While integrity has been a common word in the cybersecurity lexicon for years, its meaning and use have been relatively limited. It may be time to reconsider its central role in security. The grave new world of pervasive information and operational technology, always on/always connected networks, fluid data transfers across cloud and hybrid cloud environments, and broadly deployed endpoints, presents an opportunity for federal agencies to take a fresh look at integrity as an organizing concept for security strategy.
Enterprise cybersecurity has been a vexing challenge for years. Most common approaches prove exhausting and ultimately insufficient. Focusing on keeping attackers out of a perimeter is an untenable strategy—as “the perimeter” is now fluid and porous. Fretting about whether attackers have gained access to the enterprise network is unproductive—they are already there. Obsessing over threat intelligence is only partially helpful—defenders remain caught in a never-ending game of catch-up. And security measures like system hardening and access controls can be effective—but timely and accurate insight into their effectiveness is elusive.
Within this context, integrity has often been defined in one of two ways: the incorruptibility of data (as part of the CIA triad), and file integrity monitoring (FIM), a system monitoring control which has become a compliance requirement in broadly-applicable standards such as the Federal Information Security Management Act (FISMA) and PCI DSS (Payment Card Industry Security Data Security Standard). Data security and FIM have been the primary domain of conversations on integrity.
When viewed as a broader concept, however, integrity emerges as a way to understand what matters to an organization and what to focus on to prevent undesired consequences. As the basis for trust and reliability, integrity becomes the ultimate measure of system security. By reexamining security as an integrity problem, and realigning security controls accordingly, an organization can focus its efforts on maintaining trust in its people, processes and technology.
Integrity as the Basis for Security
By definition, true integrity allows for no variance between something’s original and current state, between its intended and realized states.1 In other words, its current state can be trusted because nothing has changed from its original or desired, trustworthy state. In a relational context, I determine that someone has integrity (therefore, can be trusted) when there is no variance between what they say they are going to do and what they actually do. In a physical context, I determine that a physical space has not been compromised (therefore, is safe to enter) when there is no change in the environment between the time I left and when I return. The term “integrity” serves as the basis for trust, and security is the result.
If security is the result of an environment’s unchanged state, then integrity is a necessary condition of security. The same is true when applying integrity to a computing environment. “Managing integrity is ultimately about managing change throughout your entire environment,” says Tim Erlin, Vice President of Product Management and Strategy for Tripwire, and author on Tripwire’s State of Security blog. “Change can be internal or external, authorized or unauthorized, intentional or accidental, benign or malicious.2 When you take an expansive view of change, it’s clear that managing integrity is at the core of foundational security.”
Integrity Defined
Most commonly, integrity is referenced as one of three CIA Triad principles—confidentiality, integrity and availability—that serve as a framework for organizations to make sound information security policies. In this context, integrity is generally focused on organizational data and making sure that data remains uncorrupted by external sources.3 While data integrity is certainly important to any security strategy, the term when used in this way significantly limits both the perspective and power of integrity in its broader application—one that impacts every area of an information system.
“Integrity is really at the heart of information security protections for any system,” says Ron Ross, Fellow at NIST. “Because if someone is able to indiscriminately change an application or a piece of data or the BIOS instructions or anything within the computing stack—whether the customer is aware or not aware of those changes—then that really attacks the basic underpinnings of an information system, along with everyone’s trust in it.”4 Integrity is a necessary condition and essential element of confidentiality and availability, its peers in the CIA triad.
Unfortunately, most organizations have security strategies based on the traditional understanding of integrity as a specific control like FIM, alongside other important controls. Without broadening integrity as an operational concept across the entire computing environment, we will continue to see minimal improvements to organizational cyber maturity levels.
Why Now?
Technology continues to evolve at a rapid pace, and one of the greatest challenges we face is attempting to defend an expanding attack surface that is borderless, porous and interdependent. In this environment, the old security approach (perimeter-based security and network defenses) has become untenable, and new approaches (zero trust, artificial intelligence and machine learning) remain unproven. Following a decade of tremendous growth of incidents causing massive financial, privacy and intellectual property losses, we know with certainty that bad actors are plentiful, and that traditional security solutions have failed to keep them out.
