2022-10-21

Parking in the cloud

 

Photo by author

It’s there in the distance: the car of the colleague who would take us away. You are looking through a crack in the closed steel gate of the parking garage of the International Criminal Tribunal for the former Yugoslavia in The Hague.

Let’s rewind 14 hours. That's when the two-day ONE Conference started in the World Forum, where nearly two thousand information security professionals from the Netherlands and abroad gathered to catch up on their field of expertise. Our team was also present with a delegation and because we were staying overnight in The Hague, we went to a Chinese restaurant together. After an excellent meal we wanted to take the tram or bus to our hotel, but that one colleague, who lives nearby and was by car, offered to drive us. Arriving at the parking garage (at 10:42 pm) his car seemed impossible to find at first, but after some time searching – and slight doubts about the parking memory of our colleague – we came to that steel gate where we saw it. Unreachable.

The doorman of the associated hotel was kind enough to walk with us. "Ah, I see. You are in the garage of the Tribunal." The garage is used by hotel guests, conference attendees and also by employees of the Tribunal. In the morning, our unfortunate colleague was waved into exactly that part by a traffic controller. The gate in question was then open and there was no indication that this was a special part of the garage. The traffic controller might not have known that the gate would be locked at night, or he might not have expected a conference attendee to pick up his car this late. Via the intercom at the barrier, the doorman contacted the security guard of the Tribunal. His card, with which he could open the gate, was missing. Finally we were able to leave the garage at 11.16 pm. And so by attending an information security conference, you can get caught up in physical security measures. I couldn't have made this up. But I really need to talk about the conference.

The war in Ukraine was a fairly prominent topic there. This is the first real war to be fought not only on land, at sea and in the air, but also in “cyber”, as it is called in military circles. From day one they started to attack each other not only physically but also digitally, and probably earlier as well. One of the speakers, Cristin Flynn Goodwin of Microsoft, told us that a fight against a state actor in your own data center can be compared to a hand-to-hand combat: arduous and bloody. Countries that attack you digitally are preying on the ideas and information governments need to make decisions about important current affairs, Goodwin said. In doing so, they mainly target think tanks, non-governmental organizations (NGOs), diplomats, policy advisors and academics.

Goodwin's point was that as an organization you cannot cope with all that digital violence on your own. It is therefore much better to store your data in the cloud, where you enjoy the protection of a large service provider (where it would have been nicer not just to mention her own company). The idea is that these large cloud suppliers have every conceivable means to optimally protect your crown jewels.

By nature, a country wants to keep its crown jewels close by, on its own territory. Furthermore, the GDPR prescribes that personal data of EU citizens must be stored in Europe (under certain conditions it may also be stored elsewhere). But, Goodwin argued, that's not always wise. She said that Ukraine has stored important parts of its national ICT completely outside its own borders. Other countries should also prepare for such a scenario, and test it. That sounds pretty scary, but I can imagine that it is one less headache for Ukraine. At least, as long as the connections to that distant cloud last.

The Dutch government recently adopted a new policy with regard to the public cloud. It switched from “no, unless” to “yes, provided that”. My biggest concern is the availability of the data. Having your own data center simply gives you a sense of tangibility, of being able to hold onto the data when the going gets tough. But if you think about it, that doesn't make sense. One cruise missile, one ransomware attack and your data is gone. And yet there is an extra dimension to that cloud: what if your country gets into a fight with the country of the cloud supplier?

If your car is parked in your own driveway, you can always reach it. If it is in a parking garage, the manager of that garage will determine whether you can leave. Even external factors can play a role: years ago a Ferris wheel on the Apeldoorn Market Square turned out to be so heavy that the city feared that the parking garage under the square would not be able to bear its weight. People who had parked their cars there could only get back to their cars after the Ferris wheel had been taken down. I see difficult choices coming our way.

 

And in the big bad world…

This section contains a selection of news articles I came across in the past week. Because the original version of this blog post is aimed at readers in the Netherlands, it contains some links to articles in Dutch. Where no language is indicated, the article is in English.

 

 

2022-10-14

The three little pigs

 

Image from Pixabay

Once upon a time there were three little pigs who went out into the wide world and built each their own house. The first piglet got off easy and built a house of straw. The second built a somewhat sturdier wooden house, while the third went to great lengths and built a solid stone house.

You probably know this fairy tale, but for the sake of completeness I will finish it. The big bad wolf wanted a pork chop and blew down the straw house, after which he devoured the resident. After a while he was hungry again and rang the bell at the wooden house. The resident saw through his smart doorbell who was at the door and did not open the door. The wolf took a deep breath and managed to knock down this structure as well. Piglet number two was also eaten all up. And as happens in fairy tales, not long afterwards it was the turn of the third house. The resident, who had already seen the wolf coming through his security cameras, did not open the door, of course. When the wolf realized that he couldn't possibly knock down this sturdy house, he climbed onto the roof and slid down the chimney. However, the piglet was aware of this vulnerability and had taken measures: a pan of boiling water was ready at the bottom of the chimney. Wolf in, lid on, and the piglet lived happily ever after.

The Three Little Pigs is an English fairy tale from the 19th century and has a clear message: if you’ve done the best you could, you will come out stronger. I am always amazed at the atrocities with which fairy tale writers bombarded children in those days, but it must have been the zeitgeist. However, the fairy tale is not only about zeal, but also about threats. “Watch out, children, there are all kinds of dangers lurking in front of you! The better you arm yourself against it, the greater the chance that you will come out of it unscathed.”

