Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Thursday, July 30, 2015

Invisible Identity

My Name Was Michael & The Rest Is History
Photo source: Michael Shaheen - My Name Was Michael & The Rest Is History
In my previous post, I promised to explain the following:
Organisations should care about identity so they can stop caring about it. Identity needs to disappear, but only from sight; it needs to be invisible.
If you've been to any of Disney's theme parks recently, you may have noticed they now have something called the MagicBand. It cost them a lot of money. Disney calls it "magic". The technology powering the MagicBand infrastructure was complicated to build, but they've done it and have the increased revenue to show for it. They've also managed to turn what is effectively a security device into a new revenue stream by making people pay for them, including charging a premium for versions that have Disney characters on them.

While it does many things, arguably the key benefit of the MagicBand is in delighting Disney's customers by providing seamless, friction-less, surprising experiences without being creepy. For example, when you walk up to a restaurant, you can be greeted by name. You will then be told to take a seat anywhere. Shortly after, your pre-ordered meal will be brought to you wherever you chose to sit, just like magic. If you understand technology, you can inherently figure out how this might work. But the key in all this is the trust that the consumer places in the company. Without the trust, Disney steps over the "creepy" line.

How does Disney ensure trust? Through security of course. Sure, the brand plays a part, but we've all lost trust in a supposedly trusted brand before because they screwed up their security.

The key pieces of that security? Identity proofing, authentication, access control and privacy, none of which is possible without a functional, secure identity layer.

Conveniently (for me), Ian Glazer recently delivered 2 presentations that go into a little more depth around the points I'd otherwise have to laboriously make:

  1. Stop treating your customers like your employees
  2. Identity is having its TCP/IP Moment
If you have some time, do yourself and favour and follow those links - you might just learn something :)

What Disney has managed to achieve within their closed walls is exactly what every organisation trying to do something with omni-channel and wearables would like to achieve. Disney is a poster child for what is possible through an identity-enabled platform, particularly in bringing value to the business through increased revenue and customer satisfaction. Identity truly is the enabler for Disney's MagicBand.

The reason it works is because no one notices the identity layer. Not every organisation will be able to achieve everything Disney has managed, but even going part of the way is worth the effort. Only by ensuring the identity layer is there, can you really make it invisible.

Until people stop noticing the identity layer, you need to keep working on it. Only then will the business see the full potential and value that identity brings to increasing revenue.

Thursday, May 28, 2015

Identity needs to disappear


The disappearing machine
Photo source: Paul Chapman - The disappearing machine
In recent years, security vendors, including ones that don't sell Identity & Access Management (IAM) products, have been pontificating about how identity needs to be the focus for all things security. They (my current and previous employers included) continue to be on-message, each beating everyone to death with their own version; identity-centric-security, identity-powered-security, identity-defined-security, identity-is-the-perimeter, identity-is-the-foundation, identity-is-the-intelligence, and on and on.

Yeah, we get it. Identity is VERY important. Enough already.

The problem with rolling out the same message for years is that people stop listening. It's like the age old line in press releases: "the market leader in"; sure you and every other vendor out there. The market leader. Yeah, right.

Ok, so I'm being a little cynical. But the fact that as an industry, we've had to go all broken-record on this means:
  1. We've not been very effective in explaining what we mean. AND/OR
  2. No one gives a crap.
The truth is probably a combination of the two.

From the 10,000 foot marketing message, we have a habit of diving too deep too quickly, skipping the middle ground and heading straight into explaining, debating and architecting how everything needs to hang together. For example: "You need to federate between the identity provider and service providers using standards like SAML, OAuth or OpenID while maintaining a translatable credential that can be trusted between partner domains. Which OAuth do you mean? 1.0? 2.0? Can't we just go with OpenID Connect? Doesn't that cover the use cases? We're effectively supporting OAuth right?"

Errr, yeah. Sure. Hey, architect person, I'm not entirely sure what all that means, but we do that, right? And why do we do that again?

We often explain the "why should we care" answer by saying "you need security because you do, and identity is the key". And therein lies the problem. The "why should we care" question is difficult to answer in a meaningful, tangible way.

In addition, the reasons tied purely to security and risk no longer resonate. It's arguable that they ever did at all, but we could always pull out the audit, risk and compliance stick to metaphorically beat people with (oops, did I say that out loud).

Today, we often pull out the data-loss card. But we can do better:
Organisations should care about identity so they can stop caring about it. Identity needs to disappear, but only from sight; it needs to be invisible.
I'll explain in the next post.

Update: The next post is up.

Monday, September 15, 2014

Hey security managers, go hire some marketing people for your team

This is not a plea for organisations to start actively hiring people away from vendor product marketing teams. But if you want to look for people to point the finger at and explain why you aren't getting the budget required to actually secure your environment, product marketing is a good place to start.

There were 2 key messages attendees should have taken away from the Gartner Security & Risk Management Summit in Sydney a few weeks ago:
  1. Security priorities tend to be set based on the threat du jour and audit findings.
  2. Security teams need to get better at marketing.
Here's the problem:
  1. Sensationalist headlines sell stories, which attracts more advertisers. This means the threat du jour will get the most airtime.
  2. People who hold the keys to budgets read headlines, which perpetuates the problem.
  3. Product marketing teams know this. So, to get more inbound traffic to their websites, the content creation and PR teams craft "stories" and "messages" around the threat du jour.
  4. Publications notice that vendor messages are in line with their stories, which fuels the hype.
It's like how seeing something on fire makes us think about checking whether our insurance covers fire damage. Meanwhile, the front gate's been broken for the past week but we've left it alone because no one's stolen anything from the house yet.

How can an internal marketing campaign driven by the security team help? You won't be able to stop the hype that builds up around the threat du jour. But as an internal team, you should know what the organisation you work for really cares about in business terms. Take audit findings as an example. While rather boring, translate audit findings into tangible, financial implications for the business and you suddenly have something worth talking about as an overall program instead of a checkbox to tick (which is unfortunately how a lot of internal security budgets get signed off).

As a starting point, take a look at my tongue-in-cheek post about contributed articles. While laced with sarcasm, the structure of my "meaningless contributed article" template works (because it's a structure many are subconsciously used to) if the content holds up. Ensure you have the following points covered:
  • Detail the industry trends that are affecting the organisation.
  • What are independent sources (both internally and externally) saying about them?
  • Why should the business care (don't use technical terms)?
  • Outline some meaningful metrics (an interesting metric does not necessarily mean it's useful - ask yourself if anyone in the organisation will care).
  • What does it mean in financial terms for the business if something is not done?
  • What have other organisations done to solve the problem?
  • What are the steps the organisation you work for need to take and what are the benefits (again, don't use technical terms)?
The mistake many of us make is in thinking marketing is easy; it's not. And it takes good marketing to sell security internally. Crafting an article can help hone in on what really matters and justify budget allocation, which makes it easier to ignore the noise.

