CSA Establishes Cloud Data Governance Working Group and Releases Governance Framework Arrow to Content

June 4, 2015 | Leave a Comment

By J.R. Santos, Vice President/Research and Member Services, Cloud Security Alliance

jr santosIt is becoming increasingly difficult to protect customer data in the clouds, which in turn is causing more and more cloud providers and cloud consuming organizations to embrace data governance strategies. To address this need, Cloud Security Alliance (CSA) recently created the Cloud Data Governance 2.0 working group.

The Cloud Data Governance working group has been created to design a universal set of principles and map to emerging technologies and techniques for ensuring the privacy, confidentiality, availability, integrity and security of data across private and public clouds. The group has recently released a data governance framework to ensure the privacy, availability, integrity and overall security of data in different cloud models. These will feed into the GRC stack and can be implemented as controls across CSA’s CAIQ, CCM and STAR.

The Cloud Data Governance working group will look to develop thought leadership materials to promote CSA’s leadership across the spheres of data privacy, data protection and data governance. One key issue is that the over-emphasis on technology controls often leads to underlying weaknesses in processes. The group will work to harmonize data privacy regulations to a set of data protection principles that can help cloud consuming organizations and cloud service providers meet new data privacy requirements in a more efficient and proactive manner.

Chaired Evelyn de Souza of Cisco, the group is comprised of representatives from across the industry, with collaboration between key industry leaders from different verticals, academia, industry analyst associations and vendor subject matter experts.

The Governance Framework is tied to the CSA Cloud Controls Matrix and examines the three phases to govern:

  1. Plan (Plan & Organize)
  2. Do (Acquire and Implement, Deliver and Support)
  3. Check, Act (Monitor and Evaluate)

The Cloud Data Governance working group has some exciting research coming up later in 2015, including reviewing and streamlining the values of security risk management, going from ad hoc to optimal. Also research on data privacy – measuring the changing perceptions to data heat index – is scheduled for release.

If you are planning to attend Cloud Expo in New York next, you are invited to attend a presentation being given by Evelyn that will focus on how to set up a cloud data governance program and spans setting up an executive board to ensuring the availability, integrity, security and privacy of cloud data through its lifecycle.

To learn more about the Cloud Data Governance 2.0 working group, please join the LinkedIn group: CSA Cloud Data Governance Working Group or join the mailing list.



Savvy Businesses Leverage Enterprise Cloud PaaS Arrow to Content

June 3, 2015 | Leave a Comment

By Rajesh Raman, Vice President/Zaplet, MetricStream

ra-205x205Imagine a workshop full of tools: hammers, wrenches and screwdrivers. These simple tools can be used on a variety of materials: wood, brick, polymer and so on. But are these basic tools the best and enough for all materials and all projects? No, some projects require more specialized tools.

In the same way, an all-purpose Platform-as-a-Service (PaaS) is fine for building general applications from the ground-up, but specialized areas demand a different and more specialized set of tools. “Enterprise PaaS” are purpose-built platforms for a class of applications, and provide the fundamental functions and intelligent building blocks to meet the needs of that class of applications. Salesforce.com is an example of Enterprise PaaS in the customer relationship management (CRM) space.

There’s a reason companies have begun adopting Enterprise PaaS solutions; it enables rapid development and deployment of domain-specific applications that meet their unique needs and characteristics. In addition, it becomes possible to create a wide range of applications that share data and work and collaborate together in a seamless and more integrated manner than ever before. These applications can be tailored to a specific company’s needs, such as compliance with company-specific policies or unique industry regulations.

Enterprise platforms have matured, bringing a vast amount of specialized and real-world expertise into their particular spaces. For example, in the Governance, Risk, and Compliance (GRC) space, many governance and operational (ex. risk and issue management, audit, etc.) nuances cut across various domains and functions.  A GRC Enterprise platform leverages years of global GRC expertise and provides an established set of core functional and data objects, database schemas, forms and workflows that become the basic building blocks on which new applications can be developed.

