{"id":77,"date":"2017-01-19T23:47:43","date_gmt":"2017-01-19T23:47:43","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=77"},"modified":"2017-01-19T23:47:43","modified_gmt":"2017-01-19T23:47:43","slug":"trust-is-a-necessity-not-a-luxury","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2017\/01\/19\/trust-is-a-necessity-not-a-luxury\/","title":{"rendered":"Trust Is a Necessity, Not a Luxury"},"content":{"rendered":"<div class=\"prose\">\n<p><strong>Mapping Certificate and Key Security to Critical Security Controls<\/strong><br \/>\nI travel all over the world to meet with CIOs and CISOs and discuss their top-of-mind concerns. Our discussions inevitably return to the unrelenting barrage of trust-based attacks. Vulnerabilities like Heartbleed and successfully executed trust-based attacks have demonstrated just how devastating these attacks can be: if an organization\u2019s web servers, cloud systems, and network systems cannot be trusted, that organization cannot run its business.<\/p>\n<p>Given the current threat landscape, securing an organization\u2019s infrastructure can seem a bit daunting, but CISOs aren\u2019t alone in their efforts to protect their critical systems. Critical controls are designed to help organizations mitigate risks to their most important systems and confidential data. For example, the\u00a0<a href=\"http:\/\/www.sans.org\/critical-security-controls\" target=\"_blank\" rel=\"nofollow noopener\">SANS 20 Critical Security Controls<\/a>\u00a0provides a comprehensive framework of security controls for protecting systems and data against cyber threats. These controls are based on the recommendations of experts worldwide\u2014from both private industries and government agencies.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-1705\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/matrix-1.png\" alt=\"Matrix\" width=\"700\" height=\"400\" \/><\/p>\n<p>These experts have realized what I\u2019ve maintained for years\u2014just how critical an organization\u2019s keys and certificates are to its security posture. What can be more critical than the foundation of trust for all critical systems? As a result, the SANS 20 Critical Security Controls have been updated to include measures for protecting keys and certificates. Organizations need to go through their internal controls and processes\u2014like I\u2019ve done as a CISO\u2014and ensure that their processes for handling keys and certificates map to recommended security controls.<\/p>\n<p>For example, most organizations know that best practices include implementing Secure Socket Layer (SSL) and Secure Shell (SSH), but they may not realize that they must go beyond simply using these security protocols to using them correctly. Otherwise, they have no protection against attacks that exploit misconfigured, mismanaged, or unprotected keys. SANS Control 12 points out two such common attacks for exploiting administrative privileges: the first attack dupes the administrative user into opening a malicious email attachment, but the second attack is arguably more insidious, allowing attackers to guess or crack passwords and then elevate their privileges\u2014<a href=\"https:\/\/www.venafi.com\/blog\/post\/deciphering-how-edward-snowden-breached-the-nsa\/\" target=\"_blank\" rel=\"nofollow noopener\">Edward Snowden<\/a>\u00a0used this type of attack to gain access to information he was not authorized to access.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-1703\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/sans20.png\" alt=\"sans20\" width=\"626\" height=\"331\" \/><\/p>\n<p>SANS Control 17, which focuses on data protection, emphasizes the importance of securing keys and certificates using \u201cproven processes\u201d defined in standards such as the National Institute of Standards and Technology (NIST) SP 800-57.\u00a0<a href=\"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-57\/sp800-57_part1_rev3_general.pdf\" target=\"_blank\" rel=\"nofollow noopener\">NIST 800-57<\/a>\u00a0outlines best practices for managing and securing cryptographic keys and certificates from the initial certificate request to revocation or deletion of the certificate. SANS Control 17 suggests several ways to get the most benefit from these NIST best practices. I\u2019m going to highlight just a couple:<\/p>\n<ul>\n<li>Only allow approved Certificate Authorities (CAs) to issue certificates within the enterprise (CSC 17-10)<\/li>\n<li>Perform an annual review of algorithms and key lengths in use for protection of sensitive data (CSC 17-11)<\/li>\n<\/ul>\n<p>Think for a moment about how you would begin mapping your processes to these two recommendations:<\/p>\n<ul>\n<li>Do you have policies that specify which CAs are approved?<\/li>\n<li>Do you have an audible process that validates that administrators must submit certificate requests to approved CAs?<\/li>\n<li>Do you have a timely process for replacing certificates signed by non-approved CAs with approved certificates?<\/li>\n<li>Do you have an inventory of all certificates in your environment, their issuing CAs, and their private key algorithms?<\/li>\n<li>Do you have an inventory of all SSH keys in your environment, their key algorithms, and key lengths?<\/li>\n<li>Do you have a system for validating that all certificates and SSH keys actually in use in your environment are listed in this inventory?<\/li>\n<\/ul>\n<p>I LOVE that I can say that <a href=\"http:\/\/cybersecuritypass.com\/\" target=\"_blank\" rel=\"nofollow noopener\">P@ssport Solutions<\/a> allow you to answer \u201cyes\u201d to all of these.<\/p>\n<p>If you are interested in more details about mapping your processes for securing keys and certificates to the SANS Critical Security Controls, stay tuned at <a href=\"http:\/\/cybersecuritypass.com\/\" target=\"_blank\" rel=\"nofollow noopener\">P@ssport Solutions<\/a><\/p>\n<\/div>\n<div id=\"floating-share-button\"><\/div>\n<div class=\"article-content-footer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Mapping Certificate and Key Security to Critical Security Controls I travel all over the world to meet with CIOs and CISOs and discuss their top-of-mind concerns. Our discussions inevitably return to the unrelenting barrage of trust-based attacks. Vulnerabilities like Heartbleed and successfully executed trust-based attacks have demonstrated just how devastating these attacks can be: if &#8230; <a title=\"Trust Is a Necessity, Not a Luxury\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2017\/01\/19\/trust-is-a-necessity-not-a-luxury\/\">Read more<span class=\"screen-reader-text\">Trust Is a Necessity, Not a Luxury<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1705,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[20],"tags":[],"class_list":["post-77","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gdpr"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/77","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=77"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/77\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=77"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=77"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=77"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}