A doctrine designed to keep military secrets safe can be invaluable to your organization. Credit: SolarSeven / Getty Images OPSEC definitionOperations security (OPSEC) is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever adversary, reveal a bigger picture that ought to stay hidden. It’s a discipline of military origins that in the computer age has become vital for government and private organizations alike — and every CSO ought to be thinking about what steps they can take to improve their OPSEC posture.The term operations security was first coined in the U.S. military during the Vietnam War, as a result of an effort led by a team dubbed Purple Dragon. This team noticed that America’s adversaries seemed to be able to anticipate their strategies and tactics. It was known that North Vietnam and the Viet Cong hadn’t managed to decrypt U.S. communications and didn’t have intelligence assets who could gather data from the inside; the conclusion was that U.S. forces themselves were inadvertently revealing vital information to the enemy. Purple Dragon coined the first military opsec definition: “The ability to keep knowledge of our strengths and weaknesses away from hostile forces.”Over time, the concept spread from the military to other U.S. government departments and into private industry, and was developed in more detail. The Department of Energy, which is in charge of the U.S. nuclear arsenal, has its own definition of OPSEC: “Operations security involves a process of determining unclassified or controlled critical information that may be an indicator or pathway to that classified information requiring protection, whether for a limited or prolonged time … the purpose of opsec is to identify, control, and protect sensitive unclassified information about a mission, operation, or activity and to deny or mitigate an adversary’s ability to compromise that mission, operation, or activity.”OPSEC examplesSo far this, is all pretty abstract. Perhaps one of the best ways to understand what OPSEC involves in practice is by looking at some high-profile failures — instances where people were able to piece together public information into a bigger picture that the subject of the information would have wanted to keep secret. We’ll start with a high-profile case of someone who should have known better. In March 2017, when James Comey was still FBI Director, Gizmodo writer Ashley Feinberg was able to track down his Instagram and Twitter accounts using only a few bits of publicly available data, in a tale that offers a master class for following clues on social media. She knew that Comey’s son Brien was an athlete at Kenyon College, and she found a video of him on the Kenyon Athletics Department Instagram account in which someone in the comments had tagged Brien’s own private Instagram. She used a burner account to put in a follow request to Brien, knowing that Instagram reacts to such requests by offering suggested accounts related to the one you just tried to follow. In Feinberg’s case, those included a locked account called “reinholdniebuhr,” named after a theologian that James Comey wrote his senior thesis about; this, she assumed, was Comey’s account. There were only a few Twitter accounts that used variations of “niebuhr” — including one with the handle “@projectexile7,” seemingly named after a gun violence reduction program Comey helped start in the ’90s. @projectexile7 had a single follower, legal blogger Benjamin Wittes, who was Comey’s personal friend. By October it was clear that Feinberg was correct in her IDs.This is a fantastic example of the sort of social medial clues that even security-minded people aren’t aware that they’re leaving behind; and indeed Facebook, and other social media sites can leave trails that are even more damaging than this in military contexts. For instance, despite the official Russian government line that the pro-Russian insurgency in eastern Ukraine is home-grown and not armed by the Russian military, Russian soldiers have repeatedly given themselves away on social media, sometimes accidentally geotagging their Instagram photos to make it clear they’re on the Ukrainian side of the border. In a not dissimilar case, Strava, the manufacturer of a popular fitness tracker that uploads data to the cloud, released a detailed worldwide map of its users’ jogging routes — and, due to the product’s popularity among American soldiers, revealed a number of secret U.S. military bases in the process. OPSEC failures at the corporate level may not put national security at risk, but they are still potentially catastrophic for the companies involved. A number of OPSEC pros shared problems they had seen with the Digital Guardian DataInsider blog. Entrepreneur Shy Bredewold explains how corporate details can leak out: “An overzealous employee tags themselves in a post which reveals a training facility otherwise unknown to the public. A chat with your spouse ends up in a forum saying how their husband is so stressed due to the new insert conceptual product release next month.” Another potential vector is in the humble password: with website password breaches becoming commonplace, many username/password combos are now public knowledge, and hackers are happy to try to match those identities to employers and see if they can find reused passwords they can exploit.What are the 5 steps of opsec?The U.S. military has established a five-step process by which organizations can assess their data and infrastructure and draw up a plan to protect it. The SecurityTrails blog has a particularly readable explanation, but here’s a quick summary: Assess OPSEC critical information. You need to begin by determining what data, if acquired or accessed by an adversary, would cause harm to your organization. This data could range from client information to financial records to intellectual property.Determine types of OPSEC threats. The next question to ask yourself is: Who are our adversaries? These can range from criminal hackers to business competitors. Keep in mind that different enemies might be targeting different data.OPSEC analysis of vulnerabilities. This is a step that should be central to any organization’s security posture: performing a complete security audit to reveal weak points in your infrastructureOPSEC assessment of risk. This step determines your threat levels by determining how any vulnerabilities revealed in step 3 expose critical data identified in step 1 to threat actors identified in step 2. You need to figure out how much damage someone exploiting an external vulnerability could cause, along with how probable such an attack would be.Making an OPSEC plan. With all this information in hand, your next step is to create the plan for locking down your vulnerabilities and keeping your data secure.OPSEC measures and best practicesAgain, that’s all a little abstract. What are specific security measures you can take to implement your OPSEC plan? HackerCombat outlines a number of best practices, including:Implementing change management processingRestricting access to network devices on a “need to know” basisGiving employees minimum necessary access and practicing the principle of least privilegeAutomating tasks to remove human weak linksPlanning for incident response and recoverySecurityTrails breaks down the areas that OPSEC planning should focus on. You’ll, of course, want to be extremely aware of any sensitive personally identifying data, including names, IP addresses, languages, emails, and the like. But you’ll also need to deal with people — specifically, your own people, for whom an OPSEC mindset needs to become second nature. They’ll need to be trained on a number of practices, including encrypting data and devices, monitoring the transfer of data, and limiting access to certain data. They also need to be made aware of all the kinds of blunders we discussed earlier, especially when it comes to social media. “Loose lips sink ships” was a proto-OPSEC slogan for World War II, but it applies to your organization as well (and extends to Facebook posts).Who has oversight of the OPSEC program?The final question you might be contemplating is who, exactly, should be in charge of OPSEC at your organization. The truth is that this is an area that’s still in flux, and often the best candidate will be the person with the most interest and ability within your company, regardless of where they sit on the org chart.The Operations Security Professional’s Association is a nonprofit professional org dedicated to supporting OPSEC pros. Their “What works in OPSEC” series profiles a number of people working in this space, which offers a great opportunity to see the career path many took to get there, as well as the job duties they take on. Some focus their whole energies on OPSEC, while for others it’s just one task out of many on their plates. You need to determine how best to implement opsec concepts in your own organization. More on OPSEC:The advanced security techniques of criminal hackersBad opsec led to the downfall of teenage DDoS-for-hire group leaderHow oversharing information can lead to disaster onlineEx-NSA chief Michael Hayden got schooled on how much eavesdropping stinks Related content news Top cybersecurity product news of the week New product and service announcements from Coro, Descope, Genetec, Varonis, Cloudbrink, Databarracks, and Security Journey By CSO staff Dec 07, 2023 22 mins Generative AI Security news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Cyberattacks Vulnerabilities news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe