Document 14474896

advertisement
Copyright © 2004 Information Systems Audit and Control Association. All rights reserved. www.isaca.org.
Security, Audit and Control Issues for Managing
Risk in the Wireless LAN Environment
By Richard A. Stanley, Ph.D., PE, CISSP
Business Drivers
Today, wireless transmission is a common method of data
communication for cellular phones, wireless personal digital
assistants (PDAs), Blackberrys, text pagers and wireless local
area networks (WLANs). Business requirements are providing
the “pull” for wireless technology, which can offer lower
installation and operating costs, mobility and flexibility.
Technology is providing the ability for sophisticated systems
that solve real business needs to be built and sold affordably.
The lure of being able to stay connected with business,
wherever and whenever, is certainly a main driver.
Security Issues
This push to untethered access to business is forcing
enterprises to deal head-on with security. Achieving this new
level of security requires weighing vulnerabilities against
requirements and the costs of reducing those vulnerabilities.
Wireless networks are inherently less secure than their wired
counterparts. The confidentiality of data is at risk because data
are sent through the free-space environment or into the air
where anyone with the appropriate technology can intercept
and/or spoof the data. The engineering standards for cellular
telephone availability (i.e., the probability of not getting a dial
tone when attempting a call) are lower than for wired
telephony, so availability is a concern. However, unlike
wireless voice networks, wireless data networks tend to be
always on, always ready to transmit or receive data. They face
the same vulnerabilities as do wireless voice networks, but
they tend to be always available for those vulnerabilities to be
exploited. Wireless communications also pose significant
technical challenges, as well as greater challenges in the areas
of control, security and audit, because they transcend
traditional and regulatory boundaries.
It is necessary to understand wireless technology and the
ways that it can be exploited to effectively implement security. A
security policy that deals realistically with the threats faced by
the network in question and is in compliance with local laws and
regulations is needed. Appropriate controls are also needed to
ensure that the measures called for in the security policy are, in
fact, implemented and that they perform as intended.
Understanding the security and quality risks that surround
wireless communications is a critical requirement for auditors.
Not only must the auditor know how the system works and
what can go wrong, he/she must also know the steps to take to
identify and correct problems when they occur. Equally
important, the auditor must have an idea of what can go
wrong, so that systems can be evaluated periodically to ensure
that all the appropriate measures are taken for each system to
assure the desired level of quality and security.
However, security is not an absolute. It is impossible to
provide unbreakable security, whether in a wireless network or
in a military setting. No matter how hard one tries, if an
adversary is willing to devote sufficient resources to
overcoming the defenses, he/she will succeed. The security
goal is to make it either too costly for an adversary to attack
the system, or to provide an incentive for the attacker to attack
another system.
Wireless networks are like radio stations because the
information-bearing signals are radiated into space or in the
air. As a result, anyone within range of the radio signal is able
to receive the network signal and, potentially, read the network
traffic and possibly connect to the network as do authorized
users. This places additional security requirements on the
network architecture and administration and may include
additional encryption and more sophisticated data handling
algorithms. Increasingly, wireless networks are used as
extensions of existing wired networks, which means that the
security problems of a relatively small wireless segment of a
network can suddenly become a security problem of the first
magnitude for the entire network. Adding a wireless extension
to a fixed network does not alter the four basic goals of
security: availability, authenticity, integrity and confidentiality.
Security Goals
Confidentiality is usually seen as a good thing—the more of
it, the better. When people think of security, they think about
confidentiality. Auditors want to make sure the information
being transmited through the air remains private.
Confidentiality does not come for free. One must invest in
cryptographic software and/or hardware to encrypt and decrypt
messages, and then deal with the continuing requirement for
managing the cryptographic keys, among other management
procedures. This is detailed, time-consuming and costly.
Unless the cost can be justified by the value of the information
to be protected, it is difficult to choose confidentiality on a
cost-benefit basis. Furthermore, there are many business
settings where confidentiality is simply not required, but other
aspects of security are.
Authenticity provides the recipient with assurance that the
message at hand truly originated with the purported sender and
that the sender is who he/she purports to be. Although
provided by cryptographic means, authenticity and
INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 3, 2004
confidentiality need not be part of the same package of
cryptographic services. One can easily envision situations in
which authenticity is desired, but confidentiality is not
necessary. Consider an electronic release of new tax code
documents. The issuing authority wants each branch office to
be sure that the documents at hand are authentic, i.e., they
came from the official source. On the other hand, the
documents are public information, and there is no need for
their contents to be kept secret.
Integrity provides assurance that the message received is
identical to the message sent, and that it has not been changed
either deliberately or accidentally. As it happens, the same
cryptographic tools that provide authenticity also tend to
provide integrity. Many network protocols, such as TCP, work
to provide integrity of messages sent over the network, but the
methods these protocols use are not secure enough to ensure
that the message and the integrity check were not altered.
Cryptographic integrity checks increase the level of assurance
of integrity, and are much more difficult to falsify than are
checks computed by an open protocol using data available to
anyone listening on the network.
Availability, unlike confidentiality, authenticity and
integrity, cannot be improved using cryptographic techniques.