Great marketing focuses on what matters by simplifying the messages and communicating the value, be it emotional or financial. This is what most security teams do not know how to do, which is why budgets are not allocated to fix that lock on the front gate. Instead, budgets are spent on fire insurance.

I know this is ironic coming from me as I work for a security vendor. But if security teams hired marketers to communicate the things that matter to an organisation's security instead of the threat du jour, we as an industry will benefit from it.

As an aside, ever notice how many security companies have the word "fire" in their name?

Monday, March 17, 2014

RSA Conference 2014 redux


If you follow me on Twitter, you probably noticed a heightened volume of Tweets from me during the RSA Conference in San Francisco. It was great catching up with many of you based stateside that I rarely get to see in person. I was also fortunate enough to be allowed to attend sessions and live-Tweeted the ones that were interesting. Therefore, I'm not going to regurgitate/organise my Tweets into thoughts here. I will however, highlight a few key points that I felt were important.

NSA, NSA, Snowden, NSA

This was an RSA conference where everyone was talking about the NSA. First, there were the well-publicised boycotts from speakers. Then came the competing conference. Then there were the protesters. RSA Chairman Art Coviello opened the conference and addressed it up front (right after William Shatner's song and dance). Stephen Colbert closed the conference with an NSA-heavy keynote (incidentally, he was hilarious). And in a show of courage or stupidity depending on your perspective, the NSA even had a booth on the expo floor.

There were many stories written about this during the conference, so just use your search engine of choice. But if you don't feel like searching, check out the New York Times' Nicole Perlroth and her blog post detailing some of the NSA-focused activities. My Tweet stream was also relatively NSA-heavy, so go check that out too.

Damage control

There were many US Government speakers from various departments and they all had one thing in common: they were in damage control mode. Essentially, it boiled down to these points:

  1. We assumed everyone knew we do the whole electronic surveillance thing. We didn't know it would be such a big deal and we're sorry, but we have to do it. And by the way, better it be the US Government than some foreign hostile nation. They're all just pissed that we're so much better at it than everyone else.
  2. We must work on collecting only what we need instead of absolutely everything. But if you've ever tried to do this, you know it's easier to collect everything instead of being selective.
  3. We, the US Government, want to work more closely and cooperatively with US companies on making the Internet, technology and the real world safer for all.

Encryption

How do we make life more difficult for governments to spy on us? Encryption. Sure, governments have quantum computers working at cracking encryption measures, but they really don't like having to do it. It was a topic of discussion during the cryptographer's panel and made in relation to the NSA. Bruce Schneier has mentioned it on many occasions and reiterated his sentiments during his session at the conference.


I said it in my IT security predictions for 2014 and I've mentioned it on television.
Start with encryption. It won't fix all your security issues, but it's a good start and a good countermeasure for issues beyond the NSA and government spying.

Privileged user controls

Despite the fact that Snowden's been the poster child for the fact that privileged users can do a lot of damage, there wasn't a great deal of noise (compared to the NSA and government spying), except in sessions relating to industrial control systems. In every session I attended where industrial control systems were a topic of interest, privileged users came up as a primary focus area. Often, industrial control systems are tied to users directories (usually Active Directory) and most attacks simply aim to compromise an account within the directory. Once compromised, an attacker will escalate privileges until they have sufficient access. In other words, the more "administrative" the account, the quicker the compromise. In short, at the very least, organisations must secure and monitor privileged accounts in directories and operating systems.

Internet of Things (IoT)

You didn't need to attend the conference to know IoT is big in 2014. While I don't believe many are doing anything in terms of IoT, I don't discount the fact everyone wants to talk about it. It became clear in listening to some IoT-focused sessions that the biggest challenge in securing the IoT at the moment lies with the ignorance and complacency in the manufacturing process, particularly with device manufacturers.

Far too many do not implement (or care about) basic security practices in delivering a product. Many use default settings, which are often insecure. In addition, they often reuse the same insecure software components in updated versions. Beyond this, there is difficulty patching existing devices, particularly in trying to figure out how to do this without user intervention. We can't even get this right for existing computing devices. How are we expected to get it right for devices with in-built computers most are not aware of and cannot access easily through a usable interface? This is why it's relatively easy to hack cars.

Wednesday, March 12, 2014

Australia's new Privacy Principles - things to consider

Effective today (12th March 2014), Australia's Information Privacy Principles and National Privacy Principles will be replaced by 13 Australian Privacy Principles (APPs). Here are the important points to note:

  • Applies to all organisations that turn over more than $3 million per year and collect personal data.
  • Fines up to $1.7 million for breaches.
  • Organisations must be transparent about how they collect, use and store personal data.
  • Organisations cannot collect data “just in case they need it”.
  • If personal data is disclosed to a 3rd party, the organisation disclosing the data is responsible for ensuring the 3rd party understands their obligation and that the consumer knows about the disclosure.
This effectively gives the Office of the Australian Information Commissioner (OAIC) teeth as the fines are now significant when compared to previous legislation. For example, Australian Telecommunications giant Telstra has only been fined a measly $10,200 AUD for their recent violation.

Mindful collection and sharing

The days of "we'll ask for the information in case we need it" are gone. Organisations need to think about what they really need to achieve the task at hand and collect only what they need. As consumers, we should be able to sign up for online services in a shorter amount of time instead of frustratingly getting stuck on a submission form which constantly complains we haven't filled in certain fields.

Marketing programs and processes need to be reviewed to ensure personal data is not being inappropriately shared with 3rd parties. Many companies disregard the flow of information and the lack of visibility & understanding around how this is done, sometimes through no fault of their own. The number of technology integration points involved is challenging, but as privacy is now tied to financial penalties, this is a huge risk to businesses and should be addressed urgently through the involvement of IT departments and potentially external assistance.

If information is justifiably shared outside of the organisation, they will need to have the ability to determine if an overseas 3rd party they are disclosing personal information to also complies with the privacy act. This is a function many organisations will not have and will need to be included as part of their risk management program.

Personal information

In all things privacy-related, things tend to be up for debate, none more so than the term "personal information". The safest way for organisations to tackle this ambiguity is to assume data can be tied together from various sources, even when not immediately obvious as to how, to form context that can be tied to an individual. For example, an IP address is a potential identifier of an individual when combined with information from the relevant Internet service provider.

