Security Watch

Whose Responsibility Is It, Anyway?

Keep records of your security recommendations to management or you might be left holding the short end of the stick.

Interesting turn of events at Ohio University last week as they suspended two of their IT staff, a director and a manager, over recent break-ins in which thousands of records of sensitive personal information may have been stolen.

The story seems to stand out as somewhat unique because of the level of the people being suspended. One might expect to hear that some worker bee was let go and management was left intact. I don't have any details beyond what was reported, but it would seem to me that the university put the blame where it most likely should've been placed -- with the decision makers.

Certainly there are instances where some staff hadn't done his or her job, or purposely altered something so as to create significant risk, but more often than not the risk comes from exceptions.

As worker bees, we have all run into situations where we've warned that a system has been granted more access than it needs; the rules have been loosened to accommodate a project, individual or department that absolutely can't live without unfettered access. We cringe and cross our fingers and hope it doesn't result in our worst-case scenario.

We cringe because we know full well that should something bad happen, we'll be the ones blamed, as if it's our fault they bought an application that has to run as Administrator or requires Microsoft file sharing ports opened to the world! We're always blamed for being too draconian in our approach and not appreciating the need.

Of course, we know they aren't appreciating the risks.

For their part, they don't want to know about the risks, they just want to hear what we're going to do to eliminate them -- without taking away their precious access, of course.

It's this impasse that should create the exception.

The exception documents the risks you've identified, what mitigations you've been able to put in place, and the business reasons the risk must be present. All the worker bees sign off, and it gets passed up the management chain for review and signatures. It should then be reviewed regularly, by all parties, to ensure the business drivers still outweigh the risks, and to look for new mitigation strategies.

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

Exceptions can be used for many things, from documenting lax firewall rules to acknowledging that your priorities aren't being acted upon. More importantly, they're your explanation when a bad thing occurs.

Some of you might be laughing at the idea of getting all of the signatures and review to happen. Several years ago I attended a meeting at the White House in which corporate executives were reminded that they had fiduciary responsibility for the security in their companies. The reminder was intended to be a wake-up call to these execs that they can be held personally responsible for the actions of those reporting to them on the security of their networks. So there should already be a vested interest in exception reports.

So, if you're a security person, pay attention and keep copious notes from management when they refuse the protective measures you recommend. They may make the difference between a paid vacation and a few weeks of unpaid leave.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular