Saturday 4 July 2015

EU Data Protection Regulation - 3 versions so far

updated: 2nd August 2015

The new proposed EU Data Regulation is slowly moving its way through the machines of EU democracy. Here are links to the 3 proposals so far from various bits of the EU bureaucracy. Useful if you want to compare them.

Updated to include a link to the European Data Protection Supervisor opinion on the various proposals. There is also a link to an App of big pdf containing a side-by-side comparison plus the Supervisor's recommendation

EU Commission - 25th January 2012 

The original European Commission version is at:

The general announcement is at:

EU Parliament - 12th March 2014

The amended European Parliament version is at:

EU Presidency to Council  - 11th June 2015

This is the version submitted by the EU presidency to the European Council

EU Data Protection Supervisor  - Opinion of July 27th 2015

This is the opinion plus comparison of the various versions

Social: DiggIt! Reddit Stumble Google Bookmarks Technorati Slashdot

Sunday 1 February 2015

Application Security and Governance Task List

Last Update: 29th June 2015


I have put together an Application Security and Governance Task List (See Useful Links below). This is an Excel Online document which can be viewed through any regular browser or downloaded and used in Microsoft  Excel which you should be able to use through most browsers. For those in a hurry, the Task List is under the tab 2-Task List
Task List

It gives a fairly high level list of tasks that should be considered at the start of a development project. It covers both security and more governance type issues.

 It is divided into a number of categories. Under each category, there are a number of tasks.

Use it just to browse the list of tasks and maybe spot some item which you had not already considered.. You can do this through your browser. The task list itself is in tab 2 - Task List in the spreadsheet.
Excel Expand/Collapse

You can also download it as an Excel spreadsheet and modify it in Excel. Use the Open in Excel or File|Save As  options in Excel Online for this. Columns D to G could come in useful here to track what needs to be done.

Use the Excel Expand and Collapse options on the Left Hand Side to show and hide the tasks.

Note: This is currently in Beta mode.

Useful Links

Social: DiggIt! Reddit Stumble Google Bookmarks Technorati Slashdot

Monday 21 July 2014

Information Security for Business-Where to Start

Update 5th July 2015, 28th June 2015

Where does a business or organisation start if they want to improve their information security stance?

Here are some ideas. The links are at the bottom of the post.

Council on CyberSecurity Critical Security Controls

  • "The Council's Technology practice area is built upon the Critical Security Controls (the Controls), a recommended set of actions for cyber defense that provide specific and actionable ways to thwart the most pervasive attacks"
This is related to the Sans Institute Critical Security Controls - See below

The council also has its "First Five Quick Wins"
  1.  application whitelisting (found in CSC 2);
  2.  use of standard, secure system configurations (found in CSC 3);
  3.  patch application software within 48 hours (found in CSC 4);
  4.  patch system software within 48 hours (found in CSC 4); and
  5.  reduced number of users with administrative privileges (found in CSC 3 and CSC 12).
These are related to the Australian Signals Directorate Top 4 - See below

SANS Institute Critical Security Controls

The SANS institute maintains a list of the top 20 critical security controls.

  • The Critical Security Controls focuses first on prioritizing security functions that are effective against the latest Advanced Targeted Threats, with a strong emphasis on "What Works" - security controls where products, processes, architectures and services are in use that have demonstrated real world effectiveness

Australian Signals Directorate Top 4

The Australians Signals Directorate (ASD) maintain that:
  • "At least 85% of the intrusions that ASD responded to in 2011 involved adversaries using unsophisticated techniques that would have been mitigated by implementing the Top 4 mitigation strategies as a package.
The  top 4 are:
  1. Application Whitelisting
  2. Patching Systems
  3. Restricting Administrative Privileges
  4. Creating a defence-in-depth system


Here are a number of programs from the The UK Government.

Cyber security guidance for business 

This guidance is aimed at business in general and starts off with board level responsibilities.It then describes  the "10 steps" to cyber security" which cover the following topics
  1. Information Risk Management Regime
  2. Home & Mobile Working
  3. User Education & Awareness
  4. Incident Management
  5. Managing User Privileges
  6. Removable Media Controls
  7. Monitoring
  8. Security Configuration
  9. Malware Protection
  10. Network Security

 Cyber Street Wise

Cyber street wise has the following "five essential tips for cyber safety" for your business
  1. Install Updates and antivirus software
  2. Use strong passwords
  3. Only download from trusted sites and organisations
  4. Beware of phishing emails
  5. Review and protect your business' information

Cyber Essentials

First comes "Cyber Essentials"  which "is a government-backed, industry supported scheme to help organisations protect themselves against common cyber attacks."

This is more technical and covers the following five areas.
  1. Boundary firewalls and internet gateways
  2. Secure configuration
  3. Access control
  4. Malware protection
  5. Patch management
It also states the following
"From 1 October 2014, [UK] government requires all suppliers bidding for certain sensitive and personal information handling contracts to be certified against the Cyber Essentials scheme."

Useful Links


Social: DiggIt! Reddit Stumble Google Bookmarks Technorati Slashdot

Sunday 13 July 2014

FUD: A Plea for Intolerance

Another interesting paper from Cormac Herley at Microsoft Research

In it he talks about "Fear, Uncertainty and Doubt" (FUD)  and how

"Even a casual observer of computer security must notice the prevalence of FUD :non - falsifiable claims that promote fear, uncertainty or doubt (FUD)"
It is short at 5 pages and well worth reading.

Useful Link:

Social: DiggIt! Reddit Stumble Google Bookmarks Technorati Slashdot

Saturday 22 March 2014

EU Data Protection Regulation - Application Security

Update: June 28th 2015

Progress is being made.....slowly. Here is a link to the version proposed by the European Council

The new EU Data Protection regulation took another step on its long road towards becoming law.  What does this mean for application design and security?