Given the explosive growth of data, the escalating number of endpoints attached to the network and the growing complexity of systems, it is nearly impossible to defend an agency—regardless of size or budget—from intruders. Of growing concern is not just the escalating number of endpoints, but the rapid speed at which remote endpoints such as laptops are being added to federal agency networks due to COVID-19 and other telework requirements.
Adding to this challenging situation is the explosive growth of the “Internet of Things” and the “Industrial Internet of Things,” or dedicated, connected devices that can collect and exchange data using embedded sensors, including medical devices, security cameras and electric meters.5 Most importantly, critical infrastructure systems essential to society are at risk.
“In the coming decade, agencies must refocus on ‘integrity’ as a critical operating principle,” says Maurice Uenuma, Tripwire’s VP of Federal. “The same security incidents that succeeded a decade ago continue to wreak havoc at every cyber maturity level, proving that perimeter-based security and network defenses routinely fail and that new ‘solutions’ often do not live up to their early promises.”
Those at the highest level of government are recognizing the risk of undetected and unmitigated changes within systems and networks. According to the Washington Times, at a hearing before the Senate Armed Services Committee, National Security Agency Director Mike Rogers, “…raised eyebrows by discussing a ‘worst-case scenario’ cyberattack on critical infrastructure that instead of revealing data—such as a WikiLeaks hack—would entail the manipulation of vital national data on a ‘massive scale.’”6 One significant result of an integrity-related attack is that decision-making by senior government officials, corporate executives and others is impaired because they’re not able to trust the information they’re receiving—or perhaps worse, they make decisions based on inaccurate or manipulated data.7
Destructive malware, ransomware, malicious insider activity, and even honest mistakes all set the stage for why organizations need to quickly detect and respond to an event that impacts integrity.
According to NIST SP 1800-25, a practice guide developed by NIST’s National Cybersecurity Center of Excellence (to which Tripwire was a contributor), the impact of integrity attacks includes, “Attacks against an organization’s data [that] compromise emails, employee records, financial records, and customer information—impacting business operations, revenue, and reputation. Examples of data integrity attacks include unauthorized insertion, deletion, or modification of data to corporate information such as emails, employee records, financial records, and customer data.”
Uenuma explains the potential severity of a modern-day data integrity attack: “Some organizations have experienced systemic attacks that force operations to cease. One variant of a data integrity attack—ransomware—encrypts data, leaving it modified in an unusable state. Other data integrity attacks may be more dynamic, targeting machines, spreading laterally across networks, and continuing to cause damage throughout an organization. In either case, behaviors are exhibited—such as files inexplicably becoming encrypted or network activity—that provide an ability to immediately detect the occurrence and respond in a timely fashion to curtail the ramifications.”
Enterprise Integrity as a Security
Strategy Integrity as an enterprise-wide organizing concept for security would extend beyond its currently narrow application as specific controls to encompass all aspects of architecture and security measures across IT and OT environments. Rather than a deployment of new capabilities, the emphasis would be on leveraging (and prioritizing) existing and emerging capabilities to maintain trust throughout the ecosystem, thus providing the necessary foundation for security.
An expansive view of integrity management would organize security controls to align with key elements of the ecosystem:
- Data integrity protects the incorruptibility of data, and includes data backup and recovery, encryption, blockchain, identity and access management (IDAM), and file access monitoring
- System integrity ensures that unauthorized changes are not made to critical assets, and includes FIM, secure configuration management, host-based intrusion detection systems (IDS), vulnerability management and patching, and privileged account management (PAM)
- Network integrity maintains the reliability of connections and protects the data in transit, and includes firewalls, network-based intrusion detection systems (IDS), encryption, virtual private networks (VPNs), and secure remote access
- Physical integrity protects the facilities and spaces within which critical assets reside, and includes access controls, security monitoring, all-hazards mitigation (fire, water, earthquakes, etc.), and uninterrupted power supplies
- Process integrity ensures that multiple controls are properly integrated, controlled, and coordinated to ensure a holistic approach to incorruptibility and resilience, and includes security incident and event management (SIEM), security orchestration, automation and response (SOAR), analytics and reporting, and a well-functioning security operations center (SOC)
- People integrity seeks to maintain trust in the humans who use IT and OT systems, create and use data, and oversee enterprise security efforts, and includes security awareness training, certification, role-based access controls (RBAC), end-user behavior analytics (EUBA), organizational policy enforcement, and background screening
Aligning security controls and integrity accordingly builds trust in organizations’ people, processes, and technology. Many tools help achieve and maintain visibility, and visibility is essential to ensuring that unauthorized or malicious changes have not occurred. Building trust then maintaining it is key to integrity management—and essential for achieving enterprise security.
