Chris Swan's Weblog


Home | Pages | Archives


Why trust != management, and what can be done about it

June 12, 2008 2:33 pm

For most enterprises the essence of trustworthiness is their internal build, which normally comes in client and server flavours for a variety of ‘supported’ operating systems. Machines running this build are trusted to access corporate resources, anything else is kept out with policies, firewalls and mechanisms like network access control (NAC). That internal build is considered trustworthy because it carries with it a bunch of tools that are meant to ensure that the machine only runs an intended subset of applications. This includes patch management, antivirus, host intrusion prevention systems (HIPS) and various user policy management systems. Historically these security subsystems have been perceived as necessary to shore up weaknesses in the ‘vanilla’ operating system. This approach is however fatally flawed because the world has moved on in two key ways:

  1. Operating system security out of the box is far better than it used to be. In all likelihood a ‘vanilla’ installation with auto update installed will be in a far more recent patch state than an enterprise machine relying upon some contrived mousetrap for patch deployment that was conceived before the auto update mechanisms matured.
  2. To an appropriately skilled attacker the enterprise layered defence looks like a panopticon. One hole is all that it takes to exploit an unpatched (or even unknown) vulnerability and install some malware (as a rootkit, in the kernel, where it will be hard to detect).

This means that the corporate build becomes little more than security theatre against a modern, stealthy and targeted attack.

Dealing with this means that security engineers must go back to square one in questioning what it is that they want to trust? Typical answers to this are:

Right now those answers are arrived at by a variety of management mechanisms, and each has its weaknesses:

So… what could we choose to trust instead?

I proposed that trusted virtual (client) appliances offer a new set of choices. Let me first describe what one of these things is:

Whilst this approach superficially looks like putting a virtual bubble around a traditional managed build it does offer a number of distinct differences:

There are of course challenges ahead:

So… getting back to the original plot… managed builds have probably come to the end of their useful life as a means of dealing with issues of trustworthiness, but by bringing together virtualisation and stronger trust assurance mechanisms it’s possible to recast managed builds in a way that not only deals with the trust problems, but also gives flexibility back to users and service providers.

Posted by Chris Swan

Categories: security

Tags: , , , , , ,

One Response to “Why trust != management, and what can be done about it”

  1. What if a manager (or management of a company) assumes that human beings are untrustworthy? I’ve been writing on this…as to what it tells about their attitude toward their customers. I suspect that such managers would still try to create a culture of trust, if only as a sort of window-dressing (i.e., marketing and human resource management tool). Nice blog!

    By A Free Spirit on October 17, 2009 at 3:57 pm

Leave a Reply



Mobile Site | Full Site


Get a free blog at WordPress.com Theme: WordPress Mobile Edition by Alex King.