For IT security practitioners, hearing about defense in depth can conjure up images of clutter. Here to cut through that clutter, point out the shortcomings and offer a better way is CSO columnist Ariel Silverstone. Defense in Depth is arguably the most time-tested principle in security and applies to the physical security as well as online. It builds on a concept of a hardened “core” where one places their “crown jewels.” This core is then surrounded by castle walls and motes, with ever-increasing generality of defense.MORE FROM ARIEL SILVERSTONE:Where PCI DSS Still Falls Short (and How to Make it Better)Mission Impossible? A Plan to Secure the Federal CyberspaceCloud Security: Danger (and Opportunity) AheadWhat Should WH Cybersecurity Coordinator’s Job Description Look Like? One Man’s ViewIt’s a great concept, but comes at a price. Just as the area covered is wider from layer to layer, so is the cost associated with protecting against more plentiful and less and less specific threats. A firewall typically acts as the last line of defense on the enterprise perimeter but has to protect against a great many varieties of threats, while a server-room door has to “only” be concerned with physical access.Another flaw in the Defense in Depth design is its inherent difficulty to implement vis-à-vis the three basic tenets of security: confidentiality, integrity and availability. Why? Because most forms of defense create increasing confidentiality, but make integrity more difficult to implement and manage. Any increase in defense, of course, makes the concept of availability that much harder to provide to the users. A difficulty that I myself encountered many times is the applicability of Defense in Depth to my “layer 8” problem – the users. If users are not trained properly, if they are not aware of information protection needs, methods, and the “why?” of it, they become a liability, rather than an asset, towards data security. If you are like me, you find the need to increase our moat-to-user-ratio on an ongoing base harder to design, implement, manage, and pay for. Many of us resign ourselves to the proverbial “this is reality” and define our demarcation line as a physical device, such as a router, an access point, a firewall or a webserver. There are potentially two things “wrong” with doing so: We are basically saying “we are a target just waiting to be attacked” and We allow most barbarians (in the form of rogue traffic, networks and devices) to hit our gates If we continue to do so, we will have approached a mathematical certainty of being hacked, or at least DDoS’ed out of the Net. I really prefer NOT to draw analogies here to the real world, and we all know which those are. Not only is the problem above big enough to cause some to lose sleep, but imagine what happens when we move to a cloud topology… there we have nothing but moats and walls and front doors. These front doors can be any browser, on any device, anywhere in the world. How do you protect yourself against that? Speaking of losing sleep – I love coffee, but this is ridiculous.Like any solution that might involve our entire user set, which may include Internet users, rather than pure corporate users, any solution must be: Easy to teach (i.e. close-to-zero learning curve) Easy to implement Applicable to the widest range of platforms possible Have a small delivery and storage footprint Easy to manage and maintain Not asking for much, am I? Knowing how rapidly threats involve “in the wild”, I also want a tool that does not go the normal route of “black listing”. I am more and more convinced that we need tools, in our world of security, that no longer compare bad signatures or behavior to a database (which is how most antivirus and firewalls, for example, act) and we need to go the “white-list” route. I will write about that in the future. Yes, I want a tool that will be controlled by me and allow me to choose which domains can be accessed, and under what (time or other) conditions can such an access occur. Let’s add those to my “dream list”: White list based Conditional access To make matters even more interesting, I want control over certain user functions. (We want, after all, to reduce the number of barbarians and the number of roads leading to our castle, don’t we?) We want to make sure that the people that request a resource are authorized to even request it.For example, I would like some files to be able to be read and written, but not printed. Or that I be able to control launching certain tools, such as IM or browsers from within the session. And finally (?) I want a bullet proof audit trail. Why? SoX, GLBA and HIPAA, to name but a few. Selective access to file functions Audit trail What should we do?Until now, I did not see any solution to this quandary. Other than awareness and training, there was not a whole lot that could be done. Even MSSPs would tell you – they are there for a reason, which is “people will attack you”.Thanks to my friend Andreas Wuchner, the CISO of Novartis, I ran (head first, mind you!) into a newly launched company called Quaresso. Launched by a group of smart people with backgrounds in networking and security, in “Protect OnQ” they created both a new product and a service. Working together, these allow us to do a few things: Firstly, they allow us, the people responsible for the data’s protection, to select who will be allowed to knock on our doors and with what. Simply put, if you so choose, people without the proper tool will not even be allowed access to your castle. “Not allowed on the island”, if you would. And this permission is manageable in real time. Then, you can select not only which browser is allowed to knock at your door, but also to choose what (and what NOT) that browser is allowed to contain: add-ins, plug-ins, encryption settings, printing ability (or not), security zone setting, and the list goes on. This effectively extends the defense-in-depth to the actual browser session!! If this was not enough, you are able to control THE ROUTE that your users take to reach you. While it may seem either unimportant or even impossible, controlling a browser’s allowed connections has the ability to protect against man-in-the-middle attacks, to name just one example. To prevent DNS hijacking and man-in-the-middle attacks, the knowledge and selection of the route is also critical. Zero-day (zero minute, really) malware protection – if it is not known, it does not get transported. Simple and neat! And the final cherry on the icing? Remember all those virii, trojans, key loggers and co.? Due to the implementation of the “armored” browser, data can no longer leak from it to the rest of the operating system. All passwords and personal information typed into a protected browser session remains confidential and un-recordable. I know I will sleep better. I tested the tool in several scenarios. The only drawback seems the need to install another icon on the users’ screen. I particularly loved it when, while running the tool, I had a sniffer on and could sense no data passing from the browser unencrypted. So much for data leakage via this route!So…. Let’s compare this tool to my wish list. Number Wish List Item Protect On-Q Delivers 1 Easy to teach (close-to-zero learning curve) Yes, being browser based and basically requiring a ‘click’ 2 Easy to implement Yes. The user is required to download an add-on or a link to their desktop and allow it to run. The tool does NOT require admin rights on the installing system. For web applications, a simple check-if-present mechanism allows the application to be On-Q aware. 3 Applicable to the widest range of platforms possible Yes. The tool, being browser and Java/ActiveX based, allows implementation on most publicly available browser. And since most ship with any computer nowadays, they are built in. 4 Have a small delivery and storage footprint Yes. The package I tested was less than 450KB in size. 5 Easy to manage and maintain Yes. They offer a partnering console as a tool to monitor/manage/update the remote pieces. 6 White list based Yes.It is not only a design philosophy, but an administrator from The Bank of Atlantis, for example, can allow a specific use-only of that tool, to only selected systems within a selected domain, if he so chooses. Nifty. Imagine allowing remote users ONLY to access a certain system, but not payroll, for example? 7 Conditional access Almost. The domain selectivity is in place and working. The time/location is not yet implemented and may be, depending on industry demand. This variable is relegated to the accessed system for now. 8 Selective access to file functions Yes and by two separate mechanisms: Firstly, the control over which browser add-on is present, allows tools like PDF browsing and key-loggers to be excluded.Secondly, the tool can control file operations of the browser. So, for example, you can choose to provide the ability to remotely (as in on the user’s site) print or not. 9 Audit trail Yes. Extensive auditing is available and, because what I saw was an early product, new reports are being developed continuously. The tool does all of these, while requiring zero learning curve to the users. By allowing the users to use the same browser they are used to and by clicking as they normally would. No new software, no new directions, nothing. We now protect another layer of Defense in Depth and greatly increased our control of who comes knocking at our doors.Try it and let me know what you think. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe