|
Not Every Server Needs to Be Connected to the Internet |
See additional comments here.
There's
a lot in the press about the SolarWinds breach.
What's largely
missing from the discussion is a hard look at why events like this
happen.
It is more than the fact that there are "hackers"
out there. Some very sophisticated.
What I want to explore are two
factors—that are in the control of those being hacked—and that I
believe facilitate hacking.
Note I am not saying that curing these
will stop all hacking. Any more than locking your door or installing
an alarm system will stop all burglars.
But
I think it will reduce the damage done.
Largely
these factors are a matter of mindset:
- responsibility "shifting"
associated with outsourcing
- the private sector's focus on profit
maximization.
To the first point, responsibility "shifting"
or perhaps more accurately "abandonment"When
services are outsourced, often the responsibility for managing the
risks associated with the outsourced "bits" appears to be
outsourced as well.
No
doubt some checks are performed on the service provider's procedures
and controls leading to the granting of access to the outsourcer's
systems. Probably the same sort of box-ticking that goes on with AML
efforts.
Or in some other way an entity is allowed to use the
company's systems based on some determination that the provider is a
"trusted" counterparty.
Here I'm thinking of the
self-described "secure" portals for the distribution of
"safe" apps for smartphones. Or other similar "portals"
for PCs.
In the first case, the outsourcer doesn't seem to place
redundant controls on its systems to monitor and supervise the
service provider's access. Or control the volume of information that
is allowed to exit its systems.
Nor apparently does the "portal"
check each app it distributes for malware. Admittedly with the
number of apps on these platforms that would be quite a task.
What I
think underpins a great deal of this reliance on third parties to do
there job is the unwarranted belief that the operation of the "free"
market results in companies delivering the best products at the most
competitive costs.
Third party suppliers or creators of apps will
make sure their security is ironclad—as much as that is
possible—because if they fail, a competitor who is more secure and
cheaper will displace them.
I also suspect that most governmental
customers believe the even greater myth that the private sector is
inherently more capable, innovative, and flexible than they are.
Not
only will private sector "George" do it, but he will do it
perfectly.
Side Comment: There's a lot of focus these days on this or that conspiracy theory or other material misinformation. Of which there seem to be quite a lot floating around.
You don't hear anything about the economic theory on which the assumptions regarding the "free" market and superiority of the private sector are based. A theory whose main proof is a tautological set of assumptions and assertions not related to what has gone on in the past, goes on now, and will no doubt go on in the future in the real world.
Yet, when compared to some of this other rubbish, it is very likely, a more damaging piece of material mis-information than the more discussed others.
Some examples of pathologies.
Example
#1 No
Due Diligence, Please, They're American
AA's
older and wiser brother relayed to me a recent conversation he had
about computer system security.
He noted that the USA firm that his
interlocutor used for a key service had a world wide network of staff
and offices, including in the Russian Federation and Pakistan.
My
brother opined that it was highly likely that employees in those
offices had access to the computer network in
the USA of
the company, and its products and programs. And likely to the
confidential information of the interlocutor's entity that was stored
with that company.
He noted common perceptions about criminal
activity and other security/intelligence risks in those
countries.
He also opined that the activities of the interlocutor's
entity and the identity of its customers might be of keen
interest
He then asked how the interlocutor's company managed these
risks.
His clear impression was that none of these risks had been
identified much less considered based on the response he
received.
"As a USA company, the service provider is a
"trusted counterparty" and is presumed
(note
that word) to be managing that risk."
As to other due diligence, it seemed to be limited to determining the USA company had the lowest price. No inquiry into ownership.
Example
#2” Sometimes George
Doesn’t Do It Even for Himself
According
to recent press reports, Microsoft admitted that the SolarWinds
“hackers” had gained access to Microsoft’s source code.
That
code is the heart of Microsoft’s products and profitability.
It
would seem that this would be one of the most carefully guarded
secrets of all those entrusted to Microsoft’s care.
Probably even
more closely guarded than any information they were “safeguarding”
for third parties.
Bonus Lesson:
So much for the private sector’s presumed superiority over
governments.
Examples
#3 Not Every Castle is “
حصن
الأبلق “
3A
ToTok
For
some time, both the Apple and Android stores allowed the ToTok chat
app to be distribued through their portals because its creators were
a "trusted" party.
Some 12 or 13 months ago, the NY Times
reported that this app – strangely the only chat app allowed in the
UAE—was likely being used by the UAEG to spy on UAE residents,
including non citizens.
3B
Zoom
Another
"trusted" app distributed through self-identified "secure"
sites, used at one point by corporations and some governments to
conduct confidential meetings due to Covid restrictions
on in person meetings.
Including HM's PM.
Turns out that at least some of the
conversations were routed through servers in the Peoples' Republic of
China.
A flaw now "corrected" according to press
reports.
To
the second point, profit maximization.
Adding
to the problem is the private sector's well known focus on profit
maximization.
One possible example is the SS7 legacy vulnerability in phone
systems that allows "hackers" to track cell phone locations
and intercept messages.
Not only to the benefit intelligence
services but also of use to common criminals. You can read about it
here.
The SS7 system was implemented some 50 years ago.
The
vulnerability has been publicly known since at least 2008.
If AA's
arithmetic is correct, that's 12 years.
During that period, members
of the US Congress have raised their august voices in concern.
The
ITU has held meetings.
The press has reported on repeated use of
this vulnerability by foreign governments. Most recently here.
It has not been fixed.
Why?
Can you think of a better
explanation other than a stubborn reluctance to spend money?