PGP Public Key Signature

PGP/GPG Public Key Signature
May 15, 2014

Here is a copy of my  PGP (or GPG) public key signature.



-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - https://gpgtools.org
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=oBFm
-----END PGP PUBLIC KEY BLOCK-----

.wdnii.
© 2014 Norris Proprietaries Inc.


Information Class Warfare part V

Information Security Process: Repeat
August 30, 2013


Information Security like all relationships requires time and effort. I use a security management system which works well for the companies I have secured and maintained. Classify, Secure, Audit, Educate, Repeat. Not a memorable acronym, but a very valuable path to cycle through. Each iteration has made my companies better prepared for the inevitable attacks and recovery easier and faster.


Repeat, yes, more than just to keep you as a security professional relevant to your employer, but also, repeat at sporadic intervals.

Perhaps this is the most important step, but all of the previous steps should be repeated.

Classification: Revisit your information classification document at least annually to verify that types of information can be added or removed. I have found that the levels of security and access rarely change, more likely that some services have been added or removed in the past year, so the information associated with those products needs to be added to the scope of your security planning or removed.

Securing Devices: These documents should be revisited more often, a scheduled review should be done at least every six months, but they should also be revisited every time a new vulnerability is released for the various systems or networks to verify that adequate controls are in place to mitigate a loss and that security is still at the same levels before the vulnerability was known.

Auditing procedures are generally an ongoing activity, but the guidelines and tools should be reviewed at least annually to see if there are better ways to make the job of auditing easier.

Education for each employee should be part of the on-boarding process, with static links pointing them to useful information specific to their job and a time should e set aside to visit each team at least once a year to see if they have any new issues they wish to address. Short fifteen minute meetings do not impact productivity and longer detailed questions can be answered outside of the meeting scope.

I hope this short series of articles was of use to you, these are some general principles that I use every day as an information security professional.


.wdnii.
© 2013 Norris Proprietaries Inc.

Information Class Warfare part IV

Information Security Process: Security Education
August 29, 2013

Information Security like all relationships requires time and effort. I use a security management system which works well for the companies I have secured and maintained. Classify, Secure, Audit, Educate, Repeat. Not a memorable acronym, but a very valuable path to cycle through. Each iteration has made my companies better prepared for the inevitable attacks and recovery easier and faster.


Security Education is always an interesting topic for me to espouse. This can be done in large meetings with power points, white boards and boring speeches, just to show that you have exposed every employee to the magic of security. Another alternative are the various online materials which employees can use on their own, the more interesting piece is that your employees can refer back to these materials when they are actually useful.

Another way to avoid the large auditoriums and conference rooms full of employees who would rather be working and helping the company keep and create new revenue is to hold small short meetings with the various teams and if there needs to be longer discussions break those into several small 15 minute meetings. Getting directly to the specific points, flaws and how they can best keep your company information accessible, correct and private. This of course requires you as a security professional to spend many more hours preparing different presentations and holding many more meetings, spending much more time talking than the standard several hour big speech which usually causes more confusion and glazed expressions than a better security posture for your company. This method also lets your coworkers know that you are available if they have any issues, or questions.

The educational points on which I like to focus are that security is each persons responsibility, and as they say in New York "If you see something, say something". These general speaking points can be tailored into relevance for almost every group. I also try to let them describe what they feel are the relevant security issues in their departments, doing this twice once at the beginning of the presentation and then at the end after they have had a chance to hear why you think the various pieces of their job are important.

A few don'ts about your presentation, don't try to prove you are an expert in their field, don't try to be their friend, and don't over simplify your requirements.

I hope this is helpful, just a few tricks that I use every day when I do my various roles as a security professional.


.wdnii.
© 2013 Norris Proprietaries Inc.

Information Class Warfare part III

Information Security Process: Internal Auditing
August 28, 2013


Information Security like all relationships requires time and effort. I use a security management system which works well for the companies I have secured and maintained. Classify, Secure, Audit, Educate, Repeat. Not a memorable acronym, but a very valuable path to cycle through. Each iteration has made my companies better prepared for the inevitable attacks and business recovery easier and faster.


I cover auditing of the various security policies in this short article. Perhaps one of the driest piece of this repetitive puzzle, unless you decide to make this a game.

