02 February 2015

Legislation

Posts relating to the category tag "legislation" are listed below.

19 July 2014

Cybercrime - A Growth Industry

Just catching up with some reading. This June report on cybercrime might interest some.

partial image of one of the diagrams in the report 'Net Losses: Estimating the Global Cost of Cybercrime - Economic Impact of Cybercrime II'

The report Net Losses: Estimating the Global Cost of Cybercrime - Economic Impact of Cybercrime II, written by the Center for Strategic and International Studies (CSIS), attempts to put a cost on the effects of cybercrime and cyber espionage by assessing the economic impacts. It discusses the problem of incomplete data, differences between countries and regions, tolerance for cybercrime, and the particular problems of valuing the cost of stolen intellectual property. Appendix B includes some estimates of the size of the vendor market in cybersecurity by product area — buying vendor solutions is not the whole answer of course.

The report mentions how cybercrime produces high returns at low risk and (relatively) low cost for the hackers and points out the two most common exploitation techniques which are both surprisingly cheap to undertake:

  • Social engineering, where a cybercriminal tricks a user into granting access, and
  • Vulnerability exploitation, where a cybercriminal takes advantage of a programming or implementation failure to gain access.

Given the choices organisations and countries have to make about risk acceptance and how much to defend themselves, the authors point out that without adequate awareness of the potentials losses or their vulnerability, they will underestimate the risk.

This world level view may not be so relevant to everyone, but the concepts and some of the data might be of use in your own application risk assessments. The report is fully referenced and also includes some good resources in its bibliography.

See also my previous posts on Systematic Study of the Costs of Cybercrime and UK eCrime Mapping.

Posted on: 19 July 2014 at 18:45 hrs

Comments Comments (2) | Permalink | Send Send | Post to Twitter

06 June 2014

High Street Spam Alert

Not all spammers are based abroad. Some are a lot closer to home than you might think. High Street retailer John Lewis has lost a court case, costing it dearly for spamming an individual called Roddy Mansfield who had browsed, but not bought from, related company Waitrose.

Photograph of a locked letter box with the label 'ISG POST' on it

The case was brought under the Privacy and Electronic Communications Regulations. Sky News, where Roddy Mansfield works as a producer, announced the decision. The damages are not yet confirmed.

John Lewis' defence seemed weak and contrary to the legislation which requires opt in, not opt out. It looks like they shot themselves in the foot. Perhaps time to update the terms and conditions here and here, and to retrain the lawyers. Maybe they should read this. The Direct Marketing Association (DMA) also seems to have put its foot in it.

More opinion and comments at The Register.

Do you know the consent status of all your marketing recipients, whether your own direct customers or obtained from other sources? Perhaps worth checking?

Posted on: 06 June 2014 at 04:35 hrs

Comments Comments (0) | Permalink | Send Send | Post to Twitter

03 June 2014

Personal Data Protection in Online Systems - Part 2/2 Security Controls

Yesterday I described the new report from the ICO, Protecting Personal Data in Online Services: Learning From the Mistakes of Others. Below is a list of the matching security controls for each issue mentioned in the report.

Examining the ICO report in greater detail, provides additional clues about the requirements expected in each class of vulnerability. The report "is not aimed at experienced security professionals", but rather at those responsible for the security of the online systems, and hopefully this list will be useful to those individuals.

My breakdown of the matching security controls, based on my interpretation of the report's text, are listed below.