The Role of FIM in Enterprise Integrity
In the context of government compliance, FIM has been used to satisfy certain requirements under FISMA. A critical security control called for in NIST 800-53 (SI-7), FIM includes the ability to view changes to configurations, files and file attributes throughout the IT infrastructure.
“Integrity is critical because once you establish a certain lockdown set of configuration settings or you deploy software, adversaries like to get into your systems and networks and they like to attack your systems and deploy unauthorized, malicious code,” says Ron Ross. “Thus, you have got to understand what’s on the network and make sure that any changes to that network are done by authorized individuals so that you have really strict control over the configuration settings and also any changes to software and systems that go on routinely within organizations.”8
When people think of FIM, most think of file or data integrity. In fact, FIM is a capability with a long history, going back to the original open-source Tripwire tool for monitoring file hashes9. While there are many approaches to FIM, agencies that do FIM well deploy solutions Immediate Action Required with capabilities beyond basic change monitoring. These capabilities allow organizations to detect change by first establishing a highly detailed baseline version of each monitored file or configuration in a known and trusted state. Using real-time monitoring, the organization can detect change to any aspect of a file or configuration and capture these in subsequent versions. Versions provide critical before-and-after views that show exactly who made the change, what changed, and more.
“To many organizations, FIM mostly means noise: too many changes, no context around these changes, and very little insight into whether a change actually poses a risk,” says Tripwire expert David Bisson.
Organizations that do FIM well also apply change intelligence to each change to determine if it impacts integrity (for example, rules that determine if the change takes a configuration out of policy or is one that is typically associated with an attack).10 “FIM is a critical security control, but it must provide sufficient insight and actionable intelligence,”11 says Bisson.
“If you think of your desired state measured in terms of acceptable risk, then maintaining integrity is all about maintaining that acceptable level of risk,” says Erlin. While check-the-box FIM applies this concept very narrowly to files and to limited configuration elements, mature integrity management seeks to apply this concept to the entirety of an organization’s IT ecosystem including systems, network devices, and cloud infrastructure.12 “
Integrity management is ultimately about managing change throughout your entire environment,” says Erlin. “When you take an expansive view of change, it’s clear that managing integrity is at the core of foundational security hygiene.”13
Immediate Action Required
The Verizon’s 2019 Data Breach Investigation Report (DBIR) highlights the significant role that integrity now plays as both an early compromise in the attack chain, as well as the final attribute compromised.16 According to Uenuma, “Assuming a bad actor has gained network access, it is important to limit the damage—during the actor’s first steps. Integrity management is about having the confidence in one’s ability to see critical assets, to make decisions that assure system integrity and to enable operations that identify, protect, detect, respond and recover. It is about taking effective actions immediately once the bad actor is in.”17
Check-the-Box Integrity vs. Integrity Done Well
But, as Maurice Uenuma notes, “In most cases, organizations have the tools in place to manage integrity—they are just not managing integrity well,”14
What does “managing integrity well” look like?
