It only takes one employee f-ing up and opening them to breach the network. 100% security is impossible. It's like ants in your condo/hdb. You can keep cleaning and spraying, patching holes, etc, but given time they'll find another way in.x9200 wrote: I just don't get how something like this is possible. The banking staff just can open some attachments on their PCs that are connected to internal, supposedly secured network, nobody verifies on system level the attachments or what?
So do you propose air-gapped networks? Two (or more) computers on everyone's desk that have no ability to communicate with each other? What if you need to email some figures or a screen shot from a "secure" system to someone else? How do you get the data over? Security is a balance with usability. You can't make something so secure that it isn't usable, because then your "security" ends up costing your business more money than any potential breach.x9200 wrote:Yep, no doubts but this is the whole point – such obvious human errors should be addressed. Why do they need to open (Internet) emails on the machines within the secure internal network? I am not a banking IT security specialist but it seems to me like some serious security architecture flaw.
1. The only direct Internet access to the intranet should be low privilege, individual client based
2. Any machines on the intranet (including inter-division secure vpn and alike) should not be able to receive external emails or, less secure, all the emails originated from outside the bank networks and containing attachments should be rejected.
We are talking about the human error so probably even a VM based solution on a single physical machine would be much safer than co-sharing mail clients. It is clearly about lots of $$$$ so even air-gapped networks could IMHO be a possibility.zzm9980 wrote:So do you propose air-gapped networks? Two (or more) computers on everyone's desk that have no ability to communicate with each other?
One way only access (de facto or even true)? You can send but not receive. Still much safer to what apparently is today and causing minor inconveniences only.zzm9980 wrote:What if you need to email some figures or a screen shot from a "secure" system to someone else? How do you get the data over?
I am aware of this but it looks like it was as much secure as an average office around and clearly it cost the banks lot of money. IMHO if you have this sort of facility security should come slightly before the usability.zzm9980 wrote:Security is a balance with usability. You can't make something so secure that it isn't usable, because then your "security" ends up costing your business more money than any potential breach.
See, you're trying to solve human error in opening an attachment they shouldn't by instituting a complex (for most average bank employees at least) solution involving VMs?x9200 wrote:We are talking about the human error so probably even a VM based solution on a single physical machine would be much safer than co-sharing mail clients. It is clearly about lots of $$$$ so even air-gapped networks could IMHO be a possibility.zzm9980 wrote:So do you propose air-gapped networks? Two (or more) computers on everyone's desk that have no ability to communicate with each other?
Anyway, in the discussed case it was enough to reject e-mails not originated from the bank's networks and containing attachment or even to scan such attachments not allowing any executable parts. This could be done for peanuts.
This is done now normally with network services that pull into more sensitive zones (as oppose to allowing data to be pushed), firewall policies, etc., but isn't a real solution. It's just a minor mitigation.x9200 wrote:One way only access (de facto or even true)? You can send but not receive. Still much safer to what apparently is today and causing minor inconveniences only.zzm9980 wrote:What if you need to email some figures or a screen shot from a "secure" system to someone else? How do you get the data over?
Yes they will, and it will be expensive for the bank (or their insurance) that it happened to. But the thousands of banks that aren't affected? They'll continue to skate by and not pay for the upgrades.x9200 wrote:I am aware of this but it looks like it was as much secure as an average office around and clearly it cost the banks lot of money. IMHO if you have this sort of facility security should come slightly before the usability.zzm9980 wrote:Security is a balance with usability. You can't make something so secure that it isn't usable, because then your "security" ends up costing your business more money than any potential breach.
Somebody wanted to have it cheap and with the full usability and now they pay and will pay the price. No wonder no bank officially admits to what happened.
A competent IT group should be able to quarantine attachments and release them to the addressee when requested (and after scanning). As in this case, banks must follow this kind of discipline.zzm9980 wrote:See, you're trying to solve human error in opening an attachment they shouldn't by instituting a complex (for most average bank employees at least) solution involving VMs?x9200 wrote: We are talking about the human error so probably even a VM based solution on a single physical machine would be much safer than co-sharing mail clients. It is clearly about lots of $$$$ so even air-gapped networks could IMHO be a possibility.
Anyway, in the discussed case it was enough to reject e-mails not originated from the bank's networks and containing attachment or even to scan such attachments not allowing any executable parts. This could be done for peanuts.
You can't reject external emails as banks deal with businesses, customers, and partners, and guess what - they email each other. And sometimes, details of those emails (statements, applications, orders, etc) will need to be entered into a transactional system to update account details and such. You can't tell people to manually transcribe those details over between VMs/air-gapped systems/whatever.
maneo wrote: A competent IT group should be able to quarantine attachments and release them to the addressee when requested (and after scanning). As in this case, banks must follow this kind of discipline.
No offense, but you speak as either an academic or "CSO Magazine"-reading white-shirt that has no practical experience engineering or deploying the solutions you're espousing. Solutions like this are *hard* to do right, and never full-proof. None of us have anyway of knowing if these banks actually did have a product in place (FireEye, PAN, etc) which does claim to do this and it was just missed.x9200 wrote:I think zzm plays a bit the devil's advocate. He is perfectly aware that all these (VM or other solution) can be easily implemented to be completely transparent with the same or lower complexity to what is probably in the banks today.
Reminds me of the time I was doing pre-sales for an EAL4 firewallzzm9980 wrote: Correction, A competent IT group could be able to install a solution which markets itself as able to quarantine attachments, but they seldom function as advertised. The IT Security industry is loaded with more snakeoil than most other tech areas. These solution generally don't work as advertised, and you're lucky when they catch known trojans or viruses. They're almost always useless for any new unknown (zero-day) threat. And these are quite common now, especially when a lot of money is the potential prize.
.
My reply was not based on a hypothetical situation, but rather actual practice of high-tech companies that did this.zzm9980 wrote:Correction, A competent IT group could be able to install a solution which markets itself as able to quarantine attachments, but they seldom function as advertised. The IT Security industry is loaded with more snakeoil than most other tech areas. These solution generally don't work as advertised, and you're lucky when they catch known trojans or viruses. They're almost always useless for any new unknown (zero-day) threat. And these are quite common now, especially when a lot of money is the potential prize.maneo wrote: A competent IT group should be able to quarantine attachments and release them to the addressee when requested (and after scanning). As in this case, banks must follow this kind of discipline.
Yes, you're right on this. Unfortunately this doesn't happen in reality.x9200 wrote:This is what I see as a fundamental flaw in the security architecture. If the solution (whatever it would be) was a part of the basic product development it would have cost peanuts and be a part of all the testing scrutiny and foolproof making along with all the other components of the system, or not?
All of my replies are based on my career and work experience, being focused on exactly this subject matter.maneo wrote: My reply was not based on a hypothetical situation, but rather actual practice of high-tech companies that did this.
From what I could tell, they did not rely only on attachment scanning, but seemed to err on the side of stopping almost all attachments and forcing recipients to request specific attachments when needed.
It was a tough protocol, but the alternative of letting viruses through was unacceptable.
Would think that banks should have this same kind of mindset.
Users browsing this forum: No registered users and 5 guests