Best Practice is best for a Reason

Best Practice is best for a Reason

We are still learning the extent of the impact from the SolarWinds hack across the 33K customers who used their Orion software. Just as we are working to fully understand the impact, we are still learning the mechanisms employed to carry it out. While we may never know the full extent of either; there are some early lessons learned.

The attackers were able to leverage legitimate credentials for malicious purposes, unchecked, for months - possibly longer. With these credentials, they gained administrative access and were able to move laterally on all affected networks with relative ease. The latest trend in cybersecurity is zero trust, which, at its core, means everyone should be authenticated at all times, regardless of who they are or where their device sits on the network.

Traditionally, in cybersecurity, any device or user already inside the network is presumed ‘safe’ for cost savings and user convenience. An assumption which, ultimately, aided the SolarWinds perpetrators.

By contrast, zero trust is inherent to physical access because it is expected that every person in the company, from the CEO down, will badge through a barrier for entry each time. Just because someone gains access through the front door, that does not mean they have been authenticated to pass through other doors in the building. Even more, most PACS operators would not consider using a system that did not provide anomalous credential usage reporting. Even residential security systems employ this.

In physical access, just like cyber security, there are credentials for individuals, devices and servers. Most obvious are the proximity or smartcard-based cards and tokens used to interact with door readers. Now, there is a shift to making these keys virtual, stored on mobile devices scanned optically or sent wirelessly.

Some of these credentials are behind the scenes, authenticating communication between system components. Identity credentials, serving as keys, are throughout access control. In cybersecurity, a credential is a key that opens a lock a lock, as well. The distinction between identity credentials and keys, physical tokens and virtual ones, even physical and cyber security are all blurring – becoming the same thing.

Yet, when it comes to monitoring of these credentials, physical and cybersecurity focus on monitoring the locks alone, which does not provide 100% situational awareness. The keys must be monitored, as well. The SolarWinds hack reminds us that attackers are most dangerous when they can use legitimate credentials for malicious means unchecked.

Over the past decade, there has been a transition from less secure authenticators like passwords and proximity badges in cyber and physical security to higher assurance networked credentials that can be used simultaneously in both physical and logical access control systems. Not only must credentials be closely monitored, but equally as important, is the monitoring of the credential issuers. The ‘credential network’ that supports the security of an organization’s data network provides valuable insight into the risk associated with accepting certain types of keys.

We see this concept in action in other industries – for example, credit card companies mitigate fraud with similar monitoring practices. Our transactions are monitored for anomalous usage, issuing banks for batches of compromised cards and so on.

Consumers take for granted the existence of this monitoring, feeling safer that their identity is secure or at least their financial exposure is reduced as a result. High assurance government and commercial credentials were created as a network backed technology with this type of monitoring in mind.

Security suffers where assumptions are made. Do not simply assume a credential is valid because it is genuine; instead, continuously monitor the trustworthiness of your entitled users’ credentials. The stakes have never been higher and cyber and physical security depends on using all the capabilities at your disposal, the best practices from all corners of security, whether traditionally physical, cyber or financial.

About the Author

Jeff Nigriny is the CEO of CertiPath.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3