ISC2 InfoSecurityProfessional May-June-2019 F
ISC2 InfoSecurityProfessional May-June-2019 F
InfoSecurity
PROFESSIONAL
MAY/JUNE 2019
A Publication for the (ISC)2‰ Membership
TIME TO
Smarten
Up Advancing consumer
AI technology while
upholding the CIA tenets
PRIVACY LESSONS
The race LEARNED
to protect A member’s
consumer data takeaways from
marches on securing a move
to microservices
isc2.org facebook.com/isc2fb twitter.com/ISC2 linkedin.com/company/isc2 community.isc2.org
The
Ultimate Guide
to Your (ISC)2 Certification
PAGE 21
departments
5 EDITOR’S NOTE
What This Magazine Is …
and Isn’t
BY ANNE SAITA
7 EXECUTIVE LETTER
Answering the Call for
Professional Development
BY MIRTHA COLLIN
9 FIELD NOTES
New opportunities to advance
your career; securing mobile
devices; tips before diving
into machine learning;
recommended reading
features and more.
PRIVACY 14 #NEXTCHAPTER
17
(ISC)2 Melbourne Chapter
Time to Smarten Up
Our AI devices may be giving away too much information.
29 CENTER POINTS
What should we do? BY ANITA J. BATEMAN, CISSP
Speaking the Universal
Language of Cyber Safety
GRC BY PAT CRAVEN
InfoSecurity Professional is produced by Twirling Tiger ‰ Media, 7 Jeffrey Road, Franklin, MA 02038. Contact by email: [email protected]. The information contained in
this publication represents the views and opinions of the respective authors and may not represent the views and opinions of (ISC)2® on the issues discussed as of
the date of publication. No part of this document print or digital may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form by
any means (electronic, mechanical, photocopying, recording or otherwise), or for any purpose, without the express written permission of (ISC)2. (ISC)2, the (ISC)2
digital logo and all other product, service or certification names are registered marks or trademarks of the International Information Systems Security Certification
Consortium, Incorporated, in the United States and/or other countries. The names of actual products and companies mentioned herein may be the trademarks of
their respective owners. For subscription information, please visit www.isc2.org. To obtain permission to reprint materials, please email [email protected].
To request advertising information, please email [email protected]. ©2019 (ISC)2 Incorporated. All rights reserved.
RETURN TO
InfoSecurity Professional | 3 | May/June 2019 CONTENTS
SUMMIT / LATAM
and Isn’t
SENIOR MANAGER, CORPORATE
COMMUNICATIONS
Jarred LeFebvre
727-316-8129
[email protected]
EVERY TIME an issue of the magazine is published, readers email me to CORPORATE PUBLIC
RELATIONS MANAGER
let me know what they like or what they find lacking. I love hearing from Brian Alberti
people, even those delivering constructive criticism. Others prefer to speak 617-510-1540
through online forums or social media posts. Based on some recent com- [email protected]
MANAGING EDITOR
Deborah Johnson
EDITOR
ADVERTISER INDEX Paul South
For information about advertising in this publication, please contact Vendor Sponsorship:
PROOFREADER
Lisa Pettograsso, [email protected].
©Rob Andrew Photography
Ken Krause
(ISC)2 Certifications..............................................2 (ISC)2 Secure Summit Denver......................... 13 Twirling Tiger ‰ Media
(www.twirlingtigermedia.
(ISC) Secure Summit LATAM..........................4
2
(ISC)2 Security Congress................................... 16
com) is certified as
(ISC)2 Secure Summit APAC..............................6 Egress..................................................................... 27 a Women’s Business
Enterprise (WBE) by
EMEA InfoSec Europe..........................................8 Cofense.................................................................. 28 the Women’s Business
Enterprise National Council (WBENC).
Duo Security.......................................................... 11 This partnership reflects (ISC)2’s
commitment to supplier diversity.
RETURN TO
InfoSecurity Professional | 5 | May/June 2019 CONTENTS
In partnership with:
2 Days • 6 Tracks
35+ Sessions • 40+ Speakers
Tracks include:
#ISC2Summits
Identity Access
Management
Cutting Edge
Technologies
and Ideas
IoT/OT
Security 25%
discount available
for (ISC)2 members
REGISTER TODAY
Sw
is
if e
sA n
rmy K
(
by Mirtha Collin
RETURN TO
InfoSecurity Professional | 7 | May/June 2019 CONTENTS
GET CERTIFIED.
www.isc2.org
© 2019 (ISC)2, Inc. All rights reserved.
field notes ¦ ¦ ¦ EDITED BY DEBORAH JOHNSON
1 IN 10
RISING RISKS
I
Even more opportunities for members to expand their skills
UP 33 %
N RESPONSE to the growing demand from members, (ISC)2 earlier
this year established its Professional Development Institute. The
Institute offers a variety of free online development courses to
members and associates, which are also available for purchase Mobile ransomware
by non-members.