Light-bulb moment


(Image Source: Shutterstock)

When it comes to Governance, Risk, and Compliance, there is no one-size-fits-all approach. For example, mid-tier banks face challenges in risk management, similar to what the big banks face, but there are subtle variations. Companies of all sizes and industries are increasingly leveraging applications that are built on top of a flexible GRC platform. This approach helps address the unique requirements of mid-tier banks with very targeted applications. For example, a mid-tier bank using a GRC platform-enabled Risk Management App can easily extend and integrate that application with others for audit, policy management, and third-party vendor management, especially as the company’s need and requirements evolve.

Another example is a company who has leveraged a GRC platform approach for incident management. Their “light-bulb moment” occurred when they realized it made more sense to do this from a mobile phone. Their Mobile Incident Management app leverages the sophisticated capabilities of the enterprise GRC platform, that can be accessed seamlessly and in real-time over the interface of a mobile phone.

The real benefit of an Enterprise GRC platform is that the new leverages the old. A platform approach provides a way to cross-leverage intelligence across applications, and also offers a more integrated and unified end-to-end view. This robust and highly flexible model has proven to offer a clear value proposition to the market.

Enterprise platforms also open up opportunities for partners who want to leverage their expertise in some area, and monetize it. For example, a company may be considered experts in energy regulations (e.g. NERC/CIP), but simply cannot deliver their expertise to everyone on a one-on-one basis. They need a platform to build a custom application for this market that can be scaled and delivered to a larger customer base. In this case, the company built its own application on top of the GRC platform that they can sell to their customers. This has become a great way for organizations to build and sell apps, provide the market with real value and also provide the organization with a new revenue stream.

As I mentioned above, Salesforce.com is a cloud-based platform-as-a-service in the CRM space. MetricStream’s Zaplet is similar for the GRC space. Zaplet allows partners and customers of MetricStream to build their own targeted GRC applications, either by extending core functions or adding specialized content, thus creating a thriving ecosystem of hundreds of thousands of business applications.

Zaplet PaaS provides rich development tools, such that a user rarely needs to write additional code. The company can say: “we want to use this data object,” or “we want to extend that attribute,” and then they can build a workflow, create a custom form, and as simple as that, they have a new application that can help them successfully solve their specific GRC problem.

The challenges for Enterprise PaaS are similar to those for general-purpose PaaS, namely: scalability, security and availability. For this reason, enterprise platform providers need to have excellent data centres, which have sophisticated access control and security architecture; expert ways of securing data; and proper segregation of multiple customers’ data.

Another challenge for enterprise platforms is how to make the development tool rich enough, with everything that business users will need—and yet make it simple, intuitive and easy to use, such that no programming training is required.

A GRC platform approach is viewed as the solution, making available all of building blocks needed for GRC application development: compliance, risk, audit, issue management, third-party management, reporting, dashboard, workflows, data functional objects and more.

This post originally appeared on CloudTweaks.

CipherCloud Risk Lab Details Logjam TLS Vulnerability and Other Diffie-Hellman Weakness Arrow to Content

June 1, 2015 | Leave a Comment

CipherCloud Lab notifies customers that 1006 cloud applications are vulnerable to logjam and other DH weaknesses, 181 cloud applications move from a low/medium risk score to high risk category, 946 cloud applications risk scores increase.


By David Berman, Director of Cloud Visibility and Security Solutions, CipherCloud

CipherCloud Risk Intelligence Lab™ has performed a detailed analysis of thousand of cloud applications and today has pushed new intelligence to hundreds of customers with access to cloud risk scoring via the company’s CloudSource™ Knowledge Base.

The logjam vulnerability made public this week affects the Transport Layer Security protocol used to encrypt traffic between client devices and web, VPN and email servers used by cloud providers and enterprises. The vulnerability allows an attacker to lower the strength of encryption enabling sending and receiving streams of communication to be more easily cracked. Academics showed that via the vulnerability a secure Diffie-Hellman 2048-bit algorithm can be downgraded by automated exploits to a lower level of encryption. The attack does not rely on social engineering like getting users to click on a link in an email. In previous attacks, an element of social engineering was required.

The exploit can be accomplished when the attacker and the user are on the same network – a common scenario when users access cloud applications or corporate networks over public WiFi.

CipherCloud researchers have found 181 cloud applications that can be exploited by public techniques used by any hacker and nation states or other actors with sufficient computing power can theoretically attack 825 cloud applications.

In addition, CipherCloud researchers detailed that many applications are vulnerable to cross-domain attacks when the logjam vulnerability is found on the web site landing domain even when the site’s login domain is not vulnerable. Post login, users that return to the vulnerable landing domain can have their session encryption automatically downgraded by an attacker if that domain presents the export-grade Diffie-Hellman cipher suite.

The attacks are serious, a special concern is if a credential is stolen, it may be used for Single Sign-on to multiple applications or reused in other cloud applications (studies have found that users reuse passwords between sites 30 – 40% of the time).

Detailed steps to remediate the vulnerability can be found at https://weakdh.org.

CipherCloud Lab will provide further updates as providers address the vulnerability.

 Summary of Findings

  • 1006 cloud applications discovered with logjam vulnerability and other DH weaknesses
  • 181 cloud applications can be exploited by normal attacker (computing power available to anyone)
  • 825 cloud applications can theoretically be exploited by nation states or attackers with required computing power (capability to break encryption beyond 512-bits)

181 Cloud Applications with Logjam Vulnerability by Category



825 Cloud Applications with DH Weakness by Category


CSA Establishes Quantum-Safe Security Working Group and Releases What is Quantum-Safe Security Position Paper Arrow to Content

May 28, 2015 | Leave a Comment

By Frank Guanco, Research Analyst, CSA

Consider this scenario: A CIO at a Fortune 500 company receives a call from a reporter asking how the company is responding to the announcement of the new commercially available quantum computer that can “break” RSA and Elliptic Curve Cryptography (ECC). This CIO has no plan, so he politely offers a “no comment” to the reporter.  He then calls an emergency meeting with his executive team to figure out what can and should be done to protect the company’s data residing in the cloud.

While this story is fictional today, it could become a reality in the not-too-distant future.  The Quantum-Safe Security Working Group (QSSWG), formed within the Cloud Security Alliance to help promote the adoption of technologies to protect data in the cloud even after quantum computing becomes readily available, recently released a position paper titled ‘What is Quantum-Safe Security?’ The document examines the need for a proactive defense against a multi-purpose quantum computer that should be available by 2030 and able to crack RSA and ECC encryption algorithms.

2030 is still so far away – why should we worry now?  In 1977 when the RSA algorithm was originally introduced, it was estimated that it would take 40 quadrillion years to decrypt an RSA-129 (a variant of RSA) encrypted message.  RSA-129 was cracked in 1994, less than 20 years later.  While most of the encryptions used now are safe, quantum computers will drastically change everything, as they will be able to rapidly factor RSA keys of any length.

There are currently two technologies under development that intend to address the looming threat of quantum computers: Post-Quantum Algorithms (PQAs) and Quantum Key Distribution (QKD).  PQAs consist of a number of new algorithms that are designed keeping in mind the known capabilities of quantum computers. QKD is physics based and allows keys to be exchanged between two different locations by using the quantum properties of photons. If an adversary attempt to intercept the key exchange is detected, changes in the measured quantum properties are made.

For now, the QSSWG recommends using both PQA and QKD, in an integrated solution, to guarantee that encrypted data in the cloud is safe against quantum computers. For more information, please refer to the full paper, ‘What is Quantum-Safe Security?




