mesh in place, it will be
side-channel attacks to get access to personally identifiable difficult to encrypt between services and is necessary for
information (PII) at “run-time.” total, end-to-end encryption.

RETURN TO
InfoSecurity Professional | 25 | May/June 2019 CONTENTS
CI/CD Pipeline

Service Mesh
IAM

Centralized
Logging and APIs
Monitoring
Microservices

Administra-
tive and RBAC DevOps
Controls

Vaulting
Container
and Secrets
Immutability
Management

Container-
Aware Data
SDLC Ecosystem Storage

The idea of a “zero trust approach” to security has been 7. Achieving maturity is hard. Expect a lot of
on everyone’s radar recently. For a zero-trust microservice growing pains.
architecture, we would need to verify each identity and not A lot of applications and diverse product lines mean that
assume that if you are in the same namespace, a service there is a tendency for the external architecture of support-
should be trusted. Furthermore, to ensure that no east- ing tools to become quite complex and hard to manage. In
west traffic sniffing is going on, a service mesh is the only large organizations where individual needs must be satisfied,
possible way to achieve transport security. It looks like the there will always be a tendency to try to centralize people
default standard here will be the open-sourced Istio. around their specific function. This type of control can
endanger the microservice architecture and the benefits it
6. Vault for secrets management. can otherwise bring to your customers and organization.
Storing encryption keys, API tokens and authentication This requires empowering teams that include devel-
keys between services and managing how one microservice opers, security and operations engineers to make their
talks to another one are essential in this type of architec- own decisions and maintain ownership of the product
ture. It is also vitally important that you recycle and rotate while delivering on tight deadlines. We need to keep them
these credentials as needed, for example, after an incident. responsible for their product and provide them flexibility to
In the security industry, we have known for a long use tools that fit into a framework. At the same time, when
time that hard-coding secrets into code is a faux pas. you try to control things too tightly, there is a tendency for
Making it easy for developers to inject a secret into their people to engage in shadow IT.
running application is an absolutely essential need. Popular That’s why it’s important to consider the following:
tools include open sourced HashiCorp Vault or CyberArk • Once you prove the transition to microservices
Conjur. is something that works and adds value to your

RETURN TO
InfoSecurity Professional | 26 | May/June 2019 CONTENTS
customers and your organization, it will be adopted 8. Data storage, security and governance should be
faster by others including development teams. It is a priority as data becomes the new gold.
absolutely critical that an organization starts small Microservice architecture allows faster development and
and breaks down a product to make a transition eas- reduced costs for applications, but this is meaningless with-
ier. Unfortunately, many organizations start in the out the data you are processing or generating for yourself or
middle and want to break down their most complex your customer.
products first. This rush can cost you greatly in the Data persists outside of the container and needs to be
long term. stored in a secure manner. This means storage blobs that
• Failing to break down monolith software and sim- have the proper controls in place and the ability to achieve
ply adding microservices around current software multi-tenancy through encryption keys that your customer
can bring significant security and operations impli- owns and controls. If you don’t think about this aspect from
cations down the road. the very beginning of designing your solution, it will be that
much harder to implement later when your customer will
• Do not take securing the orchestrator (most likely ask about it.
Kubernetes) for granted. A number of controls
(resource limits, K8S API RBAC, workload limits, 9. A maturing CI/CD pipeline with adjoining practices
privileges of containers running, etc.) need to be in is essential.
place before you have a solution that can work for You should get started on your microservices journey while
containers deployed to production. building the foundation of your CI/CD environment and

