Saturday, May 22, 2010

Where is the perimeter?

Well first post for my first blog. Thought it was about time given I've been thinking about it for a while. Actually the final straw which pushed me was an article I read on the lack of security related blogs. As a security professional myself I felt it was time to contribute so hopefully there will be something here for everyone.

My first post of interest is about the security perimeter. Where is it? What are we trying to secure? I have started listening to a new podcast from Exotic Liability which is just brilliant. They are straight to the point and very direct. In episode 13 Chris Nickerson brought up an interesting topic on the differences between the information perimeter and a perimeter. Most people consider the perimeter in an organisation to be geographical with a firewall etc and everything outside that perimeter is considered bad and untrusted. However, as Chris points out, information is everywhere and as such needs to be the core of our security program. In this context you can't think of the perimeter as being geographical. Many organisations post documents on the web and more often then not, the associated metadata is not sanitised and could contain sensitive information. Attackers (I refuse to use the word hacker) can search for this information using tools such as
FOCA and Maltego to target companies. Furthers, attackers can use tools such as MetaGooFil and libextractor to extract the metadata which could contain user names and server names and other items related to the environment.

Is this information sensitive to the organisation and could this be considered a perimeter? Perhaps you should consider reviewing your security strategy. A point to make here is this information can be gathered passively without sending a single packet through the perimeter aka firewall and router. Similarly laptops could be considered a perimeter as staff take them home or on the train etc packed full of sensitive data?

Chris summaries it well - the security of information can be improved using the following simple steps:
  • have a security strategy based on information creation,
  • classification (how important is this document to the organisation),
  • understand based on classification that certain levels cannot be placed on the internet or stored on local hard drives etc
and then you can start protecting and securing the information perimeter.

Other related items of interest:

Comments welcome.