Issue from ICO Security Report Derived Security Controls
Failure to keep software security up to date
  • Create and maintain a policy for software patching
  • Maintain a list of all software, including components (e.g. third-party libraries, frameworks), their versions, source and method of monitoring for security patches and other updates
  • Define who is responsible for the patching of each software component
  • Create, use and maintain a procedure for assessing security patches and other software updates, that includes a risk assessment
  • Apply software security patches in a timely manner
  • Do not use software that is no longer supported by the supplier/vendor/development company; or limit its use and undertake a risk assessment and apply additional controls
  • Create, maintain and operate a process for checking that security patches have been applied to all software components, or those that have not been applied have adequately justified, documented and applied mitigating controls
Lack of protection from SQL injection
  • Create and maintain a process for other people and organisations to report security issues about your applications
  • Create and maintain a procedure for assessing and fixing security flaws in custom application code, and include these issues in the software patching documentation (see above), and if SQL injection is found in one place, examine similar code elsewhere
  • Identify who is responsible for preventing SQL injection in each custom coded application (e.g. software such as websites developed by/for the organisation)
  • Require the default to be to use the safest server-side method for database queries supported by the API or framework
  • Ensure the prevention, detection and remediation of SQL injection vulnerabilities are included at multiple stages of the software development lifecycle (e.g. coding standards, peer/independent code review with audit trail, automated code review, automated vulnerability assessment, penetration testing before going live)
  • Use the software patching policy and processes (see above) for software components used by the custom applications
  • Include a requirement in contracts with third party development to build security into their development practices and inform you when they become aware critical vulnerabilities like SQL injection, and then provide patches
  • Use automated application vulnerability assessments (scanning) to help identify SQL injection, but ensure these cover all the application (e.g. for authenticated customers and administrators too)
  • Undertaking penetration testing in the production/live environment of custom-built applications (external and internal-facing) that interact with databases and other data stores, and repeat periodically
Exposure of unnecessary protocols & services
  • Do not use insecure protocols such as Telnet and plain FTP
  • Implement access control for all protocols (e.g for secure FTP disallowing anonymous access, preventing SMTP being used as an open relay)
  • Use firewalls to prevent external access to internal services
  • Remove, disable or block un-necessary services (see also decommissioning below)
  • Limit remote access to trusted IP addresses and enforce access using an encrypted method
  • Segment services so that a compromise of one does not lead to wider system compromise
  • Consider using a Virtual private Network (VPN) using strong credentials (such as two-factor authentication) for all remote access
  • Scan ports of all system components periodically to verify that only the intended services are available externally, internally, and from particular other locations
  • Document and periodically review all the services allowed
Exposure of decommissioned software/services
  • Maintain a schedule of all software/services in use
  • Ensure all system components (hardware, software, configuration files, databases, files, services, ports, DNS records, etc) are decommissioned when no longer needed, and maintain a record of how this was undertaken
  • Test/audit that decommissioned components no longer exist and cannot be accessed
  • For hardware disposal, ensure data is securely removed
Insecure storage of passwords
  • Create and maintain a password policy for all types of system users
  • Encourage, and allow, users to choose stronger passwords
  • Discourage users from having the same password on multiple systems
  • Discourage or prevent commonly used passwords
  • Never store or send passwords in plain text
  • Never encrypt passwords unless there are extremely robust key protection and key management processes in place
  • Use one-way hashing of passwords with a long salt value, unique for each user
  • Use a hashing method that is slow (e.g. PBKDF2, bcrypt or scrypt)
  • Do not use weak hashing methods such as MD5 or SHA-1
  • Review hashing best practice periodically, and build in considerations to allow future changes to the hashing method
  • Ensure password breaches are included in incident report planning
Failure to encrypt online communications
  • Identify and record all information that should be encrypted in transit
  • Ensure the encryption method (e.g. SSL/TLS) is configured correctly and that certificate are valid
  • Maintain a list of all certificates and ensure they are renewed before expiry
  • Consider using Extended Validation (EV) digital certificates to provide a higher level of identity assurance to users
  • Do not use SSL v2, and preferably enable TLS 1.2), disable weak ciphers (i.e.enable ciphers with 128 bi strength or greater) and avoid weak ciphers (e.g. RC4) or those that provide no encryption or no authentication i.e. null ciphers)
  • Ensure the information cannot be accessed without encryption
  • When web pages are sent over SSL/TLS, ensure every single component in the page (e.g. images, style sheets, scripts and third-party hosted content) is also sent over SSL/TLS
  • Never send session identifiers (e.g. cookies identifying an authenticated user) over unencrypted connections
  • Ensure SSL/TLS websites are only accessible by hostnames included in the certificate, and not by IP address)
  • Consider making websites completely "SSL/TLS only
  • Review transport encryption best practice periodically and update configurations as required
Processing data in inappropriate locations
  • Identify and maintain an inventory of all locations where personal data is stored, processed and transmitted
  • Do not allow unauthorised access (e.g. public access) to personal data
  • Do not use production data in development and test systems
  • Incorporate personal data access into systems design processes
  • Use network segmentation to assist with limiting access to personal data (e.g. segregate non production systems, segregate teams or departments with access to sensitive personal data)
  • Use redundancy/diversity to protect against accidental loss or destruction of, or damage to, personal data
  • Create and maintain policies for the storage, processing and transmission of personal data
  • Create, maintain and use procedures for transfers of personal data
  • Do not place copies of personal data in unprotected locations
  • Enforce appropriate access control in custom applications (e.g. websites)
  • Provide training about the access, use and transfers of personal data
  • Monitor transfers of personal data
Use of default credentials including passwords
  • Change all default passwords across all system components
  • Disable or remove guest and demonstration accounts
  • Use strong passwords to replace default ones (see above)
  • Avoid hard coding of access credentials (and never in software code), but use encryption if possible if necessary to store elsewhere (e.g. configuration files)

