Regaining control, 2005-11-29
Securing endpoint systems by locking them down using complex software brings back memories of another era, where business computers were once used for business applications only - and businesses retained control over their assets and data.
Fast-forward to 2005. Most of the world's green screens are long gone, replaced with personal computers that can do so much more. Security now weighs heavy on the desktop, though, and it's starting to bring functionality and productivity full-circle again. More on this in a moment.
We should all agree that security of our endpoint systems (largely our "business desktops") is a complex nightmare now, a mess that no one can solve. Business applications have moved to the web, following a vision. Great. But having a browser and an email client today is still a massive security risk. Almost all businesses still rely on a single, compatible desktop for accessing business applications that have (almost all) moved to the web. I find this ironic in light of the universality of the Web and the availability of less expensive, more feature-rich alternatives that are easier to manage and secure. However, today's business environment means that our focus on security of the endpoint still starts with Internet Explorer, an integral part of todays business operating system.
Browser security
The vision of using a browser as the future window into business applications has been blurred. We have been tricked into believing that a heavy desktop with heavy security add-ons is the only safe way to access the Internet and do business in 2005. Just to browse the web on my business computer I need a firewall, modern anti-virus with updates, three different anti-spyware applications with updates, frequent updates to the operating system and browser components, and of course I still need the browser itself - Internet Explorer. Simple, right?
Even with all these, I still do not feel safe doing any Internet banking on my business computer (during my lunch hour) because I might still have a rootkit - virtually undetectable - or an undetected virus or Trojan that was targeted to me or my company specifically and installed through some 0day exploit in my browser. Fantasy? Paranoia? No, this is happening all the time and its getting worse.
There are browser alternatives, sure. Version 1.5 of Firefox is expected this week, and most existing Firefox users will upgrade. Despite all the new features, however, I can barely stifle a yawn about this major release because of the limited market share that this (otherwise excellent) browser commands. And as far as security, with the latest run of security issues that have plagued Firefox, Im no longer convinced that its any more secure than Internet Explorer when used with those three different anti-spyware applications I have been forced to run. I still use it for its features, but not for its security.
The reason that technologically superior, feature-rich browsers like Firefox have no more than a 10% market share after years of work is that they do not solve many of the security problems on the desktop. They also dont offer any advantages for accessing business applications over todays industry standard, Internet Explorer. They offer only features. And they dont command enough market share to begin to offer any new web-specific features like Netscape did back in the day. Its amazing to me that we still use old technologies Netscape invented - like cookies, Javascript and SSL/TLS - and that new technologies arent replacing these because theres no longer any real browser war to facilitate innovation.
Time again, the best technology does not win the battle, it only gets copied like a cheap watch thats made in China and then gets assimilated into a monopoly - one that calls these copies "innovation" and sells them to the mass market. When the springs in that watch keep falling out, as is happening now, the only ones to blame are those who bought the cheap watch in the first place - which is most of us. However, these watches still have many advantages: the springs are interchangeable and have less expensive parts, plus they are all compatible with each other. Never mind how much time, effort and money is spent to fix these problems. Never mind all the added software required to keep them running, either. The system you use at work has effectively the same springs, wheels and pulleys as the system you use at home - which is ideal for those of us who enjoy working evenings and weekends on top of every business day.
Securing a business computer
I believe we have almost come full-circle, to the point where our endpoint systems need to become 100% business oriented again just to keep them secure. Lock down those corporate computer systems so tight that they cannot be used for anything except business activities again - like those green screen terminals I saw in India, albeit with much more functionality thanks to todays modern computing world. Take out the "personal" part of the personal computer, and make it a part of your business. Allow me some latitude to explain.
It is possible to have a very secure business computer on a network - quite different from a personal computer that one might find in his home. Business computers are equipment used to perform business tasks and are the property of the business that purchased them. Therefore, personal information on this equipment should be kept to an absolute minimum. No games are allowed. No illegal MP3s. No administrative access should be allowed - reduced user rights are an absolute necessity. No personal software is allowed either, due to support and security issues. No music CDs either, because they might be a major security hole. No privacy is guaranteed - the companys policy almost assuredly permits the monitoring of all web surfing activity, email and instant messaging activity. No peer-to-peer software is permitted and definitely no personal VoIP software. Manage and administer all installed applications from within the IT department and consider this software as inventory. Not even personal screensavers or desktop backgrounds are allowed - the companys logo must typically be seen at all times. Corporate policy must be enforced on these business systems - not only because they are property of the business and represent the business, but because it is also the only way to enforce security.
The latest craze, heavily managed endpoint systems in a business environment, are not too far from this mark.
However, none of these approaches go far enough. Viruses are still rampant, and anti-virus software just does not properly address today's corporate threats (disclaimer: SecurityFocus is owned by Symantec Corporation). Trojans and worms can, will, and do penetrate all major corporations. Targeted Trojans are siphoning away corporate profits. Users will click on just about anything.
A business computer should be secured according to its function. For many users, the business computer is little more than a glorified stapler, calculator or typewriter, a tool used to perform a task to conduct business. Companies should treat it as a piece of equipment. Email attachments need to be stripped away. USB ports need to be closely monitored or even filled with glue. Business cases need to be made why Sally in Accounting needs to surf the web over her lunch break or listen to music through her equipment, because either of these actions can now threaten the entire corporate accounting system through a rootkit or a backdoor that accesses private data from the inside. CIOs need to put their foot down, and make a stand on corporate policy in the name of security. Those nuts on the corporate computer systems need to be locked down so tight that they can do little else except permit the business to run.
Good luck doing this at any level lower than the CIO.
Securing information
Once the desktop systems are secure, we can try to tackle the larger job of securing, indexing, and accessing the wealth of our business information and associated profits - what actually drives our businesses and business transactions. Companies like Oracle have a major stronghold on most data systems today. Microsoft is in there as well, and surprisingly has a better track record of keeping its database secure.
I believe were in good hands, too - the juggernaut known as Google seems to believe the web and the Internet are still the key to the future of the world's information. I wonder if theyre onto something? They really dont care which browser or operating system we use, either, or how many holes are found in it each month. Its a fundamentally different business model than selling software and game consoles.
Now if we could only get those endpoints secure.