Who’s backing up BYOD data? One more reason for cloud disaster recovery Arrow to Content

May 28, 2015 | Leave a Comment

By Susan Richardson, Manager/Content Strategy, Code42

liferingIf you’re among the 60% of organizations that don’t have a disaster recovery plan, or among the 59% that only back up data in one location, here are 5 good reasons to shore up your plan and include the cloud as one of your endpoint backup solutions:

  1. There’s no shortage of incidents that can cause an IT disaster, and most are on the rise: Environmental super storms like Katrina in the United States and Niklas in Europe will likely increase with global warming. Acts of terrorism fill news reports. And the cybersecurity industry’s predictions for 2015 don’t look good, either.
  2. You will likely have a disruption in the next 24 months.Almost 70% of worldwide IT practitioners polled in The IBM Global Study on the Economic Impact of IT Risk said their organizations would likely have a minor disruption within two years and 23% said it would be a substantial disruption.
  3. The disruption will cost a lot and damage your reputation. The IBM study found the average total cost of an IT disruption to operations was between $1 million and $14 million, depending on the severity. Broken down, it comes to $32,000 – $53,000 for each minute of disruption — in idle user time, forensics and technical support. Then add another $20,000 to $5 million in reputation–related costs.
  4. BYOD is increasing, but most employees assume the company is backing up their devices. More than half of employees who use their own devices assume their companies back up their most important files, whether or not it’s true, according to a Forrester study commissioned by Code42. Employees do back up their devices, unfortunately not the way you want. According to the Forrester survey, 67% of employees back up to their own USB flash drive, CD/DVD, external hard drive or server. So much for universal access. Not surprisingly, the study found that the top two reasons for adopting an endpoint backup solution were to improve business continuity and to protect the critical data employees are storing on various endpoints.
  5. Physical backup sites may not be accessible. If you syndicate seats at a backup site, over-subscription can be an issue, as it was for some East Coast companies during Hurricane Sandy. Even if you own your own backup site, it may be wiped out or employees won’t be able to get to it.

Cloud-based disaster recovery has gained traction over the years because of its distinct advantages, some of which were highlighted in a 2014 global Forrester study:

  • Self-service restoration for employees
  • Multi-site availability
  • More frequent backups
  • Improved recovery time objectives (RTOs) and recovery point objectives (RPOs)
  • Cost savings on both storage and administration
  • The ability to improve continuity using Opex vs. Capex dollars

To learn more about self-service data recovery, register for the Code42 on-demand webinar: “Productive Amid Disaster: Enabling the Business for Secure, Self-Service Data Recovery.”

Healthcare Duped By “Spellcheck” Phishing Attack Again? Arrow to Content

May 25, 2015 | Leave a Comment

By Chris Hines, Product Marketing Manager, Bitglass

“Fool me once, shame on you. Full me twice, shame on me” – Anonymous

caref1rst_attackThis idiom has rung true in one of our world’s largest industries, healthcare. CareFirst Blue Shield made an announcement Wednesday May 20th, admitting that it had been the victim of a major data breach that compromised the records of 1.1 million customers. There is a very good chance that the same methods used in the Anthem and Premera breached were used again in this latest major breach.

CareFirst announced that the cyber criminals were able to gain access (and most likely steal) names, email addresses, birthdays and ID numbers. Luckily no SSN or credit card numbers were stored within the hacked database.

Although it has not been confirmed, the same state-sponsored cyber criminals from China that carried about both the Anthem and Premera breach, may be the same that has left CareFirst the latest smeared healthcare organization.

But why is this happening so much?
It’s important to realize that cyber criminals are tactical. They are in most cases driven by the pursuit of financial gain. To them, healthcare data is the new data gold mine. In the past, much emphasis was placed on stealing credit card numbers. Today, the cyber criminal climate has changed. Medical data, which is now worth 50x more money on the black market than credit card data, is what criminals now have their cross hairs on, as it has the chance to turn into a major pay day in a black market bitcoin sale.

Meet the “Spellcheck” Phishing attack
So far, what we at Bitglass call the “Spellcheck” phishing attack, has resulted in two epic healthcare breaches thus far. The Anthem (largest breach in history) and the Premera healthcare breaches that together resulted in the loss of over 100 million sensitive customer records. The news of this new CareFirst breach may be the third in this trend of serial healthcare cyber attacks.