Originally proposed by the EU Commission in January 2012, the EU Parliament has now supported it (with lots of amendments to the original proposal). The next step on the long road is the EU Council of Ministers.

Who knows when/if this becomes law, but it is worthwhile being aware of it. It is long and complicated and will change.

What could this mean for application design and security? Here are some of the proposed amendments which may impact your application design and security when processing personal information of EU citizens. These are just the barest details based on the amendments proposed by the  EU parliament. There is more information in the links below.

Article 15 - Amendment 78 - Right to Rectification and Completion

In this amendment, the data subject can request that any information be corrected. For the application developer, this means that there should be some way to correct personal information that the application stores.

Article 16 - Amendment 79 - Right to Erasure

The data subject can request that their personal data be deleted. There are various conditions around this. Basically it means that application should have the ability to delete a user's information at their request.

Article  19 - Amendment 81 - Data Protection by Design and by Default

This is a core article from a security perspective. It talks about "protection by design", "risk", "entire lifecycle management of personal data from collection to processing to deletion". 

Security of personal data cannot be an afterthought. It must be considered from the start of the application design. 

Article 24 - Amendment 86 - Keeping of Records

This article essentially means that the application must keep an audit trail. It even mentions such items as "date and time". 

Article 27 - Amendment 90 - Security of Processing

This is another one directly related to application security. The main clause states that the data controller or processor must:
"implement appropriate technical and organisational measures and procedures to ensure a level of security appropriate to the risks represented by the processing and the nature of the data to be protected, having regard to the state of the art and the cost of their implementation."
Again this clause mentions risk. The article itself lists a number of more detailed requirements covering such security measures such as access control etc.

Useful Links

Social: DiggIt! Reddit Stumble Google Bookmarks Technorati Slashdot

Monday 3 March 2014

NIST Cybersecurity Framework

The NIST has just released the Cybersecurity Framework Version 1.0. This is mainly intended for improving critical infrastructure type facilities in the USA. However, it can potentially be applied to a much broader range of organisations across the world.

It covers 5 main functions of a cyber security framework.
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Each of these functions is then broken down into categories and the categories are further sub divided into subcategories.

This is two more than Bruce Schneier who defines Protect, Detect and Respond.

The basic idea is that you take the categories and analyze it to define your current profile. You then define a target profile and work out action plans and prioritizations to achieve the target profile.

It is not a very long document and much of the useful information is stored in the appendixes. It widely references other public standards.

Application Security

The framework does not have much to say about secure application development.  However it is extensible so you can add in your own categories and sub categories. It does talk about access control, data-at-rest and data-in-transit controls etc.

PR.DS-7 says:
The development and testing environment(s) are separate from the production environment

Useful Links

  • NIST Press Release 

Social: DiggIt! Reddit Stumble Google Bookmarks Technorati Slashdot

Sunday 9 February 2014

Data Flow Diagrams and PCI DSS Version 3

I just noticed that the Payment Card Industry - Data Security Standard (PCI DSS) Version 3 has a new requirement at 1.1.3. The old 1.1.3 in PCI DSS version 2 is now requirement 1.1.4 in PCI DSS version 3.

PCI DSS Requirement 1.1.3

So what does new requirement 1.1.3 say?
"Current diagram that shows all cardholder data flows across systems and networks"
The testing procedure for this requirement says
"Examine data-flow diagram and interview personnel to verify the diagram:
  • Shows all cardholder data flows across systems and networks.
  • Is kept current and updated as needed upon changes to the environment.
And finally the guidance says
"Cardholder data-flow diagrams identify the location of all cardholder data that is stored, processed, or transmitted within the network. Network and cardholder data-flow diagrams help an organization to understand and keep track of the scope of their environment, by showing how cardholder data flows across networks and between individual systems and devices."

The Fundamentals

Data Flow Diagrams (DFD) are a powerful tool in many situations. Whether in the role of PCI QSA or security architect where you are trying to work out the appropriate level of security requirements. This new PCI requirement recognizes this. While PCI really only cares about payment cards, DFDs can and should also be used wherever you are analyzing data which is important to your organization.

A DFD consists of three main sections:
  1. It shows the data flows - i.e. the networks etc. through which data passes.
  2. It shows data storage areas. This indicates where data is stored within the system 
  3. Finally the DFD highlights trust boundaries. This is where data travels across boundaries which are not trusted. The interface to the internet is typically a trust boundary.

A DFD need not be complicated. At its simplest it consists of a series of boxes indicating the data storages on a whiteboard while lines showing where data flows.

When creating a DFD, make sure to ask a series of questions such as:
  • Where are backups held? 
  • How are test systems and data handled. Remember, if live production data is used in a test system, the same level of security must apply as in the production system.
  • Can users export data to desktops etc.?
These questions help build up a complete DFD picture.

When you have a good DFD, then you can start specifying the appropriate level of security controls that are required for each flow and storage within the DFD. For example, if sensitive data flows across the public internet then it should be encrypted using SSL. A DFD helps answer these types of questions.

DFDs and Application Security

DFDs apply when developing applications and choosing security controls. They help working out what type of security controls are required whenever data is at rest or in motion. When developing the security requirements for the application, the development team should develop appropriate DFDs. This should be done early in the development life cycle.  The DFDs can then be used to make sure that the proper security controls are in place which reflect the security drivers for the application. These security drivers can include data protection legislation, PCI DSS, internal corporate policies.

Useful Links

Social: DiggIt! Reddit Stumble Google Bookmarks Technorati Slashdot