Kenneth R. van Wyk wrote:

On Monday 17 January 2005 14:55, Crispin Cowan wrote:


I participated in a workshop on on insider attacks several years ago. We
identified 2 kinds of insider attacks:


(Was this Mike Skroh's (DARPA) workshop out at RAND? If so, I also participated in this. In fact, it's where I met you, Crispin.

Yes, that was it.

So we agree that more secure systems such as RBAC and Immunix do help to
address the problem of insider attackers. What they don't do is address
the problem of authorized insiders abusing their authority. That is
where this new class of products comes in: they track the movement of
sensitive organizational data by /content/ rather than by access
control, and complain when content crosses a barrier that it should not.


Understood, and at least much of this new class of products is based on statistical analysis of event logs. Certainly, products simplify that scenario, but it can also be done without add-on products.


Some are more than just statistics, and are using signatures on phrases & passages of text. Obviously that is easy to bypass (just encrypt it, or even trivial transformations) but as with a lot of defenses, the attackers are often not too bright, and so simple defenses often work.

There is also a new class of products that do access control and logging at the PC client level, so that things like USB stick access can be (nominally) controlled and logged, FWIW. I'll bet that a determined, authorized adversary can find ways of circumventing, though...


Boot from removable media, and you are running a different OS, and all access controls are shot. To prevent that, you have to get control over the machine's boot sequence. If you disable booting from removable media, then you also cripple auto-updates of the OS.

Because the end-game of covert channel prevention always leads to an
anal cavity search :)


ACK....and ick!

So, where's the Software Security lesson in all of this? IMHO, it's to ensure adequate application-level event logging and data access control capabilities.


I think the main lesson of the underwear attack is Marcus Ranum's rule that you cannot use technology to fix social problems. If an insider really wants to export your data, they are going to succeed. So be nice to your staff; it's not just the moral thing to do, it is the smart thing to do.

Crispin

--
Crispin Cowan, Ph.D.  http://immunix.com/~crispin/
CTO, Immunix          http://immunix.com




Reply via email to