Human Errors & Security Issues

Human Errors & Security Issues

I estimate at least 90% of the cyber security issues in the wild are?caused by?human error. You may wonder how I arrive at this estimate. No I'm not even talking about social engineering, phishing and other targetted attacks on humans. Although those equate to a good number of issues, what I'm refereeing to is what every single device connected to a network has in common?

The answer lies in the code, which allows them to operate and perform business functions. From firmware to software a human has coded every instruction set a device utilizes and processes. These instructions?allow a device to perform operations, and if coded incorrectly, opens all devices running that code up to risk of attack.

Whether your developers write their code from scratch or leverage various packages or API's each addition to the code base introduces a potential vector of attack. I hypothesize that most of these vectors are introduced unintentionally, but the effects can be equally catastrophic.

To the developers and run teams reading this: Does your organization review all the firmware and software you use? How about the code you develop? With many companies using outsourced labor like offshore or near shore contractors to accomplish many aspects, this issue becomes more complicated.

So is the complete chain of custody understood and do you know every person who has changed something in the code? How about the path it takes before it is installed onto your production devices? Do you perform peer review on their code? Do you perform SCA or dynamic or static code review in your DevSecOps processes?

How about the firmware, did you flash known good firmware with verified MD5 sum checks before putting them into production? It's in the best interest of an organization to put security controls around not only the chain of custody but what, when and how the firmware and software is created, maintained and upgraded.

Rogue code can be introduced anywhere along the chain of custody that both?code and devices take and corrupt firmware could be installed rendering devices useless.?One example of targeting rogue code is from my brother a CW4 Apache gunship pilot. In the Gulf War he was able to destroy a good number of targets just by homing in on injected code. The devices were printers and they had special "ET phone home" like code for tracking.

If your organization develops software, its essential to use peer manual and machine-based?code review processes.?It is also critical to use?penetration testing on your internal and external assets including applications.?These steps are?the only ways to find, learn from, and minimize the human errors that, when accidentally or intentionally introduced, can equate to major flaws in your products which possibly expose you and/or your customers, and could lead to your organization?being the next big story in the news.

No organization wants this kind of attention, notoriety or explaining it to their board of directors! Think about the operational and financial loss that could come from having your brand and company reputation tarnished.?

What are your thoughts on the matter?

要查看或添加评论,请登录

Brian Gray的更多文章

  • To Process or not to Process

    To Process or not to Process

    There is a fine balance of people, process and technology when it comes to well rounded security programs. Have you…

  • The Human Psyche of Security

    The Human Psyche of Security

    There is a fine balance of people, process and technology when it comes to well rounded security programs. Have you…

  • Supply Chain Risk Management

    Supply Chain Risk Management

    Vendor, Third or Fourth Party & Supply Chain Risk Management are often overlooked as needed processes to determine the…

    1 条评论
  • Free Security Self Assessment Tools

    Free Security Self Assessment Tools

    A self assessment is a good way to baseline your security operations. Here are some free tools available to you to…

    1 条评论
  • Security & 7 Layers of the OSI Model

    Security & 7 Layers of the OSI Model

    Many of you have heard of security by layers. Some may relate this to the 7 layers of Cyber Security; 1.

  • Which Security Framework is right for you?

    Which Security Framework is right for you?

    Like just about everything in security not all solutions are equal nor are they right for every organization. The image…

  • Understanding Risk through BIA & Risk Assessment Processes

    Understanding Risk through BIA & Risk Assessment Processes

    Purpose The purpose of this white paper is to outline the difference between a BIA engagement versus a Risk Assessment…

  • Application Testing.

    Application Testing.

    This is a briefing on Automated and Manual Testing methods and how they relate to Pen Testing and Code Review. This…

  • Pentesting 101

    Pentesting 101

    What is Pentesting or Offensive Security (Offsec). Most people have heard of the term Pen Testing.

  • Making Sense of Application Security Testing

    Making Sense of Application Security Testing

    This is a briefing on Automated and Manual Testing methods and how they relate to Pen Testing and Code Review. This…

    1 条评论

社区洞察

其他会员也浏览了