Information security, governance and compliance

1 January 2013 Information Security

There’s a hole in my bucket, dear Liza, dear Liza… . This old kids’ song relates to a conversation between Henry and Liza about a deadlocked, no-win situation. Henry’s bucket leaks and Liza’s list of suggestions on fixing it end with a need to fetch water for the hole-mending process. But there’s a hole in my bucket, dear Liza….

This is a fair analogy for the deadlock situation in corporate IT security. The very same tools that were broken in the first place are still being used to try to fix the problems of leaks, breaches and cybercrimes. These broken tools are of course IT access cards, PINs and passwords. All of which are clearly badly holed as security measures and are frankly beyond repair as secure credentials.

Enormous losses from IT-based crime continue to escalate and credential abuse doggedly remains the number one security failure.

The approach to fixing the mega-problem of credential abuse has traditionally been to apply more of the same. In an attempt to prevent abuse, passwords and PINs have become longer and more complex. Many organisations require them to be changed on a regular basis. So-called ‘smartcards’ have also been added to the credential mix to try and plug the holes in user-authentication.

But none of this tinkering with the problem alters the fact that anyone can still use your password, your PIN and your card. The main challenge in information security still revolves around authentication.

Undermining IT security, governance and compliance

If we cannot authenticate IT users, how can we possibly govern what they are doing and ensure compliance? We cannot. It is as simple as that.

Released in October 2012 by Wolfpack Information Risk, The South African Cyber Threat Barometer focuses on cyber crime issues from a local perspective. In light of the damage caused by IT-based crime in all its guises, Wolfpack deserves credit for encouraging public and private sector responses to increasing SA incidents of cybercrime.

Protecting information assets by preventing their theft is clearly a key element of IT security. It also underpins the implementation of policies concerning IT governance and compliance. So it is significant that the Barometer’s executive summary says: “Criminals are typically mainly after logon credentials, bank or credit card information and personally identifiable information.”

The criminal hunger for corporate IT access credentials is also underlined later in the report: “Although software and security technology has improved, logon credentials are the main information asset targeted or compromised during a cyber attack.”

It has long been recognised that credential theft lies at the very heart of almost every sort of IT-based crime. For example, having conducted investigations into over 2000 data breaches since 2004, the annual Data Breach Investigations Report (DBIR) from Verizon and the US Secret Service is an authoritative examination of what cyber villains are doing and how they are doing it.

In an April 2011 interview with SearchSecurity.com, Bryan Sartin, Verizon’s director of investigative response had this to say about credential theft: “With prices reaching $30 000 per account, usernames and passwords are the most common type of records traded on the cyber black market and have the highest per-record value.”

Add to this the fact that successive DBIRs have cited credential theft as the number one cyber ‘threat action’ and you are beginning to get a clearer picture of the enormous security risks directly caused by CPPs – cards, PINs and passwords. Failure to authenticate is undoubtedly a major problem. However, preventing the unauthorised access and activity that stems from credential theft is something that organisations really battle with.

Controlling access

A 2011 survey of its global members by the Information Systems Audit and Control Association (ISACA) revealed that the biggest challenge to achieving regulatory IT compliance relates to segregation of duties and privileged access monitoring. This comes down to controlling who can do what. And why do corporates battle with this? Because they cannot authenticate the people who use their systems.

And the inability to authenticate IT users means the policies that direct governance and compliance are perpetually vulnerable to being circumvented.

The annual reports of all sorts of organisations refer to board level commitments to implementing best practices in governance and compliance. Such corporate statements are used to reinforce trust and to encourage doing business with them. Very few organisations – if any – describe themselves as primarily being a secure organisation.

And yet corporate cybercrime has the very real potential to inflict long-term damage on an organisation’s continued stability and future success. These are two key areas of responsibility for any board of directors.

But this is completely at odds with another key finding from the ISACA survey: among senior managers and executives there is little commitment to taking robust measures to reinforce IT security. It seems the issue is not only under resourced, it is persistently swept under the carpet.

IT governance demands stronger security

Locally, the most influential guidance on corporate governance, risk and compliance is The King Code of Governance, the latest version of which is often referred to as King III, and as of June 2010, companies listed on the JSE must comply with it. King III requires board members to take overall responsibility for IT governance. Directors need to ensure that prudent and reasonable steps have been taken to protect intellectual property, company and client information.

Surely the question for directors is this: can CPPs be regarded as prudent and reasonable steps to safeguard these assets? In light of the overwhelming evidence to the contrary, the answer to that question is clearly no.

Rigorous control of who can do what within corporate IT systems is obviously essential for maintaining information security. As Wolfpack’s MD, Craig Rosewarne, says, “The faster we can move towards the automation of a number of important controls including the full range of detective and preventive countermeasures in the authentication arena, the better we will become at thwarting cybercrime.”

People are often surprised that South Africa is a world leader in its use of fingerprint-based authentication. Within their physical security and payroll management systems, thousands of local companies have replaced access cards and PINs with fingerprint scanners.

Marius Coetzee, MD of Ideco Biometric Security Solutions says, the straightforward business case for replacing traditional credentials with fingerprint authentication is based on the fact that the technology pays for itself, “It cuts the losses caused by unauthorised access and activity. That is the reason why it is used so extensively by so many SA organisations.”

However, in comparison to the world of physical security, Coetzee stresses that the losses arising from unauthorised IT access are much higher. He points out that fraudulent EFT payments routinely involve millions of rands and that this particular type of IT-based crime is consistently based on the simple abuse of IT access cards, PINs and passwords.

Given the advanced state of local biometric applications, Coetzee urges organisations to capitalise on local experience and expertise in order to dramatically increase security within their IT systems. “Implementing fingerprint authentication of users will prevent the repetitive occurrence of all sorts of IT-based crime by ending the abuse of credentials and the losses this causes.”



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A strong cybersecurity foundation
Milestone Systems Information Security
The data collected by cameras, connected sensors, and video management software can make a VMS an attractive target for malicious actors; therefore, being aware of the risks of an insecure video surveillance system and how to mitigate these are critical skills.

Read more...
Surveillance and cybersecurity
Cathexis Technologies Information Security
Whether your business runs a security system with a handful of cameras or it is an enterprise company with thousands of cameras monitoring sites across a multinational organisation, you must pay attention to cybersecurity.

Read more...
Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...