Saturday, December 13, 2014

IT Audit and Security Final Case Study: Target Breach

The prompt for this case study was to develop an updated information security policy for Target in light of its recent card breach. There was a 2 page limit to the response, so instead of outlining every topic in a comprehensive policy, I detailed several individual policies that I would change from existing practices.

Recommendations for Security and Privacy at Target

The 2013 breach of credit cards and customer’s personally identifiable information (PII) revealed serious deficiencies in the security of the company’s IT infrastructure and illustrated the inadequacy of having state-of-the-art security technology without the appropriate people and processes to respond to threats. The goal of this new security policy is to build on Target’s existing security infrastructure while improving the people and processes needed to secure Target’s IT against future attack.

Background:

Target has been audited every year by Trustwave and found to be compliant with PCI DSS up to the time of the breach.[1] Several security experts claim that simply complying with PCI DSS would not have necessarily prevented the breach,[2] and that security standards take time to develop and do not reflect the newest threats.[3]
Regulatory compliance with PCI DSS was not enough for Target to prevent this attack, yet that doesn’t mean there was nothing Target could have done. In fact, Target had received multiple warnings of suspicious activity during the early stages of the attack yet their internal security team chose not to investigate them. This shows that Target, as an organization, did not make a commitment to security. In this paper, we will focus on aspects of this policy that are significantly different from Target’s current state. On the people and processes front, security culture, issue escalation, alert response, and third party vendor management will be covered. On the technical front, we will cover network segmentation.

Security Oriented Culture

C-level executives set the “tone at the top” of whether or not an organization cares about security. The hiring of a CISO is a critical first step in achieving a healthy security culture, but studies show that security suffers when the CISO reports to the CIO.[4] This policy mandates that the CISO reports to the Board of Directors, not the CIO as in Target’s current structure. This ensures that the voice of security is heard at the highest levels of the organization.

Issue Escalation

Employees of the security organization must know when to report security issues to higher command. On November 30th, FireEye’s security experts sent a high level alert to Target’s security headquarters after detecting malware that was attempting to exfiltrate data from Target’s network. Target had two days to act on this warning before the exfiltration began.[5] Target’s security team, however, ignored the warnings, perhaps because the head of the department had quit a month earlier and no one else thought they had the authority to take action.5 The policy mandates if a chain in command is missing, the threat will be reported to the next level of command and not simply ignored.

Alert Response

Target has world class security applications installed on their networks. In addition to FireEye’s alert, Target also received warnings from its Symantec Endpoint Protection software to malware on a network server.5 Target’s security team chose to not respond to either of these warnings, even though they were of high priority.[6] This policy mandates at all medium to high priority alerts and warnings are documented and investigated within 24 hours. Furthermore, a high level alert must be resolved in 48 hours. Possible resolution can include removing malware, disabling a service, installing a patch, or even determining that the alert was not a threat. To resolve a high level alert, the CISO must sign off on the resolution documentation.

Third Party Vendor Management

Third party vendors significantly increase the attack surface of large organizations, as Target had learned first-hand. To protect Target’s internal IT infrastructure, the security posture of third party vendors with access to Target’s network must be carefully vetted, and that 3rd party access to Target’s system is limited. The level of scrutiny for a potential vendor should be proportional to the level of access granted to Target’s internal network.

Network Segmentation

Network segmentation is a defensive measure of isolating sensitive IT resources the rest of the company’s network. Target did not separate Point of Sale (POS) machines from the rest of the company’s network, even though isolation of the card environment is highly recommended by PCI.7 The allowed the attackers to install RAM scraping malware on every POS system after breaching the general network.[7] This policy mandates all systems involved in storing or processing PII to be isolated from Target’s general network, ensuring “defense in depth” even in event of a surface level breach.

Conclusion

The proposed information security and privacy policy minimizes risks and maximizes returns on security investment by leveraging Target’s existing technology and augmenting the people and processes behind its security infrastructure. The Target breach showed that there are not miracle applications or compliance certifications that guarantee security. Security can only be achieved through organizational commitment, effective processes, and defense in depth.