Here’s a break down of what we have seen so far:

On Feb 5th we learned that Anthem had been the victim of a healthcare breach. It was later determined that Anthem employees were fooled by an advanced phishing attack, and wound up delvering their personal access credentials directly to a cyber criminal owned subdomain site “we11point.com.”

On Feb 27th we learned that Premera had also been the victim of a very similar attack. This time, employees were fooled by a subdomain site with the name “prennera.”

On May 20th we have learned that a new subdomain called “caref1rst.com” has been discovered, leading the world to believe that these breaches may be connected.

The “Spellcheck” phishing attack may very well be the most advanced spear phishing attack the world has ever seen. Playing off of human error makes preventing breaches/limiting the damage a people problem, just as much as it is a security technology gap. As you can now see by the examples, the cyber criminals use this attack to trick employees into forking up their credentials, and then revert them back to the legitimate site that the healthcare institutions owns. The employee has absolutely no idea about the cyber theft that just transpired.

The subdomains used are all extremely close in spelling to the legitimate healthcare site. “We11point.com” looks very similar to wellpoint.com. “Prennera.com” if read quickly looks almost exactly like “Premera.com. And now “CareF1rst.com” looks like “CareFirst.com.” I mean it even has a “1” in it!

While this attack is certainly not limited to just healthcare organizations, since the value of medical data is so high, healthcare organization should on extreme alert. Teach your employees about the “Spellcheck” phishing attack, and learn from the breaches that have taken place so far.

Good luck. And remember, always check the spelling.

(Download the Healthcare Breach Report)

Governance, Risk, Compliance and Cloud: A Fresh Look at Benefits, Value Proposition Arrow to Content

May 22, 2015 | Leave a Comment

NandaBy Nanda Ramanujam, Director of GRC Solutions/PS-North America, MetricStream

Today’s world is undergoing phenomenal and unprecedented change. From political chaos and economic volatility, to great strides in the fields of science and technology, to an increasingly savvy and global workforce. All of this together is pushing the envelope forward, but also requiring us to take a step back to ask some tough questions about how we as individuals, organizations, governments, and societies will continue to meet the needs and demands of future generations.

In the context of the past, present, and future ahead, this notion of cloud computing becomes all the more interesting, and all the more critical for us to include as a key topic in our strategic planning discussions. In short, cloud computing represents a fundamental shift and change in the way technology is delivered and consumed.

For organizations operating in today’s increasingly global, social, hyper-connected, and technologically advanced world, a reliable and robust cloud computing environment will continue to play an increasingly significant role in both promoting efficiency as well as improving their ability to innovate.

By providing on-demand access to applications and resources anywhere, cloud computing offers significant cost savings, operational scalability, and an accelerated time-to-market. All businesses have to be agile in order to be competitive, able to quickly address and respond to their customers, partners and supplier ecosystems, as well as continuously deliver an even better experience, product, or service.

So, why are organizations so quick to adopt the cloud? A few reasons stand out:

  1. Improves time to market
  2. Offers scale and increases the capacity to meet a growing demand
  3. Simplifies the delivery of applications
  4. Controls and minimizes capital and operating costs
  5. Eliminates cross functional silos
  6. Improves customer satisfaction

Public cloud service adoption has become mainstream in most organizations. Meanwhile, many larger organizations see a private cloud in their future. Choosing whether to invest in building an internal cloud infrastructure, or buy from an existing cloud service provider is an important question that must be addressed, and savvy IT leaders must fast become experts and brokers of such dynamic business technology solutions. Despite this question, the fact remains — opting for cloud solutions, and making the business for doing so, is important.

For organizations evaluating Governance, Risk, and Compliance (GRC) applications, the cloud can provide an organization with significant benefits. Developing a cloud-based GRC program offers many business benefits, such as:

  • Offers unmatched scalability, reliability and flexibility
  • Achieves economies of scale
  • Reduces CAPEX on technology and infrastructure including software licenses
  • Lowers the cost of ownership
  • Requires less or zero maintenance
  • Supports globalization efforts
  • Improves visibility into operations
  • Promotes continuous availability

The adoption of GRC applications and solutions via SaaS continues to rise, and in large part, is driven by the usage and proliferation of devices — such as tablets — within and throughout the organization and extended enterprise.

