In a recent blog post, Security Economics of the Internet of Things on Schneier on Security, security expert and cryptologist Bruce Schneier describes economics related to securing IoT devices. The post was written due to unprecedented DDOS attacks against investigative security journalist Brian Krebs and his web site krebsonsecurity.com.
Updated June 12, 2016
A digital certificate was created by Symantec for Blue Coat Systems Inc. The digital certificate is a special type of certificate that allows Blue Coat to operate as a trusted Certificate Authority(CA). The certificate allows Blue Coat to create new digital certificates for use on highly trusted web sites like those used in banking and health care.
Most people and businesses operating servers on the Internet make every effort to provide the public with the safest and most secure online experience. But the Internet is a big place and not everyone plays by the rules. Providing a trusted Internet environment is essential for commerce and collaboration. The system that manages Internet trust is Public Key Infrastructure(PKI). PKI is the the security technology and processes that web browsers and web servers use for all highly trusted activities like online banking and health. Certificate Authorities(CA) play a special role in PKI as the gatekeepers of secure servers on the Internet. CA duties include managing applications for secure web servers. To fulfill this special and important role, CA’s must submit to stringent audits of their business practices and operations. During normal day-to-day operations CA’s must preserve public trust in online security by denying criminals access to masquerade as legitimate businesses or trusted partners. Most often everything goes as planned but what about the case when CA’s don’t follow the rules. Abuses may include issuing certificates without knowledge or consent of rightful domain owners, servicing unlawful or warrantless government requests, and much more.
Why is this incident important to me?
In May 2016 a security researcher, Filippo Valsorda, discovered an Intermediary CA X.509 digital certificate was issued to Blue Coat Systems by Symantec. This is a concern for two reasons, 1) Blue Coat Systems manufactures hardware designed for surveillance, 2) the Intermediary CA certificate facilitates the issuance of highly trusted certificates in any Internet domain name. For example, a Blue Coat device armed with their new CA certificate can surveil HTTPS web sites in a way that’s difficult for web browser users to detect.
Why is the Blue Coat Systems CA a problem?
Trust is essential to the continued operation of the Internet. Without trust, the full potential of the Internet will never be realized. Few would want to purchase products, view medical laboratory results, exchange ideas with business partners, or email friends and family if our information can be surveilled, intercepted, and manipulated at any point without our full knowledge and consent. The key displayed in your web browser in a secure HTTPS connection is an icon of trust. If it’s visible, we must have confidence the site we are communicating to is authentic and our communications confidential.
What does Bluecoat and Symantec have to say?
Symantec has said that it’s determined the CA certificate issued to Blue Coat was done so appropriately and that Blue Coat never had access to it. This statement is designed to assuage public concern since it would prevent impropriety on Blue Coast behalf. Unfortunately there is no easy way for the public to verify this statement.
It depends upon you. If you trust that Symantec and Blue Coat are operating in your best interest then do nothing. If on the other hand you consider Blue Coat’s CA a potential vector for abuse then you can untrust the Blue Coat CA certificate.
To mark the BlueCoat CA certificate untrusted
1) Download BC CA Cert
2) Mark untrusted, OSX users | Windows users
* Mobile users: iPhone, I don’t believe Apple exposes any trust management features to the public. Android, unsure.
BlueCoat now has a CA signed by Symantec https://t.co/8OXmtpT6eX
— Filippo Valsorda (@FiloSottile) May 26, 2016To be clear: BlueCoat, the company making TLS MitM equipment allegedly used by govs to violate human rights, now has a REAL UNRESTRICTED CA.
— Filippo Valsorda (@FiloSottile) May 26, 2016Symantec “maintained full control of the private key and Blue Coat never had access to it”. (A common practice.) https://t.co/Km9liGpCTE
— Filippo Valsorda (@FiloSottile) May 27, 2016
The Register, Blue Coat, Skype and QQ named despots’ best friends
Blue Coat Systems, Blue Coat Intermediate CA
Symantec, Symantec Protocol Keeps Private Keys In Its Control
Updated on April 16, 2016
To understand why online systems are plagued with seemly endless security incidents requires a closer look into today’s security landscape. Let’s look first to understand the vulnerable systems criminals exploit. Top security company WhiteHat says it best on their home page.
According to WhiteHat web applications are the greatest risk area. Next WhiteHat says, “…most security budgets are spent on securing and monitoring the perimeter and endpoints”. According to the FBI 2014 Internet Crime Report, “…IC3 received 269,422 complaints with an adjusted dollar loss of $800,492,073…”, keep in mind this is US losses, not global.
“…IC3 received 269,422 complaints with an adjusted dollar loss of $800,492,0731…”, FBI 2014 Internet Crime Report
Aside from the claims and statistics, it does not take a security expert to understand the global force behind the online movement. Virtually every product and service is moving online and it stands to reason the criminals and crime are following the money.