People-centric
data security
Empowering users
to share data with
confidence

Visit the
Egress booth today
www.egress.com

RETURN TO
InfoSecurity Professional | 27 | May/June 2019 CONTENTS
normalizing your tech stack. Breaking down and simpli- around teams and projects. Identity and access manage-
fying everything you will be sending out to a customer in ment around the entire ecosystem is essential and needs
production will also help achieve a certain level of maturity. to be integrated across all of your tooling. As developers
I highly recommend the latest 2018 State of DevOps will jump around your agile organization, keeping track of
Report published by Puppet and Splunk for best practices “scope creep” along all of your toolsets will otherwise be
when starting on the path of maturity for DevSecOps in an insurmountable task. Furthermore, if IAM is not easy
your organization. Without having continuous integra- to manage and integrated throughout your SDLC, project
tion practices, culture and tools in place, you will never managers and administrators will simply fall behind in
be able to deliver in a containerized environment, where the management of user rights, and this could become a
your applications need these capabilities even more than vulnerability.
in a monolith software environment with typical waterfall
development methodologies. The security of your microser- Not all of these lessons may apply in your case because
vice-based application is absolutely dependent on your CI/ every organization is unique, but my hope is that by better
CD and DevOps practice as it serves the software supply understanding some of these lessons we’ve learned during
chain of your products. my company’s digital transformation, you’ll achieve success
sooner and more securely. •
10. Integrate identity and access management into one
common tool across the ecosystem.
Using one common IAM for all tools with the proper EMIL P. MAN, CISSP, CCSP, MBA, is a product security leader at
role-based access lets you painlessly move developers Honeywell in Atlanta.

RETURN TO
InfoSecurity Professional | 28 | May/June 2019 CONTENTS
center points ¦ ¦ ¦ FOCUSING ON EDUCATION AND RESEARCH INITIATIVES

Speaking the Universal


Language of Cyber Safety

S
by Pat Craven

Safe, seguro, veilig, sûr, 安全, sábháilte, sicher, säker,


bezpečný.
No matter how you say it, it’s what we are all
trying to do—keep our children and families SAFE
online. But until now, you and your audience had to
speak English to take advantage of the tremendous
educational programs provided by your nonprofit
Center for Cyber Safety and Education. Well, that
limitation exists no more.
At the 2018 (ISC)2 Security Congress in New
Orleans, we announced that we were beginning a
project to translate all our parent, senior and mid-
dle school educational materials and presentations
into some 30 languages. Under the direction of our
Community Engagement Coordinator, Beatriz Parres,
and our Educational Program Specialist, Ciera Lovitt, re-created into other languages, but we just aren’t
we are well on our way to reaching our goal. there yet (as of this writing). What we do have are
Thanks to a growing list (more than 200 so far) several simple PowerPoint presentations featuring
of bilingual (ISC)2 volunteers from around the world, Garfield that are available in different languages
we are adding new language materials almost every and cover some fun safety basics for children. They
week. Just go to https://iamcybersafe.org/parent-pre- are available for download right now at https://iamcy-
sentation/, and you’ll see examples of the work they’re bersafe.org/garfield-basic-program/. It is not the full
doing to make sure that we reflect our global mem- Garfield lesson available in the Educators Kit or dig-
bership and the communities we serve. ital version, but it’s free and provides a great starter
Don’t see your language yet? Here’s how this program to introduce cyber safety topics to younger
works. As Language Teams are formed, they com- children.
municate with the new (ISC)2 Community platform. No matter where you live, we are committed to
The groups are in charge of how they providing you and the people in your community with
will operate and share the projects. the best educational materials on the planet. If you
Under the Center team’s direction, want to help us expand our library of materials in a
the groups will translate the Parents’ language we haven’t covered and you are an (ISC)2
Presentation and appropriate tip member, we would love to have you join one of our
sheets first, then move on to the volunteer Language Teams. Just send us a note at
materials for senior citizens, and [email protected] and let us know your fluent
then to the content for middle schools language(s), and we will put you on an existing team
(children ages 11–14) and simpler or create a new one if needed. Our goal is to have our
Garfield Basics. free educational materials available in 30 languages
WAIT! Did I just say Garfield will by the end of the year. This takes more time than you
Pat Craven is the director might think, so if you don’t see yours, be patient—or
be in other languages? Well, sort of.
Image: iStock

of the Center for Cyber


Safety and Education We do hope to announce soon that better yet, offer to help.
and can be reached at the award-winning Garfield’s Cyber Our goal is to make it a safer cyber world. Thanks
[email protected]. Safety Adventures lessons will be to your help, we are closer to making that possible. •