- Organizations centralize security and compliance visibility across the enterprise, from industrial spaces to data centers to a cloud environment
- In addition to scanning for vulnerabilities, they estimate and score the risk of vulnerabilities, enabling them to prioritize and focus remediation efforts on the highest risk hosts and the highest scoring vulnerabilities
- They continuously monitor, assess and compare secure configurations for each piece of hardware and version of software to established guidelines so that even the smallest configuration change of a critical asset doesn’t increase a system’s vulnerability
- While monitoring for changes to files and file attributes, they can tell the difference between business-as-usual changes and ones that spell trouble
- Last but not least, organizations that do integrity well deploy effective baselining to enable detection of unauthorized or potentially malicious changes.
Baselining is an under-appreciated and not-well-implemented security control that establishes “knowns” about an organization’s systems, so they can quickly recognize when something is out of place, both in a static and a dynamic sense.
According to Uenuma, “Baselining… helps defenders know what to focus on by alerting them to critical, unauthorized, potentially malicious changes on likely-targeted systems. It shifts the dynamic from just guessing where the attackers may be or just trying to harden systems in a tactical sense, to actually operationalizing enterprise risk management… and provides a single source of truth to understand the security, compliance and operational state of an asset by highlighting deviations from business-as-usual activity and known secure conditions.”15
The True Measure of Enterprise Security
Integrity when viewed as an operational concept in a computing environment is the basis for trust and the foundation of cybersecurity within an organization. Agencies can start applying this concept by extending their IM practices and policies from FIM to include the full range of assets managed. This will reduce their overall attack surface and address more cumulative security and operational risks. It’s no longer enough solely to watch for changes to organizational data—any change within a system can be a threat to an organization’s security.
Next, agencies need to assess the capabilities of their existing integrity management tools and identify a solution that provides visibility into critical assets, assurance of system integrity, and ensures operations stay focused on the right action.
Sources
- Tripwire white paper: Security Execs, It’s Time We Had the Integrity Talk
- Ibid
- Ibid
- Tripwire white paper: Closing the Integrity Gap With NIST’s Cybersecurity Framework
- Tripwire white paper: Security Execs, It’s Time We Had the Integrity Talk
- “Mike Rogers, NSA chief, to Senate: Cyberattack on infrastructure ‘worst-case scenario’”, Washington Times, May 9, 2017, http://www. washingtontimes.com/news/2017/may/9/ mikerogers-nsa-chief-senate-cyberattack-infrastru/
- Tripwire white paper: Security Execs, It’s Time We Had the Integrity Talk
- Tripwire white paper: Closing the Integrity Gap With NIST’s Cybersecurity Framework
- https://www.tripwire.com/ state-of-security/security-data-protection/file-integrity-monitoring/ what-is-integrity-management/
- Tripwire datasheet: Tripwire Enterprise File Integrity Manager
- https://www.tripwire.com/state-of-security/ security-data-protection/security-controls/ file-integrity-monitoring/
- Tripwire datasheet: Tripwire Enterprise File Integrity Manager
- Tripwire white paper: Security Execs, It’s Time We Had the Integrity Talk
- https://gcn.com/articles/2020/03/20/cybersecurity-integrity.aspx
- https://gcn.com/articles/2020/01/03/baselining-for-risk-management.aspx
- https://enterprise.verizon.com/resources/ reports/dbir/
- https://gcn.com/articles/2020/03/20/ cybersecurity-integrity.aspx
How Tripwire Helps
Tripwire’s best-in-class technology and services allow agencies to focus on the right endpoints in real-time, on-site and in the cloud, and enable intelligent decisions and actions to strengthen security. Our integrity management solution is an essential cybersecurity platform that enables federal departments and agencies to see with confidence, decide with confidence and operate with confidence, while meeting requirements established by independent frameworks and regulatory standards such as FISMA, NIST, DISA and CIS. Tripwire’s known and trusted IT/OT security capabilities are well suited for complex environments in the nation’s critical infrastructure sectors, across dispersed on-prem deployments, hybrid cloud architectures, and industrial control systems. Our award-winning cyber integrity solutions are used across the DoD, numerous intelligence agencies and their mission partners, nearly every federal department and in most of the independent agencies, as well as components of the Legislative and Judicial branches.
Let us take you through a demo of Tripwire security and compliance solutions and answer any of your questions.