Put your politics aside and protect your network

The issue was not political, at least not in my mind. It was all about security. In the national hoopla over whether a foreign government or those under its control should run operations at major U.S. ports, I heard lots of misplaced xenophobia. I wanted to understand the security implications as they might apply to networks in a similar situation, and that took me back to 1999.

At a classified counterterrorism briefing, speaking to a room full of Pentagon brass, I opened with, “Generals, you have lost command authority of your armies.” I described the implications of the military using foreign nationals to operate unclassified aspects of their global networks. The idea had been that using local individuals in overseas bases was good politics, and because the networks and information were all unclassified, what’s the harm?

The first harm is that unclassified networks that supply meals and travel orders, for example, support military readiness. That is why U-boats targeted the shipping lanes during the Battle of the Atlantic. A severe compromise of a portion of our unclassified networks could be just as devastating as a breach of classified security. The Pentagon got the message and the policy was changed quickly.

The second harm is that if you take a bunch of unclassified data and piece it together in the right way, like a jigsaw puzzle, the resulting information could be immensely valuable to a potential adversary. This is why so many organizations are sensitive to dumpster diving and other techniques that can divulge seemingly innocuous information to the public domain.

The question is, how much of your infrastructure operations and security-relevant processes do you want to outsource? While thinking about the United Arab Emirates/Dubai national security parallel and the natural follow-up — “Is our network protection any less important?” — these questions come to mind:

• Do you want to outsource any critical IT operations? If so, how do you make the distinction between mission-critical and non-critical day-to-day operations?

• If you outsource, how quickly can you bring full operations back to an internal function?

• How much of your security do you want to outsource? For example, is perimeter access-control administration better done internally or handed over to outsiders? How many layers of security administration do you have and do you want, and where are they located physically?

• How much of your physical access control, administration of badges and ID tokens, and border security of your facilities do you feel comfortable outsourcing?

• If you choose to outsource, how do you find a partner you can trust? How do you know it is reputable? Does its nationality, political stance or religious affiliation make a difference? Does the physical location of the IT resources matter to you?

• If you choose to outsource, how can you oversee the quality and trustworthiness of those hired to manage your security-relevant assets? A background check can determine only if someone has already been caught. If you outsource to a non-U.S. company, does that make employee oversight more difficult?

Statistics show 70 per cent to 80 per cent of cybercrime involves a trusted insider. Many of our controls do not address insider issues adequately, for reasons ranging from cost to expeditiousness to political correctness. This makes the question of handing over control of aspects of our networks to third parties even more important.

In the debate about the ports issue, not enough people reduced the question to its basics: How does this or any other action affect national or network security? Let’s look at the details of what outsourcing really means. Let’s manage our organizations with security, not irrational fear, as the prime motivation behind our questions and answers.

QuickLink: 062788

Schwartau is a security writer, lecturer and president of Interpact, a security awareness consulting firm. He can be reached at[email protected].

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now