Proactive security latest: vendors wire the cage but has the budgie flown….

2
PROACTIVE SECURITY Network Security April 2005 14 Vendor bandwagon Nevertheless the vendors do seem to have decided that proactive security is one of the big ideas for 2005, and there is some substance behind the hype. Cisco for example came out with a product blitz in February 2005 under the banner of Adaptive Threat Defence. IBM meanwhile has been promoting proactive security at the lower level of cryptography and digital signatures, while Microsoft has been working with a company called PreEmptive Solutions to make its code harder for hackers to reverse engineer from the compiled version. The dedi- cated IT security vendors have also been at it. Internet Security Systems has been boasting of how its customers have benefited from its pre-emptive protection anticipating threats before they happen. And Symantec has brought to market the so-called digital immune system developed in a joint project with IBM. Unreactive These various products and strategies might appear disjointed when taken together, but they have in common the necessary objective of moving beyond reaction, which is no longer tenable in the modern security climate. The crucial question is whether these initiatives real- ly deliver what enterprises need, which is affordable pre-emptive protection. If the solutions extract too great a toll on internal resources through need for con- tinual reconfiguration and endless analy- sis of reports containing too many false positives, then they are unworkable. Proactive security has to be as far as pos- sible automatic. On this count some progress has been made but there is still a heavy onus on enterprises to actually implement proac- tive security. Some of this is inevitable, for no enterprise can make its network secure without implementing some good housekeeping measures. The products can only deliver if they are part of a coherent strategy involving analysis of internal vulnerabilities against external threats. Indeed this is an important first step towards identifying which products are relevant. For example the decline in perimeter security as provided by fire- walls has created new internal targets for hackers, notably PCs, but also servers that can be co-opted as staging posts for attacks. There is also the risk of an enterprise finding its servers or PCs exploited for illegal activities such as peer-to-peer transfer of software, music or even video, without its knowl- edge. Identifying such threats and putting appropriate monitoring tools in place is an important first step along the pre-emptive path. Stop the exploitation However some of the efforts being made will benefit everybody and come automatically with emerging releases of software. Microsoft’s work with PreEmptive Solutions springs to mind here, as the technology concerned is included with Visual studio 2005. This technology called Dotfuscator Community Edition is designed to make the task of reconstituting source code from the compiled object code practically impossible, so that hackers are unlikely to try. Of course the risk then becomes of the source code itself being stolen, but that is another matter. Sharing private keys The principle of ducking and weaving to evade hackers can also be extended to cryptography. The public key system is widely used both to encrypt session keys and also for digital signatures. The latter has become a target for financial fraudsters because if they steal Philip Hunter Proactive security sounds at first sight like just another marketing gimmick to persuade customers to sign for up for yet another false dawn. After all proactivity is surely just good practice, protecting in advance against threats that are known about, like bolting your back door just in case the burglar comes. To some proactive security is indeed just a rallying call, urging IT managers to protect against known threats, and avoid easily identifiable vulnerabilities. All too often for example desktops are not properly monitored allowing users to unwittingly expose internal networks to threats such as spyware. Similarly remote execution can be made the exception rather than the default, making it harder for hackers to co-opt internal servers for their nefarious ends. Proactive security latest: vendors wire the cage but has the budgie flown…. Proactive security has to be automatic Philip Hunter

Transcript of Proactive security latest: vendors wire the cage but has the budgie flown….

Page 1: Proactive security latest: vendors wire the cage but has the budgie flown….

PROACTIVE SECURITY

Network Security April 200514

Vendor bandwagonNevertheless the vendors do seem to have decided that proactive securityis one of the big ideas for 2005, andthere is some substance behind thehype. Cisco for example came out with a product blitz in February 2005under the banner of Adaptive ThreatDefence. IBM meanwhile has been promoting proactive security at the

lower level of cryptography and digitalsignatures, while Microsoft has beenworking with a company calledPreEmptive Solutions to make its codeharder for hackers to reverse engineer

from the compiled version. The dedi-cated IT security vendors have alsobeen at it. Internet Security Systemshas been boasting of how its customershave benefited from its pre-emptiveprotection anticipating threats beforethey happen. And Symantec hasbrought to market the so-called digitalimmune system developed in a jointproject with IBM.

UnreactiveThese various products and strategiesmight appear disjointed when takentogether, but they have in common thenecessary objective of moving beyondreaction, which is no longer tenable inthe modern security climate. The crucialquestion is whether these initiatives real-ly deliver what enterprises need, which isaffordable pre-emptive protection. If thesolutions extract too great a toll oninternal resources through need for con-tinual reconfiguration and endless analy-sis of reports containing too many falsepositives, then they are unworkable.Proactive security has to be as far as pos-sible automatic.

On this count some progress has beenmade but there is still a heavy onus onenterprises to actually implement proac-tive security. Some of this is inevitable,for no enterprise can make its networksecure without implementing some goodhousekeeping measures. The productscan only deliver if they are part of acoherent strategy involving analysis ofinternal vulnerabilities against externalthreats.

Indeed this is an important first steptowards identifying which products arerelevant. For example the decline inperimeter security as provided by fire-walls has created new internal targetsfor hackers, notably PCs, but alsoservers that can be co-opted as stagingposts for attacks. There is also the riskof an enterprise finding its servers orPCs exploited for illegal activities suchas peer-to-peer transfer of software,music or even video, without its knowl-edge. Identifying such threats andputting appropriate monitoring tools inplace is an important first step alongthe pre-emptive path.

