In the last few months, news outlets have covered a number of security breaches of some very high profile organizations such as Target, Neiman Marcus>, KT Corp, and Forbes (to name but a few).
Instead of reading these reports and breathing a sigh of relief that our organization was not targeted, we should look to see what we can learn from those incidents to better prepare our defenses.
A system is made up of many components. When it comes to information security systems, technology is just one of those components. We need to look beyond the technical aspects of these attacks, and analyze the business, people and process elements that also contributed to the breach.
Here are some of the things that struck me as a good idea while reading the various media coverage of the aforementioned attacks:
1. Conduct a risk assessment for all your systems to determine how the evolving threat landscape could impact them. A lot of the attacks targeted personal information such as user names, email addresses and passwords. If any of your systems store such data, you should reassess the risk profile for those systems and implement appropriate controls.
2. A lot of the recent attacks targeted usersí email addresses, passwords and credit card details. So, have you reviewed lately how well you are securing that information? Is your password database secured? Are the permissions protecting the password file/database sufficient?
3. A number of recent attacks were the result of exploitation of application vulnerabilities (e.g. SQL Injection). How confident are you that all your systems are not vulnerable to web application attacks? Now is the time for you and your development team to become familiar with the OWASP top 10 web application vulnerabilities and to develop a program to eradicate them from your applications. You should do this as a result of your risk assessment and target the more critical systems first.
4. Some of the organizations that were breached did not know they had been successfully targeted until the attackers posted the stolen information onto the web. How confident are you that you could detect an attack against your organization? How well do you monitor and review your logs for suspicious behavior? Are you sure that your log files and audit trails are capturing all the information you need? Now would be a good time to review your log management strategy so that you could answer those questions positively.
5. Has your organization appointed someone responsible for information security and, if they have, does that person have the appropriate authority and resources to fill that role effectively?
6. Lack of communication, transparency and openness about the attacks has been the heaviest criticism leveled against some of the victims. Is your organization prepared for a breach? Would you be able to quickly identify the compromised assets and the impact the attack could have on your organization and your customers? Do you have people trained in how to communicate with the press, staff and customers in the event of a breach?