Security
Begins on Your Desktop
J. Dowling - April 18th, 2000
IT Management Issue
Consider
this:
- If the hard drive on your personal computer failed right now:
- How long would it take for you to be as productive as you were
yesterday?
- Would any clients be inconvenienced?
- Would you impact the productivity of others in the company?
- Are you sure that no one else on your corporate network can access
the files on your machine? How about when you connect to the internet
from home? From a client's site?
- Is your company providing the proper level of privacy and integrity
controls over client and corporate data to satisfy contracts? Laws?
The
enterprise runs on data, and not all of it is in the repositories that
are managed directly by the information technology departments. Studies
have shown that less than 20% of the data used to run a company resides
in its mainframe systems. Older studies showed that more than 50% resided
in unstructured formats in file cabinets and the remainder was stored
in personal files. Today, the personal computer has assumed the role of
personal and even work group file cabinet. However, it has not assumed
its privacy, security, and asset management capabilities.
Work
group file cabinets are obviously company property, as are their contents.
Ownership of data in personal computers is not so obvious, by practice
and it is rarely shared. Cabinets are locked to prevent accidental access
and lock-barred to prevent intentional violation. Most personal computers
have neither capability or if they do, often it is not engaged.
Consider
also the use of spreadsheets, business modeling software, and personal
databases. Hundreds of hours go into building data interpretation, translation,
and presentation rules by individuals to enhance their personal productivity
(hopefully) or knowledge-based power (unfortunately). These rules are
used to make or guide business decisions, but they are not accessible
or even decipherable by anyone other than the model creators.
Continued
availability of such systems is an information technology management issue
even though it is rarely incorporated into formal information asset protection
systems. There are two principle threat sources that must be considered:
Physical threats such as theft, destruction, or damage to a personal computer;
and intrusion threats such as unauthorized use and network access.
The
Chief Information Officer rarely gets involved in personal databases and
information systems. The net result? A chief with domain over less than
20% of the corporate information assets.
Business
Implications
Business
continuity is an important issue for management. However, the impact of
losing a personal data store or information systems is not often considered
to be a business continuity issue. Some examples of business issues resulting
from weak governance of personal computer personal data stores and information
systems follow:
- A catastrophic hard drive failure causes the loss of years of accumulated
e-mail, memos, notes and proposals, resulting in months of confusion
among customers due to broken commitments.
- A stolen laptop computer places proprietary client data in the
hands of unknown parties, jeopardizing a valued relationship and opening
the company to legal action.
- Data extracted from several sources on mainframe systems is incomplete
and not synchronized, causing a collections team to ignore high-risk
accounts, resulting in a bad-debt bubble to burst weeks downstream.
- An employee's resignation places his personal computer into the
hands of a supervisor who reassigns the machine without removing files,
causing the loss of months of sales leads, proposals, and contract
details.
- A work group shares files over the corporate intranet, where they
are copied by a disgruntled employee and e-mailed to the press, resulting
in significant internal conflict and public embarrassment.
- An employee whose machine is not equipped with updated virus detection
software introduces an infected document onto the machines of the
entire sales force, resulting in costly down time for sales and technical
staff to inoculate and disinfect machines.
- An employee tele-commutes to work using a broadband (cable modem)
service, which lays the machine open to hacking without knowing the
implications, resulting in lost files.
IT
Management Implications
Personal computers
demand personal responsibility for information technology management. Many
of the above business issues could be mitigated to a great extent through
centralized or professional information technology management techniques.
However, the scale of these issues is immense when one considers the number
of people, the locations, travel, and other factors that drive the complexity
of issues and responses. There is, however a short list of information technology
implications that can be addressed to limit exposure.
- Provide education, policy, and means for backup, archive and recovery
of personal computer-based data and systems.
- For laptop machines, provide hard drive encryption software and encourage
the use of removable hard drives that can be encrypted and packed separately.
- Employ desktop computer monitoring software to identify failing hard
drives and proactively replace them.
- Facilitate access to mainframe data stores to assure data integrity.
- Provide education and means for continually upgraded virus detection
at the desktop, server, and mail gateway.
- Provide education, policy and means to assure data privacy in network
environments.
Architecture
Impacts
Information Technology Architecture is principally driven by the need
to support enterprise applications and data access. Special consideration
must be given to enable personal and workgroup productivity without compromising
data integrity and business continuation. Architecture design must consider
at least:
- Workgroup file servers with backup, archive and recovery capabilities.
- Workgroup level firewalls to control access to sensitive data such
as is often shared within marketing, human resources, research, finance,
and legal teams.
- Personal computer-based firewalls to assure network security within
the corporate intranet, when connected to other corporate internets,
and when connected to public networks.
- E-mail encryption at the desktop and e-mail gateways.
- Virus inoculation at the desktop, servers, and e-mail gateways.
- Remote diagnostics for personal computers.
- Public data networks with and without Virtual Private Network capabilities.
Business
Management Response
Share
the responsibility for assuring business continuity and data security
through policies, procedures, and education. Take active measures such
as the following to create an informed and enabled workforce:
- Incorporate data integrity and privacy into human resources policies
and procedures and include in new employee orientation.
- Reinforce established practices through operational reviews and
audits that assess compliance with policies.
- Question the source of data used to make management decisions to
assure its integrity.
- Encourage and support information technology management to develop
workgroup-level architecture and infrastructure.
- Treat business interruption and liability issues related to personal
computer use the same as you would other risk management issues. Insurance
companies can provide helpful data as can legal consultants.
- Do not expect a higher degree of security than you are willing
to invest in.
User
Recommendations
The
infrastructure and services that enable responsible computing among personal
computer users is costly and not highly leverageable. Unlike the mainframe
environment where one firewall, backup server, or uninterrutible power
source, serves hundreds or thousands of users, many services must be implemented
on each personal computer individually.
To
make matters worse, personal computer management is a continual process
even for an individual user. Each hardware or software upgrade, each new
network, each new workgroup, and each new service requires personal attention.
Standardization has the highest degree of impact of any actions that information
technology management can take. Following lists high leverage standards
and practices:
- Workgroup servers allow user files to be stored and backed up inexpensively
on high-availability hardware platforms.
- Enterprise Management Systems enable the technical support teams
to monitor the desktop and server network, responding to alerts and
trends rather than incidents.
- Segmented and Routed networks enable the use of filters and access
control lists. They also make convenient firewall lines of demarcation.
- Corporate accounts with Internet Service Providers can simplify
configuration and technical support.
- Inspect-and-Push software version management simplifies distribution
and increases the probability that current virus detection and firewall
software is in place.
- Locked-down desktop and laptop configurations can help but generally
they are bypassed to 'personalize' software and networking options.
This only works in high control / high conformance environments.
- Data-Marts improve data quality and access at the same time.
- Education and proficiency for technical support staff assures that
the tools at hand are employed properly and to their fullest value.
|