Model Driven Security Policy Automation

On this blog, ObjectSecurity co-founder and CEO Ulrich Lang discusses security policy automation and model-driven security. The aim of this blog is to advocate advance the state of the art in this area through exchange of ideas. www.modeldrivensecurity.org - www.policyautomation.org - www.objectsecurity.com

Wednesday 10 June 2015

Cybersecurity in 2015: Manage Impact!

This article was moved to https://www.objectsecurity.com/cybersecurity-in-2016-manage-impact/.

1 comment:

Dr. Ulrich Lang, CEO, ObjectSecurity said...

OPM hack:

"But even if the systems had been encrypted, it likely wouldn't have mattered. Department of Homeland Security Assistant Secretary for Cybersecurity Dr. Andy Ozment testified that encryption would "not have helped in this case" because the attackers had gained valid user credentials to the systems that they attacked—likely through social engineering. And because of the lack of multifactor authentication on these systems, the attackers would have been able to use those credentials at will to access systems from within and potentially even from outside the network."
(http://arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/)

The opm hack once again makes a strong case for using fine-grained, contextual access control for impact control. It would have actually helped, provided that the OPM user credentials had overprovisioned access, which appears to have been the case.
See: http://objectsecurity-mds.blogspot.com/2015/06/cybersecurity-in-2015-manage-impact.html