Security for Change, not Performance
The latest notice of exploitation of critical infrastructure comes with an irresponsible set of actions:
The problem with all of these suggestion is that are performative, an ineffective in the long run. Changing the default passwords, even using strong passwords. Is nothing more than putting a wait state in the breach given modern tools. As we saw with the LastPass breach, MFA is not real security anymore, either. Disconnecting from the Internet is a great recommendation, except hiding behind VPN isn't disconnecting from the Internet as VPN endpoints are literally ON the Internet. As Brian Deitch says: "If you can reach it, you can breach it." Similarly, changing TCP ports is not an effective maneuver as it is still out there, just on a different port. The saddest recommendation of all: "Backup to enable fast recovery." That is only useful if the SecOps team detects the breach, which is typically in days, if not weeks.
领英推荐
So, what IS a security measure for change and not performance? For one thing, cloaking access to private applications behind Zscaler's ZPA is one such measure. It is an action which can be taken to change the dynamic of the attack, as opposed to the above measures which merely delay it. If access is given via Browser Isolation, that truncates the attackers tools, even if they were to gain access. Another measure would be to deploy Deception technology. Deception leverages strategically-placed decoys to lure attackers for early detection, as well as protection of vital resources. With today's technology dynamic deception tools are entirely accessible and appropriate. The lack of pervasive use is simply mind-boggling.
Entrepreneur, Security Strategist and Partner. Master of Red Teaming, Cyber Threat Research, and Malware Elimination. Skilled in vCISO & GRC. ‘True grit and hard work create the unbeatable.
11 个月Great Post Maria Teigeiro, CISSP