[1] http://www.darkreading.com/risk/compliance/target-pci-auditor-trustwave-sued-by-banks/d/d-id/1127936
[2] http://blogs.gartner.com/avivah-litan/2014/01/20/how-pci-failed-target-and-u-s-consumers/
[3] http://www.technewsworld.com/story/80160.html
[4] http://www.csoonline.com/article/2365827/security-leadership/maybe-it-really-does-matter-who-the-ciso-reports-to.html
[5] Target Data Breach Case Study
[6] http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data
[7] http://blogs.sophos.com/2014/04/02/sophos-at-bsides-austin-credit-card-security-and-pci-dss-compliance-post-target/

Thursday, May 8, 2014

Bitcoin, 3D Printing, and Drones: Three Technologies That Will Change the World

If I were to pick 3 technologies that will most likely change the world on the scale of the PC or the Internet, Bitcoin, 3D printing and drones would top my list.

There are still many people out there that believe Bitcoin is a fad that can "drop to zero" on the whim of a few websites or the US Government. Anyone with a solid understanding of the siginificance of the technology behind Bitcoin will realize this is almost impossible.

Even if Bitcoin were to be overshadowed by a newer cryptocurrency, the fundamental technology behind it, the blockchain, will remain significant.

The Bitcoin blockchain is a digital record that contains every Bitcoin transaction in history. It solves the longstanding problem of digital ownership: no one can "spend bitcoins twice" without fooling more than half of the entire Bitcoin network: a task becoming increasingly hard with the exponential increase in Bitcoin mining power. 


While digital money is the most obvious item to transmit through this technology, it can be used to prove ownership and provide of any kind of digital file: copyrighted music, article of incorporation, etc. Like the Internet in the 90s, we have not even imagined the possibilities of Bitcoin and blockchain technology.
One of the best indicators of successful technology is whether people are using it to break the law.
One of the best early predictors of successful technology is whether people are using it to break the law. This shows that the technology has overcome an economic hurdle that has prevented people from breaking such laws in the past.

A great example is Peer-to-Peer file sharing, the technology behind Bittorrent that allows people share often very large files with many people without buying expensive bandwidth and dedicated servers. 

Much P2P content is pirated, but unlike traditional content piracy, pirate content is distributed on P2P without financial incentives. P2P pirates are motivated to increase their online reputations, not profits, but this is only possible due the the extreme efficiency of P2P sharing technology.

Despite enormous pressure from the entertainment industry, P2P has thrived and is now used by organizations to legitimately distribute softwareThe closet analogue to P2P file sharing is 3D printing. 

Like P2P, 3D printing drastically decreases an economic cost, this time the cost of physical manufacturing. Like P2P, the cost decrease is so dramatic that people will begin to distribute 3D printable designs without financial incentive. 

We already see the potential for law breaking: anyone can now print their own 30 round magazines and knockoff toys. The potential for legitimate use is also great: 3D printing empowers artists and small-time designers with a whole new medium. 

Looking at P2P's past, we know that any government or industry effort to ban or restrict 3D printing will be futile since the triumph of efficient technologies is inevitable. Its best to embrace such technologies and encourage their legitimate use.

Lastly, aerial transport drones will transform the entire retail market, including online commerce and physical stores. Even with 3D printing, we will still need to buy goods that are not printable: fresh food and electronics for example.

 Instead of scheduling a trip to the grocery store or waiting days for a package to arrive, imagine an Amazon or Walmart drone delivering items to by parachute to your front door within hours of ordering. 

The success of transport drones will not rely on convenience alone: it also represents a huge reduction in shipping costs. It costs much less for a small robot to deliver a package through the air  than paying for a driver and a vehicle to deliver packages on an assigned route.

While aerial transport drones have great potential, I put this technology last because it has the greatest risk of failure due to regulation. While it will be incredibily hard for a government entity to enforce a "ban" on Bitcoin and to a lesser extent 3D printing, it would be relatively easy to enforce a ban on transport drones: they can simply be shot out of the air. 


