A commonly-misunderstood aspect of computer security is that you are battling computers.
No. That is not right at all. Computers are barely involved.
You are battling humans who eat apathy and coordination problems.
A commonly-misunderstood aspect of computer security is that you are battling computers.
No. That is not right at all. Computers are barely involved.
You are battling humans who eat apathy and coordination problems.
I tell the story often but in the beginnings of my career in IT I was fascinated by stories of 0days by state actors. And I worried about them.
As our entire client base was XP SP2 with zero governance and many machines shared huge groups of local admins. Some of them made Authenticated User a local admin.
And I sat there and I was worried about foreign military 0days. Perspective later is hell of a thing.
The reason IT Security is so hard is someone has to do it. That's the answer.
That is not a technical challenge it is an interpersonal one.
Do you know how many smart people there are trying their very best? You think it would be deluged in security.
But it's not. This is a personal problem and that's what ruins everyone that tries it.
The funniest thing I find about my history and Helpdesk is the credibility. Yes I can talk your language and I know your priorities and I know what worries you about technical change. I know the results of an outage because I have had to support it. I took the calls and I took them for a decade.
I know exactly what it means to fail. Which is something you should understand when you make a change for IT Security.
They don't need to hear perfection. They need to hear empathy. They need to know you thought this out and that you know exactly what will mean if it fails. Because you sat on that call. The thousands of them.
Failure is pain. And they need to hear that in your voice when you tell them the plan about changing everything.
I have been through changes by people that did not understand the gravity of what they were implementing. The people they talked to probably felt it. But allowed it in grace.
One was they broke things that were extremely nuanced in the networking of Windows.
You understand what they've done. In perfect innocent honesty. The goal they were aiming. In naive abandon.
They did the right thing. But accomplished the wrong one. The victims will never trust us again.
Credibility is something harp so much on in InfoSec.
Your performance relies on your credibility more than your technology. Nobody gives a shit about the fucking firewall vendor. They don't care about the nuances of injecting TLS inspection certificate chain in 3rd-party toolchains.
They care about your credibility. It is something that is impossible to describe or proscribe, but is the most important ingredient in your success.
With the people that matter. Who decide if your benevolent campaign gets implemented.
The thing about computer security is you get confused by benevolence.
All you wanna do is save them. You want to save them from themselves and you want to save them from the past they live under.
It is so easy that you will be cavalier. Your job is saving them. What could ever be simpler than that?
And in this frame you're gonna do the wrong thing and you're gonna ruin your credibility. Which is saving them by breaking it. If it's broken it can't hurt them. You will be proud and they will scream.
The essential question is how are you gonna save them without breaking it?
First you need to understand it. And that. That, my friends. Is the bedevilment.
Because it has to be fucking broken because it is intolerable in its current state.
You have to fix it in a way they never understand you did anything. Your job is to do nothing but change everything.
@SwiftOnSecurity One of the irritating aspects of this is that infighting above you can completely torpedo your work at building that credibility.
But when you’re able to build it, you can do some impressive stuff. My team owns tons of infrastructure other teams depend on. Due to the effort we’ve put into building understanding and relationships, we’re able to do things like roll out updates with speed which seemed impossible two or three years ago.
@wendynather @SwiftOnSecurity @mhoye
When I was looking after a large academic site, I would always cultivate the wannabe haxorz and give them extra priviledges like larger space and semester to semester persistent storage.
Keep your friends close
Keep your enemies closer.
@SwiftOnSecurity Maybe, I put in a few years of tier-1 support too. Everyone at any service company, from the facilities to CEO, should be putting in two or three days a quarter on front line support, It’s the biggest missed opportunity at every company in the world.
You can learn so much. Devops has been around 15 years and has less to say about how to run a customer service software shop than you’ll learn from 15 days on the phones.
I worked long and hard to get to a position where they never want me to talk to a user again.
@SwiftOnSecurity @mhoye Yeah, similarly I run SecOps and get every single phishing report. I can see things like official HR communications being reported because of the third-party email sender or lack of good org change management, potential invoice fraud from a BEC at a supplier, etc.
There’s gold in them thar hills…
@Landwomble @Lee_Holmes @SwiftOnSecurity
L1 helpdesk, content moderation and community management are where you meet the Pure Unfiltered Id of your Real Audience, and it's genuinely not a surprise so many organizations outsource dealing with the real problems their products have caused for real people, however much you learn from that.
If Facebook's devs and execs had to spend a week every quarter doing the work they foist off on underpaid moderators, Facebook wouldn't exist in a year.
@SwiftOnSecurity please don't. Your humanity, and your ability to convey the gravity of it, was one of the biggest things that inspired me to believe that I could be in this industry and _help people_. Years ago, when I was poorly imagining being where I am now, I learned how important it was to be where I was then. I've always held on to those experiences because of you. Thank you.
(Edit: Originally wrote this to reply to your follow up about how you might delete it)
@SwiftOnSecurity Literally this. Incredibly well said. The problem isn’t the computers, it’s the CFO who thinks MFA “ruins the culture” they’ve built. It’s the software developers who don’t want to bother supporting their own creation. It’s the Directors who refuse to move off an old, unsupported platform, or the business that refuses to adapt its processes or systems.
The computers did exactly what bad humans told them to, which was to remain vulnerable to harm.
Convincing the humans involved of that fact is 99% of IT.
@nonspecialist I chose to go kinda minimal on the device management stuff. You can do that so long as you document those choices. We’ve only ended up with a device monitoring tool that checks for four things - he encryption, screen lock (with password unlock), existence of an installed password manager (we use 1Asseird) and, umm, something rise I’m not gonna try remember this n a friday afternoon. ;-)
Do you need a “CSIO with experience reaching ISO27001 certification”? I could be tempted away pretty easily. Even without a C(whatever) title…
@SwiftOnSecurity ... and today if you go looking at what those foreign adversaries are doing, it's pretty much all unpatched, long-known CVEs, and those vulnerabilities are pretty much all elevated access via unsanitized input.
Just basic, wash-your-hands fundamentals.