"Untrained" or Uncertified IT Workers Are Not the Primary Security Problem
There's a widespread myth damaging digital security policy making. As with most security myths it certainly seems "true," until you spend some time outside the policy making world and think at the level where real IT gets done.
The myth is this: "If we just had a better trained and more professional IT corps, digital security would improve."
This myth is the core of the story White House Commission Debates Certification Requirements For Cybersecurity Pros. It says in part:
A commission set up to advise the Obama administration on cybersecurity policy is considering recommending certification and training for federal IT security employees and contractors.
The Commission on Cybersecurity for the 44th Presidency, which in December 2008 issued its Securing Cyberspace for the 44th Presidency report to Congress, is currently working on a sequel to that report, due sometime in late June or early July. The commission, made up of a who's who of experts and policy-makers, is debating strategies for building and developing a skilled cybersecurity workforce for the U.S., as well as issues surrounding an international cybersecurity strategy and online authentication...
[R]egulated entities, such as critical infrastructure firms, also would likely fall within its scope.
My opinion? This is a jobs program for security training and certification companies.
(Disclaimer: I still teach TCP/IP Weapons School four times per year for Black Hat, and I organize the Incident Detection Summit for SANS. I've also held the CISSP since 2001. Whether this makes you more or less inclined to listen to me is up to you!)
So what's the problem? Isn't training good for everyone?
In a world of exploding Federal budgets, every new spending proposal should be carefully examined. In the words of the article:
[M]andating certifications could be a bit limiting -- and expensive -- for the feds. "I don't know if the government has that kind of money lying around." Certification courses can cost thousands of dollars per person, for example.
Here's my counter-proposal that will be cheaper, more effective, and still provide a gravy train for the trainers and certifiers:
Train Federal non-IT managers first.
What do I mean? Well, do you really think the problem with digital security involves people on the front lines not knowing what they are supposed to do? In my opinion, the problem is management who remains largely ignorant of the modern security environment. If management truly understood the risks in their environment, they would be reallocating existing budgets to train their workforce to better defend their agencies.
Let's say you still think the problem is that people on the front lines do not know what they are supposed to do. Whose fault is that? Easy: management. A core responsibility of management is to organize, train, and equip their teams to do their jobs. In other words, in agencies where IT workers may not be qualified, I guarantee their management is failing their responsibilities.
So why not still start with training IT workers? Simple: worker gets trained, returns to job, the following conversation occurs:
Worker to boss: "Hey boss, I just learned how terrible our security is. We need to do X, Y, and Z, and stop listening to vendors A, B, and C, and hire people 1, 2, and 3, and..."
Boss to worker: "Go paint a rock."
Instead of spending money first on IT workers, educate their management, throughout the organization, on the security risks in their public and private lives. Unleash competent Blue and Red teams on their agencies, perform some tactical security monitoring, and then bring the results to a class where attendees sign a waiver saying their own activity is subject to monitoring. During the class shock the crowd by showing how insecure their environment is, how the instructors know everyone's Facebook and banking logins, and how they could cause professional and personal devastation for every attendee and their agency.
We need to help managers understand how dangerous the digital world is and let them allocate budgets accordingly.
The myth is this: "If we just had a better trained and more professional IT corps, digital security would improve."
This myth is the core of the story White House Commission Debates Certification Requirements For Cybersecurity Pros. It says in part:
A commission set up to advise the Obama administration on cybersecurity policy is considering recommending certification and training for federal IT security employees and contractors.
The Commission on Cybersecurity for the 44th Presidency, which in December 2008 issued its Securing Cyberspace for the 44th Presidency report to Congress, is currently working on a sequel to that report, due sometime in late June or early July. The commission, made up of a who's who of experts and policy-makers, is debating strategies for building and developing a skilled cybersecurity workforce for the U.S., as well as issues surrounding an international cybersecurity strategy and online authentication...
[R]egulated entities, such as critical infrastructure firms, also would likely fall within its scope.
My opinion? This is a jobs program for security training and certification companies.
(Disclaimer: I still teach TCP/IP Weapons School four times per year for Black Hat, and I organize the Incident Detection Summit for SANS. I've also held the CISSP since 2001. Whether this makes you more or less inclined to listen to me is up to you!)
So what's the problem? Isn't training good for everyone?