A successful pilot launch in 2018 offered three development courses: attacks in 2018
48 %
GDPR for Security Professionals; DevSecOps; and Building a Strong Culture
of Security.
“The Professional Development Institute is a recognition that cybersecu-
rity education is a lifelong journey, and that achieving professional certifica-
tion, while important, is only one stop along the way,” says (ISC)2 CEO David
Shearer, CISSP. “These new CPE opportunities are enriching and rewarding Of malicious email
and provide valuable, topical insights that will help our members continue to attachments are Office
grow and progress.” files, up from 5% in 2017
Mirtha Collin, education director for (ISC)2, leads the Professional
2
Development Institute, including a growing team that will manage content Source: 2019 Symantec Internet Security Threat Report
https://www.symantec.com/security-center/
development, curriculum building, quality control, communications, logistics threat-report
and administration. In this edition’s Executive Letter, she describes PDI as
“a go-to resource for timely and relevant continuing educational opportuni-
ties to keep members’
skills sharp and curiosity READ. QUIZ. EARN.
“These new CPE opportunities piqued.”
are enriching and rewarding The program is Earn Two CPEs for
expected to grow quickly. Reading This Issue
and provide valuable, topical By mid-2019, there will
insights that will help our be nine courses available
Please note that (ISC)2 submits CPEs
for (ISC)2’s InfoSecurity Professional
members continue to grow covering topics including magazine on your behalf within five
leadership, cloud security business days. This will automatically
and progress.” and IoT. By the end of this assign you two Group A CPEs.
—David Shearer, CISSP, CEO, (ISC)2 year, Collin estimates that Note: To access this members-only
platform and quiz, you’ll need a Blue Sky
there will be as many as
account. If you don’t have an account, go
30 new courses offered. Her team will be looking for feedback from members to the Blue Sky homepage via the link and
as well, she explains. “We will refresh the catalog of courses we provide based click on “Create User Profile” in the upper
on ongoing dialogue with and input from our membership.” right-hand corner.
Inquiries related specifically to PDI, including topic ideas, can be directed https://live.blueskybroadcast.com/bsb/client/
CL_DEFAULT.asp?Client=411114&PCAT=7777&-
to [email protected]. For more information and to access online courses, please CAT=10814
visit www.isc2.org/development. •
RETURN TO
InfoSecurity Professional | 9 | May/June 2019 CONTENTS
¦¦¦ field notes
I
Excerpted from the April (ISC)2 Insights e-newsletter
Mobile devices are often able to ac-
cess the most crucial company data,
but does that mobility put our data at
greater risk? Despite drums sound-
ing on mobile security for years, DC ANTICIPATES a $57.6 billion worldwide
Verizon’s Mobile Security Index 2019 investment in cognitive and artificial intel-
shows that mobile devices continue ligence (AI) by 2021, which means there’s a
to be ignored or dismissed when it good chance your company is considering,
comes to security protections. if not already buying or building, AI and machine
Verizon surveyed 700 profes- learning (ML) solutions for both business processes
sionals involved in buying, managing and security operations.
Paulo Shakarian
and securing mobile devices for their Paulo Shakarian, CEO and co-founder of
organizations. Some 67 percent ac- CYR3CON, which uses AI to predict cyberattacks,
knowledged they were less confident offers some words of advice—and a few warnings—to make sure AI and ML
about the security of mobile devices implementations and ongoing usages work as intended and do not lead to data
than other devices. Not surprising, leakage and other potential cybersecurity threats.
then, that more companies admitted
they’d suffered a compromise that Beware of the hype.
involved a mobile device—33 per- Do your homework before you spend a dime (or thousands of dimes), cautions
cent in the 2019 survey compared Shakarian. “The hype is mainly coming from vendors. … The CISOs then feel
to 27 percent in 2018. pressure from the executive suite.”
The vast majority, 83 percent of
survey respondents, though, say the What to do before you buy.
risk from mobile threats remains Shakarian recommends doing adequate due diligence before an AI/ML
high, and a similar number (85 per- purchase.
cent) say they need to take mobile
device security more seriously. Engage the board.
