In the News:
Security Today – by Sam Rehman
When organizations began sending employees home in early 2020, it’s likely that few realized just how long their workforces would remain remote or how security risks would increase right along with it. However, the new security realities quickly became clear. Organizations small to large have been impacted, with some of the world’s largest companies taking the biggest hits. At the end of March, Marriott reported that more than 5.2 million guest records had been compromised by a hacker using the logins of two employees at a franchise property. It is the second breach in 18 months, with the first affecting over half a billion people. In early April, Zoom learned that hackers had obtained half a million user passwords and were selling them on the dark web. And, in July, the Twitter account of celebrities including Barack Obama, Bill Gates and Elon Musk were accessed by hackers who convinced company employees to give them access to the customer service portal.
Now that millions will continue working remotely for an unknown number of months to come, protecting the entire organization from security threats is an emergent priority.
Remote work is nothing new, but the recent scale of it is. Many companies and their employees were unprepared for such an abrupt shift—one that has dramatically changed network and enterprise boundaries. According to findings from a July TrendMicro survey of 13,200 remote workers across 27 countries, more than half are using a non-work app on a corporate device, with 66% indicating they have uploaded corporate data to it. Ironically, employees are more likely to download an app than open an unknown email, but apps can be just as insecure and malicious. In fact, Google Play store has discovered and removed more than 1,700 apps infected with the notorious Joker malware since 2017, but it continues to spread. This trusting behavior is often reflective of a false sense of security, where workers assume that company filters are actively defending their personal Wi-Fi and home environment while providing end-to-end encryption of data sent. When this mindset is left unaddressed, employees unwittingly expose sensitive employee and client data to nefarious actors.
Trust nothing and verify everything
As they chart a path toward securing the entire remote-work ecosystem, many organizations have turned to a zero-trust approach. This applies to people, computers, networks and platforms. While some use remote monitoring tools that track employee idle time and browsing, the zero-trust approach prioritizes safeguarding data. And for good reason. Digital is everywhere and underpins everything related to how we work, communicate and innovate. Particularly for companies making the transformation, the ecosystem becomes increasingly complex. With the threat landscape expanding exponentially, enterprises must take a more holistic approach to security that includes proactive protection, pervasive defense, actionable intelligence, and rapid response.
To help organizations work from anywhere and still maintain the necessary security posture, EPAM created the Remote Red Room. Recognizing that physical relocation from a hardened commercial facility (ODC) to an individual’s home naturally results in decreased overall security (if controls remain unchanged), the system is designed to provide verification for the binding between a physical identity and an employee’s access identity. It is similar to traditional onsite Yellow (medium security) and Red Rooms (high security), which are important when dealing with sensitive data that links to an individual’s financial, health, educational or employment information. Though not very well-known concepts outside of specific industries, these secure data rooms ensure levels of compliance and security are enforced and monitored for anyone entering, with Red the highest.
Characteristics of a traditional on-site Yellow Room:
- Optional: Video surveillance for entry/exit
- Optional: Corporate mobile phones only (no cameras)
- Optional: Remote identification (security officer) for each person entering the room
- Optional: Verification for the binding between a physical identification and the access identity
Digital vs. digitalization
Characteristics of a traditional on-site Red Room:
- All optional items for the yellow-zone setup are mandatory
- Security officer controls in person entry/exit
- Full video surveillance off the working area
- Optional: No cell phones
- Optional: Personal search/metal detector
- Optional: Color/Numbered paper if printing is required
- Optional: RF Shield (smaller rooms)
Characteristics of the Remote Red Room
The Remote Red Room moves workstation controls to a contained virtual desktop (VDI) environment, with enhanced hardware standards enforced by technical controls and monitoring. The binding between VDI, plus image verification and other behavioral analytics is key. As a result, common home network hardware risks are minimized. Here’s how it works:
Utilizing machine learning and a mounted wide-angle camera, the system must recognize the person in front of the computer screen or will be denied access. If an unknown person appears in the visual line of sight, access is blocked, or the system shuts down. The same actions occur if the authorized person takes out a phone or places unknown papers on the desk. Additionally, snapshots are taken and sent to a manager or administrator who will further assesses the risks.
In certain sectors—especially insurance, medical and finance where confidential information makes up the bulk of data—the Red Room is widely known as a more secure space for conducting business or transactions. The Remote Red Room controls provides a critical set of controls to mitigate a set of risk introduced when the end points are remote or mobile. And when normal operations resume, whether that means a return to office or a hybrid model, these enhanced controls can be layered on top of any existing ODC environment and provide additional value.
Considering the current challenges that organizations of all sizes and in all industries face, the Remote Red Room affords an essential layer of security that may not have been necessary in many sectors before the pandemic. It can also help safeguard employees from unintentional mis-steps and errors, as well as cybercrime. As more companies realize the potential of a flexible and distributed workforce, new ways to ensure safety will contribute to bolstering both productivity and security.
About Sam Rehman
Mr. Rehman leads EPAM’s internal and external security functions as Chief Information Security Officer, SVP. In his role, he is responsible for all aspects of information security in the company, including the oversight of EPAM’s internal controls, the CyberR&D Lab, the company’s security research and insights arm, and EPAM’s full, global Trusted Services model for customers.
With 30+ years of experience in both software product engineering and security, he is a proven technology expert and evangelist with patented inventions in software security, cloud computing, storage systems and distributed computing. While his most recent role was as Head of Digital Engineering Business of Cognizant, and prior to that, as the CTO of Arxan, a security industry leader in application self-protection products, Sam was previously EPAM's CTO and Co-Head of Global Delivery.
Prior to his initial role with EPAM, Sam was a serial entrepreneur, and held a number of critical roles including engineering leadership at Oracle’s Server Technology group. Sam is a certified Krav Maga instructor and martial artist, with 20 years of competitive combative sports experience.
The original article can be found here.