So, not such a short list. It is a combination of technical, administrative and physical controls, and not just applicable to online systems, but all electronic systems that store, process and transmit personal data, and generally regardless of whether it is sensitive personal data or not.

Posted on: 03 June 2014 at 07:48 hrs

Comments Comments (0) | Permalink | Send Send | Post to Twitter

02 June 2014

Personal Data Protection in Online Systems - Part 1/2 Security Vulnerabilities

The UK's Information Commissioner's Office (ICO) published a report in mid May about the most common classes of IT security vulnerabilities in online systems that result in failures to secure personal data.

The cover from the ICO report

The seventh data protection principle requires organisations to take appropriate measures to safeguard personal data. It states "Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data".

Protecting Personal Data in Online Services: Learning From the Mistakes of Others describes the issues most commonly found to have been the root causes of inadequate protection of personal data in online systems.

There are some issues clearly related to poor management control such as incorrect decommissioning of business processes and inappropriate locations for processing of data. The other issues are more technical but are all the types of things well-organised and careful organisations ought to be getting right already.

I was interested to check which of these relate to infrastructure (I/S) components and which to applications (Apps). For the latter, also whether the latter appear in the OWASP Top Ten most critical risks.

Issue ICO Security Report Component OWASP Top Ten 1013
I/S App
Failure to keep software security up to date Y Y A9 Using components with known vulnerabilities
Lack of protection from SQL injection Y A1 Injection
Exposure of unnecessary protocols & services Y - -
Exposure of decommissioned software/services Y Y - -
Insecure storage of passwords Y A6 Sensitive data exposure
Failure to encrypt online communications Y Y A6 Sensitive data exposure
Processing data in inappropriate locations Y - -
Use of default credentials including passwords Y Y A5 Security misconfiguration

We can see there is a mixture of infrastructure and application security issues, and that some issues span both of these categorisations.

Simon Rice, ICO Group Manager, blogged about the release of the report, password storage, SQL injection, and answers questions about the report in a video interview.

Tomorrow, I will list the security controls for each issue, as discussed in the report.

Posted on: 02 June 2014 at 07:40 hrs

Comments Comments (0) | Permalink | Send Send | Post to Twitter

30 May 2014

Cloud Security Guidance from HM Government

The UK government's National Technical Authority for Information Assurance (CESG) has updated its guidance on cloud security.

Screen capture of the gov.uk cloud security guidance collection published by CESG

Cloud security guidance was updated this month and now includes:

The principles and new risk management guide are intended for public sector organisations to help them understand and manage the risks associated with cloud services. The implementation guide outlines different approaches that can be taken to meet the individual security principles and explains the risks associated with each.

These may also be of use for non public sector organisations.

Posted on: 30 May 2014 at 07:28 hrs

Comments Comments (0) | Permalink | Send Send | Post to Twitter

18 April 2014

Data Subject Breach Notification and Privacy Impact

The EC Article 29 Working Party has published an opinion offering guidance to data controllers to help them to decide whether to notify data subjects in case of a personal data breach.