When companies were asked
“Board members often come across innovations. It’s up to the CISO,”
what they’re doing to improve mobile
security, more than two-thirds—69
Shakarian says, “to coach board members on the pros and cons.”
percent—said they would be spend-
Know your business needs.
ing more next year on mobile protec-
tions. At the same time, 77 percent Not every solution requires AI, Shakarian counsels. “If you’re looking to pre-
thought that the biggest barrier to dict something; if you’re looking to find something that is abnormal and that
protecting data on mobile devices would normally require human interaction; if you’re looking to optimize the
was a lack of user awareness. decision-making process in an automated way—I see those as the holy trinity
Be it money or education, the of AI, probably 90 percent of what you need AI and machine learning for.”
directive is clear, according to
Thomas T.J. Fox, SVP, Wireless Challenge the vendor.
Business Group at Verizon: “It’s When listening to a pitch from a vendor, Shakarian advises information secu-
time to close the chasm between rity professionals get answers in some crucial areas.
levels of protection.”
To read the survey in full, go to Peer review.
https://enterprise.verizon.com/re- The first question to ask, Shakarian says, is whether the underlying technol-
sources/reports/mobile-security-in- ogy in the product has undergone peer review. “If it’s not, that should be a big
dex/#report.• alarm bell if they’re vetting their own stuff.”
RETURN TO
InfoSecurity Professional | 10 | May/June 2019 CONTENTS
¦¦¦ field notes
Relevant data. can’t tell the difference between failure and your normal
Does the data fed to algorithms make sense? Shakarian error rate. Whereas, if there’s some level of transparency
posed that question in a blog post on this subject. of how it’s producing the results, the user can check up
“Regardless of how fancy an algorithm or piece of software on it.”
is, it’s making the prediction based on some piece of data—
and you should ask the vendor what that is and ask him or Updates to the machine learning model.
her why it makes sense.” “…expect that the model is being updated on a regular
basis by the vendors. If it’s not, that, I think, is a major red
Data security and reliability. flag because there’s a high chance that the product might
Unless your company is large enough to afford a data scien- not work as advertised.”
tist or data science department, you’re going to outsource
to an AI/ML provider. This raises the scrutiny required to
ensure these providers keep your data safe and available at Before succumbing to the siren song of machine learning
all times. as the business solution, Shakarian believes you should ask
if such a solution is needed at all. “Does the business need/
“Transparent” algorithms. require AI or machine learning to address it in an impact-
In order to monitor accuracy, you need transparency, ful, sustainable way?” If the answer is yes, then you have a
Shakarian warns. If the algorithm is a “black box, you roadmap here to follow. •
-2 validated) tokens
Sign up for a
free trial at duo.com
RETURN TO
InfoSecurity Professional | 11 | May/June 2019 CONTENTS
¦¦¦ field notes
C
(SchwartauHaus, 2018)
considered.
Schwartau acknowledges that we are not perfect and we can’t be right in
all circumstances, but we must try to measure with a level of precision and
granularity. He doesn’t advise the best security tools for specific circum-
$6.5
stances but, rather, tackles the current issues with a more holistic approach.
Winn Schwartau has been honored as a “Power Thinker” and one of the
50 most powerful people in networking by the online resource Network World.
He was voted one of the 25 most influential people in the security industry
by Security Magazine. Schwartau is the founder and president of the Security
Awareness Company (formerly Interpact, Inc.) and is the chairman of the
BILLION USD
board of security and compliance company Mobile Active Defense.
Security professionals looking for quick checklists for actions that can
be implemented should consider some of the author’s approaches. Thanks,
Winn, for giving us the alternatives. • Paid in 2018 in response
Image: iStock
to SamSam ransomware
The author of Recommended Reading did not receive financial compensation from the book attacks
publisher, nor a free copy of this book. All opinions are his alone. Source: Sophos Labs 2019 Threat Report
RETURN TO
InfoSecurity Professional | 12 | May/June 2019 CONTENTS
SUMMIT / DENVER
Defining Cybersecurity
Join us in Denver for Official (ISC)² Pre-Conference Training.
2-Day and 5-Day courses offering more education
opportunities, more CPEs, and a discount on registration
if you attend classes and the Summit.
Register Now
• Network with like-minded
professionals
• Earn valuable CPE credits
#nextchapter ¦ ¦ ¦ EDITED BY DEBORAH JOHNSON
RETURN TO
InfoSecurity Professional | 14 | May/June 2019 CONTENTS
¦¦¦ #nextchapter
Q&A
This is to provide equal opportunity
and encourage more participation in
the chapter activities.