Personal data can also be stored in unexpected locations that organisations may be unaware of, the most obvious being application logs. IT departments need to perform an internal audit of the information applications use and ensure they are not subject to inadvertent personal data leakage through logs as a result of log file settings.

There is also additional administrative overhead in dealing with personal information and its access. The right technologies and a properly implemented reliance on external information providers can help. For example, power can be given to individuals to have complete control over the information stored about them through self-service portals. In addition, there may not be a need to store certain pieces of information. Standards exist (e.g. pick your favourite federated identity standard) that allow a relying party requiring information about an individual to ask for it from an identity (or attribute) provider and use it in flight without having to store the information on disk.

Beyond the more mature federated identity standards, there are emerging ones such as User Managed Access (UMA) that place more power in the hands of consumers (i.e. the rightful owners of the data). While not yet supported in many technology stacks, the concepts are sound and organisations would do well to adopt the thinking behind what UMA is attempting to achieve in the longer run.

Summary

Australian organisations need to treat personal data like they would financial information. For example, there are a raft of measures dictated by the PCI-DSS standard regarding the storage and usage of credit card numbers. While the number of credit card data breaches have proven PCI-DSS alone does not prevent breaches, existing data protection standards are a good start for organisation struggling to deal with the implications of the new privacy principles. Organisations would do well to adopt many of the same measures dictated by security standards in protecting personal data as a start. As they understand the requirements and data flows over time, more sophisticated security and access management measures can be implemented to round out an evolving security program.

Thursday, January 09, 2014

Moving beyond incident identification

I made a few IT security predictions for 2014 last last year, but I want to highlight item number 3 as it's become particularly relevant:
"Security departments will shift their focus from incident identification to incident reaction and management"
We're only a week into 2014 and the two highest profile IT security stories so far are related to incident reaction and management (a.k.a. response).

While the acquisition of Mandiant by FireEye technically completed in 2013, it was only announced in 2014. To quote the New York Times article:
"Mandiant is best known for sending in emergency teams to root out attackers who have implanted software into corporate computer systems."
The other piece of news was that Bruce Schneier has joined Co3 systems. In his own post on the matter, he states:
"...there have been many products and services that focus on detection, and it's a huge part of the information security industry. Now, it's time for response."
The true value in security monitoring, and by association Security Information and Event Management (SIEM), lies in moving beyond incident identification/detection. SIEM technologies have become much better over the past few years at using data analysis techniques to translate raw data and events into useful information that security departments can understand and hopefully act on.

Unfortunately, few organisations have the resources available to react to incidents adequately and in a timely manner let alone attempt to manage them. Incident identification/detection without the ability to respond is akin to having an alarm on your house go off that only your neighbours can hear. Even if they are around, how many actually care enough to do something about it?

The best alarms don't make any noise, but lock the house down so that no one can leave while simultaneously sending an alert to have a professional incident response team dispatched to the premises to deal with the threat while the incident is in-progress. Of course, it would have been better if they hadn't been able to enter in the first place, but we'll leave access management discussions for another day. Security departments need to work on the presumption that bad guys will get in somehow.

While the latter option sounds more like a military operation, it's how organisations need to be thinking about security incidents in 2014. At the very least, security departments need to have properly thought out, documented incident reaction and management procedures that anyone can follow with minimal training. While not every incident response person can be the IT security equivalent of a Navy SEAL, at least have a security guard on staff and augment with external assistance by using tools or service providers.

As I said in my predictions article:
"The focus when dealing with threats up to this point has been on the identification of them. Vendors spend large sums of money expounding the wonders of their tool’s collection and analytical abilities. It has become a game of “my feature is better than your feature” and “my analytics are better than your analytics”. Ultimately, it is pointless identifying a threat when there is no path forward to manage the incident, deploy the appropriate responses and counter the threat through remediation."

Monday, January 06, 2014

Why crooks love gift cards and how retailers are to blame

It’s the holiday season and there are those that don’t feel like thinking about particular gifts can cop out by gifting a gift card. For those that have never used one, it’s relatively simple. The card number combined with an access code is usually enough information for a gift card to be used for a purchase. This is how it usually works when making online purchases. At the actual physical store, the use of a gift card typically requires the user to also be in possession of it.

Fraud liability lies with the purchaser

Gift cards are designed with convenience in mind with no regard to security or indemnity. If your bank issued a card with the PIN printed on it, you would immediately cut it up, cancel it and change banks. Unfortunately, this is exactly what most retailers do with gift cards.

Both the number and the access code are displayed on the actual card (both physical and virtual versions). This is all one needs to make a purchase using the card. The anonymous nature of gift cards is just as much of a problem. Crooks love anonymity because at no point can a transaction be linked back to them.

To add to the mess, most retailers have a statement in the fine print to “treat the card like cash as we cannot process refunds in the event of theft or loss”. We would not tolerate this type of behaviour from financial institutions, yet that’s exactly what we do each time we buy a gift card. At least financial institutions will indemnify cardholders from loss or theft. Retailers simply say “too bad, your loss, not our problem”.

Because retailers do not care enough to accept responsibility, at no point will they ever attempt to investigate the crime and the criminals that stole your gift card details get away scot-free.

Digital gift cards are less secure than physical ones

While gift cards are not secure for the reasons already mentioned, digitally-delivered cards are worse. With physical gift cards, the most blatant, practical example of fraud involves crooks cloning inactive cards from stores and subsequently waiting for them to be activated through a legitimate purchase.

The best way around this particular method of fraud is to cover the access code on each card with a layer that can be scratched off, which many retailers have implemented. This is a simple, yet effective way to reduce the risk because if a card has a visible access code, you know it’s been compromised. Unfortunately, the digital version of this “scratch layer” is often non-existent.

The most common method of retrieving a digital gift card involves accessing a URL. To understand why this is a problem, consider the fact that often, the URL to retrieve a gift card is derivable, even if encryption is used in the actual URL pattern. It is not too difficult for a skilled attacker to get the standard URL pattern by legitimately ordering a card and subsequently performing a brute-force attack, similar to how passwords are cracked, on the parts of the URL that change to retrieve other gift cards.

The digital equivalent of a “scratch layer” would be to make the retrieval URL accessible exactly once. This way, one would know upon an attempt to retrieve the card if it has already been compromised through its URL and contact the retailer to report the issue immediately instead of finding out after the card has already been used. Once a card has been used by the fraudster, it is too late and there is no recourse for the victim.

