tag:blogger.com,1999:blog-4088979.post2266480850461018243..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Nothing Is Perfectly SecureRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-4088979.post-41849837632848835712014-12-26T17:17:18.287-05:002014-12-26T17:17:18.287-05:00Schneier's Law: Anyone can invent a security s...Schneier's Law: Anyone can invent a security system that he himself cannot break. <br /><br />I'm not sure how I'd feel about having to work with someone who doesn't understand that. The job security probably isn't worth the headaches.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-58330393693141195302014-12-15T03:10:36.078-05:002014-12-15T03:10:36.078-05:00I'm sure a few people thought they built "...I'm sure a few people thought they built "perfectly secure" systems a few years ago using the latest SSL libraries and look how that turned out. <br />A "full patched" or "secure" system is so only at that fleeting moment in time. As technology continues to compress space and time, that "full patched and secure" moment grows shorter everyday.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-11819621708709922622014-12-09T08:58:57.544-05:002014-12-09T08:58:57.544-05:00What does 'secure' mean? Even if you have ...What does 'secure' mean? Even if you have a system that can't be used in any way other than what is designed (one definition of security) you are still subject to intentional or unintentional design flaws, or just a clever use of the existing functions. 'Secure' is really a human judgement, not one machines are likely to be able to make. Even if everything else is perfect, it can't be 'perfectly secure' since an authorized person can still go in and copy all the data and ship it off to someone else. I guess the old saying is true, perfectly secure means powered off, sealed in concrete, then dropped into the sun.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-84523158671772457492014-12-08T12:28:58.615-05:002014-12-08T12:28:58.615-05:00You should absolutely strive for a high level of s...You should absolutely strive for a high level of security, but they are not arguing for that. They are arguing that monitoring and testing are not necessary.<br /><br />They are using a belief in what they think makes a "secure system" in order to justify the argument against monitoring. That belief is a matter of faith which is contradicted by the facts.<br /><br />You can use the same logic against any kind of QA or stress testing in the world. Can you imagine what would happen if Boeing decided that everything they made was so well-engineered that none of it required quality control or any kind of monitoring?<br /><br />The same argument has been used to hide failures and excuse bad decisions throughout history, and it has always failed.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-73900496838415160032014-12-05T18:41:08.225-05:002014-12-05T18:41:08.225-05:00As Dan Geer would say... "The absense of unmi...As Dan Geer would say... "The absense of unmitigable surprise".redpriestnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-14605047571076245872014-12-05T17:29:01.729-05:002014-12-05T17:29:01.729-05:00Any system that relies on "perfection" o...Any system that relies on "perfection" or "not making mistakes" is inherently exploitable.<br /><br />Everything is made by human beings. And human beings fail, even when you have teams of careful people double-checking each other's work.<br /><br />To say you'll never fail is classic greek legend hubris.mwlucashttps://www.michaelwlucas.comnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-15329556631568349992014-12-05T17:26:33.573-05:002014-12-05T17:26:33.573-05:00I agree; trust but verify. It all plays into the d...I agree; trust but verify. It all plays into the defense in depth strategy, and history has proven that monitoring and response is 100% required. Also keep in mind that response also needs to include procedures for action on the inevitable as well; data will be lost/exposed so prepare for it.Venioushttps://www.blogger.com/profile/11764254462793172944noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-13086957866034942912014-12-05T17:22:04.526-05:002014-12-05T17:22:04.526-05:00I agree; Trust but verify. History has proven that...I agree; Trust but verify. History has proven that detection and response is 100% required. Response also needs to include a plan of action for the inevitable data loss/leakage as well, which is likely goes well beyond a technical response.Venioushttps://www.blogger.com/profile/11764254462793172944noreply@blogger.com