An Approach to Minimizing Legal and Reputational Risks in Red Team Hacking Exercises

An Approach to Minimizing Legal and Reputational Risks in Red Team Hacking Exercises

computer law & security review 34 (2018) 908–911 Available online at www.sciencedirect.com journal homepage: www.elsevier.com/locate/CLSR An approach to minimizing legal and reputational risk in Red Team hacking exercises ∗ Joseph V. DeMarco DeVore & DeMarco, LLP, New York, NY, USA a r t i c l e i n f o a b s t r a c t Article history: Robust cyber-resilience depends on sound technical controls and testing of those controls in combination with rigorous cyber-security policies and practices. Increasingly, corpora- tions and other organizations are seeking to test all of these, using methods more sophis- Keywords: ticated than mere network penetration testing or other technical audit operations. More Data protection sophisticated organizations are also conducting so-called “Red Team” exercises, in which Data security the organization tasks a small team of highly skilled and trained individuals to try to gain Cybercrime unauthorized access to physical and logical company assets and information. While such Cybersecurity operations can have real value, they must be planned and conducted with great care in order Cyber-resilience to avoid violating the law or creating undue risk and reputational harm to the organization. Computer intrusions This article explores these sometimes tricky issues, and offers practical risk-based guidance Ethical hacking for organizations contemplating these types of exercises. Network and information security © 2018 Joseph V. DeMarco. Published by Elsevier Ltd. All rights reserved. Penetration Testing Red Team ten without any warning to internal security personnel. This 1. Introduction article discusses the risks of trying to break into your own net- work and to hack your own data. As the amount and variety of data being stored has increased exponentially over the years, so have the challenges in keep- ing it safe. As a result, information security professionals have 2. The Red Team operation needed constantly to re-invent how to proactively test and assess the physical and technical vulnerabilities of company Red Teaming is a form of “ethical hacking” which involves the systems, so much so that the defenses themselves raise le- use of techniques and methods similar to those of a crimi- gal and reputational risks. “Red Team” operations conduct in- nal hacker or state-sponsored organizations to simulate a real ternal physical and logical testing to determine whether un- cyber-attack (often paired with a physical intrusion) so that 1 known vulnerabilities exist at a corporation, which would the corporation can learn about weaknesses in their defenses. permit unauthorized access to company data and systems, of- The theory is that by simulating an attack, the Corporation ∗ Corresponding author: Partner, DeVore & DeMarco, LLP, New York, NY, USA. E-mail address: [email protected] 1 Although governmental entities and NGOs can also benefit from Red Team testing, this article focuses on the issues implicated when a private corporation or similar private-sector entity conducts such operations. https://doi.org/10.1016/j.clsr.2018.05.033 0267-3649/© 2018 Joseph V. DeMarco. Published by Elsevier Ltd. All rights reserved. computer law & security review 34 (2018) 908–911 909 can prompt appropriate changes and security improvements test. Grey Box testing is when the Company provides partial based on observed cyber-weaknesses. As readers of this publi- details of the target systems and the network defense orga- cation are likely aware, one common example of ethical hack- nization may have some notice of the test. White Box test- ing is the penetration test, whereby a Company enlists a tech- ing is when a Company provides the Team with full and com- nology consultant to test certain points of vulnerability in the plete details of the network, applications, and internal proce- company’s system at a certain period in time in coordination dures and when the Company’s network defense organization with the Company’s IT personnel. In contrast, Red Teaming knows about the test in advance. The recommendations below involves a more comprehensive cyber-security assessment of are generally applicable to all of these scenarios. a company, often over a longer period of time and usually with little or no warning to employees within the company. Indeed, knowledge of the exercise is sometimes limited only 3. Legal risks to a handful of senior management –and in some cases, to increase the realism of the test, the CISO and head of phys- 3.1. Access to sensitive information ical security (or their functional equivalents) are deliberately excluded from the “circle of trust” and have no knowledge of Even though the Company voluntarily authorizes 4 the hack- the exercise until it is concluded. ing, it does not mean that the hacking is free of a variety of Ty p i c a l l y, the operation aims to identify both the cyber and statutory and contractual legal risks. The Company’s systems physical vulnerabilities in a