No protection against insiders

As is the case in many organisations, the insider with access is a huge risk in this particular context. Credit card numbers are partially protected through PCI-DSS requirements that mandate encryption of stored card details and audit of access. Gift card details however are not subjected to the same rules and thus can be stored in clear text and not be monitored when accessed without regulatory consequences for the retailer.

Organisations tend to ignore security when they are not liable in the event of a security incident. In the case of gift cards, no liability lies with the retailer. This means employees of a retailer storing gift card details in the clear have relatively easy access. In addition, even if the retailer happens to have audit mechanisms tracking access to databases storing gift card details, the fact that consumers are expected to “treat gift cards as cash” is a sure sign that a retailer will not spend precious dollars to investigate any potential internal fraud with gift cards.

Too many third parties involved

Another trend that contributes to the problem is the use of third parties to administrate and issue gift cards. For example, many large retailers in Australia use the same third party company to do this. The problem with third parties is that access to data is now expanded to people not directly associated with the responsible retail organisations.

As gift cards are not subjected to the same standards as credit card information, employees of the third party company potentially have full access to gift card details of multiple retailers and can exploit this access for personal profit much more easily than if they were attempting to steal credit card numbers.

No regulation, no deal

Gift cards are effectively cash cards. Retailers have said so themselves in an attempt to indemnify themselves from liability in the event of fraud. The problem is that they are indemnifying themselves at the expense of fraud victims, also known as customers. The relationship in this instance is completely one-sided in favour of retailers.

Financial institutions dealing with credit card details are not afforded the same cop-out liability statement. In fact, it is the opposite. Financial institutions are held liable in the event of fraud and we as consumers are protected.

Imagine if we were told that whenever we use a credit card, we assume all the risk? Mastercard, Visa and American Express would go out of business very quickly. Why are retailers not subjected to the same rules?

It is time we woke up and realised exactly how unprotected we as consumers are when we buy gift cards. If you feel the need to buy a gift card for someone else, do what Asians do instead and put cash in a red packet.

In Asia, giving a red packet to someone implies you are wishing them good fortune. Giving someone a gift card however, means you couldn’t be bothered. You may also have just gifted them a worthless piece of plastic which they will resent you for when they try to use it.

Friday, December 20, 2013

IT security predictions 2014

It's prediction season again and I've written a piece for CSO Australia.

Here's how it starts...
"2013 was the year of Edward Snowden and the NSA spying revelations. We also faced a deluge of data breaches with an increasingly large amount of information compromised. The emerging trends that appeared on the radar in 2012 such as Cloud, Mobility, Social and Big Data became key challenges for organisations in 2013. These will continue to be important in 2014, but what will they evolve into? What other things do we need to consider?"

Click through to the article for the predictions. Got an opinion? Comment or Tweet me.

Monday, November 18, 2013

Social identities are becoming our online driver’s licence

Note: This is a companion blog post to an article I wrote earlier this year for CSO Australia. The original essay was too long for an online publication, so I split it up into 2 related, but independent pieces.

For the generation that assumes a priori that the Internet is a tangible, more-essential-than-oxygen component of the air, social networks have become the digital manifestation of their identities as people. Most use each social network for a specific purpose. For example, Facebook content is typically personal and LinkedIn content is almost always professional. Where possible, we try to confine their use within our subconscious boundaries, but they invariably bleed into each other through porous walls. Nevertheless, each is a persona; a one dimensional representation of our real selves.

While online, much of our significant actions require some form of identification: a licence that says enough about us as unique individuals. While we don’t need a driver’s licence to walk along a road, we do need one to drive along it. Similarly, to do anything of significance online, we need to prove who we are to varying degrees; we need a licence that says enough about ourselves to be allowed to perform certain activities.

A majority of our individual activities both online and off can be divided into two categories: transactions and interactions. We transact with retailers, financial institutions and governments. We interact with friends, family, colleagues, employers and government institutions. There are exceptions to these, but a majority of what we do conforms to this model.

The word “transact” in this sense is not always tied to financial activities. Anything that has a negative real-life impact when fraud is committed can be deemed as transactional. In life, our identity matters when we transact and interact with retailers, financial institutions, governments and other people. There is however, a distinct difference in the acceptable forms of identity when comparing transactional activities and interactions which is tied to risk. It is why certain organisations will accept your Facebook account as proof of identity, but others will not.

Appropriate use of social identities

The key to understanding appropriate use for social identities is context. In real life, activities that require proper identification such as a passport or driver’s licence are transactional.

If you analyse the scenarios you are familiar with in dealing with retailers, financial institutions and governments, you will quickly realise that for anything we classify as an interaction, using social identifiers for access is sufficient. For transactions, they are not.

In the Information Security world, this is known as using the appropriate Level of Assurance (LOA) for the appropriate context. A higher LOA is required for transactions than interactions. The progression to a higher LOA is typically achieved using multi-factor authentication. If you’ve ever received a code on your mobile phone immediately after your username and password has been accepted and asked to enter it into a site before it allows you access, you have used multi-factor authentication. The SMS code sent to your mobile phone increases your LOA.

In situations where social identities play a part in the authentication process, they are best used as first level of authentication. As a “lightweight” identity, this provides the personalisation we psychologically crave and the added usability organisations would like to provide. The fact that personalisation provides additional insight to organisations is a bonus for them. When the interactions verge on being transactional, the LOA needs to be raised using either a second factor or a stronger form of identification. In real life, this is best demonstrated by the fact that a driver’s licence is sufficient for entry to a bar but a passport is required to cross international borders.

Excessive collection of personal information

A major concern regarding the use of social identities as a login mechanism relates to the amount of sensitive personal information stored within social networks. Using your Facebook account to login to another site does not necessarily give it access to your Facebook account (e.g. to make updates). More commonly, the login process involves sharing an amount of information about yourself that the site requires.

The word “requires” is used loosely here. Far too often sites ask for more information than they actually need because they can. We have become so accustomed that we accept it as the norm. Bad data collection practices have trained us into accepting additional risk as a condition for using the Internet. In reality, most sites really only need a way to contact you (e.g. email) and perhaps your name. Put simply, a site should only ask for the information it needs for you to complete your tasks.

The breach the Australian Broadcasting Corporation’s website suffered earlier this year is a perfect recent example of data collection misuse. The information stolen included easily cracked hashed passwords and personal details about each person that the website did not need. When we give up our information to an organisation, we almost never have control over anything that happens to it after the fact.

This is something that the Kantara Initiative is attempting to address through its User Managed Access (UMA) work group and the associated UMA protocol. But until this or something like it is mandated across sites that store information about individuals, it is extremely difficult to address the lack of control we have over our personal details and their proliferation.

