Wednesday, July 15, 2015

Good Grief, Isn’t Anyone Responsible Here?

We have all seen the news of the massive theft of information from the Office of Personnel Management (OPM).  In a nutshell, with extremely high probability just about anyone that does work for the government (or from one estimate over 21 million people), which includes yours truly, had very personal information stolen.  In my case, this could mean that the last 35 years of my life, everywhere I lived, everywhere I worked, the names and contact information of my close relatives and closest friends, and virtually everywhere I traveled outside of the United States of America is in the hands of what is speculated to be the Chinese government.  In some cases, of course other than myself, the information will include self-disclosed arrest information, drug and alcohol abuse disclosures, and whether bankruptcy was declared.  Good Grief! And, what do we get from those in charge of OPM? Well to my mind it is exactly what the Peanuts characters hear when the adults talk: "waa waa waa.".  Translated for your benefit: The (now former) Director of OPM says she does not believe "anyone is personally responsible".  It is just this lack of personal responsibility as well as other Cyber security failures that needs to motivate us to a new approach – one that recognizes that every business relationship today has its implementation foundation built on Information Technology (IT).

Although the director of OPM has now resigned, there is still no real accountability or responsibility.  Dozens of OPM government employees and contractors knew the state of their system and lack of protection.  The problem is that these people know, with certainty, that there is no accountability and there is no responsibility.  The Chief Information Office (CIO) has not resigned, and that person is directly accountable to Congress to represent that their systems are FISMA compliant.  Here is a link to the OPM Office of the Inspector General Report for 2014.  Just read the summary page under "What Did We Find?" and you will be appalled.  There is some glimmer of hope on the trail to real responsibility.  As reported in the Wall Street Journal CIO Report by Kim S. Nash, the OPM CIO better get some lawyers as she is being sued.  The legal threshold is high, but this is at least a step away from zero responsibility.  Of course, let’s say that she loses in court, what exactly is going to be the remedy for the people impacted (she most likely has no money, even if that is a potential judgement)?  Would this actually change the environment to get some real focus on Cyber security?

Of course it is easy to be a Monday Morning Quarterback and to Beat A Dead Horse, so let's move to a more constructive set of observations and advice.  The old adage is that you "get what you pay for".  In the business world it transforms into "you get what you measure", and I will contend that in the Cyber Security world "you get what someone is liable for".  In fact, the government gets precisely what is measures, preferring to award Lowest Cost Technically Acceptable (LCTA) contracts where in general there is no significant liability for Cyber failure and more importantly no emphasis on actually grading the contractors during source selection against Cyber security performance.  In the OPM case, the government hired a contractor to perform background checks and submit data.  This contractor’s system became entangled in the government’s system.  Because there was little emphasis on the Cyber security posture of the contractor as part of the performance of the contract, the contractor’s system was apparently not well managed or secured, and when the attackers found a hole, it ran all the way into the government and enabled the theft of massive amounts of data.  Most likely, the system was built by a contractor many years ago (of course this is speculation) and is still in place because budgets and priorities are always about maintaining status quo and "working on" new solutions.  In general, the government finds it significantly difficult to "abandon" outdated or obsolete systems, where industry does - it invests in the new modern methods and either sells of or disposes of the old.

Let me explain.  In the business environment companies have to directly address the risk of doing business.  This is represented by insurance for fire and theft, as well as in many cases for other business related issues such as product liability.  In the commercial world, poor business practices translate into higher business losses (for example product related liabilities) and an increase in costs due to rising insurance rates as well as potentially large expenses due to punitive damages imposed by a court decision.  In addition, business executives are directly accountable legally (e.g., Sarbanes-Oxley, HIPPA, etc.) and from their Boards and Stockholders - that is they lose their jobs and even can go to prison.  Business leaders are also responsible for the entirety of their business - accounting, hiring, delivery, liability, and profit to shareholders and owners.  Hence, they know how it all works together and they make decisions with the overall goal of sustaining the business and enabling growth as primary focus elements.

In the current government environment, and almost surely at OPM, none of the normal commercial business pressures are at play, especially in light of comments that "no one is personally responsible". The problem is that when the government takes on the responsibility directly, in general, there is virtually no administrative or legal repercussions for a massive failure.  Assuming good faith of effort, organizations such as OPM grow their government supervised internal Cyber Security operation setting-up processes, buying tools, and then trying to keep-up with the quickly morphing Cyber threat landscape.  Miss one step in this activity, and we get a massive Cyber failure.  Cyber security technology is not the culprit here - it is the lack of understanding by leadership as to how to apply Cyber security as an enterprise core competency where agency heads are not dazzled by the latest buzz words, but see the enterprise as a single architecture that includes its partners.

So, what can be done? A good friend of mine loves to quote Peter Drucker: "There is nothing so useless as doing efficiently that which should not be done at all".  In this case, doing more efficiently the internal Cyber efforts of a government organization nearly a waste, and the reason is simple.  Adding processes, tools, and oversight does not make anyone actually truly responsible or liable in the legal sense of the word.  What needs to be done is a complete shift of activity to an approach that selects providers that offer a warranty or service level agreement for not only the performance of the direct work (e.g., performing background checks) but also for all necessary associated IT components.  This is not just a selection by reputation, but a selection that is based on the company's willingness to "put their money where their mouth is".