RETURN TO
InfoSecurity Professional | 29 | May/June 2019 CONTENTS
(ISC)2 community

¦ ¦ ¦ SHARING INSIGHTS FROM BUZZWORTHY THREADS
Join the (ISC)2 Community ›

Highlights from Recent Discussions QUESTION:


I want to switch my career to cyber-

on the (ISC)2 Online Forum security professional. The issue, of


course, is that I do not have any expe-
rience in the field. I’m doing a few
The (ISC)2 Community has more than 20,000 cybersecurity professionals online courses but not sure how much
connecting, sharing knowledge and offering solutions in the online forum. they would help with the job. [Is
InfoSecurity Professional, in partnership with the Community’s administra- there] a process of what can be done
tors, presents a few of the more buzzworthy threads. Note that the ques- in order to start being acknowledged
by the industry? Would continuing
tions and responses may have been edited for clarity and brevity.
courses help eventually, or is there
some exam … [that] would give some
kind of recognition? Your help would
QUESTION: but a cash cow.) Actual stories don’t be appreciated.
One of the more curious things I’ve have to be taken down, just the —Submitted by Ayazm
wondered about is how the Right to Google links to them.
be Forgotten impacts backups. Obvi- By extension, therefore, backups SELECTED REPLIES:
ously, you can’t go to a backup (tape) are not subject to RTBF. As soon as
and erase a particular record—at I don’t want to ruin your enthusi-
someone or some corporation finds a
least easily. How are people address- asm but I think the best tool, and
way to make huge amounts of money
ing this right with backups? mostly recognized, is experience in
charging people for cloud backups,
—Submitted by DHerrmann the field. IT security often touches a
then the EU will extend RTBF to
wide range of items, which is hard to
ensure that they can fine the heck
SELECTED REPLIES: capture in a single training. Which
out of that corporation for keeping
The only thing that would work is also why the CISSP certification
backups.
would be some kind of “register” requires a number of years (of) work-
—Submitted by rslade
of those forgotten to ensure you’re ing experience.
not pulling out their data when you —Submitted by gert
Here’s some useful guidance on this
do a restore or the like. from the Information Commissioner’s
—Submitted by emb021 Office, the public body responsible My recommendation for you is try
for upholding information rights in and get a job as a help-desk specialist
I once took part in an exercise for an the U.K. and work your way up from there.
ISP to drop all historic DHCP data “If a valid erasure request is In my experience, the best security
backups because law enforcement received and no exemption applies professional is the one with the full
could request that data for various then you will have to take steps to breadth of knowledge regarding oper-
purposes, if it was held. This repre- ensure erasure from backup systems ating systems, hardware/software,
sented a very significant possible cost as well as live systems.” databases, networking, vulnerabili-
and it was circumvented by dropping —Submitted by AlecTrevelyan
ties, etc., and all the little intricacies
those file-sets so they could not be that make them function—things you
recovered. Morality notwithstanding, I created and maintain a DB that don’t really learn by reading books.
it’s a nifty capability to have. holds all requests for deletion and —Submitted by dharvey32
—Submitted by ed_williams in case [I] run a restore of my
backups, all deletion requests will Gain as much experience as you can.
Most of what has been written, be re-run against the restored data Even if you have to do it yourself. I set
argued and opined about RTBF has to so, as with beginning of usage of the up a lab environment and practiced
do with search engines. Most of the “restored-DB,” none of the users who all kinds of setup and hacking to
decisions are slaps and fines against requested the deletion of their data gain the experience I couldn’t gain
Google for allowing decisions and are in the DB. at work.
events to be searchable. (As such, —Submitted by RRehm —Submitted by CISOScott
there is a strong case for those who
say that RTBF is not actually a right, Find this complete thread here. Find this complete thread here.

RETURN TO
InfoSecurity Professional | 30 | May/June 2019 CONTENTS

You might also like