29.04.2016 Views

GSN Digital Edition April 2016

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Campbell on Crypto<br />

Cybersecurity and Occam’s Razor –<br />

Encryption is the Simplest Answer<br />

By Shawn Campbell<br />

When it comes to OMB’s Cybersecurity<br />

Strategy and Implementation<br />

Plan (CISP), it may be<br />

best to apply the problem-solving<br />

principle of Occam’s Razor: The<br />

simplest answer is usually correct.<br />

And the simplest answer is:<br />

Encrypt everything, from datain-motion<br />

to data-at-rest.<br />

CISP underscores the need for<br />

agencies to implement<br />

an indepth<br />

defensive<br />

strategy to protect<br />

high value<br />

information and<br />

assets – especially<br />

sensitive<br />

data, sensitive<br />

keys, and identity credentials.<br />

Sensitive data at rest is particularly<br />

vulnerable once a breach<br />

has occurred, because of its volume<br />

and relevance.<br />

The true threat to sensitive data<br />

comes from attackers hijacking<br />

privileged accounts with full access<br />

to servers. In some cases,<br />

“Insiders are a major source of breaches,”<br />

whether intentional and malicious or<br />

through inadvertent misuse by employees<br />

or partners.<br />

22<br />

the attackers are actually insiders<br />

with existing elevated privileges.<br />

Privileged accounts are where<br />

data is most readily available;<br />

other end points do hold data,<br />

but that data is too widely distributed<br />

to be as great a threat.<br />

The greatest risk to unauthorized<br />

data access comes from insider<br />

threats, which are surprisingly<br />

prevalent. As early as 2012,<br />

the industry analyst firm Forrester<br />

noted that (particularly in the<br />

private sector) “insiders are a major<br />

source of breaches,” whether<br />

intentional and malicious or<br />

through inadvertent misuse by<br />

employees or partners. Privileged<br />

accounts have access to considerable<br />

amounts of data. Today,<br />

through the sharing of administrator<br />

and superuser accounts, as<br />

well as physical theft of servers,<br />

insiders present both a real and<br />

growing threat.<br />

Enter Occam’s Razor<br />

To address CISP’s requirement<br />

for protection of high value information<br />

and assets,<br />

the best way<br />

for agencies is the<br />

simplest: Encrypt<br />

all sensitive data on<br />

your storage array.<br />

What it boils<br />

down to is, if sensitive<br />

data is encrypted,<br />

then it is safe. And if you<br />

don’t know which of your data is<br />

sensitive, then encrypt all of it.<br />

As an added layer of protection,<br />

separately store the encryption<br />

keys used to encrypt and decrypt<br />

data. When an encryption key is<br />

stored separately from the data –<br />

ideally on a hardened device – it

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!