Thursday, June 18, 2009

Pending Canadian legislation proposes new snooping capabilities for authorities

Interesting story reported by Canwest News Service out of Canada

OTTAWA — Police will be given new powers to eavesdrop on Internet-based communications as part of a contentious government bill, to be announced Thursday, which Public Safety Minister Peter Van Loan has said is needed to modernize surveillance laws crafted during "the era of the rotary phone."
Original Story by Canwest News Service

Monday, May 11, 2009

Star Wars and Information Security

One of our family traditions that I thoroughly enjoy is family movie nights. Every Sunday we gather in the theater to watch a family movie. It reminds me of Sunday nights when I was a kid, and Disney would show the Sunday night movie on ABC. It marked the end of the weekend, and the dreaded school week ahead loomed just over the horizon. The kids have gotten interested in Star Wars thanks to new cartoons that are being released, so this Sunday we decided to watch the original Star Wars. It has been a long time since I have seen the movie, but there is a great lesson for all organizations in the movie in regards to their risk management and information security programs. At this point, you are probably wondering if my misspent youth has clouded my judgment here, or perhaps I am one of those people who have a life size Darth Vader in their house and know all of the Star Wars trivia. I assure you that neither of these are in play here, so hang on a minute while I clarify. For the purposes of my illustration here, the Death Star and the baddies on it are a large organization with aspirations of intergalactic domination, not unlike (insert large organization from your “I hate them” list here).

At one point in the movie there is a meeting with the Generals, leaders, and Darth Vader where one of the individuals (I’ll call him the CSO) comments that the death star has several vulnerabilities and not to get too cocky (I’m paraphrasing here). The others dismiss his notions as nonsense, and Darth Vader proceeds to choke him without actually touching him. This would equate to the CEO or Executive Board shooting down your most recent proposal. As if the physical breach of the Death Star’s security by a newbie, a freighter pilot, a Princess, a Wookie, and two robots was not enough of a wakeup call, the Rebels eventually figure out that there is indeed a vulnerability in the Death Star that can be exploited by a single X-Fighter. We will equate this to a web vulnerability in one of your front-end applications that when exploited gives someone complete control over the back end system that holds credit cards. As this attack is underway the same person advises one of the Generals that perhaps it is time to get his escape pod ready (DR plan) and is again dismissed because hey what could possibly go wrong when we have enough money to build a ship the size of a planet.

In the end of course the vulnerability is exploited and the entire thing gets blown to bits. I found myself hoping that the CSO got out of there somehow since he was the only one who knew the BCP plan by memory, and is now living a peaceful life on some planet.
Anyone who has ever read any of my blogs (thanks Sis) knows that at this point, I will try and tie this to some nugget of Information Security gold, and they are right. No matter how much money you spend on Information Security in an organization, there is probably some vulnerability in something you coded or bought that can wreak havoc on your organization. The trick is to catch as many of these as you can without driving your company into bankruptcy, or the CSO into an early grave doing so. Additionally, when things do go terribly wrong you had better have a BCP/DR plan that everyone knows how to execute.

Wednesday, March 18, 2009

Changes coming for Healthcare Privacy

On February 17, 2009, President Obama signed into law the American Recovery and Reinvestment Act of 2009 (“ARRA”). Title XIII of ARRA, the Health Information Technology for Economic and Clinical Health Act (“HITECH Act) and specifically Subtitle D calls for new regulations and requirements to protect the privacy of health-related information that previously fell under HIPAA.

Under the HITECH Act, entities will be required to notify individuals as to a breach of their personal health information (PHI) unless it is encrypted. The breach notification must be made without unreasonable delay and within no more than 60 days following the detection of the breach. If the breach involves more than 500 individuals, then the Department of Health and Human Services (“HHS”) must also be notified as well as “prominent media outlets” in the applicable area. HHS will also be publishing the names and details of these reckless wrongdoers (my words not theirs) on their website.

This will effectively make this the first Federal data breach notification law in the country, and will be just one more item that needs to be added to the ever expanding data breach procedures at any organization that handles, owns or processes this type of information.
More information in the link
http://waysandmeans.house.gov/media/pdf/110/hit2.pdf

Wednesday, February 25, 2009

Information Security and Privacy class

Thanks so much for everyone who attended my class. I have published notes and links at the Class Notes link below. Please let me know if you have any questions, or need additional information.

Chris

Class Notes

Monday, February 23, 2009

Outsourcing Risk Management

You’ve heard it before “you can outsource the business process, but you can’t outsource the risk”. SaaS, cloud computing, BPO, or simply external hosting of an internally developed application can open up an organization to a much larger risk appetite than they might have if the data and solutions remained in-house. Of course if an organization’s policies, procedures, and standards are bad enough it could also reduce the risk. Either way, organizations must manage that risk to determine if there are significant changes that need to be addressed. COBiT, ISO 27K, PCI, and most other standards and many regulations call for the proper management and oversight of outsourced providers, so this should be no surprise to organizations or the companies that provide these type of services.