The cloud enables organizations to develop and run GRC applications with unbounded scalability and ease-of-use, and with rapidly changing and evolving regulations, adopting a cloud strategy makes long-term business sense. Common GRC related activities such as stress testing, inspections, and audits necessitate temporary and periodic increases in the need for collaborative workspace, computing needs, and archiving of business records — and cloud helps to better address these.

However, it is the opportunity for better risk management and the mitigation of business risk which remains one of the primary investment drivers for cloud-based GRC applications. Listed below are some of the applications where the cloud provides better ROI in the world of GRC:

  1. Field Audits
  2. Compliance Monitoring
  3. Supplier Governance and Vendor Management
  4. Policy Management and Training, with a focus on Social Engineering
  5. Incident Management

As cloud computing becomes a strategic way for businesses to cut costs and increase sales, there has been tremendous capital activity in funding cloud based ventures. Estimates posit that the global cloud computing sector will reach revenues of $20 billon by end of year 2016, growing at a pace of over 30 percent yearly. There is an increasing interest and unrivaled commitment from organizations of all sizes to run most of their mission critical apps — including GRC apps — in the cloud.

Cloud computing is a new paradigm in IT, and new advancements in technology and industries continue to take the cloud to the next level. Collaboration and open communication amongst enterprises and cloud vendors can help strengthen an organizations governance, risk management, and compliance programs, improve overall decision making, and drive superior business performance.

Read more.

LogJam Exposed: 575 Cloud Services Potentially Vulnerable to Man-in-the-Middle Attacks Arrow to Content

May 21, 2015 | Leave a Comment

By Sekhar Sarukkai, VP of Engineering, Skyhigh Networks

LogJamLogJam, the latest in a spate of web vulnerabilities, was exposed on Tuesday evening by a team including Mathew Green, assistant research professor at Johns Hopkins University, experts from University of Michigan and the University of Pennsylvania, and researchers from Microsoft Research and INRA, who were part of the team that initially discovered the FREAK vulnerability. The vulnerability, which is derived from an encryption flaw, is closely related to the FREAK vulnerability which was exposed on March 4, 2015.

How does LogJam work?
Specifically, any servers that support export grade DHE cipher suits are vulnerable to LogJam. This is a subset of FREAK, though in FREAK all export grade ciphers were counted against vulnerabilities. Additionally, if the server supports export grade DHE ciphers and uses a key less than 1024-bit, then it is computationally easy to break private keys as DH uses a known set of prime numbers to derive its private key. Web browsers also support 512 bit keys for encryption. If both the browser and server support 512-bit key encryption, a man-in-the-middle can force the browser to use a weak key. Most VPN (IKEv1 support) devices use 1024-bit keys, which can be easily broken by state sponsored resources. According to tests 61% of VPN devices are vulnerable, as opposed to only 8.4% of HTTPS servers.

Further, the researchers that exposed LogJam show that, “the computation against the most common 512-bit prime used for TLS demonstrates that the Logjam attack can be used to downgrade connections to 80% of TLS DHE EXPORT servers. We further estimate that an academic team can break a 768-bit prime and that a nation-state can break a 1024-bit prime. Breaking the single, most common 1024-bit prime used by web servers would allow passive eavesdropping on connections to 18% of the Top 1 Million HTTPS domains. A second prime would allow passive decryption of connections to 66% of VPN servers and 26% of SSH servers.” (https://weakdh.org/)

How widespread is LogJam?
Security researchers have focused on tracking vulnerable websites. The number of vulnerable sites is less than those vulnerable to FREAK upon its publication. This is due to the fact that websites and services that applied the FREAK patch also removed the yet-to-be surfaced LogJam vulnerability. As of Tuesday at 10pm PDT, 3.4% of browser trusted sites were vulnerable to LogJam, as opposed to 36.7% for FREAK on the day of its exposure, and 8.4% of the Alexa’s top 1M were vulnerable to Logjam, as opposed to 9.7% for FREAK on the day of its exposure. (Note – this website is not vulnerable). For the latest website vulnerability metrics, check https://weakdh.org/.

