Sentries used to ask, "Friend or foe?" and were able to relax when the answer came back "friend." But in today's world of information technology, the question "With friends like these, who needs enemies?" is becoming a catch phrase, particularly among those with the title of chief information security officer (CISO). Those charged with protecting a company's electronic assets have had to concentrate their efforts on combating the growing trend of internal menace.
Over the last decade information security has moved from firewalls and stopping hackers to compliance and keeping the company out of trouble, explains Roger Nebel, who heads up the strategic security practice for FTI Consulting. He believes there is an increasing awareness of internal threats but points out those threats continually have been there. The focus for security has become internal–from screening employees and putting computer security controls in place to creating a need-to-know system where business users can look at one document but not another.
People in the security community know their job is to protect assets whether attacks are intentional or unintentional, according to Kevin Yeamans, IT security and compliance leader with GE Insurance Solutions. "Largely, the intentional threats were perceived to be external in nature, although you always have the threat of internal people stealing data and exposing it outside the company," he says. "But the larger threat always has been unintentional destruction or modification."
Quite often employees are unaware what they are doing is dangerous. Yeamans cites examples such as a business user creating data to send to a customer and not being careful about making sure the information is scrubbed and the file has only the data that particular customer needs to see. In such cases, employees potentially are exposing internal pricing practices or claims practices to outsiders.
Don Casson, CEO of Evergreen Systems, explains a big part of what his strategic consulting firm does is to help the IT function of clients to become more compliant with policy. One of the big challenges in security he sees is some threats and weaknesses are caused by actions taken in IT as opposed to a threat from a sophisticated hacker. "The hackers typically are exploiting weaknesses exposed to the market at large," he says.
ID the Threats
What do internal threats look like? Casson indicates threats can come from three areas: the application development department, the infrastructure, and the data center. In applications, companies are leveraging all sorts of open-source code and service-oriented architectures. "These are driving a higher degree of interaction from components of code," he says. There also is an infrastructure level that is expanding rapidly outside the company's firewall. "We have this really synchronistic business network," he continues. "Speed and accuracy are critical. That means those things will be electronically open to us, and there's a possibility it will create more exposure to security issues."
As for the data center, Casson adds there used to be a server for every application, but that's quickly disappearing into a virtual-server environment. "If you think about using multiple operating systems on a rack or server cards and multiple applications in who knows how many integrations, what levels of security are processing through that mass of stuff? And how do we protect it?" he asks. "The server structure is becoming a capacity function. That blurring of the computer power line is one of the biggest risks in the next couple of years."
Internal security issues derive from three concerns, states Nebel: What breaches happen more often? Which are more preventable? How would you prevent them? Just as companies have a control objective that ensures financial reporting is accurate, another control objective might allow only authorized people to update the spreadsheet and make changes to reporting. "You might have specific controls at that level–steps, procedures, or technology put in place to achieve the control objective," he says. Often companies need what are called compensating controls. "If one control is only partially effective, you have an additional control," Nebel suggests. An example of a compensating control is two people having to sign checks for amounts above $50,000. Those controls prevent both malfeasance and error, he adds. "Good hiring practices, training, and checks and balances are your controls against errors," he says.
When Evergreen describes a proactive approach to security, the consultants want clients to put in those policies upfront when work is planned, because as the work is launched and sent down through the organization, some mid-level database administrator or programmer isn't likely to know the security policies or the governance compliance policies. "People just are beginning to think about effective enterprise process when it comes to security compliance," Casson says.
Bountiful Data
User access to too much data often is the problem a business faces. What has changed for GE Insurance Solutions, notes Yeamans, is data access is granted on the basis of a person having a demonstrated need for access to a particular data set or a particular view of the data.
Insurers have customer data to consider and business practices to protect, Yeamans acknowledges. "You can't maintain a competitive edge if your pricing information and your pricing practices are being exposed outside your business, whether it is intentional or unintentional," he says.