The first place to start is during contract negotiations with the external party. It should be clear what the organization expects, and what standards, policies, and procedures should be met. There should be penalties and consequences if these are not meant, and audit rights should always be present in any obligations. The FFIEC statement on this entitled Risk Management of Outsourced Technology Services.


The following is a good baseline of items that should be included.


  • Service Level Agreements for 10% of the yearly expenditures for each breach of the SLA.

  • The service provider and its agents are prohibited from using or disclosing the institution’s information, except as necessary to or consistent with providing the contracted services, and to protect against unauthorized use (e.g., disclosure of information to institution competitors).

  • All third-party or sub-contractors who will be storing or processing data must be approved.

  • Provider must disclose any known, suspected or future security issues or incidents

  • Any BITS FISAP, SAS 70 Type II, or other external third party audits

  • Qualified information security management must be in place in the organization

  • Regularly scheduled reviews of the third-party’s policies

Monday, December 1, 2008

Protecting our most valuable gifts

Children are the most precious gift we could ever receive. It is our job to protect them, and arm ourselves and our children with the knowledge needed to keep them safe. Protecting our children on the Internet is only one aspect of their overall safety and security. Below are links to sites that promote the education of both children and their parents on various safety and security issues.

Various Internet Safety links for parents and children
http://www.netsmartz.org/
http://www.ConnectSafely.org
http://www.safekids.com
http://www.safeteens.com
http://www.kidswatch.com/

Wireless routers with filtering software built-in
http://www.pcmag.com/article2/0,1759,1619375,00.asp
http://tech.yahoo.com/blogs/devlin/5684
http://www.netgear.com/Products/RoutersandGateways/SuperGWirelessRouters/WGT624SC.aspx

Fire Safety for the home
http://www.firstalert.com/tundra_fire_extinguishing_spray.php
http://www.usfa.dhs.gov/kids/flash.shtm

Great sites about auto safety, and other safety items for kids
http://www.kidshealth.org/kid/watch/out/car_safety.html
http://www.aap.org/healthtopics/carseatsafety.cfm
http://www.nhtsa.dot.gov/portal/site/nhtsa/menuitem.9f8c7d6359e0e9bbbf30811060008a0c


Teen Driving
http://www.nsc.org/issues/teendriving/guide.htm
http://www.skipbarber.com/driving_school/mazda/new_driver.aspx

Monday, November 3, 2008

Encryption and Security Awareness – it’s the law!

Several states are jumping on the information security and privacy legislation train, and it is leaving the station at full speed. Similar to the data breach laws that are now in place for 44 states now, we can expect a similar rush by states to initiate similar laws calling for specific security measures to be enacted to protect personal information, and liability for companies that have breaches

Massachusetts for example passed the following legislation, which calls for some very specific controls and measures to be enacted to comply with the state law.

201 CMR 17.00: Standards for The Protection of Personal Information of Residents of the Commonwealth

This regulation is applicable for entities who “own, license, store or maintain personal information about a resident of the Commonwealth of Massachusetts”.

According to the regulation personal information and records are defined as such:

"Personal information," a Massachusetts resident's first name and last name or first initial and last name in combination with any one or more of the following data elements that relate to such resident: (a) Social Security number; (b) driver's license number or state-issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to a resident’s financial account; provided, however, that “Personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

“Record” or “Records,” any material upon which written, drawn, spoken, visual, or electromagnetic information or images are recorded or preserved, regardless of physical form or characteristics.


Two of the more interesting and detailed requirements are:

“The encryption of all personal information stored on laptops or other portable devices, and “to the extent technically feasible, encryption of all transmitted records and files containing personal information that will travel across public networks, and encryption of all data to be transmitted wirelessly”

“Each covered entity must train employees on the proper use of the computer security system and the importance of personal information security.”

Nevada has similar legislation that went into effect on October 1, 2008, which prohibits businesses from transmitting unencrypted personal information on consumers on external networks.

So how can your organization begin to comply with this type of legislation?

  • Consult internal and external counsel on these matters and ensure you have someone specialized in privacy & data security law.

  • Ensure you have a written information security plan that uses a published industry standard to use as a guideline (ISO, PCI, etc.). Most of the legislation is based on using “reasonable” security measures that cover (and this is the de facto language) administrative, technical, and physical safeguards.

  • Once your standard is in place in your program – work to achieve that standard, by performing a risk assessment against the organization so you know where to start, and where to properly spend money and resources.

  • Know where your important and confidential data is within the organization, and how people are using it. Get line managers that are responsible for this type of data together and ask them in a very non-accusatory manner how the organization is using and protecting this type of data.

  • Exercise control over service providers and require them to contractually protect your data and follow your standards, as well as auditing them to ensure they are doing so.

  • Have a plan ready in case none of this work and you have to report a breach.

Obviously, these are all very high-level requirements and are by no means an exhaustive list. Every organization is different and requires different controls and processes. The more you understand the data flows, and the risks to the organization the better you will be when the worst happens.

One quick note - in the definition of person, the commonwealth intentionally left any of their agencies out of this definition so they wouldn't have to abide by this legislation - NICE!