55 76
% % 6.4 BILLION
Fake emails sent
worldwide every day
Of organizations do not Of organizations increased
Source: Ernst & Young Global Information
make “protecting” part their cybersecurity budget Security Survey 2018-19 of 1,400 respondents
of their strategy after a serious breach including CISOs, CIOs and other managers
RETURN TO
InfoSecurity Professional | 15 | May/June 2019 CONTENTS
EARLY BIRD
PRICING
through August 15
Oct. 28 - 30 • Orlando, FL • Swan & Dolphin
(ISC)² Members 4000+ Attendees Earn up to
SAVE $200 & 100+ Sessions 46 CPEs
All Access Pass Benefits:
• Educational Sessions, Keynotes • Town Hall & Career Center
& Workshops • Networking Night
• Networking Luncheons • CSA Summit &
• Expo Hall Expo Hall Pub Crawl
SAVE $50
Off All Access Pass
with code:
INFOSECD18
REGISTER TODAY!
congress.isc2.org
#ISC2Congress
¦¦¦ PRIVACY
TIME TO
Smarten Up BY ANITA J. BATEMAN, CISSP
RETURN TO
InfoSecurity InfoSecurity | 17 | May/June
Professional Professional | 17 | 2019
May/June 2019 CONTENTS
Amazon called it an isolated incident, most likely CONFIDENTIALITY AND PRIVACY
triggered by someone using words that were interpreted Smart speaker vendors provide access to your audio files in
by the machine as “record” and “send.” several ways. Amazon and Google provide you with access
As with most new technology areas, the smart speaker to your recording history for replay and allow you to delete
and AI home device market has quickly accelerated over the recordings. Apple analyzes logs and then erases them,
the past five years since Amazon introduced the Alexa and so there is no history for you to replay or erase.
Echo in November 2014. The major players—Amazon, The question around confidentiality comes down to how
Google, Microsoft and Apple—have a large range of prod- much we trust our device vendors to abide by their privacy
ucts, and other global vendors have rolled out new solutions and security claims. In addition to your audio files, these
in the past two years (see A Timeline of Voice Assistant and devices connect to your other personal accounts, such as
Smart Speaker Technology From 1961 to Today). your Amazon Prime account with credit card and other
We are challenged as consumers and as cybersecurity sensitive data, or your Google email account and other
professionals to keep up with this technology pace. Beyond Google services. We need to hold vendors accountable to
the challenges for end users to understand these devices, make sure that they protect our sensitive data, especially
the growth of the technology in this space provides inter- when a device can be accessed by multiple users.
esting legal, ethical and personal The confidentiality topic is
dilemmas for us to examine with closely tied to privacy. Capturing
our cybersecurity “hats” fully on.
From music and weather to “Those who audio data to learn about us as
consumers is critical to the business
home security, thermostats,
appliances, smart offices, health- choose to use this models of Amazon and Google, as
well as other vendors. The sharing
care and even fashion advice, the
use cases are multiplying rapidly technology can’t of our data with third parties is
broader and wider than we might
for smart speakers and other smart
assistant devices (see “The Buzz” and shouldn’t have initially imagined.
Bill Brenner, now a research
on p. 19).
So, how do we approach this expect 100 director at IANS, wrote in a 2017
NakedSecurity blog post: “Those
broad topic as cybersecurity
professionals? percent privacy.” who choose to use this technology
can’t and shouldn’t expect 100
Let’s look at how smart speaker percent privacy. If not for the
—Bill Brenner, research director, IANS
devices are handling the cyberse- ability of Amazon Echo and Google
curity CIA triad of confidentiality, Home to listen, these things would
integrity and availability, and let’s become nothing more than doorstoppers and paperweights.”
add privacy as a component of confidentiality for this dis- Brenner provided a few recommendations to protect
cussion. Most of us are familiar with these critical tenets, ourselves when using these devices.
but to help ground us, here is a quick refresher from the
• Mute your device when you are not using it. Or even
Infosec Institute.
better, consider unplugging it.
Confidentiality “…states that access to information,
• Don’t connect your sensitive accounts to your device.
assets, etc. should be granted only on a need to know basis
so that information that is only available to some should not • Erase your old recordings on a regular basis.
be accessible by everyone. • Tighten up and review your device security settings.
Integrity makes sure that the information is not tam-
pered [with] whenever it travels from source to destination Dr. Florian Schaub, an assistant professor at the
or even stored at rest. University of Michigan, is focusing his research around
understanding privacy and security behaviors and percep-
Availability [as a] concept is to make sure that the tions in order to identify the security flaws in these prod-
services of an organization are available.” ucts. In a recent article, Schaub and his co-authors make
Privacy, as defined by the Merriam-Webster the case for “strong standards for IoT security and privacy
dictionary, is “freedom from unauthorized intrusion,” protections … in order to establish a reasonable baseline
whereas the legal interpretation of privacy includes a consumers can rely on. Security certifications of devices
person’s right to control how their information is could further ensure that certain standards are met by a
collected and used. device … similar to safety seals for electronics products.