As a cloud security and enablement company, we’re focused on detailing how this vulnerability affects cloud services and helping enterprises manage their IT security response so they can protect their data and users. We’ll share stats on potentially vulnerable cloud services below and offer steps security teams should take to protect themselves.

How does a LogJam-enabled man-in-the-middle attack work?
The LogJam vulnerability enables man-in-the middle attacks. The attack would occur as follows:

  • In the client’s Hello message, it asks for a standard ‘DH’ ciphersuite.
  • The MITM attacker changes this message to ask for ‘export DH’.
  • The server responds with a 512-bit export DH key, signed with its long-term key.
  • The client accepts this weak key due to the OpenSSL/Secure Transport bug.
  • The attacker factors the DH modulus to recover the corresponding DH decryption key.
  • When the client encrypts the ‘pre-master secret’ to the server, the attacker can now decrypt it to recover the TLS ‘master secret’.
  • From here on out, the attacker sees plain text and can inject anything it wants.

575 cloud services potentially vulnerable to LogJam
Skyhigh’s Service Intelligence Team monitors security breaches and vulnerabilities,including the LogJam vulnerability, across thousands of cloud providers. Six hours after the vulnerability was officially publicized, 575 cloud providers remain potentially vulnerable.

With the average company using 923 cloud services, the chances that an organization uses one or more vulnerable services is high. Across the 400+ enterprises using Skyhigh, 99% are using at least one cloud service that is potentially vulnerable, and the average enterprise uses 71 vulnerable services. We will continue to track these vulnerable services and work with customers to diagnose and remediate their vulnerabilities.

Eliminating the LogJam vulnerability for cloud services
To patch the vulnerability, cloud providers should disable support for export suites, deploy elliptic-curve Diffie Hellman, and generate a strong, unique Diffie Hellman Group. For specific details, visit: https://weakdh.org/sysadmin.html.

Protecting your company from LogJam
Organization must determine and contain both their client-side and service-side exposure. Skyhigh is contacting each of the cloud providers affected to ensure they are aware of their vulnerability and perform the required steps towards remediation. We‘re also informing our customers who use potentially vulnerable services.  Here are 5 steps to protect your company from LogJam:

  1. Contain your client-side exposure: Require that employees use only browser versions that are not vulnerable (i.e. patched versions of Chrome, Firefox, IE).
  2. Determine your service-side exposure: Skyhigh informs customers of the potentially vulnerable cloud services in use at their organization. If you’d like to look up an individual service to see if it’s vulnerable, visit: https://tools.keycdn.com/freak (If they have applied the FREAK patch, the service has eliminated the LogJam Vulnerability, as well).
  3. Validate your proxy configurations: If your enterprise uses a MITM proxy (like a web proxy) ensure that the configurations are properly set so it does not degrade.
  4. Ensure any OpenSSL use within the enterprise is updated: If not careful, external facing sites may be fixed first while internal sites/development environments are never fixed. Ensure that you don’t neglect internal deployments as well.
  5. Update your VPN Server: VPN servers that support IKEv1 protocol for encryption should be updated to disable any keysize less than 1024 bits – or better yet, use elliptical curve keys. Organizations should also consider using SSL VPN technology, which is better supported as its underlying OpenSSL is updated regularly against various encryption protocol vulnerabilities.

