Security Basics are Essential (and not Basic) – Part I
I wish I could claim ownership of the idea that “Security Basics are Essential” but I have to thank my friend Simon PG Edwards who asked me to give a talk on the topic at an upcoming conference (coming up very soon now - and I’m told that if you ask very nicely there may be one or two spots still available). Appropriately primed, I spent some time unpacking the concept, and in doing so have gained a great deal of insight about how we do security today, and why it just might be completely wrong.
I’ll be presenting the entire paper at the conference, but I’d like to put out a teaser here (which I’ll break up into a few parts); I’ll push the last part out after the conference closes. For this first installment, I’d like to explore the term “Security Basics” - a term which I think has pejorative connotations associated with it, almost implying that this is what beginners do, not “us pros” (whomever we are). In fact, nothing could be further from the truth, and my firm belief is that if you get the basics (or, as I prefer to call it, the foundation) of security right, you are well on the way to building out a robust security plan and culture.
When we think about the foundational pillars of cybersecurity, it can be quite daunting, because there are lots of different ways we can explore that concept. Are we talking about “security basics” for individuals? For corporations? For the SOC? The concept changes depending on the audience. Similarly, one could be referring to the key defensive technologies every company should be using, the best practices and strategies one needs to adopt, and the governance, risk acceptance and compliance “basics” that form the basis of a successful security program. Put this way, we can see that the topic of “security basics” is both multi-faceted and broad.
If I were to unpack the topic fully, I would probably want to break out “security basics” using a number of well known taxonomies (such as “People, Process, Technology”, but there are many). However, for the purposes of brevity, in this article, I will focus on best practices (the things you simply have to do) and the key defensive technologies you need to accomplish adherence to best practice. Given that best practices seem so common sense, let’s start there.
Best Practices
The value of best practices is that they are generally fairly universal, and they (usually) stand the test of time.
When we think of Cybersecurity Best Practices, one might come up with a list that looks a bit like this. Oh, and don’t send me hate mail about me missing your pet product (please), but do put major omissions in the comments!
That might not feel too bad, it all makes sense. Let’s unpack those outcomes into products. It’ll start feeling more familiar any minute now…
Key Defensive Technologies
As we consider the best practices that we expect a “good” company to adhere to, we immediately consider how this adherence can be established using technology - after all, any time we can bake security into the system, we’re ahead of relying on humans who are notably bad at reliable policy compliance.
At a minimum from a product perspective we would expect:
The keen reader will notice that there’s actually a mismatch between the standards up above (best practices) and my off-the-cuff list of tools you probably should be using. That’s intentional, at least in part, just to keep the “what” (the best practices) separate from the “how”. There’s a few different ways to accomplish things, and so the list of actual products required will vary a little bit depending on how one operationalizes a particular best practice.
As can be seen, best practice and key technologies form a pretty intimidating list of “things you need to do” for defenders. Are all necessary? What are the implications of focusing on one at the expense of another? Must we really do it all? If only there were a way to know...
I’m From the Government, and I’m here to Help
It turns out that one of the best places to get a grasp of what the “basics” of cybersecurity look like - the lowest acceptable bar, if you will - is the Federal Government, if you happen to be in the USA. Even if you aren’t, the US Government has published some pretty interesting standards and guidelines about what the basics of Cybersecurity are.
Recommended by LinkedIn
One set of rules that I want to point out is the Federal Financial Institutions Examination Council (FFIEC). This Council, in its own words: “is a formal interagency body empowered to prescribe uniform principles, standards, and report forms for the federal examination of financial institutions by the Board of Governors of the Federal Reserve System (FRB), the Federal Deposit Insurance Corporation (FDIC), the National Credit Union Administration (NCUA), the Office of the Comptroller of the Currency (OCC), and the Consumer Financial Protection Bureau (CFPB), and to make recommendations to promote uniformity in the supervision of financial institutions.” As such, Federal Financial Institutions are accountable for their adherence to these rules - and they quite helpfully cover Cybersecurity.
The FFIEC publishes a handy “Examination Handbook” for security, which can be found here. Thumbing through its virtual pages, you will very quickly get an idea of what the security basics mean, at least in the Government. Clocking in at 96 pages, the document is also notable that it is dated 2016 and yet still contains a set of operating principles that are valid almost a decade later. Another related source of regulations can be found on the FINRA website. Once again, these “basics” provide a pretty robust roadmap for cybersecurity within an organization.