RETURN TO
InfoSecurity Professional | 18 | May/June 2019 CONTENTS
H
THE BUZZ
HERE ARE SOME recent news stories and usage scenarios that have everyone talking:
• Amazon Workers Are Listening to What You Tell Alexa
• Google Nest Secure home security system revealed to have a microphone that can be enabled as a smart
assistant.
• Did Alexa Hear a Murder? We May Finally Find Out
• Alexa and Third Parties’ Reasonable Expectation of Privacy
• CSI Alexa: The Smart Home Has Become the New Crime Scene Witness
• Amazon Alexa Will Come Built-In to All New Homes from Lennar
• Toyota and Lexus Vehicles Will Add Amazon Alexa This Year
• Panasonic Adding Google Assistant and Amazon Alexa to Future In-car Infotainment
• Kia adds Google Assistant to Infotainment System
• Google Assistant Is Coming to Android Auto
• Amazon’s Blockbuster Alexa Event Made Zero Mention of Privacy Concerns
• Research has demonstrated an approach for how to attack smart speaker systems using directional sound
beams.1
• The Amazon Echo Look with Alexa provides fashion advice.
• Smart speakers in healthcare remind patients to take medication, check blood sugar or provide other daily
activity reminders.
• Additional research projects are branching out into voice recognition of individuals, sentiment recognition,
inferring child behavior, keyword identification (for advertising, law enforcement or other use) and leverag-
ing wearable technology for security improvements. 2, 3
FOOTNOTES:
1
“POSTER: Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams,” CCS ’18, October 15-19, 2018,
Toronto, ON, Canada; By Ryo Iijima, Shota Minami, Zhou Yunao, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa and Tatsuya Mori
2
“Understanding the Long-term use of Smart Speaker Assistants,” by Frank Bentley, Chris Luvogt, Max Silverman, Rushani Wirasinghe,
Brooke White, Danielle Lottridge; Proc ACM Interact. Mob.
3
“Wearable Technology Brings Security to Alexa and Siri,” GetMobile, March 2018, Volume 22, Issue 1, pages 35-38.
—A. Bateman
Companies need to truly provide transparency about smart concrete information or assurance about how their data is
speakers’ data practices to consumers, including what data being stored, accessed, used or protected. Many of us may
is collected, how long it is stored, who has access to it and not realize that our voice data may reveal a great deal about
how it is protected.” us—including gender, age, nationality or even mental state.
In a recent discussion with Schaub, he highlighted that We need to pay attention to how our personal data is being
most smart speaker vendors’ privacy policies and terms of used and shared.
service are vague and do not provide consumers with much Consider the scenario in which you have a smart speaker
RETURN TO
InfoSecurity Professional | 19 | May/June 2019 CONTENTS
in your home and you have a visitor. Then ask yourself: the main intent for smart speakers is to be available to you
• Where is your smart speaker located in your home? when you want to use them. The devices are “always on”—
waiting for their special “wake word” or keyword. The
• What is your visitor’s expectation of privacy?
ability to change the wake word is available from Amazon
• What is your obligation to them? and Google; however, Apple has not caught up yet (you are
• Are you obligated to inform them of the presence of not allowed to rename Siri).
a smart speaker and its on/off status? The ability to easily turn your device off and back on is
• What about other audio-enabled devices, like thermo- another feature to consider. Most products provide a physi-
stats or appliances, that you have in your home? cal button that will mute the device or disable the speaker;
however, you must physically take action to use it. The
There are plenty of positive use cases for these devices, ability to issue a voice command to turn off or mute your
including providing more accessible technology for those speaker has not been implemented.
with disabilities. However, we must also consider our In general, if you are concerned about availability, the
individual responsibilities and the default settings will provide
expectations of privacy for visitors what you need. If you are more
concerned about privacy than
to our homes. This technology is
recently starting to make its way This technology is availability, you might consider
when to mute or even unplug
into the business office environ-
ment, introducing more confidenti- recently starting your smart speaker devices in
your home.
ality challenges to consider.
to make its way Availability can also be bal-
anced with providing the neces-
INTEGRITY into the business sary parental control capabilities.
Google and Amazon both have
Integrity involves the assurance
that information is not tampered office environment, options that support content
filtering and profile setup for
with in transit or at rest. Tampering
with voice data requires more tech- introducing more kids’ use. The Amazon Echo
Kids Edition even includes a
nical know-how but is still feasible.
Research from October 2018 confidentiality manners setting that requires
the speaker to say “please” and
in Japan was able to demonstrate
the ability to insert inaudible voice challenges to “thank you.”