Lifehack: 4 Things to Stop Doing When It Comes to O365 Security Arrow to Content

May 20, 2015 | Leave a Comment

By Chris Hines, Product Marketing Manager, Bitglass

I’m sure you have read a million blogs about what you should be doing when it comes to achieving security for cloud applications like Office 365. I know because admittedly I have written some of them myself. But an idea came to me yesterday as I was training my 7-month-old puppy, Odin, on what NOT to do. He has the tendency to bark at other dogs and becomes extra alert at the sight of strangers. Naturally, I can’t have that taking place. The training is still a WIP…

Now securing Office 365 is not the same as training a puppy, but as IT security professionals, I think we can all benefit from a lesson on what NOT to do when it comes to securing one of the most popular cloud-based productivity suites (O365 is slated to outpace Google Apps 29% to 13% in future years.). This reverse approach should make it easier for folks to eliminate the bad, shining some much needed light on some of the mistakes you might be making in your enterprise.

So here is the O365 security lifehack.

1. Stop ignoring the need for SSO and Multi-Factor Authentication.

Single-sign-on plays a crucial role in reducing the attack surface that criminals can use to access your sensitive data. By centralizing access to Office 365 and other cloud apps, you can get hold of unused accounts, identity sprawl, and weak passwords.

– Multi-factor authentication is a quick win for added security, making it tougher for cyber criminals to be successful in nabbing employee credentials and stealing sensitive data.

2. Stop viewing mobile security as a separate issue.

– Cloud apps have made it easy for any device, located anywhere, to access company data, leading to a proliferation of “cloud” data to “mobile” devices. Cloud security and mobile security must be part of the same conversation.

Controlling data accessibility from unmanaged mobile devices, and revoking data when required, such as when an employee leaves the company or when the device is lost or stolen, is key.

3. Stop being unaware of suspicious activity.

– Many companies make the mistake of thinking that O365 has enough security, out of the box cloud. But Office 365 does not provide visibility or audit logging for employee activity taking place within the application, making it impossible to tell that the sales rep that just left the company lifted next quarter’s financial projections out of OneDrive on his last day.

4. Stop the leakage!

– JP Morgan, Sony, Anthem and HSBC serve as nasty reminders of the damage leaked data can cause. Office 365 offers some fairly limited DLP, but this only works for data sent between senders and email recipients already within O365. Classifying data and setting policies that secure your data, but don’t inhibit the productivity of your work for is a must have.

If your enterprise is struggling with any of these 4 topics then it’s your mission to make sure your CIO, CSO, CISO, CTO, or whomever has the decision making power, is aware.

Balancing IT Risk and Opportunity Arrow to Content

May 13, 2015 | Leave a Comment

By David Williamson, CISSP, CGEIT, CRISC, Vice President – Professional Services, MetricStream

davidwilliamsonFor business managers, moving portions of our company’s most valued information assets into the public cloud, while compelling economically, raises a thicket of difficult risk and compliance questions.

  • From a business perspective, considering reputational and other risks, do the economic advantages outweigh the risks?
  • Can anybody in my company really answer:  if we move these processes and data into the cloud, will we still be fully compliant with all of the necessary “legs and regs” we must comply with?  How do we really prove that?
  • Frankly, our IT partners are hardly impartial in the decision; we’re allocating our IT shop’s funds to buy cloud services.  Are their security concerns perhaps a little overblown?

To answer these questions, risk and other professionals need to perform the business equivalent of alchemy:  transforming security “bits and bytes” into business data we can understand and operate upon.  This is where a good GRC framework can be pure gold.

An integrated GRC framework will allow you to understand how security threats and vulnerabilities affect the systems that support your core business processes.

Security “sensors” which detect malicious behavior in the networks, or the existence of threats and vulnerabilities, can be viewed through a risk and compliance lens.  Different types of IT risks can be assessed for probability and impact, mitigated, transferred, or accepted, and the residual risk impact compared against the economic consequences of other risk types.

It’s just a simple fact that there will always be some degree of risk in systems.  The Executive Suite craves objective data about how these risks, including the risks of non-compliance with key regulatory requirements, compare against other risks to the enterprise.  An integrated GRC framework can allow executives to meaningfully weigh IT risks and opportunities against other corporate risk and opportunities, and make informed decisions about where to invest scarce corporate assets.

Page Dividing Line