Finally, and perhaps most importantly, there are the NIST 800-171 guidelines. These guidelines are designed for organizations that handle “Controlled Unclassified Information”, but they provide an outstanding reference for what the “blocking and tackling” of cybersecurity really is. While adherence is onerous, if an enterprise actually followed these guidelines rigorously, it would be a pretty hard target to attack. These all form part of a larger constellation of advice - the recently published NIST CSF 2.0 is another outstanding resource for defenders. This document broadens the idea of the basics into 5 main functions, built on a foundation of governance:
They say a picture is worth a thousand words, so the NIST CSF looks a bit like this:
Within each of these areas, the expectation is that the organization has a plan and technical resources to action such a plan. It’s also notable that CSF 2.0 has enhanced focus on governance and supply chains (and their impact on cybersecurity stance). If we want to go international, there’s also the perfectly respectable ISO 27000-family of standards, which fit quite well with the ideas mentioned above.
The fact that all these documents have been produced by a committee highlights one of the most surprising things about security basics: they actually form a pretty stable foundation, and usually don’t change overnight.
I’d argue that this is because most of these standards are outcome focused rather than technique focused. For example, we might be told that administrator events need to be logged in a tamper proof manner so that certain changes can be tracked. That’s good advice - it only becomes dated when the technique for accomplishing this is defined.
This kind of “first principles” view of security is helpful, as we tend to think of security as an area that changes rapidly. In some ways that’s actually true. That OpenSSH server you were running yesterday looked to be secure. Today, it’s vulnerable to a brand new 0-day. As such, one can argue that cybersecurity is a game for people who have plenty of “fast twitch” muscle. On the other hand, the basic principles that security is built upon haven’t changed in a long time. Be aware of the assets you’re exposing to the Internet. Mindfully practice least privilege, and make sure your IAM is in place. Nothing here is new, and it’s all good advice.
The perfect illustration of the unchanging nature of the threat is ransomware. Surely that’s a new evolution? Actually far from it. Ransomware was one of the first cybersecurity threats that hit the headlines, when in 1989 the now-infamous AIDS Trojan Disk was mailed out to an unsuspecting public. While the distribution method was different back then, the basic threat was absolutely the same as the ones we face today. We may feel like we’ve come a long way, but thirty five years later, we’re arguably in the same place. “Don’t run untrusted code” is as valid today as it was then.
Collectively, these documents represent just a few of the raft of regulators that the CISO needs to pay attention to. While we’ve come a long way from the early days of the Internet where at times it was impossible to actually comply with regulations from different organizations because they were contradictory, the breadth and depth of today's compliance requirements is eye watering. It’s good advice, but the side effects of taking all the medicine can lead to burnout and exhaustion. Security basics are obvious. Security basics are absolutely essential. And, on reflection, Security basics have grown to be a major burden on cash and talent strapped cybersecurity teams. Thinking through the implications of that is where we'll start in Part II.
Closing Thoughts
So far, we’ve explored the concepts of “Security Basics” a bit, and then used this idea as a springboard to get us into some of the better-known cybersecurity frameworks and standards that exist. My approach has been breadth first, as there are lots of different standards around to consider. Looking at the standards, we’ve examined a list of just the very simplest countermeasures a medium-sized organization is going to need to put in place. That list is long, expensive, and hard to complete exhaustively.
This sets us up very nicely for the topic I’d like to cover in Part II: that’s the challenge that these "basics of cybersecurity" pose, when viewed en masse. Individually, each is sensible. Who wouldn’t want a firewall, right? But collectively they can become a pressing burden; when combined with strict compliance needs in highly-regulated industries, the guidance can move from being a light to show us the way to a rod with which we’re going to be beaten when something inevitably goes wrong. Security basics are essential. But doing them all is a mammoth task, and as we shall see, compliance doesn’t quite equal security.
I’ll see you in Part II.
Have a good one Richard! Safe travels.
Richard, thanks for sharing!
What a great explanation of the basics, love your concepts - esp “fast twitch muscle,” and “from a light to a rod.” So true! Looking forward to your part 2 👏🏼
would love to be attending, just to sit and have a coffee with you! It has been waaay too long since seeing you. Trust all goes well!