In a world of exploding Federal budgets, every new spending proposal should be carefully examined. In the words of the article:
[M]andating certifications could be a bit limiting -- and expensive -- for the feds. "I don't know if the government has that kind of money lying around." Certification courses can cost thousands of dollars per person, for example.
Here's my counter-proposal that will be cheaper, more effective, and still provide a gravy train for the trainers and certifiers:
Train Federal non-IT managers first.
What do I mean? Well, do you really think the problem with digital security involves people on the front lines not knowing what they are supposed to do? In my opinion, the problem is management who remains largely ignorant of the modern security environment. If management truly understood the risks in their environment, they would be reallocating existing budgets to train their workforce to better defend their agencies.
Let's say you still think the problem is that people on the front lines do not know what they are supposed to do. Whose fault is that? Easy: management. A core responsibility of management is to organize, train, and equip their teams to do their jobs. In other words, in agencies where IT workers may not be qualified, I guarantee their management is failing their responsibilities.
So why not still start with training IT workers? Simple: worker gets trained, returns to job, the following conversation occurs:
Worker to boss: "Hey boss, I just learned how terrible our security is. We need to do X, Y, and Z, and stop listening to vendors A, B, and C, and hire people 1, 2, and 3, and..."
Boss to worker: "Go paint a rock."
Instead of spending money first on IT workers, educate their management, throughout the organization, on the security risks in their public and private lives. Unleash competent Blue and Red teams on their agencies, perform some tactical security monitoring, and then bring the results to a class where attendees sign a waiver saying their own activity is subject to monitoring. During the class shock the crowd by showing how insecure their environment is, how the instructors know everyone's Facebook and banking logins, and how they could cause professional and personal devastation for every attendee and their agency.
We need to help managers understand how dangerous the digital world is and let them allocate budgets accordingly.
Comments
Training is a different story. I have always believed that for a professional, training is an personnal responsibility. An employeer's willingness to assist with training is a significant benifit up there with how many days of leave, but for the employer it is a benifit. Personnally I have two major certs (CISSP and CISA) with no Boot Camps, all individual study, (and I walked ten miles home from school in the snow!), more reason why I don't see where the employeer picks up the requirement for training for certs. Phase in time to train and test, yes; responsibility to pay for training, not so much.
On the other hand "Train Federal non-IT managers first." This is not really professional training but propaganda (not a bad word, really!). It is already a requirement in the federal world. And it is done universally and poorly. So we have all these professional IT Security Managers running training programs for the organization and not getting results. My solution. Require them to get real certs. Most of the worthless ones will not pass. Most of the good ones will now have letters after their names. Again I'm failing to catch the downside. Yes, it is a crude way of seperating the wheat from the chaff, but right now the method is equally crude but unfortunatly we keep mostly the chaff.
P.S. Organize, train and equip is a service responsibility. For soldiers, absolutely. For GS-15s not so much. They get the position because of a claim of professional compentance. Show me your master piece.
The debate isn't about whether or not certifications are a good thing for some or even most people, the debate is about whether all security professionals should be required by law to obtain them in order to work with governments or critical infrastructure. Certifications may work out great for some people, but there are many professionals who do not maintain them and there are many contexts in which they are not absolutely required even if they are preferred. Many of us in this industry do not want to be bothered sitting through regular retests of material or tracking hundreds of CPE credit hours when our professional experience and accomplishments speak for themselves. I'm glad your certification has worked out well for you but I do not want to be forced to do the same thing and I don't see the value in it. My time is not free, and that is the downside.
Unfortunately the problem is not what is good for you, but what is good for the government. What we have now is a disaster, painfully close to where fixing the watch with a hammer might provide a better result. Too many government requirements are set up not to solve the problem at hand, but to solve another completly unrelated problem. At least the question of required certs addresses the question at hand. For you perhaps not in the best possible way.
http://www.wired.com/dangerroom/2010/06/dhs-geek-squad-understaffed-with-no-juice-and-no-plan/#comments
I agree that having a certified IA force is not the silver bullet. However, we do need some measure for our security/IA workforce. We intended the DoD certification to be coupled with a maturing process, where the candidate had to grow into the positon that required a commerical certification.
We also developed standards and certifications for those non-IT managers. Unfortunately that part of the program didn't take off.