We have taken a very brief
commands into the environment
and manipulate the behavior of consider. look at smart speakers and how
both Amazon Echo and Google they support confidentiality,
Home devices. privacy, integrity and availabil-
Other research has looked at possible attack vectors ity today. This article did not delve into third-party data
for the Amazon Echo. The multiple user scenario can be sharing or third-party “skills” for Amazon devices or Google
problematic when it comes to integrity, as a guest could Play apps. Those are topics for another day and are addi-
get access to information on a device for which they are tional threat vectors for smart speaker devices.
not authorized. I expect some of us in the cybersecurity community
Amazon and Google allow their devices to be configured are involved directly in product development for smart
to access multiple, different accounts. While Amazon and speaker technology, and more of us may be involved in the
Google devices can be trained to recognize your voice, this expanded use cases described earlier. We are beholden to
does not appear to be the default configuration. “An amus- our community and for the greater good to work diligently
ing story of an African grey parrot able to mimic its owner’s to continue to advance smart speaker technology and
voice activating a smart speaker and conducting internet uphold the CIA tenets within our spheres of influence. •
shopping illustrates some of the technical limitations of
smart speakers,” according to a health law blog post.
RETURN TO
InfoSecurity Professional | 20 | May/June 2019 CONTENTS
¦¦¦ GRC
PERSONAL DATA is a critical asset for many companies, and governments are requiring greater
transparency and accountability in how they use and manage it.
Last May, the European Union’s General Data Protection Regulation (GDPR) came into effect
after being highly anticipated by both domestic and international businesses. GDPR unified the
data privacy laws of EU-member countries through a wide-ranging piece of legislation that affects
companies doing business with any citizen of an EU country. The regulation is designed to expand
consumer rights and control over personal information and require transparency in how companies
treat personal data.
RETURN TO
InfoSecurity Professional | 21 | May/June 2019 CONTENTS
The CCPA is often
described as being
modeled after the
Many organizations felt compelled, resident is currently obligated to develop,
even prior to the enactment of GDPR, GDPR and shares implement and maintain a compre-
to evaluate their business processes hensive written information security
and policies regarding the use of data many similarities program that incorporates the pre-
and proactively implement programs to
facilitate regulatory compliance with
with its EU scriptive requirements contained in the
regulation.”
the regulation. That trend should now counterpart. An important takeaway here is that
accelerate. states seem to be evaluating their privacy
Nearly a year later, several U.S. states regulations and are likely to require com-
have not only taken notice of GDPR, but they also have panies to adopt or update their data governance programs.
drafted or adopted legislation that mimics or even extends As legislation spreads throughout the United States,
the EU regulations. As the regulatory landscape surround- it will become more difficult to recommend or rely on
ing data security and privacy continues to expand beyond one rigid set of practices for data privacy compliance.
GDPR, the critical question becomes: What more is needed Companies should not rely on piecemeal preparation for
to be compliant, or prepare for compliance, with such compliance, but rather should aim to create a baseline
regulations? information governance program that can be adapted to
California is currently at the forefront of state data meet unique state requirements.
privacy law efforts. As a hub for many science and technol- Although it is unclear at this time how a company can
ogy leaders, California developed legislation to prioritize demonstrate complete compliance with the CCPA and
consumer rights concerning the privacy of collecting and other new regulations, entities should make reasonable
using personal information. To that end, on June 28, 2018, efforts to leverage their GDPR compliance work and other
California hurriedly enacted the California Consumer existing data management policies to install programs that
Privacy Act of 2018 (CCPA). The CCPA takes effect on will help them prepare for data breaches and data requests
January 1, 2020 and aims to create new and powerful con- before they occur.
sumer rights over personal data and to set data protection Features of an effective and defensible data management
standards for businesses. program should include:
The CCPA is often described as being modeled after the • Understanding what data is being collected, from
GDPR and shares many similarities with its EU counter- whom it is being collected, the purpose of the
part. For instance, both regulations encourage transparency, collection, where the data is stored and the
require businesses to report data breaches, and attempt to lifecycle of the data;
provide greater security for personal information. • Creating and implementing best practices to respond
However, there are a number of differences between the to requests for access, deletion and opt-out;
two regulations. Organizations that took steps to comply • Creating universal privacy policies and implement-
with GDPR will now need to assess whether additional ing them companywide to ensure consistent best
processes should be added to their current compliance pro- practices;
grams in order to be better prepared for CCPA enactment. • Implementing data security protocols to prevent and
The chart (see next page) highlights certain differences be alerted to data breaches;
between the GDPR and the CCPA. • Creating systems and protocols for responding to
The implementation of the CCPA will create challenges emergency security incidents; and
for businesses attempting to translate its requirements • Instituting straightforward methods of communicat-
into business operations, policies and practices to facilitate ing about data privacy issues and problem solving.
