The Security Compliance Zombie

September 9, 2017 | Views: 3203

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here
The Security Compliance Zombie 

I recently had the opportunity to view a  webinar where the topic was how to stop what was referred to as “compliance zombies”. We have all seen zombie movies. Zombies, they are unintelligent existences that march straight forward, with no thought whatsoever as to what they are doing, to achieve a single objective. No thought. No deviation. Even if they are putting themselves at great risk.
 
Security compliance zombies do the exact same thing. They press forward with a set of vague guidelines just for the sake of being “compliant”, without really understanding what it is exactly they are doing and often, and without intent, putting their organization at risk. When it comes to security and compliance I believe a lot of us out there can relate to this type of zombie phenomenon and I am speaking from experience.
 
Several years ago, when it came to securing the environment I was responsible for, I found myself behaving the exact same way. Being the lone security engineer with the responsibility for ensuring several small networks were both secure and “compliant” with applicable industry security standards I found myself just pushing forward aimlessly. Mandating controls and secure configuration guides without REALLY thinking about what it was that I was doing. Implementing what I believe the controls were stating because, hey, I was the security guy. I am supposed to know it all, right?
 
I wish I could say that I realized right away just how wrong that mindset was. But if I did I would be lying. It took longer than I care to admit. But I am happy to say that it did all change for me one day when I was challenged by one of the system engineers on a specific control that I said had to be implemented. The particular control addressed object reuse and it stated
 
“…the constant reallocation of objects is a security risk because residual data may remain when the object is reassigned to a new process after a previous process is finished with it. Clearing residual data from an object before reuse assures that system resources, in particular, storage media, are allocated and reassigned…”.
 
And do you know what that system engineer had to gall to ask me? He asked me “What does that mean and how do I apply it”? I will never forget that moment because I did not have a definitive answer for him. And to me, that was not acceptable. That’s the moment that I realized I was acting like a zombie and things had to change.
 
 
It took some time but I went back to my desk and I traced that control, Object Reuse, all the way back to the NSA’s Rainbow Books. When I sat down with that system engineer and provided them with a thorough explanation of not only the meaning of the control but the complete history, purpose, and applicability of the control.
So, you may be wondering, what is the cure for the security zombie? First, one needs to come grips with the following statement…compliance does not equal security. I know it may come as a shock to some but compliance is merely a snapshot of how your security program meets a set of general security requirements at a given moment in time. It does not mean your system or data are by any means secure. Next get ready to put in some serious work because it’s time to gain a thorough understanding of the data, systems, and technologies you are tasked to protect. It’s time to start reading documents like secure configuration guides (i.e. STIGs and ICS Benchmarks) and RFC documents all while you start to learn and understand things about your environment like who has access and where the weak points of the systems are.
 
Does this all sound familiar? Are you a security zombie? If so it’s time to cure yourself and your career of that dreaded disease. It’s time to begin to understand what threats and vulnerabilities are and which ones are applicable to your environment. It is finally time to put in the time and the effort to understand how threats, that are pertinent to your environment, operate so that you can finally start to design and build the proper defensive solutions. 
Visit my blog at https://mikesship.blogspot.com/2017/09/the-security-compliance-zombie-i.html
Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 333 / December 14, 2019
How do I Get MTA Certified?
Views: 925 / December 12, 2019
How much does your PAM software really cost?
Views: 1378 / December 10, 2019
How Do I Get into Android Development?
Views: 1756 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel