The Power of Asking Why
Robert Cross
I help security teams build strategic testing programs that reduce risk by 1000% | Book an appointment below to find out how ?
The 5 “Whys” for Root Cause Vulnerability Analysis
The 5 Whys is a problem-solving method used to identify the root cause of an issue. It's a simple yet powerful technique that involves repeatedly asking "why" to peel back the layers of a problem and get beyond the initial symptoms.? For parents reading this, it will sound familiar if you’ve ever had long car rides with your 5 year old kid. For non-parents, kids will ask you “why” at least 5 times about the world around them.? ;-)??
The 5 Whys method is credited to Sakichi Toyoda, a Japanese industrialist and inventor. He founded Toyota Industries, which later became the Toyota Motor Corporation. While the exact date is unclear, it's believed he developed the technique in the 1930s. The method became popular in the 1970’s and it is believed that Toyota still uses it today.
That begs the question, what makes The 5 Whys, which is a framework to ask “why” five times when analyzing an issue, so powerful that it became? a cornerstone of problem-solving within Toyota's manufacturing methodologies and is still used extensively today? Let's dig in!
Here's how it works:
Here's an example:
By addressing the root cause (replacing the worn shaft), you can prevent similar problems in the future. Had we stopped asking why earlier in the process, we would likely experience the issue again in the future as we solved the wrong problem.
The 5 Whys is a versatile tool applicable in various situations. It's commonly used in:
Remember, the number "5" is more of a guideline. The key is to keep asking "why" until you reach a clear understanding of the root cause.
How This Methodology Applies to Cyber Security, Vulnerability Management and Testing
A cybersecurity professional can leverage the 5 Whys methodology to effectively identify the root cause of let’s say…SQL injection (SQLi) vulnerabilities in web applications. Here's how it would work:
1. Start with the problem:
Problem: The web application is vulnerable to SQL injection attacks.
2. Why is the application vulnerable?
This initial "why" focuses on the development or configuration flaws that allowed the vulnerability to exist. Here are some possible answers:
We will assume the general response was that user input isn’t being sanitized. This appears to be a purely technical challenge but let’s dig deeper.
3. Why wasn't user input sanitized?
Here, we delve deeper into the development process:
We will use a combination of input sanitization and best practice awareness due to lack of resources or training as the response. Aha! So now we still have a technical problem but the reason the technical problem exists might not be 100% a technical challenge.
4. Why weren't developers aware or didn't follow best practices?
This “why” focuses on potential knowledge gaps or security awareness issues:
It is in this response that we discover that security wasn’t a key requirement in the project development was working on. Now the question is: Why!?!?!?
5. Why weren't developers trained or security prioritized?
This why digs into the overall security culture and processes:
This “why” response will give us the true area of investment and change that would have the largest impact.?
PAUSE: It’s important to note that every organization is different and rarely do we find that people intentionally have these gaps. As you leverage the 5 Whys methodology try not to insert bias into the questions or lead the witness. The goal is an objective reason that can be a target of positive change to ensure all future iterations of these checks have a better result.?
Let’s recap what we’ve learned and discuss what the root cause could have been.
Identifying the Root Cause:
By going through these 5 Whys, the root cause could be:
Taking Action:
Once the root cause is identified, the cybersecurity professional can recommend solutions like:
The 5 Whys methodology helps move beyond the immediate issue (the vulnerability) and identify the underlying reasons that allowed it to exist. This allows for implementing targeted solutions to prevent similar vulnerabilities in the future.? However, just like when you’re answering the “why” for your 5 year old kid in the backseat, we have to move beyond, “Because I said so!” as our answer if we want to seize the opportunity to bring those around us into a new level of awareness so they too can see the world as you see it.??
To My Subscribers / Readers:
Did you enjoy this article?
Let me know what you thought in the comments and if you implement the 5 Whys make sure to send me a note about the results you saw as a result. We all can help our organizations get better, one “Why” at a time.?
Network & Security Professional / Systems Administrator
2 个月The overall concept is good. The specific example for "How This Methodology Applies to Cyber Security, Vulnerability Management and Testing" is interesting because some people would probably disagree with "user input sanitizing will be sufficient" and describe relying on such a technique as a flaw. Would bind variables or other methods to use data without trusting/executing its content be part of the "best practices" in #4?
Business-Focused Cybersecurity Leader | Consulting & Strategic Testing for Real Results
2 个月Great read, and you know I'm a massive supporter of the 5 Why's to uncover the real issue. For the others reading this if there is a way to bring in "Champions" from the dev org then do it. To get the best buy in from work centers left of security, they need to be part of the decision making process. Give these teams a voice (and listen), and your security posture will thank you.
Principal Database Consultant at Buda Consulting, Inc | Database Design | Database Management | Database Security
2 个月Great job applying this excellent root cause analysis technique to the critical job of securing data. Well Done Robert Cross
Fractional CXO | CEO Whisperer | Board Member/Advisor | Leadership Coach | Marketing Consultant | Fundraising/Capital
2 个月Great piece, Rob. Thanks.