compliance. The importance of developing such processes
cannot be overlooked, as potential civil fines and damages Data privacy should be central to a company’s infor-
arising from private action have the potential to quickly mation security and compliance program. It is critical for
become significant. legal, IT, business, human resources, marketing and secu-
The requirements of the CCPA are likely to be replicated rity compliance teams to work together to identify changes
or even expanded throughout the United States. At last in requirements of existing and new regulations and contin-
count, nine states have either amended or introduced bills ually update the company’s data risk control mechanisms. •
concerning data privacy and data security. For example, on
January 19, 2019, Massachusetts amended the state’s data
breach law, providing in part that “any entity that owns JENNIFER J. SOSA, Esq., is the director of information security and
or licenses personal information about a Massachusetts compliance services at TransPerfect Legal Solutions.
RETURN TO
InfoSecurity Professional | 22 | May/June 2019 CONTENTS
CCPA GDPR
WHO IS REGULATED
Any for-profit entity doing business in California that satisfies Data controllers and data processors that are either:
one of the following tests: • Established in the EU and process personal data in the
• Has gross annual revenue in excess of $25 million; or context of the activities of an establishment in the EU, regard-
• Annually buys, receives, sells or shares the personal less of whether the data processing occurs in the EU; or
information of more than 50,000 consumers, households • Not established in the EU that process the personal data of
or devices for commercial purposes; or EU data subjects in connection with offering goods or
• Derives 50 percent or more of annual revenue from selling services in the EU or monitoring their behavior.
personal information.
The law also applies to any entity that either:
• Controls or is controlled by a covered business; or
• Shares common branding with a covered business.
WHO IS PROTECTED
Consumers—a natural person that is either: Data subjects, defined as identified or identifiable persons to
• In California for other than a temporary or transitory purpose; whom personal data relates.
or
• Domiciled in California but outside of California for a tempo-
rary or transitory purpose.
PRIVACY NOTICE
Businesses must notify consumers of: At the time that personal data is obtained, the data controller
• The categories of personal information collected; and must provide information about its personal data collection and
• The purpose for which the categories will be used. processing. The notice must include specific information that
is dependent on whether the data is collected directly from
the data subject or from a third party.
OPT-OUT RIGHT
Businesses must notify consumers of their right to opt-out of the The GDPR does not enumerate a specific right to opt-out of
sale of personal information to third parties, and must comply personal data sales.
with consumers’ opt-out requests.
RIGHT OF ACCESS
Consumers have a right to obtain their personal information Data subjects have a right to access personal data that is being
collected by any regulated entity, as well as additional informa- processed, and data controllers are obligated to provide a copy
tion, including the business or commercial purpose for collecting of the personal data undergoing processing and disclose certain
or selling the information and categories of third parties with information about the processing.
whom the business shares information.
RIGHT TO DELETION
A consumer has the right to request that a business delete any Data subjects have the right to request erasure of personal data
personal information about the consumer that the business has from the controller under six circumstances.
collected, subject to certain exceptions. Data controllers who have made personal data public must
Upon receipt of such a request, the business must delete the take reasonable steps, including technical measures to inform
consumer’s personal information from its records and direct its controllers that are processing the personal data that the data
service providers to delete the data. subject has requested the erasure.
CIVIL FINES
The California Attorney General can bring an action for up to Administrative fines can reach ¤20 million or 4 percent of annual
$7,500 per violation of the CCPA if a business does not cure global revenue, whichever is higher.
its violations within 30 days of being notified.
RETURN TO
InfoSecurity Professional | 23 | May/June 2019 CONTENTS
¦¦¦ TECHNOLOGY
10 LESSONS LEARNED
MICROSERVICE ECOSYSTEM
SECURING A
RETURN TO
InfoSecurity Professional | 25 | May/June 2019 CONTENTS
CI/CD Pipeline
Service Mesh
IAM
Centralized
Logging and APIs
Monitoring
Microservices
Administra-
tive and RBAC DevOps
Controls
Vaulting
Container
and Secrets
Immutability
Management
Container-
Aware Data
SDLC Ecosystem Storage
The idea of a “zero trust approach” to security has been 7. Achieving maturity is hard. Expect a lot of
on everyone’s radar recently. For a zero-trust microservice growing pains.