Continuous scanning, is one of the best methods to secure internal and external networks. These will detect poorly configured servers before external auditors, or hackers, and alert you to each device someone attempts to slip onto your network. Using a log consolidation system, helps identify threats and attacks, but can also be used for auditing. Attack each server with one of the various vulnerability frameworks and rotate through those only during maintenance windows or when agreed by the product owner. The logs will help indicate if there are any additional vulnerabilities that can be exploited, along with the framework reporting.

The game I generally see security professionals play is to attack servers and try to determine vulnerabilities before the System or Network Engineers are able to patch those servers, this always encourages poor cooperation between these teams, which succeed or fail only with each others help. A more interesting way is to hire outside auditors to test your site security or internal corporate security, and then run your own internal tests to see if you can find more vulnerabilities than they did. This is always more rewarding and rarely incurs the wrath of those on your own team.

Internal Auditing is a crucial piece of the the security puzzle, and must be regularly executed to maintain a working and thorough knowledge of your networks, perimeters and the success of your policies.

.wdnii.
© 2013 Norris Proprietaries Inc.

Information Class Warfare part II

Information Security Process: Securing (policies)
August 8, 2013


Information Security like all relationships requires time and effort. I use a security management system which works well for the companies I have secured and maintained. Classify, Secure, Audit, Educate, Repeat. Not a memorable acronym, but a very valuable path to cycle through. Each iteration has made my companies better prepared for the inevitable attacks and recovery easier and faster.

I cover securing information devices and paths in this article in a general way, though I can provide more specific resources.

Securing is a multi-part process, first is taking the original classification of critical systems and information paths and using those to derive specific security policies for each type of device. A security policy should state why it exists, and which pieces of the organization it is trying to secure. Also, and while seeming trivial a date, revision history and revision number is useful.

Each security policy should list the types of networks, devices and data that are included and excluded. For example, a machine which runs DNS (Domain Name Service) externally will most likely have different restrictions from a machine which runs DNS internally. The same with routers, internal routers may have different types of restrictions and required processes than internal routers.

A security policy should list the roles and responsibilities of the system, the information and/or the people who administer and use that system and/or data located on that device. Some systems are critical and the business will fail if those systems are impacted either with a security breach or natural disaster, so some security policies require a business recovery plan for those systems to be back online. This can be done via an active / active solution so the system and data recovery will be without interruption. A hot standby solution provides usually a short interruption which is usually considered not to impact any revenue generation. A cold standby site is another solution, where a copy of the data is kept and depending on the requirements usually the site can be back online in minutes to hours. The least expensive solution is to have off-site backups, where an entire site can be rebuilt from scratch, but the downtime can be quite extensive.

A security policy should list the authoritative documentation for the systems and information being secured, such as any relevant technical books, Internet RFCs, and vendor documentation. You should also reference other relevant security policies and mention that they should also be used. This is the easiest section to write.

My security policies include examples of configuration files and which sections of those files are required to be used, how the program should be run, such as the user and group designations, the user and group ID numbers and even the location on the file system where the programs should be located.

Finally, a section stating which audit procedures will be used and what type of external controls will be used around this type of system. Again for a DNS server this can mandate where the log files are written and how often the system is audited.

Overall though, my philosophy of security is that the information provided needs to be available and accurate when needed. So, a clear link from the data or information categorization needs to be linked to the consumers that use each resource and how these security procedures allow those consumers access to the correct information, but do not allow the information to become corrupt, or allow the consumers to become compromised or allow the consumers to compromise the data for any valid use.


.wdnii.
© 2013 Norris Proprietaries Inc.

Information Class Warfare part I

Information Security Process: Classification
August 1, 2013


Information Security like all relationships takes time and effort. I use a security management system which works well for the companies I have secured and maintained. Classify, Secure, Audit, Educate, Repeat. Not a memorable acronym, but a very valuable path to cycle through. Each iteration has made my companies better prepared for the inevitable attacks and recovery easier and faster.


I only cover Information Classification in this article; it is the most ethereal of the process. Every other step's effectiveness can be measured quantitatively, but classification is qualitative.


