Page 45 - Cyber Defense eMagazine - October 2017
P. 45

Equifax Breach & Why Your Company is Next


               The Hybrid Cloud Data Center Paradigm Shift That Leaves Security Behind
               by Dave Klein, Senior Director of Engineering & Architecture, GuardiCore

                                                                              th
               When the Equifax breach was announced on September 7 , I was not surprised.  When
               I heard the magnitude of the damage: 143 million US consumers and 44 million British
               consumers  –  which  equate  to  roughly  57%  and  97%  respectively  of  both  country’s
               populations, age 18 years of age and older - I, again, was not surprised.  Why?

               Four years ago, I began seeing breaches occur in my customer’s data centers, both on
               premises and in the cloud and utilizing my customer’s own application workflows to hide
               their activity as they progressed. Attackers dwelled undetected for long periods of time,
               spreading laterally with ease. Tools at our disposal for cyberattacks were purpose built
               for  yesterday’s  cyber  battles  occurring  outside  of  data  centers.   Not  only  were  these
               attacks  in  places  we  weren’t,  they  also  behaved  unexpectedly.  It  was  as  if  we  were
               firefighters  battling  an  internal  factory  fire  while  being  forced  to  stand  outside  the
               building’s thick concrete walls.

               The IT world had shifted dramatically, and, in its transformation, cybersecurity had been
               left  behind.  IT,  had  moved  valuable  resources  to  hybrid  cloud  data  centers  but
               cybersecurity  solutions  and  practices  had  not  kept  pace  with  the  transformation.
               Cybercriminals had already seen the shift and adjusted to maximize the larger attack
               surface, and reaped accordingly.


               Equifax provides a great example of a breach that took advantage of this IT paradigm
               shift.  The  cybercriminals  attacked  Equifax’s  data  centers  directly.  Focusing  on  the
               vulnerability however is like missing the forest through the trees. Equifax’s vulnerability,
               Apache Struts, was merely the entry point.  To steal roughly half the US population’s
               information and almost  all  of  Great  Britain’s  so  quickly  tells  us  the  attackers became
               well established within the application housing targeted data.  They overcame the front-
               end querying capability to syphon off massive amounts of data while avoiding encrypted
               data at rest on the backend.


               If  the  IT  paradigm  shift  has  changed,  as  seen  with  the  Equifax  attack,  how  can  we
               bridge that gap?  Taking perimeter solutions and endpoints into the hybrid cloud data
               center  environments  won’t  work.  Customization  to  legacy,  traditional  cybersecurity
               solutions  to  transform  them  from  north-south  solutions  that  bring  them  into  east-west
               environments is not possible. No matter what retrofitting is done, they are poorly suited
               for their new working environment.


               When looking at new security solutions that can help you avoid being the next Equifax,
               here are five attributes you should consider for security applications and data in hybrid
               clouds:
                    45   Cyber Defense eMagazine – October 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   40   41   42   43   44   45   46   47   48   49   50