The Solarwinds Attack b Donbt Trust; Always Verify

The Solarwinds Attack b Donbt Trust; Always Verify

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”4.7.0″][et_pb_row admin_label=”row” _builder_version=”4.7.0″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.0″ _module_preset=”default”]

What’s the biggest lesson from the SolarWinds fiasco?

That just focusing security defenses on the most common means of penetrating an organization doesn’t cut it. Sure, you should guard against phishing, fortify your DMZ and Internet-facing applications, train your staff, and so on. That will at least give you a credible response if you get hacked and you’re asked what you were doing to prevent it (which I admit is nothing to sneeze at!). However as webve seen, that wonbt keep you safe.[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default”]

The software supply chain risk

Few organizations take software supply chain risk seriously. It’s very common for software packages to “call home” to the vendor for diagnostics, code and data file updates, etc. How many customers, or even the vendors themselves, have any way to monitor this threat vector, or to model the application for behavior changes that indicate compromise? Virtually none. Try asking your vendors “How can you demonstrate to me that your update channel isn’t compromised?“, and watch them squirm. And this doesnbt even address the problem at SolarWinds, which was the insertion of rogue code into the development process. While timely patching is a security best practice, how does one know that the patch itself isn’t compromised? Finally, given the prevalence of open source, and the push for rapid development and software innovation, can anyone seriously believe that the risk from software supply chain compromise will be bsolvedb anytime soon?
Supply chain attacks such as the Solarwinds incident work because they exploit trust relationships. Most security controls depend on whitelisting of the bknown goodb, including files, folders, processes, systems, users and groups, domains, IP addresses, and behavior. Typically, security solutions rely on reputation and past behavior patterns to give a free pass to btrusted entitiesb. [/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default”]What is needed is a more flexible layer of defense, one built with the attacker’s mindset in mind, not the defenders. These defenses should not rely on signatures, black/white lists, behavior analysis or reputation for threat detection. And whatbs the fastest way to implement this type of defense? By implementing a modern, automated Deception solution such as Acalvio ShadowPlex. By automatically overlaying a comprehensive and customized deception fabric over the network, ShadowPlex lies in wait for a threat actor to begin their recon and lateral movement activity.
It doesn’t matter how they got in: spear-phishing, vulnerability exploit, or compromised software – it’s all fair game for ShadowPlex. In all such cases, itbs ready to detect, characterize, and if desired engage your adversary, without a lot of operational overhead or false positives. Will you sleep more soundly knowing ShadowPlex is on the job?
Webd like to think so![/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]


Leave a Reply

Your email address will not be published.