Kenneth van Wyk: After Snowden
Restoring trust in our information systems after Edward Snowden's NSA revelations will take years -- if it can be done at all
Computerworld - We've lost something precious -- perhaps irretrievably. We've lost trust in our information systems, thanks to Edward Snowden's leaks of National Security Agency documents.
The loss of trust runs deep. We've lost trust in our security APIs, our crypto, our random-number generators, our network security protocols, our operating systems, our firmware, our hardware. To paraphrase my colleague Gary McGraw, it really is turtles all the way down, only these are snapping turtles, and they are bearing down on our most private of private data.
In the six months or so since Snowden's revelations began, our trust has been hog-tied, beaten to a pulp and left for dead.
Restoring that trust will take much longer than it took to be lost, if it can be done at all. It's going to be a long and arduous process. If it's even possible, it is going to take years.
While we work to rebuild our lost trust, we have to continue to use the systems we no longer trust. We can't just abandon them and start from scratch. It will be something like completely refurbishing an airplane, engines and all, while it's already in the air.
I'm not here to pass judgment on Snowden, the NSA or any of the other parties caught up in this mess. Let the right and wrong be argued elsewhere. For the purposes of this column, the important point is that the whipped cream is out of the can and there's no getting it back in. So let's focus on how we can start to fix what has been broken.
Since we can't just throw everything away and start over, I think we have to tackle the problem from two directions: from the top down and from the bottom up.
Working from the top down, standards organizations, including the Internet Engineering Task Force, have to assemble the brightest minds to develop security standards that are outside the reach of any one government or agency. Everything, from our crypto algorithms to security protocols, needs to be re-evaluated, and fixed or rewritten if necessary. This will take years of hard work by smart people -- digital patriots, I'll call them.
And that's just the start. Just how paranoid do we need to be? If there have been hardware and firmware compromises, as some stories have suggested, the answer might be more than we can bear. But we've got to start somewhere, and our critical evaluations should certainly include supply chain management from the chip level upwards.
And then there's the bottom-up side of things. That effort will mostly rely on software developers. How do we write software that can be trusted at all? We start by always questioning our trust. Why should we trust an API, an algorithm, etc.? I've covered quite a bit of this ground here in my columns, but some of the principles we need to strive for include doing our own key management whenever possible, building our code on robust, rigorously peer-reviewed security foundations, and so on.
More by Kenneth van Wyk
- Kenneth van Wyk: Apple's big fail
- Kenneth van Wyk: After Snowden
- Kenneth van Wyk: Target breach underscores how backward U.S. payment tech is
- Kenneth van Wyk: Enjoy your trip, but protect the data you take with you
- Kenneth van Wyk: Lingering faults with security by default
- Kenneth van Wyk: High hopes for iPhone's Touch ID
- Kenneth van Wyk: Why mobile apps beat Web apps for privacy
- Bug bounties: Bad dog! Have a treat!
- How to avoid Big Brother's gaze
- The true root causes of software security failures
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts