This story appeared on Network World at
Network managers: good worries, disappointing lapses
Security managers exhibiting risky behaviors, survey shows
'Net Insider By Scott Bradner , Network World , 05/06/2008
Most of the survey questions concerned security, as it should be, considering the importance of that topic. The general results (also covered by Network WorldŐs Denise Dubie) are generally realistic -- managers felt issues that they might have an ability to affect were more important than some of the issues (like user training) that managers often feel are impossible or at least outside their ability to control. But behind the headlines there were some results I found surprising and not just a little disappointing.
Most usefully, because VanDyke has been commissioning this survey for five years, one can get a sense of the changing management pain points. Issues that managers who answered the survey this year felt to be most important were securing remote access (up in importance over the last five years), keeping virus definitions up to date (down quite a bit over the same period) and monitoring intrusions (which has stayed about the same).
The biggest decline in importance over the five years the survey has been run is patching systems. I expect this is not because the need to patch has decreased in any way but because patching systems are now quite mature and thus are not a significant worry. I also expect that the drop in importance of keeping virus definitions up to date has happened for the same reason.
For all the focus on real problems mentioned by the survey, a few important ones seem not to be getting proper attention.
More than a quarter of network managers admit that they are still configuring their network devices using insecure telnet, and more than a third are using insecure HTTP rather than using secure SSH or HTTPS.
While this is down quite a bit from five years ago it is still far too high. I only hope that there are no cases where the network manager has to access the network devices while at a conference or hotel. It's easy to hand control of your network devices to a random observer in such cases. A tale from long ago illustrates the potential for mischief when passwords get leaked, as they can be with telnet and HTTP.
The router passwords for a good-sized ISP got compromised. One day someone logged into each router in succession, starting with the ones furthest out. This person proceeded to turn off each outward-facing interface and change the password on the router. It did not take long for the network to have the forwarding ability of a pile of bricks.
other clear and present danger is the lack of the use of secure file-transfer
methods when exchanging confidential information with third parties (such as
customers and vendors) and when doing the same with remote offices. Less than
half of the respondents said they always used secure methods in both cases --
another quarter said they mostly did.
This makes me sad - with all the coverage of security issues there are still organizations that actively try to give their secrets away. One can only wonder where their auditors are.
Disclaimer: I know where HarvardŐs auditors are (which is one reason I wonder about some other auditors), but they have not, nor has the university, reviewed this survey report so the above review is mine.
All contents copyright 1995-2009 Network World, Inc. http://www.networkworld.com