Note (not part of original blog post): I strongly suggest checking out Ian Glazer's "Big P Privacy in the Era of Small Things" video if you are interested in exploring and understanding this topic in more depth.

Potential benefit of social identities

Social networks have the potential to reduce the number of places that our information is stored. In addition, they can potentially become the gatekeepers to our information. Imagine if the interaction between a social network and another site included the obligation to delete our information upon request by the social network using a protocol like UMA? Better still, what if it required that the information used be transient and disappears when our session with the site in question ends? Nothing actually gets stored.

In fact, some social networks enforce this today, although this is used more as a defensive tactic to reduce the likelihood that a partner site becomes a competitor by replicating all their user data than a way to protect the information for the benefit of users. Sites that do not conform to the policy are unceremoniously prevented from being able to interact with the social network in any way.

There are benefits to be had for the sites accepting social identities as logins too. Studies have shown that user drop-off rates decrease because users no longer have to fill in forms to access the site. Data storage costs drop as a result and for organisations that do not want to be front page news for losing user data, this risk is no longer present.

A driver’s licence is not a passport

We began by referencing the generation of digital natives driving the assimilation of our digital and physical lives. They influence online innovation today through their demands and expectations. They are the demographic many businesses target. As a result, their behaviour shapes the evolution of the online world and by extension, the real world.

The rest of us have to begrudgingly adapt to a reality being built for them. Like it or not, social identities are becoming the Internet’s driver’s licence of choice. However, social identities are not our online passports. The world is not ready for that reality. And unless social networks start vetting people like banks do, that reality is unlikely to ever be achieved.

Monday, November 04, 2013

Gain RELIEF with future proof security

I wrote an article for SCMagazine that was published in late October. Unfortunately, since more than 7 days have passed, it now sits behind a registration wall (which I believe is free, but still requires effort on your part). It was originally titled: "Holistic security heals your cloud and mobility symptoms", but the editor decided the current one worked better.

For those that don't feel like registering to read the article, the RELIEF acronym in the title spells out:

  • Resources – What are you trying to protect? This is almost always going to be information. Often, IT departments classify the applications housing information as resources, but without the information, applications do not need to be protected. The classification of data needs to be considered here as this has a bearing on access control policies.
  • Entry – How is each resource accessed? Through an application? Database? As a text file on a file server? Do the access control policies and enforcement mechanisms cover all the combinations and can they be easily managed? Where are the blind spots? Where is access not enforced?
  • Locations and time – Where are these resources located? On-premise? In the cloud? Where are resources accessed from? Can people access a resource when they are outside the office? When can they access these resources?
  • Identity – Who is accessing corporate resources? Can access be tied back to a single individual or is the audit trail ambiguous? Can you enforce access based on who the person is? Are the monitoring mechanisms able to understand identities?
  • Exit – How can information leave the organisation? What are the allowable circumstances and combinations where this can happen? Can this be enforced or at the very least monitored? Are there blind spots?
  • Flow – How does information move between entry and exit points? What about all the points inbetween? Is the flow of information completely auditable and enforceable at all touch points?


Thursday, September 12, 2013

Usable identification - the key to a world without passwords


Consumer devices offer the best vehicle in bringing non-password based authentication mechanisms to the mainstream much the same way social networks have brought identity federation to the masses. It is the best shot we have of eventually killing passwords off for good. If that day comes, passwords will more than likely be replaced by a combination of biometric and token-based mechanisms.

The inevitable rise of wearable computing in addition to the ubiquity of smart phones will result in an abundance of options (compared to a world before smart phones) in available tokens to use as part of the identification dance known as authentication.

Signing on to a site using your social network is not commonly referred to as identity federation; that's what security people call it. But it works because it's usable, although this is at the expense of some security. Social identities help consumers clear the security hurdle to the point where the word "security" doesn't rate a mention during the authentication and/or registration process. Social networks however, still use passwords.

Passwords on their own are insecure. In the absence of other ways to identify ourselves (i.e. multi-factor authentication), a lot of damage can be done to our digital lives that are difficult to recover from. Also, let's not forget about the number of hacks suffered by multiple sites that included leaked passwords. But they remain because the username and password combination is a design pattern we have been trained to understand and accept. Because we have been conditioned this way, passwords are inherently usable. Therein lies the challenge in moving past them.

Good authentication practices have always included multiple factors. In other words, passwords on their own just won't do. In addition to usability, cost is almost always a prohibiting factor. It costs an organisation a lot of money to procure the hardware required to support authentication mechanisms beyond passwords. Wouldn't it be nice if consumers had tokens they could use that were as secure as these expensive ones organisations currently have to buy?

Some organisations have weighed the risks against costs and decided that SMS tokens are good enough to be considered as an acceptable second factor beyond passwords. If you've looked into this, you know SMS messages are not actually that secure. But for a lot of scenarios, they are "good enough" when combined with the primary password. If organisations want to move beyond this however, it gets very expensive.

It took well-known brands with a significant amount of consumer influence (e.g. Facebook, Twitter, LinkedIn) to bring identity federation to the masses. Similarly, it will take at least one well-known brand with a significant amount of consumer influence to fork-lift-point us down the non-password oriented identification path.

In the case of authentication however, there is the cost consideration that was not present in the consumer identity federation equation. How can we put stronger authentication factors in the hands of consumers in a cost effective manner? Ideally, we would make consumers buy these tokens, but who would want to do that just for a bit of extra security and a more disjointed user experience? Enter large, well-known consumer brand with the requisite influence.

Apple, the king of making technology usable is that organisation. Their announcement yesterday of the Touch ID fingerprint sensor on the iPhone 5s is the latest (and loudest) in a recent spate of devices that have the potential in helping achieve the right balance of usability, cost and security at scale. Rich Mogull's article on TidBITS is the best one I've read if you want to understand some of the security aspects.

Beyond Cupertino, there are a few recent developments that will hopefully be caught up in the Apple authentication snowball that is rolling down security mountain:
  • Nymi is a device which wraps around our wrist and uses our unique cardiac rhythm to authenticate and identify us to things around us. There are unknowns around how or if this will actually work, including some more knowledgable about cardiac rhythms than I, who remain sceptical. Dave Kearns however, is a little more enthusiastic, as are most other people on Twitter. I for one, hope it actually works because the potential scenarios are interesting, exciting even.
  • Let's not forget about the impending barrage of smart watch releases over the next year, starting with Samsung's Galaxy Gear. Apple of course, has also been working on the rumoured iWatch. Even car manufacturers like Nissan are clamouring to wrap themselves around our wrists. While smart watches aren't inherently security devices, they are effectively another token that could be used in the authentication process. For example, the fact that a smart watch is mine and is paired with my smart phone (or car in the case of Nissan) at the point of identification (authentication) gives the system identifying me a level of assurance that I am who I claim to be.

