Rich makes the case that A Is Not for Availability in this week’s FireStarter. Basically his thinking is that the A in the CIA triad needs to be attribution, rather than availability. At least when thinking about security information (as opposed to infrastructure). Turns out that was a rather controversial position within the Securosis band.
Yes, that’s right, we don’t always agree with each other. Some research firms gloss over these disagreements, forcing a measure of consensus, and then force every analyst to toe the line. Lord knows, you can never disagree in front of a client. Never. Well, Securosis is not your grandpappy’s research firm. Not only do we disagree with each other, but we call each other out, usually in a fairly public manner.
Rich is not wrong that attribution is important – whether discussing information or infrastructure security. Knowing who is doing what is critical. We’ve done a ton of research about the importance of integrating identity information into your security program, and will continue. Especially now that Gunnar is around to teach us what we don’t know. But some of us are not ready to give up the ghost on availability. Not just yet, anyway.
One of the core tenets of the Pragmatic CSO philosophy is a concept I called the Reasons to Secure. There are five, and #1 is Maintain Business System Availability. You see, if key business systems go down, you are out of business. Period. If it’s a security breach that took the systems down, you might as well dust off your resume – you’ll need it sooner rather than later. Again, I’m not going to dispute the importance of attribution, especially as data continues to spread to the four corners of the world and we continue to lose control of it. But not to the exclusion of availability as a core consideration for every decision we make.
And I’m not alone in challenging this contention. James Arlen, one of our Canadian Wonder Twins, sent this succinct response to our internal mailing list this AM:
As someone who is often found ranting that availability has to be the first member of the CIA triad instead of the last, I’m not sure that I can just walk away from it. I’m going to have to have some kind of support, perhaps a process to get from hugging availability to thinking about the problem more holistically. Is this ultimately about the maturation of the average CIO from superannuated VP of IT to a real information manager who is capable of paying attention to all the elements of attribution (as you so eloquently describe) and beginning the process of folding in the kind of information risk management that the CISOs have been carrying while the CIO plays with blinky lights?
James makes an interesting point here, and it’s clearly something that is echoed in the P-CSO: the importance of thinking in business terms, which means it’s about ensuring everything is brought back to business impact. The concept of information risk management is still pretty nebulous, but ultimately any decision we make to restrict access or bolster defenses needs to be based on the economic impact on the business.
So maybe the CIA acronym becomes CIA^2, so now you have availability and attribution as key aspects of security. But at least some of us believe you neglect availability at your peril. I’m pretty sure the CEO is a lot more interested in whether the systems that drive the business are running than who is doing what. At least at the highest level.
Reader interactions
17 Replies to “Counterpoint: Availability Is Job #1”
I agree that availability is job 1, its just not security’s job. We have built approx zero systems that have traditional cia, time to move on.
I always thought it was CIA^2N where the additional A is for “authenticity” (which is pretty damn close to attribution, whether your are talking about DATA or Network Communications) and the N is for Non-Repudiation, but then of course come folks argue that Integrity = Authenticity. But this could easily degrade into an academic argument, if it hasn’t already 😉
@Mike – attribution is a prerequisite for information centric security. You need attribution of some type to prescribe of suitable controls to the data. And remember, Rich’s post is based upon Quantum Dataum, a finite unit of data. The entire thread must is made from that perspective. I just want to keep what we want to do (C-I-A) from how we want to do it.
—
@Rich – I’d like to see more ‘fail-closed’ models.
—
@Dean – DDoS is _so_ 2002. Seriously though, can you imagine the complains from users if they could not buy a Thigh Master over an unsecured connection while at Starbucks with their Windows98 laptop and IE6 browser? Heck, they’ll just drive to Walmart to avoid the hassle. That said, whenever my credit card has been rejected for on line purchases the error does not tell me anything, the online merchant is not permitted to tell me anything, and the credit card company won’t tell me why that particular transaction send their fraud detection system into overdrive. Useful information and responses would help the merchants in this regard … but I digress.
-Adrian
Dean,
Take a look at my comments in the other post.
C I and A are always in conflict- keep it safe? Or keep it running? As Mike said those are business decisions we inform and implement.
But if my focus is on “protecting the data”, then availability is what I will most likely drop. If the goal is to keep the site up? Which might be more or less important? Then C and I drop.
I fully agree that the primary goal of infrastructure-centric security is availability. But for information-centric/data security? Then it falls more into usability.
(and give me a little credit- I’d never make such a stupid statement to a CISO within that context. I’d have been out of business a long time ago if I acted like that).
If Availability is not a major security concern, please explain to me what to say to the CIO when he receives a message from a cyber-extortionist threatening a DDoS from a botnet that he controls unless the company forks over a lot of cash, and I tell him that my high-priced consultants recommended that I omit availability from my security strategy.
@rich, availability is a business decision. Business folks may decide the risk of fail open is not acceptable. *That is their choice.*
Ultimately it’s about giving business managers the information they need to make decisions, understanding the risk of said decisions. If they decide Fail Closed is the right business decision, then we do that at the cost of potential availability.
My point is that arbitrarily making that choice without input from the business is a bad idea.
If attribution is a tool, what goal is it supporting?
To defend myself a bit before I jump into an all day meeting…
If availability is job 1, why do we ever use fail-closed security controls?
Expand on this Adrian. Or do your own counter-point post. If C, I, and A are *goals*, and attribution is a tool, what other *tools* do we need to worry about? I kind of like the distinction between a tool and a goal, but I think it needs to be fleshed out a bit better.
And yes, folks this is how the sausage is made.
Ugh. Was hoping to side-step this comment, but your counter-point forces my hand: attribution is just a tool. Availability is a goal. Attribution is a critical tool for data security implementations, but I just don’t see why we need to mix it into the C-I-A model.
-Adrian