Photograph of a large crowd of people

Opinion 03/2014 on Personal Data Breach Notification provides advice to telecomms companies subject to mandatory breach notification under Directive 2002/58/EC. Whilst most readers of this blog will not work in this sector, the guidance itself is useful for consideration in any sector.

The opinion recommends organisations should be proactive and plan appropriately. It illustrates the effects of confidentiality, integrity and availability effects on personal data and the impact upon individuals.

The document recommends that all the potential consequences and potential adverse effects on individuals should be examined, and that data breaches should be notified to the data subjects in a timely manner, if the breach is likely to adversely affect the personal data or the privacy of the data subjects.

See also the Information Commissioner's Office (ICO) guidance on Incidents and breach notification.

Posted on: 18 April 2014 at 08:43 hrs

Comments Comments (0) | Permalink | Send Send | Post to Twitter

11 April 2014

Criminal.UK

Nominet, the .uk country code top level domain name registry, has announced an upcoming change to its terms and conditions which expressly prohibits any .uk domains (and from 2014 .cymru and .wales) being used to carry out criminal activity.

Partial view of Nominet's press release 'Nominet formalises approach to tackling criminal activity on .uk domains'

In the announcement, Nominet explains how it will be working with existing bodies, who are able to alert it to criminal activity on a .uk domain name:

The process and criteria used by the law enforcement agencies to identify the domains is not divulged. But following administrative checks by Nominet, it will suspend the identified domain name being used "for any unlawful purpose", with subsequent complaints being referred back to the relevant law enforcement agency. Nominet intends to report after six months, and thereafter quarterly, on the nature and volume of requests received from each law enforcement agency and about the outcome of related complaints.

Furthermore, Nominet is also taking the opportunity to introduce a ban on registering "proscribed" domain names that appear to "indicate, comprise or promote a serious sexual offence and also where there is no reasonable or legitimate use for that domain".

The revised terms and conditions come into force on 4th May 2014 and are available online with changes highlighted in red.

See also my post last Friday about Regulation of Software with a Medical Purpose.

Posted on: 11 April 2014 at 07:48 hrs

Comments Comments (0) | Permalink | Send Send | Post to Twitter

09 April 2014

Third-Party Tracking Cookie Revelations

A new draft paper describes how the capture of tracking cookies can be used for mass surveillance, and where other personal information is leaked by web sites, build up a wider picture of a person's real-world identity.

Title page from 'Cookies that give you away: Evaluating the surveillance implications of web tracking'

Dillon Reisman, Steven Englehardt, Christian Eubank, Peter Zimmerman, and Arvind Narayanan at Princeton University's Department of Computer Science investigated how someone with passive access to a network could glean information from observing HTTP cookies in transit. The authors explain how pseudo-anonymous third-party cookies can be tied together without having to rely on IP addresses.

Then, given personal data leaking over non-SSL content, this can be combined into a larger picture of the person. The paper assessed what personal information is leaked from Alexa Top 50 sites with login support.

This work is likely to attract the attention of privacy advocates and regulators, leading to increased interest in cookies and other tracking mechanisms.

The research work was motivated by two leaked NSA documents.

Posted on: 09 April 2014 at 10:02 hrs

Comments Comments (0) | Permalink | Send Send | Post to Twitter

13 March 2014

OWASP Top Ten 2013 A9 and Principle 7 (Security) of the Data Protection Act

The UK Information Commissioner's Office (ICO) has made a clear statement that it believes unpatched software is no longer acceptable.

30% of PCs still use Microsoft XP. If your business does after 8 April 2014 it may be breaching #DPA

The ICO does not provide much prescriptive guidance about Principle 7 of the Data Protection Act (DPA) 1998 concerning security, and data controllers and processors have to read all the guidance and enforcement actions to get a feel for what is expected. Thus for example, for many years the ICO has taken a very dim view of losing mobile devices that have unencrypted storage media.

