[Dataloss] Suggestion for changing status quo on data losses
Arshad Noor
arshad.noor at strongauth.com
Sat Aug 2 23:35:23 UTC 2008
I have to publicly apologize to Lyger, Jericho and others of the
dataloss listserv and attrition.org for my faux-pas. I neglected
to mention attrition.org in my letter to my representatives because
I was under the mistaken impression that etiolated.org belonged to
the same group.
If anyone chooses to use the text from my letter, please don't make
the same mistake I did and give attrition.org the credit it deserves
in your letter to your representatives.
Once again, I believe the work done by the people behind this listserv
is highly commendable, but even with the best of intentions, people
can make mistakes - I know I did. My apologies.
Arshad Noor
StrongAuth, Inc.
Arshad Noor wrote:
> security curmudgeon wrote:
>> In my opinion, to do this correctly would involve someone drafting a
>> well-written form letter that list subscribers could use to send to their
>> own representative. One page, cite the issue, quote some statistics, say
>> it affects them (faster way to make them care) and then to 'fix it'. Of
>> course, 'fixing it' is generally a myth as there isn't a simple to
>> implement solution to stop dataloss.
>>
>
> Jericho/All,
>
> Thank you for reminding me of advice I used to give out many years ago,
> but stopped bothering seeing how ineffective our representatives are in
> so many other areas. Nonetheless, if I do not let them know, I cannot
> expect them to address the problem.
>
> That said, I have sent my CA representatives the attached letter. I
> have also sent it to both Presidential candidates, and am disclosing
> this letter for discussion and in case others may want to adopt it to
> send to their own representatives (permission is freely granted to one
> and all).
>
> While the suggestion cannot guarantee a solution to the problem, it is
> my strong belief that it is the first step towards a long-term solution.
>
> Let the tomato/egg throwing begin....
>
> Arshad Noor
> StrongAuth, Inc.
>
> ----------------------------------------
> I am writing to inform you of my concerns about America's current
> Information Security policies and to propose a plan for addressing its
> shortcomings.
>
> Since California's seminal Breach Disclosure law (CA Senate Bill 1386)
> and similar laws in 40+ states, this country has witnessed the public
> disclosure of some of the largest breaches to private data in our brief
> history with information technology (estimated to be well over 200M
> identities in the last 5 years – http://etiolated.org/ and
> http://www.privacyrights.org/).
>
> While there are Federal laws stipulating data-protection (GLBA, HIPAA,
> SOX, FISMA, etc.), we continue to see unrelenting breaches of data,
> indicating the laws are ineffective in this regard. It is my belief
> there are fundamental flaws in America's technology security policy that
> need to be corrected before we see any change.
>
> Every sector of US industry that can cause harm to humans is not only
> regulated, but is required to disclose adverse events that either cause
> harm, or have the potential to cause harm, to a regulatory body.
> Automobiles, airlines, food, drugs, medical, chemical, banking,
> environment, power, construction – they are all required to report
> adverse events. Except the IT sector!
>
> Just as the Center for Disease Control (CDC) would be hopelessly
> ineffective if mandatory reporting of adverse health events were not
> required, the IT sector is currently hampered because there is neither a
> Federal agency with the mandate to collect such information, nor a law
> requiring companies to report adverse security events to such a central
> authority.
>
> The history of science shows that improvements come only with research.
> However, research requires comprehensive data. Without data that
> supports root-cause analysis and statistical analysis, it is impossible
> for scientists and engineers to solve the problem we face, and
> consequently, for our nation to build a stronger IT infrastructure.
>
> I propose that the US Congress enact a law stipulating the following:
>
> - The creation of a “National Technology and Security Administration
> (NTSA)” modeled along the lines of the National Highway Transportation
> and Safety Administration (NHTSA) with the following mandate:
>
> a) Collect information on computer-related breaches in the USA.
> b) Create statistical reports from breach data and disseminate such
> reports (including raw data) to the internet.
> c) Establish a Security Baseline that all technology products must
> deliver.
> d) Establish a Security Profile for different classes of systems that
> businesses, government agencies and individuals must achieve.
> e) Mandate the recall of products that do not meet the Security Baseline.
>
> - Requiring ALL businesses that store private data of US citizens on
> computerized devices – regardless of geography – to report adverse
> security events to the NTSA;
>
> - Allocating the NTSA appropriate resources and giving it the
> operational latitude to carry out its mandate;
>
> - Eliminating the liability exclusion for defective IT products (no
> other manufacturing industry is excluded from the liability of producing
> defective products; why does the IT industry enjoy this exclusion more
> than 25 years after the PC was created, and nearly 50 years of the
> existence of the computing industry?)
>
> With such a law the US will establish the foundation of a process to
> make the internet and information technology products secure. This will
> not happen overnight. But within 24 months of the creation of such an
> agency, we can expect to start seeing some benefits, and within five
> years, we can expect a dramatic reduction of breaches to private data.
>
> While we can never eradicate all vulnerabilities or breaches, the NTSA
> can make significant contributions towards protecting the private data
> of US citizens. Given that the US economy is critically dependent on
> computers, we cannot wait for a catastrophic IT event to take decisive
> action.
>
> I have had some discussions with people on security forums in this
> regard, and am attaching some observations for your benefit. I look
> forward to seeing some action from US Congress on this issue. If there
> is anything I can do to help, please don't hesitate to have your
> staffers contact me.
>
> Regards,
>
>
> 1) What constitutes a security event?
>
> A loss of resources (data, time, money, capacity) for the owner of the
> computer asset due to any factor that can neither be deemed negligence
> nor accident on the part of the owner. An assumption is that the owner
> has defined a security policy and is in conformance to it. For
> individual users, the security policy will be either the default
> security policy of the manufacturer or a stronger policy if they have
> implemented it.
>
> 2) How would the information provided to this new agency be protected?
>
> All user/company information that can identify them is anonymized. The
> detail must have a section that is legible to business-people and a
> section that is gory for technical people. Names & versions of
> operating systems, software, sufficient configuration detail to describe
> protections in place (but without any identification information again).
> Security specialists and researchers must have this detail so they can
> learn from the experience, build models for future protection, etc.
>
> FOIA rules would apply, but the information should be available as soon
> as it is reported in an online database on the internet.
>
> Mechanisms to verify the authenticity and integrity of the report should
> be in place (once again, without identifying the reporter).
>
> 3) What are the penalties for not reporting security events?
>
> Loss of insurance coverage for damages. Penalties for companies if they
> are found out later.
>
> 4) And how are they enforced?
>
> I would like to say that it should be on an honor-based systems because
> the more data we have, the more benefit we derive from it. So, that
> should be an incentive to report.
>
> However, audits of randomly selected companies could be implemented to
> see if the reporting is statistically in correspondence to the security
> events visible on the internet. Non-compliant companies will be fined
> and subject to mandatory annual audits for three years.
>
> 5) Do the rules apply just to corporations; or to individuals?
>
> It has to apply to all - especially to individuals. However, since the
> vast majority of individual users cannot be expected to know what to
> report, manufacturers of computer systems must include diagnostic tools
> that can be used to pick up reporting information after scrubbing
> identification information. This can then be submitted separately by
> the "victim".
> ----------------------------------------
> _______________________________________________
> Dataloss Mailing List (dataloss at attrition.org)
> http://attrition.org/dataloss
>
> Tenable Network Security offers data leakage and compliance monitoring
> solutions for large and small networks. Scan your network and monitor your
> traffic to find the data needing protection before it leaks out!
> http://www.tenablesecurity.com/products/compliance.shtml
More information about the Dataloss
mailing list