architecture, we would need to verify each identity and not A lot of applications and diverse product lines mean that
assume that if you are in the same namespace, a service there is a tendency for the external architecture of support-
should be trusted. Furthermore, to ensure that no east- ing tools to become quite complex and hard to manage. In
west traffic sniffing is going on, a service mesh is the only large organizations where individual needs must be satisfied,
possible way to achieve transport security. It looks like the there will always be a tendency to try to centralize people
default standard here will be the open-sourced Istio. around their specific function. This type of control can
endanger the microservice architecture and the benefits it
6. Vault for secrets management. can otherwise bring to your customers and organization.
Storing encryption keys, API tokens and authentication This requires empowering teams that include devel-
keys between services and managing how one microservice opers, security and operations engineers to make their
talks to another one are essential in this type of architec- own decisions and maintain ownership of the product
ture. It is also vitally important that you recycle and rotate while delivering on tight deadlines. We need to keep them
these credentials as needed, for example, after an incident. responsible for their product and provide them flexibility to
In the security industry, we have known for a long use tools that fit into a framework. At the same time, when
time that hard-coding secrets into code is a faux pas. you try to control things too tightly, there is a tendency for
Making it easy for developers to inject a secret into their people to engage in shadow IT.
running application is an absolutely essential need. Popular That’s why it’s important to consider the following:
tools include open sourced HashiCorp Vault or CyberArk • Once you prove the transition to microservices
Conjur. is something that works and adds value to your
RETURN TO
InfoSecurity Professional | 26 | May/June 2019 CONTENTS
customers and your organization, it will be adopted 8. Data storage, security and governance should be
faster by others including development teams. It is a priority as data becomes the new gold.
absolutely critical that an organization starts small Microservice architecture allows faster development and
and breaks down a product to make a transition eas- reduced costs for applications, but this is meaningless with-
ier. Unfortunately, many organizations start in the out the data you are processing or generating for yourself or
middle and want to break down their most complex your customer.
products first. This rush can cost you greatly in the Data persists outside of the container and needs to be
long term. stored in a secure manner. This means storage blobs that
• Failing to break down monolith software and sim- have the proper controls in place and the ability to achieve
ply adding microservices around current software multi-tenancy through encryption keys that your customer
can bring significant security and operations impli- owns and controls. If you don’t think about this aspect from
cations down the road. the very beginning of designing your solution, it will be that
much harder to implement later when your customer will
• Do not take securing the orchestrator (most likely ask about it.
Kubernetes) for granted. A number of controls
(resource limits, K8S API RBAC, workload limits, 9. A maturing CI/CD pipeline with adjoining practices
privileges of containers running, etc.) need to be in is essential.
place before you have a solution that can work for You should get started on your microservices journey while
containers deployed to production. building the foundation of your CI/CD environment and
People-centric
data security
Empowering users
to share data with
confidence
Visit the
Egress booth today
www.egress.com
RETURN TO
InfoSecurity Professional | 27 | May/June 2019 CONTENTS
normalizing your tech stack. Breaking down and simpli- around teams and projects. Identity and access manage-
fying everything you will be sending out to a customer in ment around the entire ecosystem is essential and needs
production will also help achieve a certain level of maturity. to be integrated across all of your tooling. As developers
I highly recommend the latest 2018 State of DevOps will jump around your agile organization, keeping track of
Report published by Puppet and Splunk for best practices “scope creep” along all of your toolsets will otherwise be
when starting on the path of maturity for DevSecOps in an insurmountable task. Furthermore, if IAM is not easy
your organization. Without having continuous integra- to manage and integrated throughout your SDLC, project
tion practices, culture and tools in place, you will never managers and administrators will simply fall behind in
be able to deliver in a containerized environment, where the management of user rights, and this could become a
your applications need these capabilities even more than vulnerability.
in a monolith software environment with typical waterfall
development methodologies. The security of your microser- Not all of these lessons may apply in your case because
vice-based application is absolutely dependent on your CI/ every organization is unique, but my hope is that by better
CD and DevOps practice as it serves the software supply understanding some of these lessons we’ve learned during
chain of your products. my company’s digital transformation, you’ll achieve success
sooner and more securely. •
10. Integrate identity and access management into one
common tool across the ecosystem.
Using one common IAM for all tools with the proper EMIL P. MAN, CISSP, CCSP, MBA, is a product security leader at
role-based access lets you painlessly move developers Honeywell in Atlanta.
RETURN TO
InfoSecurity Professional | 28 | May/June 2019 CONTENTS
center points ¦ ¦ ¦ FOCUSING ON EDUCATION AND RESEARCH INITIATIVES
S
by Pat Craven
RETURN TO
InfoSecurity Professional | 29 | May/June 2019 CONTENTS
(ISC)2 community
‰
¦ ¦ ¦ SHARING INSIGHTS FROM BUZZWORTHY THREADS
Join the (ISC)2 Community ›
RETURN TO
InfoSecurity Professional | 30 | May/June 2019 CONTENTS