I first identify the pieces of information vital to the company's survival, vital to their growth and then protect against losing any company secrets. This protects the company’s present, their future and their advantages over their competition. I label this information confidential and apply that tag to any device that has control, such as routers, switches, servers, laptops, cell phones, desks, offices, secretaries, conference rooms, and the corporate phone system, for examples. All of these provide a way for this information to be compromised, to fall into the wrong hands, or be lost which could be even worse.


How valuable is something? Information is an abstract concept, but represents tangible assets in my corporate world. I came up with a few rules on how to determine the value of various corporate assets and information. First, how valuable is it to the company? How valuable will it be tomorrow? How valuable will it be 5 years from now? Second, how valuable is it to a department in the company, and how valuable is that department? And finally, how valuable would this be to a competitor?


Creating this inventory of information locations and which pieces of technology they traverse on a given day gives a decent idea of what needs to be secured. For the smaller companies I generally find every piece of technology needs to be secured and maintained, because high value information passed through multiple times a day. For larger companies this list has been more granular.


While coming up with this classification matrix is necessary, generally most servers, routers, switches, laptops have the same or a similar configuration. But this is not the case with every environment, and especially with Bring  Your Own Device.


While this view may seem over protective and intrusive, this is just to bring to the company’s attention where their highest level vulnerabilities are,. Securing is a separate issue and can usually does not have to disrupt current business practices.


.wdnii.
© 2013 Norris Proprietaries Inc.

Who Follows the Followers


Social Leadership
July 11, 2013


While checking twitter accounts of various technology companies I found an interesting correlation between the number of people that a company followed to the number of followers they had. Apple only follows nine people and Cisco over three thousand.


Another interesting bit, on Google+ the Google corporate page has fewer than two thousand +1s.





Following
Followers
Microsoft
1033
1716245
Google
394
6378566
Apple
9
1748061
Intel
1111
1727931
HP
815
116653
Oracle
491
139931
Cisco
3217
223250



.wdnii.

© 2013 Norris Proprietaries Inc.


Securing and Creating Chaos

Information Security and Software Engineers
July 8, 2013


As a security professional I am frequently asked “Which piece of the enterprise do you secure first?” As a developer, I am asked on a new platform “Which software do you port first?” These questions are both sides of the same coin.


In Information Security, coming into a startup whose focus is being fast, energetic and agile they look at me like alcoholics at an intervention. Like I am trying to take away their fix, their juice, their addiction. But in reality, I am trying to give them more. I just want to make sure they are drinking what they really like, so the beer drinkers get more beer, and the whiskey drinkers get more single malt. That metaphor holds.


My answer to the security question, which piece do you secure first, is also a question, “Which strand of spaghetti do you eat first when served a bowl?” Exactly, the easiest piece to come out. You look at the bowl, stick your utensil in, twist and pull. then things seem to line up, and slowly the chaos is clean.


Perhaps with Information Security there are some of the usual suspects, Identity Management, Role Assignments, Intrusion Detection, Intrusion Response, Services Protection, Information Loss Prevention to name a few. And  I find that organizations are stronger or weaker in some of these areas. Which to address first? Find which piece can be done the fastest, cheapest  and has the best return on investment. An old qualitative rule of thumb that I distill and discuss with co-workers, from engineers to the C-Levels.


As a developer on a new platform, I liken that to a new whiteboard waiting to be defaced. But the tools are easy, first an editor, to build a compiler and then I can write whatever software is needed, like a better editor. I imagine the process is like an architect, some just dump in the same foundations and build the same box in a different spot or others are artistic and the buildings seem to float.


So, with development the problem that needs to be solved is the opposite of security. With security you try to remove pieces without breaking the whole, with development you build a foundation and then the following levels, until you have a finished product.


But I find that rarely do I work on a new platform, instead I am thrust in the middle of a digital urban landscape, with various routes from where I am, to where my project needs to be. And I have to decide how to exist within the past digital environment, that others have left. Some developers don’t know how, or do not wish to learn, so they demolish and just build where they landed, and expect the corporate enterprise to come to them, others are immersed in the legacy systems and never try to build something new. But I envision the system as a whole, see the connections and move my project so I can take advantage of what exists while extending and making something more. This is how my development and security experience intertwine.

wdnii.
© 2013 Norris Proprietaries Incorporated.