Let’s change gears, let’s look into background on today’s top security executive the, Chief Information Security Officer (CISO). The following is Digital Guardian[INFOGRAPHIC] infographic for Fortunes 100’s top CISO’s.
The infographic tells us CISO’s are predominately male, well educated, hold various security and audit certifications. In short, nothing particularly remarkable outside of our expectations but take a look at the following, 59% of CISO’s have IT work background with only 13% in programming/engineering experience.
Fortune 100 CISOs are not well equipped with the skills necessary to defend today’s vulnerable web applications
Makes sense, for years IT leaders have been successfully defending permitters with firewalls. In all fairness, firewalls will always be valuable but they have not proven as effective defending online applications as well as IT infrastructure. Indications are Fortune 100 CISOs are not well equipped with the skills necessary to defend today’s vulnerable web applications. Let’s look at some of the reasons why.
Writing software code, software architecture, debugging, understanding the battery of tools, is an entire domain of expertise. Can programming be learned like any other challenge? Of course, but let’s give programmers some credit, application development is an entire domain of knowledge and takes takes years to master. Once that domain is mastered, learning to think like an attacker, breaking systems, secure coding techniques, secure coding libraries, dynamic and static analysis security tools are, in all fairness, is an entire new domain of expertise to master and not taught in most universities. A top defender of software and secure software designer is a unique skill set. This is why those that break into systems (e.g., pentesters) or secure traditional IT infrastructure don’t necessarily make the best application defenders.
Attacks occur where you least expect them and it’s often frustrating to newcomers in the application security profession
To give some idea of the learning challenges, learning basic programming principles like writing a “Hello World” program in Java will take about 10 minutes of time. Learning object oriented design techniques principles, some months. Learning the various Apache and open source packages you need to be competitive in a business environment can take years. Understanding how to defend all that technology takes years of working through incidents, developing the security mindset, understanding the tools and techniques. A strong technical leader requires mastery of two domains, software development and security. If you wanted a leader for security engineering this is all you would need but you don’t, you want a CISO. Now you need someone who also knows how to frame security challenges to smart executives and board members that may not be very technical. Strong CISO are rare individuals in high demand.
Today security is largely a software quality problem that can’t be addressed with the next vendor security-in-box-solution. Software security is a business and engineering quality problem – not an act of God. Software code must be designed, built, and delivered securely. Each step in the software development process, inception, architecture, development, testing, deployment, sunsetting, is important in the overall solution quality and historically entirely within the domain of software engineering groups. Let’s face it, software engineering leaders don’t necessarily appreciate security advice around how to build systems. Especially when the suggested security quality improvements reduce execution tempo which is closely related to performance based compensation.
Today security is largely a software quality problem that can’t be addressed with the next vendor security-in-box-solution. Software code must be designed, built, and delivered securely
Significantly reducing business risk depends on the CISO’s ability to influence and win the support of software developers, development leaders, business executives, and board members. Even a CISO with the best background and skills may not be able to influence positive code quality security improvements. A CISO is not an army of one. A knowledgeable CISO will fail without the proper support across business constituencies. This is because security is everyone’s job, not only the job of the CISO and their staff. Influencing systemic positive change throughout an organization is difficult but it begins with role dependent education. Today’s CISO’s must be as comfortable reviewing and recommending security architecture to a developer on the whiteboard as explaining business implications of security vulnerability to corporate boards. CISO’s must explain why engineering quality processes must be improved and recommend specific improvements when requested. CISO’s with best blend of technology and business experience have the best chance for improving software code quality and influencing the most positive changes to security and winning respect of developers.
As our most valuable assets are brought online as Internet web applications, criminals abscond with our data while companies are busy tweaking firewalls. Many companies are squandering security investments prodigiously in the wrong areas. Indications are Fortune Top-100 CISO’s don’t have the best blend of skills and experience to defend software systems – the primary weakness.
The trend is that all executives share security responsibility in a significant security incident so the value of a knowledgeable security executive should not be underestimated
The best CISO defenders of tomorrow will be those with experience coding/programming, designing, shipping software products and services. If a security leader with a development background is not available – build one. Find a top engineering leader and begin building the security mindset. Send them to security conferences where executives congregate like, Gartner IT Security Summit. Understanding business implications of security, executive concerns around security, and how to communicate with executives are essential. Send them to SANS Institute to learn how to break software applications. Theory is helpful but hands on skills are essential. Attend security conferences like Blackhat, DEFCON, and others. It can take years to find the best leader and build out a team. Begin now, by investing in your own organization and growing some organic talent. The trend is that all executives share security responsibility in a significant security incident so the value of a knowledgeable security executive should not be underestimated.
Laws and regulations have not kept pace with growth of Internet technologies. No clear expectations have been communicated to the software industry or users of these services by policy makers. Executives have responsibility for protecting customer data but enforcement remains selective. In the most egregious incidents, top C-level execs have been terminated for poor cybersecurity (e.g., Target).