The following text is
copyright 2009 by Network World, permission is hearby given for reproduction,
as long as attribution is given and this notice is included.
Information Security How
Not-Tos
By: Scott Bradner
It's not easy getting information security right. It is easy to get advice (often from vendors who want to sell you their semi-magic fix for all that ails you) on what you should be doing. But actually protecting your corporate or personal data turns out to be hard in the real world. Take a look at the Identity Theft Resource Center's report on what happened last year to see. (http://www.idtheftcenter.org/BreachPDF/ITRC_Breach_Report_2008_final.pdf)
There are lots of rule sets you can follow, or in some cases must follow, to protect information. These range from the multiple families of security standards put out by the International Organization for Standardization (ISO) (see http://www.iso27001security.com/html/others.html) to the new Massachusetts regulations implementing the Massachusetts Identity Theft Law.
To me, standards like the ISO security standards are too
complex and theoretical for humans to effectively implement. The new Massachusetts regulations (http://www.mass.gov/?pageID=ocaterminal&L=3&L0=Home&L1=Business&L2=Identity+Theft&sid=Eoca&b=terminalcontent&f=idtheft_201cmr17&csid=Eoca)
are quite good and almost all of them can be reasonably implemented (a
personal, not official Harvard view) although the Massachusetts business
community seems to be going non-linear over them.
It is frequently quite hard to figure out why these types of
rules say what they do - too rarely do the rules include enough context for the
reader to understand what threat is being addressed and how the rule will
address the threat. It is also
hard to understand what specific parts of the rules are key and which parts can
be tweaked for a local environment without seriously impacting actual
security.
Sometimes one can learn more by finding out what not to do
than by being told what to do. The
best list of things not to do, or more precisely, dumb security ideas is Marcus
Ranum's The Six Dumbest Ideas in Computer Security (http://www.ranum.com/security/computer_security/editorials/dumb/). It has a good list of bad ideas and
very good explanations on why they are dumb. It's a few years old but the lessons are for today. The dumb idea I most relate to (being
from an educational institution) is number 5 - "educating
users." Fundamentally users
can not be educated to pay reliable attention to security and any security
mechanism that depends primarily on educating users will fail.
A different type of list of what not to dos was just
published by the SANS Institute.
This is a list of "How to suck at Information Security"
(http://isc.sans.org/diary.html?storyid=5644). This list does not have any of the kind of background and explanation for each of the bad ideas that Ranum puts in his list but is quite instructive anyway. If you know something is a bad idea maybe you can think about why and learn from that process.
The SANS list is broken into 5 parts, each listing common information security mistakes and misconceptions. The sections include security policy and compliance, security tools, risk management, security practices and, finally, password management. Some examples: "say 'no' whenever asked to approve a request", "enforce policies that have not been properly approved", "make somebody responsible for managing risk, but don't give the person any power to make decisions", and "require your users to change passwords too frequently". There are lots more bad ideas - take a look.
disclaimer: Education, at places like Harvard, involves exposing
students to bad ideas as well as good ones so that they can tell the difference
- but I know of no University view on the usefulness of bad security ideas so the
above reviews are mine alone.