As with any new technology, there are potential security implications that need to be analysed and I'm sure this will be done by many when the devices are made available to the general public. But Apple Touch ID, Nymi, smart watch manufacturers and other wearable devices we have yet to hear about have the potential to make security invisible.

Security is the enemy of usability. Studies have shown that when presented with a secure option or an easy option to perform a task, people almost always choose the easy option. The trick is to make the easy option also the secure option. The devices mentioned aim to make our lives better. The fact that they have the potential to make our lives easier while improving security is exciting.

Here's to a future where we don't need passwords, but can stay secure while remaining blissfully ignorant of that fact.

Saturday, July 27, 2013

Securing the hybrid cloud

The following is an excerpt from an article I just wrote for Business Spectator Australia's technology section.
Securing a hybrid cloud model requires a mindset shift from traditional IT security approaches. Analyst firm Forrester uses their Zero Trust model to illustrate the fact that IT security can no longer trust activities occurring internally within the walls of the organisation. Security is about verifying everything that occurs and organisations have to inherently assume an insecure state and react quickly as a security incident occurs.
Check out the rest of it here.

Friday, May 10, 2013

Login to the real world with your Facebook account

The following is an excerpt from an article I just wrote for CSO Australia.
Ultimately, context is the key to understanding the appropriate use of social identities. While we may be happy browsing a retailer’s website logged in with our Facebook account for a personalised experience, we are not going to be making the payment with it. Organisations that get the balance right while understanding appropriate use and context can begin their social-enablement journey with their eyes open.
Check out the rest of it here.

Tuesday, December 18, 2012

IT security predictions 2013

It's that time of year again where everyone recaps the year that went by and makes outlandish predictions for the year ahead. Not wanting to be left out, I wrote a piece for SCMagazine.

Here's an excerpt.
"Together, BYOD and cloud heralded the arrival of the consumerisation of IT, essentially the democratisation of IT within organisations. Employees are no longer content with being dictated to. As consumers, we now enjoy more useful, usable applications than ever before. We expect the same of our IT applications at work. The sentiment that work is where we go to use old technology is common and users are revolting."
Full article here. Agree? Disagree? Sound off in the comments or on Twitter.

Tuesday, November 20, 2012

IT security implications of BYO* for enterprises

This is the post I promised I'd write when I talked about Cloud and BYOD as part of my "Do security like a start-up or get fired" series.

I created and delivered this presentation for events in Sydney, Canberra and Melbourne. The presentations received some press coverage, in particular this ZDNet article written by Michael Lee which garnered over 110 Tweets and 70+ LinkedIn shares including mentions from the likes of Cisco, IBM, SAP, Good Technology, Palo Alto Networks and of course NetIQ.

As this is a presentation masquerading as a blog post, it will be different to my usual posts. There are a bunch of images littered throughout, which are all slides from my presentation deck. As a result, you'll see some text as images because they were slides. I've kept it this way instead of typing everything out to give you a better feel for the actual presentation.


IT security implications of BYO* for enterprises

The BYO in the title stands for “bring your own”. The term dominating the headlines is Bring Your Own Device (BYOD) but it's about so much more than just the 'D' in BYOD. The use of the “*” is a reference to the fact it’s not just about employees bringing their own devices into the work place; it's about a trend towards employees bringing their own technology into the workplace.

I’m going to cover 3 things:
  1. Why BYO is top of mind.
  2. Understanding BYO.
  3. How to secure BYO.
If BYOD was a viral video, it would be this one.


Your barista’s doing it.


Google chairman Eric Schmidt is doing it.


It’s the viral video of 2012, holds the Guinness world record for the most likes on YouTube and has spawned more spoof videos than any other this year.

My point, other than being able to work Gangnam Style into my presentation, is that all everyone wants to talk about this year in the enterprise is BYOD. Sure, people still talk about Cloud, but in the words of the Black Eyed Peas, that’s so two thousand and late. So, the real title of my presentation is...

How to secure the Gangnam Style of Enterprise IT

While we’re on Google, I thought I’d see what their algorithms thought about the BYO meme since we rely so much on search today. It’s a convenient, mildly scientific way to get at what’s top of mind in terms of things we want to know about or find solutions for.

As most of you know, Google gives you suggestions as you type. Here’s what “bring your own” reveals.


Three out of the four suggestions are related to the same thing.

Some come up with what’s known as the A to Z of Google search terms. Here’s one for “bring your own”.


There’s a few interesting ones on the list which I won’t comment on. The point of this is that you can classify the list into 2 distinct categories.


The driver for BYOD is essentially the combination of these categories crossing over into the enterprise.


But the key message I want to make is this.


That's right. You cannot deal with BYOD by dealing with BYOD. By the end of the presentation (blog post), it should be clear why this is true.


When I ask this question, almost everyone says "no". In reality, almost everyone has. We just know it better as the five stages of grief.


In speaking with organisations about BYOD, I’ve found they tend to go through the five stages.


This is where IT says no. It’s all too difficult and presents too much of a risk to the organisation so it’s much easier just to deny everyone the privilege. They also pretend it’s not happening and hope that they will never have to deal with it once they’ve said no.


The “no” answer, usually falls on deaf ears. IT gets asked again and they keep saying “no”, until they get the question from people at the executive level. In fact, this is commonly the compelling reason that forces IT to relax their stance and find a way to get it done. I’ve actually sat in a meeting before with one of the large Australian banks and had the head of security step out of the meeting to take a call about the CEO wanting to get access to corporate email via their iPad. Of course, it got done despite the fact that it broke policy.


Once you make single exception, there are always other exceptions. Eventually, it becomes too difficult to manage and IT has to relent, but only to a certain extent. Usually, IT lets you have limited access and this starts with email. The interesting thing is that there is a perception that email is one of the least sensitive applications and hence presents minimal risk to the organisation. This is why it’s usually one of the first systems that are moved to the Cloud. The reality is that corporate email is one of the most sensitive applications any organisation has. The fact is however, this is usually what happens.


This is where IT realises that even though they thought they addressed the issue by compromising, an increasing number of people continue to go around them. Users are a smart bunch at getting around IT departments and IT security policy, especially when we have full control of the device we’re using. At this point, IT has 2 options:
  1. Stick their head in the sand, pretend it’s not happening and attempt to lock everything down thus getting in the way of business.
  2. Deal with the situation at hand in a constructive, business-centric manner. We forget all too often that IT is a business enabler. IT security, should also be a business enabler.