Unless the FAA clears the use of airspace for private transport drones, we may never see the success of this technology. I am hopeful, however, because well-heeled companies like Amazon are likely exerting lobbyists right now to make this a technology a reality in the US.

Saturday, February 15, 2014

Universal Cell Phone Kill Switch: Why government-mandated solutions can make for bad security

Several bills have been proposed on the state and national levels to mandate a remote "kill switch" on all cell phones sold in the US. The purpose of the bill is to prevent cell phone theft by allowing users to permanently disable stolen cell phones.
 On the surface, this seems like a great idea: what can go wrong? A government mandated solution has many issues:
 Since the feature is one that is mandated by the government, we will likely see some poor implementations of it by some manufactures. A poor implementation could result in accidental bricking or even exploitation. This has happened in the past: a Gizmodo writer had his iPhone and macBook remotely wiped by a hacker. 
Given recent revelations about our Government's actions in the technology security field, I also worry about the the power of this legislation. What prevents the government from mandating the bricking of would-be protester's phones, for example? That may sound ludicrous, but its not. In 2011, Bay Area Rapid Transport Authority of San Francisco shut off its subway's cell phone transmitters to prevent a protest, leaving all passengers without cell signal. Imagine what can be done with a cell phone kill switch.
Currently there are free and built in solutions that offer similar functionality to the proposed "kill switch." Apple allows users to deactivate stolen devices in a way that persists even through a reset, and the free Android app TrustGo allows users to track and lock stolen devices.
 If these bills were to pass, language must be added to ensure that the kill-switch has an opt-out that allows the user to completely disable the functionality. Why give a hacker or the government the chance to brick your phone?

Sunday, January 5, 2014

Connect a 2560x1440 QHD Monitor over HDMI 1.4 [Windows]

This post is a bit different from my other ones- it is a simple tutorial to connect a 2560x1440 monitor to a laptop with a HDMI 1.4 port. While HDMI 1.4 is capable of outputting to 2560x1440, many laptop graphics drivers artificially limit this to 1200p. I'm posting this because while simple, the process of tricking the GPU to output to 1440p via HDMI took me a few days of googling to figure out.

You will need:
2560x1440 monitor with Dual link DVI input (They sell for around $300 on Ebay)
Spare Monitor (1080p or less) with DVI input
Laptop/Desktop with HDMI 1.4 port running Windows OS (most computers made in the last few years are on 1.4 specs, mine is the HP DV6-6135DX)
Dual Link DVI to HDMI cord (It is important to get a dual link DVI adapter. A single link adapter will not have the bandwidth to output 1440)
The Custom Resolution Utility, a free software by ToastyX at Monitor.com

First, connect the QHD monitor to the computer via the DVI-HDMI cord. You may notice that your graphics adapter refuses to output any sort of resolution to the screen. Don't worry, the monitor's specification is now saved and you can edit the specification to trick the graphics adapter to output in 1440p.

Connect the spare monitor to the laptop via the same cable. This monitor should work at 1080p or whatever the native resolution is.

Open CRU and select the "Active" monitor from the dropdown. Choose "Add" a detailed resolution. Edit the entry to read 1440 for vertical and 2560 for horizontal pixels. Save, and restart your computer.


Now you should have the ability to output in 2560x1440 on this 1080p monitor. Right click the Desktop and go to screen resolution. Select 2560x1440 and apply to test this.


Open CRU again and click "Copy" on the top right corner next to the active monitor. This copies the display settings on the current monitor. "Paste" those settings onto the next monitor on the dropdown- this should be the 1440p monitor we first connected.


Restart your computer and reconnect the 1440p monitor. You should now be able to see the screen output and select the native 2560x1440 resolution.

Note: Some people will need to decrease the screen refresh rate to display at 1440p. Usually 55Hz is okay.

A 2560x1440 monitor is great for things like computer coding, video editing, and multitasking in general. Don't let silly driver restrictions stop you from enjoying life in QHD.