The vision is that an organization like OPM will select a responsible party with a track record of performance that demonstrates that they can do the job and stand by their work when there is a Cyber event.  Sign them up for real metrics, for example on the time between discovery and reporting and for the number of days between major Cyber events.  Don't take their word for it, hire an independent auditor, review the Cyber performance every month (or week) and hold them to their agreements and hit them with penalties and even legal action for failure.  However, liability just is one element.  We must not perpetuate the "security is a separate function", so we need to do more.  We have to get away from escape clauses that boil down to the contractors "just doing what the government wants them to”, and where the government supervises or even performs the Assessment and Authorization (A&A) process for the systems.  Without these additional changes, the liability melts away into the political morass and standard government CYA.

The solution to our problem is that we need the system provider, and their subcontractors, to provide the "warranty" just as they do today for their financial systems.  Just as a company or the government may hire an accounting or financial firm today, they need to hire their Cyber firm - both need to be accepted and certified.  Then the government needs to focus on monitoring and spot checks, and not interfere in the contractor’s activities because when they do, the liability goes back to the unaccountable.

Of supreme importance, this needs to expand to include when the government contracts for virtually any service.  In OPM’s case the apparent root-cause system that enable the breach was associated with a contracted personnel background investigations company.  The fact that the performance of the contract came with an IT system that electronically interacted with the government's system is the point.  It does not matter what service or product you buy, you are buying into that company’s Cyber posture and how they manage their IT and how it interacts into agency’s IT.  This is what the CIO needs to understand and address.

You might ask whether anyone would take on such an activity, but it happens every day.  Certified Public Accountants and Professional Engineers have to sign their work.  Maybe it will scare away some of the "Johnny come lately" Cyber "expert" companies that give advice but take no responsibility for the actual result.  Companies that have their act together, that genuinely understand the risks and technology will rise to the occasion.

Using this method, there will never be a time when someone is not responsible.  True risk equals good reward for Cyber companies and other providers that actually stand up for their work combined with IT security results.  Maybe “doing efficiently” our current approach should “not be done at all” – after all it does not seem to be working.

Monday, March 30, 2015

Buckle-up, all infrastructure is software and your enterprise needs enterprise orchestration

The capabilities landscape for equipment manufacturers, service providers, and enterprises is rapidly changing, and within several years it will be fundamentally transformed from today.

There are several basic areas:
  1. The creation of robust commercial Cloud services with a rich set of services all presented for allocation and configuration to the enterprise via a set of standard Application Programming Interfaces (APIs).
  2. The emergence of the Software Defined Networking (SDN), offering the potential of flexible network services again presented to the enterprise for allocation and configuration as a set of APIs.
  3. The transition of traditionally physical network-related devices to application that can be configured onto essentially standard computer servers, called Network Function Virtualization (NFV).

The battle that is the force driving these changes are between what I call the “new traditional” service providers and the “legacy” service providers.  Companies like Amazon and Google eschewed traditional wisdom of hardware providers and the paradigm of legacy service providers.  Driven by their application development and low-cost consumer mindset, their general approach is to strip-down to the necessary hardware and software functionality.  Bloated hardware and software with features and functionality not needed is removed.  The over 30 years of the evolution of Internet standards that defines to the control of network devices, embedded into expensive routers and switches, is discarded in part or whole for so called “white box” hardware and Open Source software as the basis for their control.

Legacy network service providers grew-up with the Internet, driving its standards within the common framework of a set of “autonomous systems” configured by the service provider with a set of defined end-user services.  Scant thought was given to providing end-users (in this case the enterprise customer) any meaningful end-to-end control of services, and almost without exception nothing that looks like a web-service RESTful API.  This is in stark contrast to the rich information and control APIs expected and provided by today’s commercial Clouds.

The figure below represents the recent past and much of the present.  Blue represents the legacy infrastructure approach.  Focusing on the network space, the enterprise has to contend with complicated device configurations and essentially static service configurations from their network services provider.  There is little if any coordination between the network and the applications development and operations environment other than at best service tickets and at worse verbal (and undocumented) direct staff-to-staff communications.
The expectations of enterprise Information Technology organizations will also drive the trend to a more software defined environment, as the use of Cloud services and it associated reporting and control will become the expectation, not the exception.  In fact, it is likely that more comprehensive “enterprise orchestration” systems will be developed that will cover all services, from internal application development lifecycles (i.e., Development and Operations), to control and management of end-to-end enterprise services delivery.

This leads to the view in the figure, below.  Red and green represent the new infrastructure trends and blue represents the legacy environment.  The significant change is that nearly all of the infrastructure is now software based, from SDN controlling and reporting of end-to-end network (including to and from Cloud resources), to the direct control of virtual network devices whether in the Cloud, at an enterprise location, mobile, or one of those Internet of Things devices using NFV.
When every resource or service is controlled by what appears to be a web-service and the same mechanism is used to obtain performance, usage, and other relevant from across the different traditional service domains (compute, storage, network, security, etc.) then everything looks like software.  Once this happens, one has to completely rethink an enterprise’s IT operation, as the same types of activity that is done to develop applications is now the fundamental discipline for orchestrating the enterprise, whether it is resource management, application development or rollout, or cyber security.

Buckle-up, time to become an enterprise orchestration programmer.