It seems the time has come for addressing published software vulnerabilities in a timely manner is also to be included in the bare minimum controls the ICO expects to be in place to protect personal data.

In a tweet and referenced post on the ICO's blog Simon Rice, Group Manager for the ICO's technology team, has highlighted how having unpatched vulnerabilities, that are not mitigated in any other way, in software and infrastructure could be considered a breach of the DPA 7th principle.

Read more about vulnerabilities in software components from OWASP, and also how one UK charity was fined last week by the ICO after a data breach involving a vulnerability in a website content management system (CMS).

Posted on: 13 March 2014 at 12:21 hrs

Comments Comments (0) | Permalink | Send Send | Post to Twitter

11 March 2014

Know Your (New) Regulator

Web site operators ought to be familiar with regulation from the Information Commissioner's Office (ICO) regarding the Data Protection Act (DPA) 1998 and the Privacy and Electronic Communications Regulations (PECR) 2003. Some organisations in, or working for, the public sector are also regulated by the ICO for Freedom of Information Act 2000. But some might also unknowingly be have the Financial Conduct Authority (FCA) as a regulator, and they have much stronger enforcement powers (than say the ICO, despite even this).

Photograph of the bar in a pub which has a blackboard with the wifi password clearly written on it

You do not have to be in the financial sector to be regulated by the FCA — there is a long list of regulated activities. Furthermore on 1 April 2014, the FCA is taking over the regulation of the consumer credit market from the Office of Fair Trading (OFT), which will cease to exist at the end of March.

Crowd-Sourced Funding

Following a consultation on crowdfunding and similar activities last year, the FCA has announced its PS14/4 - The FCA's Regulatory Approach to Crowdfunding over the Internet, and the Promotion of Non-Readily Realisable Securities by Other Media. See also the guidance information for consumers.

PS14-04 applies to UK individuals and organisations that operate, or plan to operate, peer-to-peer lending platforms, peer-to-business lending platforms (loan-based crowdfunding platforms), and investment-based crowdfunding platforms. The new rules can be found in Appendix 1 of PS14/4.

Other Forms of Credit

Of course most web sites are not crowdfunding platforms, but there are many other ways that the FCA could become an organisation's regulator from 1st April. Other types of activities require authorisation by the FCA. Organisation may fall into this if they offer any form of credit to consumers, including possibly interest free loans, hire purchase, and direct debits. Not all activities are subject to the full consumer credit regime; some present reduced risks to consumers, and therefore are eligible for a reduced regime which the FCA expects to include lower application and ongoing fees, a shorter application form, and reduced frequency or complexity of reporting to the FCA.

De-Scope

Not too concerned? Read the FCA's Decision Procedure and Penalties Manual (DEPP Manual) and Enforcement Guide (EG). This description and flowchart explains how the process works.

If these activities are not core parts of an organisation's business, it should consider ways of changing its activities to lessen the regulation burden, and the risk of enforcement action for non-compliance such as not protecting information adequately, or in the event of an actual information security or other compliance breach incident.

If these changes apply to you, consider what needs to be implemented or altered, and review the risks of non-compliance. If an organisation already has an OFT licence and wants to carrying on with consumer credit activities after 1 April 2014, it must register for interim permission by the end of this month. Some transitional arrangements are in place to allow adjustment to the changes, but that does not mean that being unregistered after the 1st April is an option.

Remember KYR, Know Your Regulator.

Posted on: 11 March 2014 at 10:11 hrs

Comments Comments (0) | Permalink | Send Send | Post to Twitter

More Entries

Legislation : Application Security and Privacy
ISO/IEC 18004:2006 QR code for https://clerkendweller.uk

Requested by 54.83.189.89 on Tuesday, 31 March 2015 at 17:51 hrs (London date/time)

Please read our terms of use and obtain professional advice before undertaking any actions based on the opinions, suggestions and generic guidance presented here. Your organisation's situation will be unique and all practices and controls need to be assessed with consideration of your own business context.

Terms of use https://www.clerkendweller.uk/page/terms
Privacy statement https://www.clerkendweller.uk/page/privacy
© 2008-2015 clerkendweller.uk