I'm a part-time fairy tale teller. Not only every Friday morning, when I write this blog, but sometimes during my other work as well. Like the unknown creator of the above fairy tale, I also point out threats to people and have them implement measures to reduce risks. Usually with business language and a technical slant, but sometimes I allow myself a story to make something clear. One of my favorite stories is that of Joost Tonino , former public prosecutor in Amsterdam. Tonino had put his virus-infected private computer on the street for the refuse collection, but a taxi driver was ahead of the binman and delivered the PC to Peter R. de Vries (a Dutch investigative journalist who was murdered in the streets of Amsterdam last year). It turned out that confidential business data and child pornography were on the pc. End of career as Public Prosecutor. I tell this story when we discuss the careless disposal of data carriers during risk analyses. But also in other situations I like to use an anecdote or metaphor to explain something.

Yesterday I sat down with a department MT to discuss compliance with certain rules. The point was that that department often receives requests from another department to do something that violates the security policy. They then want an exemption to get it done anyway, because otherwise their system cannot function. When we show them how to do it, they sometimes say: “We can't do that on our system!” However, if they take the time to look at it seriously, it turns out it can be done after all, although sometimes some effort is needed. Oh, they're just like kids, who often say that they can't do something, even though they've never tried it. And if, after some encouragement, they turn out to be able to do it, they are very proud of it.

And so information security officers constantly try to influence people's behavior in such a way that they stick to the rules. This is done through the formal route – policy, standards, instructions – but I prefer to focus on awareness. Because if I manage to make you understand why you should or should not do something, if you understand that you or the organization otherwise run risks, then you will be more willing to take the right turn.

We are still in the middle of the European cybersecurity month. So there are still all kinds of activities going on. Take advantage of it and show that you are actively working on your security awareness.

Thanks to Wendie for the inspiration.

 

And in the big bad world…

This section contains a selection of news articles I came across in the past week. Because the original version of this blog post is aimed at readers in the Netherlands, it contains some links to articles in Dutch. Where no language is indicated, the article is in English.

2022-10-07

The history of keys

 

Image from Pixabay

Your bicycle, your car and your house have one thing in common: they have a lock. And all those locks come with keys. Locks have a long history – they are said to have been around for over six thousand years. Over the centuries, all those locks served the same purpose: to let in those who are allowed in, and to keep everyone else out.

There have always been people who still wanted to go somewhere they weren't allowed in. Most shrug and think “too bad,” but some are really trying to get in. We call those people burglars. They have a whole range of options for breaking down the barrier that has been raised, such as lock picking tools (which can be used to fumble with cylinder locks), the Polish key (used by bicycle thieves) and the time-honoured crowbar. It should be noted that the latter is not used to open the lock, but to work around it.

And then the computer was invented. Soon – in 1961 – it was thought that it also needed a lock. I myself have used PCs that had a physical lock, but the password is still the most common mechanism. The password itself was not new; the ancient Romans used it already, and I remember from old wild west movies that anyone who wanted to enter the fortress had to say the password at the gate.

In the good old days we had one password. You could easily remember that, if only because there were no requirements yet that it had to meet. In modern times, we all have dozens of accounts, at work and in our private life, and their passwords have to meet some of the most horrific requirements, which are different everywhere. For example, last night I found out that my bank does require a special character, but that it should not be a circumflex accent (^). And while I can think of a reason for that, I immediately wonder why using this character is fine elsewhere.

I've written it before: passwords have had their day. Not only because we are tired of it, but mainly because they lose their security value. I'd venture to say that anyone who doesn't use a password manager either writes down their passwords somewhere or uses weak passwords (which includes using the same password in several places). Writing that down doesn't have to be so bad, if you approach it a bit smartly. A notebook with the title “All My Passwords,” as seen on TV nine years ago by Ellen DeGeneres, is not a good idea.

Biometrics is a nice alternative for some applications. You can unlock your phone smoothly with your fingerprint or with facial recognition. Even firearms are equipped with it (although such a smart gun has never been sold, Wikipedia says). There are also more robust – and therefore more expensive – biometric systems that scan your iris, for example, or your palm. The latter technology scans, in addition to the shape of your hand, the pattern of the veins in the hand. Biometrics can literally go deep.

An alternative to logging in to websites is the FIDO standard (Fast Identity Online). When using FIDO, you register once at a website. You can then log in using your mobile device or your computer, possibly using a FIDO USB key, which you only need to touch to log in. But despite roaring texts on the FIDO Alliance website (“FIDO is widespread and growing fast!”), I've never seen it on a website. Major players such as Google, Facebook and Dropbox are connected, but apparently not for Dutch users.

Change is difficult, as it turns out. But one day there will be people who will no longer know what a password is, just as there are already millions of people walking around who have not experienced the time without computers and smartphones, or people who do not know what a floppy disk is. Until then: use a password manager. And wherever possible, activate two/multi-factor authentication (2FA/MFA, also known as two-step verification).

 

And in the big bad world…

This section contains a selection of news articles I came across in the past week. Because the original version of this blog post is aimed at readers in the Netherlands, it contains some links to articles in Dutch. Where no language is indicated, the article is in English.

 

Gyro Gearloose

  Image from Pixabay Gyro Gearloose is a crane after my own heart. He can invent a genius device to order, or he has something lying around ...