{"id":250,"date":"2017-05-31T16:07:28","date_gmt":"2017-05-31T16:07:28","guid":{"rendered":"http:\/\/securitycurve.com\/?p=250"},"modified":"2017-05-31T16:07:28","modified_gmt":"2017-05-31T16:07:28","slug":"if-youre-gonna-fad-at-least-learn-something","status":"publish","type":"post","link":"https:\/\/securitycurve.com\/?p=250","title":{"rendered":"If you&#8217;re gonna fad, at least learn something."},"content":{"rendered":"<p><a href=\"https:\/\/securitycurve.com\/wp-content\/uploads\/2017\/05\/538e05182ffb5118d08fe48c55362d2b.jpg\"><img decoding=\"async\" class=\"alignright size-full wp-image-251 lazyload\" data-src=\"https:\/\/securitycurve.com\/wp-content\/uploads\/2017\/05\/538e05182ffb5118d08fe48c55362d2b.jpg\" alt=\"\" width=\"236\" height=\"236\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 236px; --smush-placeholder-aspect-ratio: 236\/236;\" \/><\/a>Have you ever noticed that security is an industry driven in large parts by fads?<\/p>\n<p>It&#8217;s true. \u00a0There are a few different types of fads out there. \u00a0First, there are technology fads. \u00a0If you&#8217;ve been in\u00a0the industry for a while, you probably remember at least a few of them. \u00a0Remember the HIPS revolution? For a while there, everybody needed a HIPS solution and it was &#8220;be there or be square&#8221; on the HIPS. \u00a0I particularly liked it when people referred to both host based and network based IPS together (HIPS and NIPS)&#8230; \u00a0because that&#8217;s just hilarious. \u00a0Or you maybe remember when anti-spyware was its own product category (totally separate and distinct from AV of course)? \u00a0Or\u00a0when &#8220;heuristic malware detection&#8221; was something everybody needed to have? \u00a0When file integrity monitoring, session authentication state maintenance (i.e. cookies and such), virtual taps, or some other technology &#8220;du jour&#8221; was what everybody <strong>really<\/strong> cared about?<\/p>\n<p>There are also fads that aren&#8217;t about technology but instead target the <em>practice<\/em> of security. \u00a0For example, have you noticed how fired up everyone was about threat intelligence after Lockheed published their <a href=\"https:\/\/www.lockheedmartin.com\/content\/dam\/lockheed\/data\/corporate\/documents\/LM-White-Paper-Intel-Driven-Defense.pdf\">kill chain paper<\/a>? \u00a0For a while there, there were mid-market companies &#8211; hamburger companies, \u00a0hotel chains, staffing services, and restaurants &#8211; investing significantly in sophisticated threat intelligence gathering and analysis capability. \u00a0For reals. \u00a0Another example of this phenomenon would be the <a href=\"https:\/\/na.theiia.org\/standards-guidance\/Public%20Documents\/PP%20The%20Three%20Lines%20of%20Defense%20in%20Effective%20Risk%20Management%20and%20Control.pdf\">three lines of defense<\/a>\u00a0that one encounters more and more often in the wild nowadays. \u00a0[In fairness I should probably note that the original source for that was <a href=\"http:\/\/www.ferma.eu\/app\/uploads\/2014\/10\/ECIIA_FERMA_Brochure_v8.pdf\">FERMA\/ECIIA<\/a>\u00a0guidance and not the IIA position paper that I linked to&#8230; but the IIA does a better job (I think) of explaining the concept &#8211; both motivation for and implications of.]<\/p>\n<p>Anyway, these fads can be useful &#8212; but they can also be dangerous. \u00a0With a technology fad,\u00a0there&#8217;s a defined cycle: some new fad comes along, everybody and their brother jumps on the bandwagon\u00a0until the technology permeates the collective security echo-chamber. \u00a0Then, in relatively short order, it gets sublimated\u00a0&#8212; it gets\u00a0folded into the status quo. \u00a0Don&#8217;t believe it? \u00a0Look at HIPS. \u00a0HIPS is still around &#8211; it&#8217;s just that it&#8217;s not front of mind because it&#8217;s embedded in a number of security products (and operating systems for that matter). \u00a0Anti-spyware same deal. \u00a0It&#8217;s still a &#8220;thing&#8221; &#8212; it&#8217;s just that we don&#8217;t need to run a separate <em>instance\u00a0<\/em>of\u00a0<del>grep<\/del>\u00a0anti-malware to look for spyware\u00a0but can instead do so inside of other software we already have.<\/p>\n<p>The upside is that we&#8217;re cultivating a new capability or a different way of doing something. \u00a0But there&#8217;s a downside too. \u00a0Technology trends for example can\u00a0stifle innovation because 1) everyone wants to view whatever is new through the lens of what&#8217;s &#8220;hot&#8221; and 2) it creates disinformation as marketing teams stretch to claim that their product is the hot new thing. \u00a0Likewise, broader trends like TI and three lines of defense can distract from the fundamentals. \u00a0Does a hamburger company really need a sophisticated threat analysis capability when they can&#8217;t patch or when they give administrator access to the point of sale system to associates at retail locations? \u00a0I&#8217;d argue there&#8217;s a priority issue if they know what Russian attackers are up to but they don&#8217;t know how to monitor their own associates.<\/p>\n<p>So what&#8217;s the point? \u00a0I think it&#8217;s to be critical of fads. \u00a0If there&#8217;s a technology fad that everyone is talking about (cognitive springs to mind right now), it&#8217;s likely to wind up sublimated if you wait a few months. \u00a0So maybe it&#8217;s not the end of the world if you don&#8217;t sweat it too much right now. \u00a0If it&#8217;s a broader fad &#8212; one that asks you to think about security in a different way, that&#8217;s great too, but incorporate the lesson only to the extent it makes sense in your business. \u00a0For example,\u00a0understanding adversary activity as part of a interruptable campaign as kill chain analysis does is awesome &#8212; but understand why you need that and act accordingly. \u00a0Underscoring the value of independent verification as the three lines of defense does is also a really great lesson &#8211;\u00a0but only to the extent that you incorporate it into your goals, your business context, your practice. \u00a0When you&#8217;re just servicing the fad &#8212; doing something because it&#8217;s &#8220;hot&#8221; &#8211; chances are high you&#8217;re missing the point.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever noticed that security is an industry driven in large parts by fads? It&#8217;s true. \u00a0There are a few different types of fads out there. \u00a0First, there are technology fads. \u00a0If you&#8217;ve been in\u00a0the industry for a while, you probably remember at least a few of them. \u00a0Remember the HIPS revolution? For a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[5,54,118],"class_list":["post-250","post","type-post","status-publish","format-standard","hentry","category-security","tag-3-lines-of-defense","tag-fads","tag-threat-intelligence"],"_links":{"self":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=250"}],"version-history":[{"count":0,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/250\/revisions"}],"wp:attachment":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}