Company’s network and systems. likely contain a variety of personal information that is sub- The Red Team (which is carefully selected and operates un- ject to local and foreign national laws (and both federal and der strict supervision) often begins by gathering as much in- state laws in the United States). For example, in the U.S., un- formation as possible from publicly available sources about der federal and state data breach statutes, Companies who the “target” whether it is the corporation as a whole or a divi- hold personal information that is inadvertently exposed must sion or even single facility of the Company. This “reconnais- undertake an extensive investigation and expensive remedial sance phase” can also include the collection of information on measures to inform affected individuals of the breach. Ad- Corporate personnel who will be targeted. Often, those em- ditionally, the exposure or deletion of data may give rise to ployees’ social media profiles are a rich source of data that causes of action in tort or could violate contractual provi- can be used to learn who to target in order to gain access to sions between the Company and third parties. A properly con- company facilities, systems, or confidential information. The ceived Red Team operation should, through knowledgeable le- Red Team generally does not leverage knowledge of internal gal counsel, analyze these laws in advance, so as not to trigger operations, sources of information, Corporate network access; a “false alarm” and needless data breach report by the Corpo- rather, they seek to emulate access and availability of an ex- ration. ternal attacker. Once potential weaknesses are identified, the Red Team operatives should, to the extent possible, avoid Team then employs many of the same tools that a black hat viewing any electronic financial data, credit reports, employee hacker would use to compromise company servers and net- or applicant data, or health data. Unless otherwise stated in works, including “social engineering”2 techniques that solicit writing, data exfiltration relating to employees—whether cur- critical information from employees under false pretenses. In rent, former, or prospective—of the Corporation should almost addition, physical intrusion testers may be tasked with sur- always be prohibited or only be conducted with prior approval reptitiously gaining access to areas in Company facilities to and appropriate documentation. Similarly, exfiltration of data identify weaknesses in physical security or, place a device on outside of the internal network should not be permitted. In ad- the Company’s system to aid the hacking. For example, a tester dition, to maximize security, information compromised dur- may pose as a package delivery person or use a cloned build- ing a testing engagement should not traverse the internal ing access card to get access to a server room, or just to com- network with risk of external exposure. Moreover, unless oth- puters that are unattended. They may even scatter “infected” erwise approved in advance, testers should not access or thumb drives in company offices in the hope that someone attempt to access customer data, sensitive employee infor- might plug them into a corporate computer.3 mation, or systems housing information not owned by the The Team may or may not provide some limited informa- Company. tion to the company’s IT department in advance for certain In terms of attack technique and tradecraft, malware parts of the operation. Black Box testing is when the Com- should never be employed for any purpose during the exercise. pany provides no information prior to the start of testing to In addition to implicating potential liability under local com- the Team about the company’s network and the Company’s puter crime laws, the malware may damage data or spread to network defense organization has no prior knowledge of the other systems in unpredictable ways that could give rise to a claim sounding in negligence, among other legal liabilities. 2 Examples of “social engineering” include sending phishing emails to Company employees or “pre-texting,” communicating 4 As will be discussed elsewhere, see infra, it is crucial that inter- with employees using a fabricated scenario to obtain information. nal or external legal counsel versed in the issues discussed herein 3 Naturally, the drives will not contain any actual malware; they be closely involved in the conceptualization and execution of the can, however, be configured to “beacon home” to the Red Team op- exercise. At the outset, counsel can guide the Corporation in the erations center with information about where the drive was con- proper methods of exercise authorization so as to ensure that it is nected and, potentially, who connected it. Targeted remedial mea- not “ultra vires” while at the same time maintaining the parame- sures can then be considered by management. ters of desired secrecy. 910 computer law & security review 34 (2018) 908–911 Instead, as a general matter, Red Team testing efforts should confrontation and bodily injury.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us