Every organisation will get to this point whether they like it or not. It’s just a matter of time. To remain secure and evolve with the times, you have to. It’s better to go in with eyes wide open than to dig your heels in and pretend it’s not happening.


The reality today is that most organisations are somewhere between bargaining and acceptance, skewed towards the bargaining stage. The point to take away here is that when it comes to the freight train that is BYOD...

Photo credit: Steve Wilson

You can’t have a track that ends.

Photo credit: Cassandra Jowett

It has to look more like this.

Photo credit: Les Chatfield

Where you have well defined paths, but allow flexibility to choose the one that is appropriate for the situation and destination.

You can’t put a wall up or make it the end of the line otherwise people, usually the ones with the authority to make you change your stance, find ways around you. They will eventually replace you with someone who can be that creative "yes" person the modern enterprise needs.

You may have noticed that I've been using the BYOD term a lot. But as I said up front, when you actually have to deal with it, you will quickly realise it’s actually about more than dealing with devices. To deal with BYOD, you have to handle a raft of other issues. BYOD is essentially about handling employees using what they choose for business purposes, not just a device of choice. It is about the Consumerisation of IT and its intersection with Enterprise IT.


Since we’re talking about transport, let me talk about airports.

Photo credit: Oliver Mallich

Everyone generally knows how airports function, but we never take the time to think about it. We typically meander through because we want to get to our destination with as little fuss as possible. Airports are businesses and perform an essential function, but need to be self-sustainable from a financial standpoint. They provide infrastructure services to support the experiences we have in an airport; fuel for the planes, spaces for shops, airline lounges and so on. But when you strip everything back, there are two essential things about an airport that we cannot do without.

The first is ensuring that passengers are able to get to their destination safely. As travellers, we want safety. Without safety, we would not fly anywhere. That’s why we put up with the painful security checks at every airport.

Photo credit: Inha Leex Hale

The second is ensuring that the airport experience is as pleasant as possible, even though it may not seem that way. As consumers, we are demanding and expect more than just “pleasant”. Anything less than good and we complain that the airport is not up to standard. We want to be impressed, even if we won't admit to it. For example, Kuala Lumpur international airport has a jungle walk inside the terminal.


Back to safety; to minimise risk and ensure an acceptable level, airports and the relevant services within the terminal make us jump through all sorts of hoops to gain access to things. Airports control access to designated areas and services based on forms of identification combined with monitoring activity and observed behaviour. The only reason this works is because of identity.


But not just any identity. The key is that real-world identities are scalable.

Photo credit: Stefano Chiarelli

If you’ve seen (or read) my Identity in an agile world presentation, you’ll remember that the reason real world identities are scalable is because: for access to things, it doesn’t matter who I am; it matters what I am.

This is why the fact that my boarding pass...


Gets me onto a plane...

Photo credit: Jay-Oh

Has nothing to do with me being Ian Yip. It's because the boarding pass is an acceptable credential to gain access to the plane as a passenger. It just needs to be genuine and have the correct date and flight number on it. Even when it is cross-checked with a passport on international flights prior to boarding, the name on the boarding pass is irrelevant. The staff at the gate are simply checking that they match, which raises the level of assurance of the credential (boarding pass) I'm using.

When we fly, we have a choice. Imagine if the only choice we had when we fly was this plane.

Photo credit: Tim Bunce

And this is where you sit.

Photo credit: Bill Abbott

Would you want to use it? What would you think if that was your only option? Would you pay more to fly this in this other plane?

Photo credit: Vox Efx

And your seats looked like this?

Photo credit: Andy Mitchell

Right about now, you're probably thinking...


In the context of the topic at hand, various aspects our experiences in airports are relevant. If you think about the airport as being the organisation, the rest of the things on this list map logically.


The key point being that we have a choice of airlines, just like we have a choice of devices if corporate policies allow. Airports manage to remain secure despite the choices they present us. Sure there are inconveniences we have to deal with but we pay the price for the benefits.

Now, let’s consider this point. Would we lock the planes down but let everyone wander around freely? This only works at airshows, not in a real airport. We would never use an airport if this was the case. So why do so many organisations attempt to deal with BYOD using only Mobile Device Management (MDM) technologies? Doing so is effectively locking the plane down but leaving everything else open. MDM is a tactical feature, not an organisational strategy.

To deal with BYOD and subsequently the consumerisation of IT, you need all the other things that make an airport secure while balancing it with the flexibility of experiences a good airport provides. In other words...


Remember the jungle within Kuala Lumpur’s terminal?


Airports add services like this to make the experience better. It balances out all the inconveniences we have to endure in making our way through airports. Psychologically, this is similar to why employees are starting make their own choices when using applications to do their jobs.


How many of us have tried to use an enterprise application (e.g. ERP or CRM) and complained about how bad it was? They end up not getting used and we revert to something basic like spreadsheets, which aren't all that nice to use anyway. We’ve been behaving this way for quite some time and have been forced to get used to it due to the lack of available options. The difference today is that the innovation in the mobile space has extended to applications and we’re able to use great, consumer-grade applications for business needs (which aren't necessarily sanctioned by corporate IT). This is the driver behind users bringing their own applications, or if we follow the BYO meme, the Bring Your Own Application (BYOA) trend that is upon us.

Consumerisation is now extending to our social logins. The following options are arguably the dominant identities we use online: Facebook, Twitter, Google, LinkedIn.


Given the lines between personal and business are starting to blur, it is inevitable that our social identities start to extend into the enterprise. While we may not be at the stage where they can be used as being highly trusted identifiers for critical systems, they do provide a way for enterprises to use a lightweight identifier for their employees and customers.

In fact, a lot of organisations are looking at using social logins for their customers. Retailers are the most common type of organisation here, although the UK government announced recently that they were looking at allowing this for citizens. Washington State in the US allows voters to register through Facebook. We haven’t gotten to the stage where most organisations are actively trying to implement the same thing for their employees, but given that many will have the foundational components in place for their customers, it’s not a stretch to extend it to employees and provide a lightweight identifier internally for less critical systems without forcing employees to sign in. For example, my iPad is signed in to Twitter by default at the operating system layer. With the latest release of iOS, Apple added Facebook to sit side-by-side with our Twitter identity. In other words, it's relatively easy to Bring Your Own Identity (BYOI) to your day job, especially when you BYOD.

What about Cloud? Could employees conceivably bring their own Cloud?


