Back in the day when the enterprise security model was a hardened perimeter protecting the internal “trusted” network, security vendors seized on the notion that businesses need protection from their employees – the insider threat.
Studies were commissioned to show how much malicious insiders were costing businesses. More recent studies indicate that outsiders carry out the majority of data breaches. So, what to do? Protect against insider threats or outside attacks? The answer is it doesn’t matter, because both forms of attack are carried out in pretty much the same way.
The standard attack MO is the abuse of elevated privileges to gain access to and then steal high-value information. The insider may already have those privileges. The outsider has to obtain them first. From that point on, the outsider is, effectively, an insider.
Conceptually, it is straightforward enough to defend against this by taking the following steps:
This all sounds good on paper, but, unfortunately, attacks are not carried out on paper. They happen in very real, very serious business situations. Protect your organization by following these steps and working with experienced people and vendors with strong domain expertise to put together a well-integrated security infrastructure.
About the author: Jonathan Lewis serves as director of product marketing at SSH Communications (News - Alert) Security where he is focused on raising industry awareness of risk and compliance issues of unmanaged Secure Shell identities. Jonathan has over 15 years of experience in the IT security industry, having held product management and product marketing positions at Nortel (News - Alert), Arbor Networks, Compaq and Digital Equipment Corporation. He has led the launch of numerous security products including IPsec and SSL VPNs, end point security products and firewalls. Jonathan holds a BS and MS from McGill University as well as an MBA from Bentley University.