More data security onions or Data Security is like a great big onion-Part 2

more onions

A couple of weeks ago I wrote a post about some security events we’d been running and how in between the sessions exploring I’d covered where each solutions sat and the problems that we were trying to solve.

A few people suggested that a post about the multiple layers of data security problems we where addressing would be useful, this lead to what turned out to be a popular post, with a very tenuous music link, Data security is like a great big onion part one (feel free to have a read) and as we all know, data security is one heck of a big tear inducing onion, with lots of layers, so big in fact that it needed two posts to deal with just the bit we covered during our events.

Since then, we’ve run our final event in the series and now I’ve finally had the chance to write part two of this onionesque data security post.

By way of a quick recap, the event we ran brought together 6 leading data security vendors  to look at the challenges that our day to day usage of our data brings, what those problems are and how we address them.

We where not covering the more “traditional” data security tools anti-virus, firewall, anti-spam etc. not because we feel they are any less important, but we had to assume that our attendees, as probably with most readers of this BLOG, already deal with that problem with well established solutions. The areas we looked at where some of the problems we don’t necessarily consider.

The areas covered fell into these categories;

In part one we dealt with the initial core parts of the challenge, understanding who’s accessing our data, how we ensure compliance in our key systems and how to manage encryption on all of our devices, (feel free to check part one out if you need too)

So now let’s move a little further outside of the core and out to our edge devices, as we look at three further challenges.

The Endpoints

One of the most overlooked areas we find in securing data is those plethora of end point devices, we often see these devices remain relatively unmanaged and uncontrolled in many environments.. but why!?

Think of the risk, it’s great securing our core data and our line of business applications, however once the data gets out to the endpoints, where that unstructured data spends most of it’s time, it really is only as secure as the endpoint it sits on and today of course, how many of those endpoints sit within the safety of our network?

Of course the mobility and the range of devices makes it hard to secure them and besides, if we are securing the data in the core, is the endpoint really that big a risk?

Our friends at Lumension where happy to share exactly why it is such a problem;

The main challenge out on the endpoints, was not one of lack of AV, but almost that organisations believe that in itself that is enough, but the challenge of protecting these devices is as multi layered and oniony (sure that is a word!) than anywhere else, the threat comes from unauthorised software, unauthorised devices, lack of patching and of course the inability to look for behaviours outside of what we understand, especially if we are relying on signature based AV or application blocklisting.

Over 90% of cyber attacks exploit known security flaws for which a remediation is available” – Gartner

Lumension covered some key areas, as they looked at the importance of patching, understanding of behaviour and also some really smart technology around software application control, and anyone who’s used group policy to manage that, knows any smart tech is a big help!

Having full and smart control of our endpoints is hugely important and something that does tend to get overlooked more than it should, but something our attendees really grabbed and took away from the event.

Edge Data

At last we are right out at the extremities of where we put our data, the outer layer of our big juicy onion.

One of the huge changes in IT usage over the last 10 years (at least) has been the massive increase in technology mobility, today we have our data on laptops, tablets, smartphones, heck even watches, and our users have an expectation that we can give them access to data on all of these devices all of the time.

Our guests from Druva shared a really interesting statistic with us;

Recent figures from Gartner and IDC suggested that 28% of corporate data now resides only on endpoint devices.

Gartner and IDC suggested that 28% of corporate data now resides only on endpoint devices

82074d1272615744-gordon-browns-face-palm-yesterday-priceless-trading-during-election-run-up-brown_facepalmYep, i did repeat that, read that statement again, 28% of corporate data residing only on endpoint devices. Think about what we’ve done so far with our onion, we’ve controlled out data access in the core, we’ve added compliance to our corporate apps, we’ve encrypted, we’ve controlled the endpoints, all of these really good things, however we’ve got people in our organisations running around with key data, only on their mobile devices, heck it’s a good job those devices never go missing with that data on!

Of course the reality is, this is extremely high risk, we risk permanent data loss, potential for easy breach and a real problem when it comes to compliance – if we want to search all the data we have, then how do we pick that data up when its only hidden away on someone’s tablet?

It goes without saying then, that it’s a critical element of our overall strategy that we take care of all of these areas and that we have a strategy that allows us to;

  • Captures and Centralises our data
  • Ensures we have strong rules and controls on data at the edge to avoid data loss
  • Making sure we can analyse and discover all of our data out at the edge
  • All of this while ensuring this is a simple and unobtrusive process for each of our client devices.

Quite a challenge, but one we really have to take…unless you want to be having face meet palm at high speed!

Pesky Users

The last layer of this challenge (or the first layer if you came to the Manchester event!) was all pesky kidsaround the people, yep those pesky kids…I mean users!

That brought up our final speakers NETconsent who posed some very interesting questions around the human factor in information security.

We’ve said all along the issue of data protection is multi layered and, of course, so are the solutions, there isn’t a magic bullet out there that is going to cure it for us with one press of a button. However what is also the case is that without our users understanding why we are securing the data and how to make sure they use our systems and data in a way that keeps it secure, we are probably wasting our time.

I’ve recently done some work with a local organisation about data leak prevention and one of the very first questions we asked was;

What buy in do you have for data security?

Because if you don’t have buy in from the leadership of your organisation, then your data protection strategy is never going anywhere, it’s equally important however, that not only your leadership buys in but that there is an understanding of why you have a data security strategy across all levels of your business, because if you are putting strategies and solutions in place, that may appear to users as an inconvenience, regardless of how minor, then if everyone across the business doesn’t understand how to adhere to your policies and maybe even more importantly why data protection is important at all, you really are fighting a losing battle.

In reality the only way we achieve all of this is a mixture of things it’s having buy in, having technology to help implement our policies is of course key, however none of this delivery and enforcement can be done, without documented policies and user education, which is a huge task, to manage the process and measure the effectiveness is very difficult to many organisations.

Our Partners from NETconsent shared a range of techniques and solutions to ensure that we have a controlled and centralised repository, that we ensured our documentation and training was up to date and that we could measure the effectiveness of all of this.

Well none of us want to be saying “my data would of been secure if it wasn’t for those pesky users!”

Sliced and Diced

chopped%20onionSo there it is, our data security onion sliced and diced, hopefully if you’ve been able to follow this post all the way through, you’ve not shed too many tears!

As I said right back at the beginning, data security is a huge problem, one that’s ever changing, even the stuff I’ve covered in these two lengthy posts, are only looking at a subset of the areas that you should consider and of course the threat is ever evolving, even with these things in place, don’t rest on your laurels thinking you have your data secured, you need to keep looking at the ever changing landscape and the threats it contains, to ensure you keep your data secure and safe and that it isn’t wandering out of your organisation and you only find out when it’s to late.

Hope you enjoyed this onion related set of posts and I hope that it’s given you some food for thought (collective groan!) and at least has helped a couple of you to develop some new areas of your data security strategy.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s