However, restricting data is not easy, Yeamans concedes. It starts back with the application design or a data model design phase to understand what data is available within a certain application. "You have to understand data models and whether there is a view into the database," he says. "What kind of information is there to see?"
For example, Yeamans explains, security people need to look into some HR databases, but they don't need to see salary information. "There are certain things you do and don't need to see," he says. The same goes for insurance-type data, he points out. Some business users may need to see policy information, but they may not need to see a policyholder's medical history. Carriers need to understand what data is there and what the business need is.
Access to data was driven by what Yeamans calls look-alikes. "Business users would ask for the same access as someone with a similar job title. We've backed down from that and gone to role-based access," he says. "For each set of data and applications, there has to be a defined set of roles. This is what the job function is, and this is the type of data you will need or be able to manipulate based on your role."
Getting to that role-based model has been difficult, Yeamans admits, but in the long run it's been worthwhile because it has raised the level of controls within the company.
At Selective Insurance, business owners of the data are the ones responsible for issuing access authorization. "They will tell us for this role–say, someone who's a claims management specialist–it's appropriate to allow access to that particular business system," says John Ciccolella, manager of information security. "The profiles are critical to making it manageable. You manage by the profile or the job responsibility, not each employee." In the normal course of events, the business owners are used to this process. "There's good buy-in," reports Ciccolella. "They need their information to be accessible, but they also understand the need to keep it private."
Separating the Data
There is a lot of awareness and education that has to go into separating the data, Yeamans indicates. Users have to be made aware of the implications involved in issues such as data privacy. "We have to get privacy notices in front of people who are doing DBA-type work," he says. Database administrators have a high level of access, and they have to be educated. "We tell them they may be exposed to this kind of data in their daily work, and it's incumbent on them to be cognizant they're being treated as a trusted employee in this position, and there are nondisclosure implications that come with accepting that role," he says.
Some business users may feel the information security people are coming down on them, but that is where education plays a big part. "You show them a few articles and clips on data, and you make them understand there is legislation in place to govern [data security]," he says. "People can be held culpable for these types of things."
It helps when compliance is being pushed down from the very top of the organization. "Once you get that, it makes your job easier," says Yeamans. "The important thing I try to get across to people is even if we were not a publicly traded organization and were not subject to Sarbanes-Oxley-type legislation, the controls those laws imply are good controls. They make good business sense."
Inadvertent Mistakes
Companies need to review controls involving systems access on a monthly basis, advises Yeamans. A situation companies struggle with is when employees transfer to new positions. "When people move from one area of the company to another, their responsibilities change, and [companies] often grant them new access to be able to do their new responsibilities without addressing their old access," he says. "It's difficult because there's usually a transition period where they'll remain somewhat responsible for old responsibilities. But once they move on and still retain that old access, you have an exposure where that user potentially has inappropriate access."
This is the point where companies need periodic reviews from the applications side. "We need to see they've reviewed it and checked on every person who has access," says Yeamans. "That's why it was so important for us to get to that role-based model."
One other issue carriers deal with is what Ciccolella refers to as "the finger fudge." If an employee has legitimate access to the data and presses the wrong keys, the data can disappear. "We keep a safety net under the data, either for a user failure or a hardware failure," he says. "We have daily backups and routine testing of the restoration so we can get a record back or put data back from an error or from lost hardware."
Backups of data occur daily, Ciccolella notes, and they need to be a routine part of the operation. Selective's business application owners stipulate to IT what they require should a failure occur, and it is up to the security staff to comply. "Different service levels have different prices surrounding them," he says. "If a server broke, the data went away, and we have to have that data back in X number of hours, then that's what we do. The only way we're sure all that happens is through religious testing."
Selective has a formal business continuity plan that tries to identify anything that could possibly interfere with ongoing business. This includes twice-a-year visits by company officials to the carrier's hot site location, Ciccolella says, where they walk through a scenario that's meant to appear as if the carrier had lost access to its headquarters. "The testing gets down to a thing as small as an inadvertent deletion of a record that needs to be recovered," he says. "In the business continuity plan, you have to think of the small things that happen on a routine basis and the large things that hopefully never happen."