Stop the exploitationHowever some of the efforts beingmade will benefit everybody and comeautomatically with emerging releases ofsoftware. Microsoft’s work withPreEmptive Solutions springs to mindhere, as the technology concerned isincluded with Visual studio 2005. This technology called DotfuscatorCommunity Edition is designed tomake the task of reconstituting source code from the compiled objectcode practically impossible, so thathackers are unlikely to try. Of coursethe risk then becomes of the sourcecode itself being stolen, but that isanother matter.

Sharing private keysThe principle of ducking and weavingto evade hackers can also be extendedto cryptography. The public key systemis widely used both to encrypt sessionkeys and also for digital signatures. The latter has become a target forfinancial fraudsters because if they steal

Philip Hunter

Proactive security sounds at first sight like just another marketinggimmick to persuade customers to sign for up for yet another false dawn. After all proactivity is surely just good practice, protecting in advance against threats that are known about, likebolting your back door just in case the burglar comes. To someproactive security is indeed just a rallying call, urging IT managersto protect against known threats, and avoid easily identifiable vulnerabilities. All too often for example desktops are not properly monitored allowing users to unwittingly expose internalnetworks to threats such as spyware. Similarly remote executioncan be made the exception rather than the default, making it harder for hackers to co-opt internal servers for their nefariousends.

Proactive securitylatest: vendors wirethe cage but hasthe budgie flown….

“Proactive

security has

to be

automatic ”

Philip Hunter

Page 2: Proactive security latest: vendors wire the cage but has the budgie flown….

PROACTIVE SECURITY

someone’s private key they can writethat person’s digital signature, therebyeffecting identify theft. But here toorisks can be greatly reduced throughpro-activity. An idea being developed byIBM involves distributing private keysamong a number of computers ratherthan just one. Then the secret key canonly be invoked, whether for a digitalsignature or to decrypt a message, with

the participation of a number of com-puters. This makes it harder to steal thekey because all the computers involvedhave to be compromised rather thanjust one. In practice it is likely that atleast one of the computers will besecure at any one time – at least such isthe theory. This development comes ata time of increasing online fraud andmounting concerns over the security ofdigital signatures.

BuglifeThere is also scope for being proactivewhen it comes to known bugs or vul-nerabilities in software. One of themost celebrated examples came in July2002 when Microsoft reported vulnera-bility in its SQL Server 2000Resolution Service, designed to allowmultiple databases to run on a singlemachine. There was the potential tolaunch a buffer overflow attack, inwhich a hacker invokes execution ofcode such as a worm by overwritinglegitimate pointers within an applica-tion. This can be prevented by codethat prohibits any such overwriting, butMicrosoft had neglected to do so withinResolution Service. However Microsoftdid spot the vulnerability and reportedit in July 2002. One security vendor,

Internet Security Systems, was quick off the mark, and in September 2002distributed an update that providedprotection. Then in January 2003 camethe infamous Slammer Worm exploitingthis loophole, breaking new groundthrough its rapid propagation, doublingthe infected population every 9 secondsat its height. The case highlighted the potential for pre-emptive action,but also the scale of the task in distrib-uting the protection throughout theInternet.

Open disclosureAnother problem is that some softwarevendors fail to disclose vulnerabitieswhen they do occur, through fear ofadverse publicity. This leads to delay inidentifying the risks, making it evenharder to be proactive. It makes sensetherefore for enterprises to buy softwareonly where possible from vendors thatpractice an open disclosure policy. Manysuch disclosures can be found on theBUGTRAQ mailing list, but a numberof vendors, and in some cases even sup-pliers of free software when there wouldseem nothing to gain by it, hide issuesfrom their users. There is however acounter argument in that public dissemi-nation of vulnerabilities actually helpsand encourages potential hackers. Butthere is the feeling now that in generalthe benefits of full disclosure outweighthe risks.

Patch itBe that as it may the greatest challengefor proactive security lies in respondingand distributing patches or updates toplug vulnerabilities within ever decreas-ing time windows. As we just saw theSlammer worm took six months arrive,and the same was true for Nimda. Thisleft plenty of time to create patches andwarn the public, which did reduce theimpact. But the window has sinceshortened significantly – a study byQualys, which provides on-demand vul-nerability management solutions,reported in July 2004 that 80% ofexploits were enacted within 60 days ofa vulnerability’s announcement. In

some cases now it takes just a week ortwo, so the processes of developing anddistributing patches need to be speededup. Ideally service providers shouldimplement or distribute such protectionautomatically.

ConclusionProactive security also needs to be flexi-ble, adapting to the changing threatlandscape. A good example is the case oftwo-factor security, in which static pass-words are reinforced by tokens generat-ing dynamic keys on the fly. This hasbeen the gold standard for controllinginternal access to computer systemswithin the finance sector for well over adecade, but recently there have beenmoves to extend it to consumer Internetbanking. But some experts reckon this isa waste of money because it fails to

address the different threats posed byInternet fraudsters. These include manin the middle attacks which capture theone time key as well as the static pass-words and replay both to the onlinebank. So it may be that while two-factorsecurity will reduce fraud through guess-ing or stealing static passwords, the costof implementing it across a customerbase will outweigh the benefits, giventhat vulnerabilities remain. But nobodyis suggesting that proactive securityavoids hard decisions balancing solutions against threats and cost ofimplementation.

April 2005 Network Security15

“Many suppliers

hide issues

from users ”

“There have

been moves

to extend

two- factor

authentication

to Internet

banking”