Guess what? It’s already happening with business units procuring their own SaaS applications without the knowledge of IT. This has been caused by IT security saying no all the time and instead of trying to negotiate, they simple use a credit card and pay for a service with the approval of the business head. This is more common than most of us realise.

I said “pay”, but this typically starts off free. I’ll give you a simple example. Have you used Google Apps or Dropbox to store documents so you can easily collaborate with colleagues? It’s for business use and it’s free! Guess what? You’re bringing your own cloud in the form of SaaS. Again, instead of saying “no”, IT security departments are better off saying “yes” and working with the business users to mitigate the risks this poses.

Could we go further? What about the more technically minded that aren’t necessarily part of IT spinning up a new server instance within a Cloud service provider and building their own applications on top of this without the involvement of IT? This will be less common than bringing your own Cloud in the form of SaaS, but this vector actually poses more of a security risk than SaaS because someone who is technical enough to do so isn’t necessarily trained in IT security. In fact, the unfortunate situation we have today is that many technical people and developers aren’t sufficiently trained in IT security. This is something that urgently needs to be fixed. Also, the further down the infrastructure stack you go, the harder it is to secure and that's exactly what happens when someone spins up new IT infrastructure in the Cloud.

Apart from BYOD, I’ve mentioned a few other BYO acronyms.


This is by no means the final list. It’s still early days and the list will evolve. Organisations need to be agile enough to deal with trends and issues as they arise. As many of us found with Cloud and BYOD, these things creep up a lot more quickly than we expect and if you aren’t prepared, it makes things difficult, especially when it comes to security.

You can generalise the various approaches to dealing with BYO* into the following list, three of which are tactical and one of which is strategic.


By tactical, I mean that you can address one aspect of security, but you will find holes in other areas. It’s better to adopt the strategic approach so that you can react more quickly and focus on what it is you’re trying to do. Strategic approaches allow you to address a larger "risk and threat surface area" with less long-term spend.

In focusing, you should be thinking about what you are actually trying to protect. In reality, it’s the information.


Notice how I’ve said information and not just data. There’s a subtle distinction best illustrated by a joke about all the PINs in the world being exposed. It was simply a list of all the numbers from 0000 to 9999. That list is simply data. Add things like account numbers to the PIN and you have information. The difference between information and data is context.

What this means is that the strategic approach to cover your bases in the long term and become agile, is to focus on protecting the information. You do that by controlling access to the information, knowing about the identities accessing the information, what is being done to the information, when things are being done and subsequently being able to react quickly when appropriate.


I’ve already mentioned a few challenges. Here’s a list of some important ones that need to be addressed if you want to deal with the consumerisation of IT within the enterprise effectively.


Many of them have to do with human behaviour, which cannot be fixed by technology alone. It’s about altering culture. It’s about rethinking security.

There are two on this list that I want to focus on for a few moments:

  • The first is skills. As your IT environment evolves, so do the skills required. One of the biggest challenges enterprises face is that many of people with the skills required are shying away from working in the enterprise due to the perceived lack of innovation. They prefer to work for small companies. The challenge for enterprises is to change that perception and you do that by changing the culture and the way you do IT.
  • The second is the tricky issue of privacy. Given that devices hold a lot of personal data, it becomes paramount that organisations do not store employee personal data in the enterprise. In fact, one of the reasons many MDM deployments fail is due to the privacy concerns of employees and the concern that their employers are monitoring them during non-business hours. On the other hand, many organisations don’t want anything to do with employee personal information due to potential legal ramifications they may be subject to. Inevitably, for things to work, there needs to be compromise, but not at the expense of the requirement to NOT use more personal information in a business context than required or allowed (by the employee and regulatory requirements).

That said, there are benefits to be had. I’ve already mentioned a few, but here is a list of the top 5 benefits many organisations cite.


Notice I don’t have something commonly cited in the list of benefits and that is in the reduction of hardware costs. It seems logical that in not having to buy employees new equipment, you save money. But these costs will manifest themselves in other ways, the most obvious being the expenditure required in dealing with BYO.

Here’s a list of things that will help secure the Gangnam Style of the enterprise.


It’s not an exhaustive list, nor are they all appropriate for every organisation, but it’s a good starting point. To expand on each in the list:

  • Evolve from no people to creative yes people - I’ve alluded to this a few times. Stop saying no. Say yes and be creative about mitigating the risks or people will go around you. Also, your boss will fire you and hire someone who can say yes while managing risk.
  • Have an acceptable use policy for devices that is easy to understand - The first step down the BYO journey tends to be the drafting of a policy. But it is essential that it’s easy to understand. How many times have we blindly agreed to a policy because it’s too difficult to understand?
  • Enforce access control policies - These should rely on identity, context and policy to protect resources. Do not allow a device to access resources if systems cannot determine the user’s identity, if it does not meet compliance standards or if it does not have prerequisite software installed. Apply context by restricting access based on factors such as location and whether the connection is encrypted.
  • Automate the remediation process - Make it as simple as possible for the user to ensure device compliance by automating a majority of the remediation process. Do not rely on the user to know that they need to download and install a list of software components.
  • Monitor events and activities - Monitor all devices accessing resources on the corporate network using a Security Information and Event Management (SIEM) solution that can provide auditable, actionable intelligence and can be tied to identities. In an environment filled with partially trusted, potentially compromised devices, visibility is paramount and incident response time critical.
  • Use scalable identities - Reduce operational overhead in environments with many identity sources in a secure, standards-based manner by federating user identities across segmented zones and rely on trust-levels to enforce access controls. As an example, consider the overlap between internal employee identities and their online identities that I alluded to earlier when talking about BYOI. Users with their own devices are usually already logged in to their online accounts. For ease of use and transparent single sign-on, security policies can be implemented to support levels of assurance (LOA). If an employee is already signed into Twitter, internal applications can utilise that identity, but at a lower level of trust. So, an employee can potentially use their Twitter credentials to access non-sensitive parts of the intranet. But if they want to access corporate email, they are required to provide their employee credentials thus enforcing a higher LOA (thus "stepping-up" their authentication level) and asserting with greater confidence (and reduced risk) that the employee is who they claim to be.
  • Provide secure devices - An alternative to allowing employees to buy and bring their own devices is to let them pick what they want and pay for it with the trade-off being that they have to allow the organisation to load required software and implement relevant controls based on IT security policies. This presents a win-win situation for both organisation and employee. They use a device of their choice without having to pay for it and can access the corporate environment in a secure and compliant manner.
  • Encrypt sensitive information - Encrypt any information placed on a non-standard device that is deemed to be company property. This may include the employee’s corporate email.

In summary, if you don’t remember anything else, please at least keep the following 5 things front of mind.