There is no way a company can be protected completely against inadvertent attacks on its systems, Casson admits, but he adds a lot of mistakes come from poor planning and poor review before activities occur. "It's not the actual activity done at one level that creates the problem, it's conflicting activity done at another level or a lack of awareness of that activity at a third level," he says. "If you look at the system outages IT organizations suffer–and that could be the ultimate proof of a mistake–I'd say 90 percent of those are caused by their own haste."
It is rare for a system to break on its own, Casson points out. Once a system is operating, it tends to maintain that state of operation, but changes made to the system often are what cause breakdowns, he believes, and it's usually the impact of those changes on other processes that cause the failure. "It's all these 'we didn't realize' or 'we didn't know' statements that really drive the problem," he says. "The other thing about making mistakes is even though you can't prevent them, if there are checkpoints, depending upon criticality, you can prevent them from becoming a systems failure."
Pick Your Poison
There are two ways, according to Casson, to look at security: a proactive approach and a reactive view. A great deal of the time and energy spent managing security has targeted the reactive strategies, whether firewalls, passwords, or virus protection. "There hasn't been a terrific amount of focus on security policy and bringing that policy to life," he asserts. Security as a proactive process is a critical focus, Casson believes. Studies have shown companies that exercise effective or proactive control over their security have 90 percent fewer security incidents than those that don't. "It comes from that point of exposing themselves or not exposing themselves," says Casson. "When we work with a client, the first point we make is security is a process, and all of the IT staff are part of the security organization. Security is not a line function for IT."
GE Insurance Solutions reviews its controls monthly, reports Yeamans. The reason for the frequency is so the company can maintain what it refers to as continuous compliance. "A lot of companies will tell you Sarbanes-Oxley certification gives you a snapshot of a point in time," he says. "A lot of companies also will tell you they have a large scale of remediation efforts that occur during the time of year prior to certification. That gets you the stamp, but in order to get to a continuous compliance model, you've got to monitor things." Yeamans advises companies must know when the controls change and why the controls change. "You need to be able to track those changes to authorize requests," he says.
GE Insurance Solutions has moved to a model where security people are in continuous communication with the functional owners of the applications, Yeamans states. These business users need to be involved in the controls that govern access to the data and systems changes. "They have to accept the responsibility as the owner of the application and the owner of the data that the people who apply the controls–the security function–are doing it at [the business owners'] direction," he says. "We'll help them monitor those controls, but at the end of the day when the outside auditors come in and take a look, [the auditors] are holding that data owner responsible for whatever the data is exposed to. [Business owners] need to be aware of what the controls look like, how they're changed, and when they're changed."
A large organization might have a head of internal audit, a head of security, and a head of compliance, and they all work together, Nebel reports. "Security people can maintain their independence by advising, measuring, and reporting, but they generally shouldn't design or implement," he says. "The traditional security function–firewalls, intrusion detection, access control–is staying in IT and becoming an IT function, but the CISO job is becoming more of a compliance or internal audit function."
The Security Compliance Council did a study of 244 companies, according to Nebel, and concluded the information security job in a company needs to evolve into a risk management function. "A CISO generally has a substantial compliance role conducting risk assessments and doing risk management and control effectiveness and measurement," he says. "Internal audit can't do that."
The job of internal auditors is to assess whether controls are effective, but the security person is emerging in savvy organizations as the person to lead that effort, especially in smaller companies because they have fewer people with fewer specialties, Nebel explains.
SOX Appeal
Is Sarbanes-Oxley making security easier for companies today? "I think it is for those embracing it as an opportunity to improve," says Casson. "It depends on your attitude. Those that have embraced [SOX] have seen terrific gains."
Legislative changes, particularly SOX, have been beneficial to information security leaders, Yeamans agrees. "It heightens the awareness our directors and our chief operating officers have around internal controls," he says.
The fact SOX certification directly impacts a company's CEO, CFO, or COO gives information security people a huge amount of traction, adds Yeamans. "It opens up doors for us that weren't open before," he says.
Nebel reports the biggest thing he sees in information security right now is the impact Sarbanes-Oxley is having on corporate America, specifically Section 404, where companies are required to document and assess the effectiveness of internal controls. "Sarbanes-Oxley says you should document the effectiveness of internal controls, but it doesn't prescribe how to do that," he says.
What it boils down to, Nebel points out, is every public organization over the last two years has had to document all its internal controls, particularly anything that could affect financial statements. "Eventually the CEO and the CFO have to certify their controls are in place, they're effective, and the financial statements are correct either to avoid a restatement or, if there is a restatement, to know whom to go after," he says. "That's had a tremendous effect on organizations in terms of addressing the internal threat."
Ciccolella doesn't believe internal security is any different today than it was prior to the enactment of SOX and other privacy legislation. "Because we're insurance, security always has surrounded who has access to the information in the employee base," he says, adding Selective uses what it calls the principle of least access. Simply put, if employees' jobs require access to data, they have it. "That enables us to do business," he says. But if employees' duties don't require access, they are restricted from that access.
Send a Message
Sometimes it's more difficult to detect internal attacks than those from the outside because the users don't understand the problem. "It's almost as if [users] are being treated as suspects, and that's certainly not the message we want to send," says Yeamans. "We're really not suspicious of anybody. There was a time when security professionals would joke if they really were doing a good job, the other employees in the company couldn't handle their jobs because [security] blocked everything out."
The job of information security professionals, Yeamans contends, is to protect people from themselves and to protect the company from external threats. "We have to do that as we enable business to occur the way our leaders have outlined it," he says. "That's the thing sometimes IT can be guilty of. We take our role in IT for granted. If it were not for the business we need to transact on a day-to-day basis, there would not be a need for IT. Insurance is data driven. It's an information-driven business. It's important to remember that's why we're here."
Tech Guide: E-systems, E-commerce, Web Services, and Security Tools
Accenture
Palo Alto, Calif.
312-737-8842
www.accenture.com
AdminForce Remote
Boulder, Colo.
877-905-0777
www.adminforce.net
AdminServer
Chester, Pa.
610-619-3100
www.adminserver.com
AgencyPort Insurance Services
Boston, Mass.
617-646-4550
www.agencyport.com
Aladdin Knowledge Systems
Arlington Heights, Ill.
800-562-2543
www.ealaddin.com
Allegient Systems
Wilton, Conn.
203-761-1289
www.allegientsystems.com
Allenbrook
Portland, Maine
877-764-6452
www.allenbrook.com
Allfinanz
New York, N.Y.
888-824-2929
www.allfinanz.com
BMC Software
Houston, Tex.
800-841-2031
www.bmc.com
Burstek
Bonita Springs, Fla.
800-709-2551
www.burstek.com
CA
Islandia, N.Y.
800-225-5224
www.ca.com/security
CGI Group
Montreal, Quebec, Canada
541-841-3200
www.cgi.com
CMS Products
Costa Mesa, Calif.
714-424-5520
www.cmsperipheralsinc.com
Connective Technologies
Houston, Tex.
713-690-6789
www.connective-edi.com
Connextions
Orlando, Fla.
877-772-6868
www.connextions.net
COSS Development
Milwaukee, Wis.
262-241-8989
www.cossdev.com
CSC Financial Services
Austin, Tex.
800-345-7672
www.csc-fs.com
DRC
Honolulu, Hawaii
800-836-6057
www.decisionresearch.com
Digital Sandbox
Reston, Va.
703-390-9770
www.dsbox.com
Duck Creek Technologies
Bolivar, Mo.
800-889-8401
www.duckcreektech.com
DynTek
Irvine, Calif.
877-297-3723
www.dyntek.com
Eagle Technology Management
Marion, Iowa
800-975-3245
www.eagletm.com
EDS
Plano, Tex.
972-605-6000
www.eds.com
eHealthSystems
Sunnyvale, Calif.
408-542-4800
www.ehealthsystems.com
Engedi Technologies
Bumpass, Va.
540-894-0100
www.engedi.net
ePolicy Solutions
Torrance, Calif.
310-819-3200
www.epolicysolutions.com
Ernst & Young
Security & Technology
Solutions Practice
New York, N.Y.
212-773-3000
www.ey.com
Evergreen Systems
Sterling, Va.
571-262-0980
www.evergreensys.com
Examen
Sacramento, Calif.
866-239-2636
www.examen.com
Fair Isaac
Minneapolis, Minn.
612-758-5200
www.fairisaac.com
FileNet
Costa Mesa, Calif.
800-345-3638
www.filenet.com
Financial Services ISAC
Reston, Va.
888-732-2812
www.fsisac.com
First Notice Systems
Boston, Mass.
800-310-4367
www.firstnotice.com
Fiserv Insurance Solutions
Cedar Rapids, Iowa
800-943-2851
www.fiservinsurance.com
Forsythe Technology
Skokie, Ill.
800-843-4488
www.forsythe.com
Genelco Software Solutions
St. Louis, Mo.
800-983-8114
www.genelco.com
Global Technologies Group
Arlington, Va.
703-486-0500
www.gtgi.com
Group Technologies
Milford, Mass.
877-476-8755
www.grouptechnologies.com
Guidewire Software
San Mateo, Calif.
860-217-0215
www.guidewire.com
I-Alliance
Indian Head, Pa.
800-997-5871
www.iallianceonline.com
InsureWorx
Emeryville, Calif.
800-785-4526
www.insureworx.com
Insurity
Hartford, Conn.
860-616-7721
www.insurity.com
InsurSys
San Francisco, Calif.
415-975-0966
www.insursys.com
ISO Insurance Technology Solutions
Nashua, N.H.
603-598-5427
www.iso-its.com
MFX
Parsippany, N.J.
866-639-6399
www.mfxfairfax.com
NaviSys
Edison, N.J.
800-775-3592
www.navisys.com
NetManage
Cupertino, Calif.
800-558-7656
www.netmanage.com
Network Automation
Los Angeles, Calif.
888-786-4796
www.networkautomation.com
onClick
Houston, Tex.
713-784-7600
www.onclickcorp.com
Ovum
Boston, Mass.
800-642-6886
www.ovum.com
Parasoft
Monrovia, Calif.
888-305-0041
www.parasoft.com
PilotFish Technology
Middletown, Conn.
860-632-9900
www.pilotfishtechnology.com
RedSiren
Reston, Va.
703-788-9800
www.redsiren.com
Results International Systems
Worthington, Ohio
800-875-2126
www.resultscorp.com
S1
Atlanta, Ga.
888-457-2237
www.s1.com
Safend
Philadelphia, Pa.
215-496-9646
www.safend.com
SANS Institute
Bethesda, Md.
301-654-7267
www.sans.org
Seagull Software
Atlanta, Ga.
404-760-1560
www.seagullsw.com
SecureWave
Herndon, Va.
703-788-6760
www.securewave.com
Steel Card
Santa Barbara, Calif.
800-553-9961
www.steelcard.com
Symantec
Cupertino, Calif.
800-813-5869
www.symantec.com
Tumbleweed Communications
Redwood City, Calif.
877-988-6253
www.tumbleweed.com
Value One
Morrisville, N.C.
800-565-9598
www.e11online.com
Verian Technologies
Charlotte, N.C.
800-672-8776
www.verian.com
Webmethods
Fairfax, Va.
703-460-2500
www.webmethods.com
Whale Communications
Fort Lee, N.J.
877-659-4253
www.whalecommunications.com
Whitehill Technologies
Moncton, N.B., Canada
888-944-8344
www.whitehilltech.com
© Arc, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to TMSalesOperations@arc-network.com. For more information visit Asset & Logo Licensing.