If the business relies on a wireless network to deliver messages
when and where required, the enterprise must be confident the
network will be available. It may, in fact, make it worse by
increasing the level of complexity of the system and/or by
providing another means of attacking the system. Wireless
extensions to wired networks may also degrade the overall
network availability, as wireless systems are vulnerable to
many things that reduce their availability but do not affect
wired networks, such as interference and jamming. The net
effect of these additional, wireless-specific vulnerabilities is to
decrease the availability of the entire network.
Role of Assurance Professionals
Assurance professionals must understand the post-design
choices that were made for the networks being audited. They
must also understand the alternatives so intelligent
recommendations can be made to the network owners
regarding modifications that might be made to security
parameters to achieve lower costs, improved availability, etc.,
within the scope of the security requirements for the network.
The wireless network is rarely separable from the wired
network to which it connects. The performance of the wireless
network directly affects the performance of the backbone
wired network, usually in a more direct way than the wired
network affects the wireless segment.
Additionally, assurance professionals must understand that a
solid security policy is the key to defining and enforcing
security within any organization. At a minimum, the policy
should involve continuous review of potential threats and
vulnerabilities and should deal with:
• Overall policy
• Access control
• Usage management and monitoring
• Security monitoring
• Network security
• Virus protection
• Encryption
• Pertinent laws
• Incident response
• Enforcement
Points Covered in the Security Policy
The security policy section devoted to access control should
define the bounds, authentication and standards. For example,
if the policy is for a network, then the network should be
described. It should state who is allowed access, when they are
allowed access and from where they are allowed access. For
wireless, the standards used should be identified. The policy
should also define who has the authority to grant exceptions to
the policy.
The security policy should also define user management and
monitoring. For example, if management does not permit any
personal telephone calls at work, then it is consistent to do the
same with the network. If limited personal telephone calls are
permitted, however, then it is reasonable to allow limited
personal network use. Whatever the decision, the point is to
strive for consistency. Having established standards for usage
of the network, it is wise to set out in the policy the penalties
for failure to observe those standards. For example, a bank has
a rigid policy that no one, except specifically authorized
personnel, is allowed even to attempt to access the accounts
payable directories. In the event that an unauthorized employee
attempts such access, the penalty is immediate dismissal.
Auditing data can be obtained from log files, which can in
turn be produced by many applications and services. Most
commonly, the operating system can log critical events and
make them available for review as required. The procedure for
collecting audit logs should be described in the security policy.
The network administrator often conducts periodic
monitoring of the network to ascertain the caliber of security
and compare it with the objective security levels. The policy
for doing this should be stated. If automated tools are to be
used, then it is good to describe what tools and who may use
them. The current state of intrusion detection (sometimes
called intrusion prevention) systems (IDSs) is improving, but
this technology is still immature. Network-based IDSs can
monitor the network for events that are identified by reference
to a rule set (which must, itself, be specified in the policy
someplace). When such events are identified, alarms can be
raised, to which appropriate response can be made after
investigation of the specifics of the event. Host-based IDSs can
detect illicit activities that do not transit the network, such as
installation of an unauthorized program or alteration of the
operating system database or registry. Network-based IDSs are
on the wired network backbone and cannot see much of the
problems encountered by the wireless segment. Host-based
IDSs on the wireless clients, if configured properly, can detect
many illicit connection problems and report them. Monitoring
of the radio link can also help improve the ability to detect
intrusions or intrusion attempts into wireless networks.
The decision to implement encryption in the network is not
to be taken lightly. Once chosen, the encryption parameters
and management structure should be clearly stated in the
policy document. Encryption is a valuable tool and can
contribute significantly to the security of wireless networking.
INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 3, 2004
However, if it is to be used effectively, the policy for its use
and maintenance must be carefully planned and thoroughly
described before attempting to encrypt the network.
Just as brick-and-mortar businesses exist within a legal
jurisdiction, so do networks. There are four areas of the law
that are of concern to wireless networks: radio regulations,
encryption, unauthorized use of the network and privacy. The
network security policy must deal with these areas of concern
adequately, coherently and consistently in the face of laws that
sometimes appear to be widely dissimilar.
The security policy is the assurance professional’s key
document. In it are the definition of the security goals, the
means of attempting to achieve those goals and the ways
success is monitored and measured. In a situation where
wireless networks exist, the security requirements of those
networks should be specifically described in the policy. If they
are not, there is no basis for further compliance measurement,
and the audit will be forced to proceed on the basis of the
auditor’s understanding of what the policy should say. As every
auditor knows, that is a difficult position from which to
proceed, so it is important to first evaluate the policy before
proceeding with the audit.
Conclusion
If the security is deemed by the auditor to be insufficient,
then the responsible parties should be advised to expend more
resources on the network to assure a higher degree of security.
If those entreaties are not heeded, auditors should document
the request and the response, as they will surely be important
should a liability case arise from a breach of network security.
Richard A. Stanley, Ph.D., PE, CISSP
is vice president of Wheeler Associates Limited, a technology
and educational consulting firm located outside Boston,
Massachusetts, USA, which specializes in custom security and
educational solutions. He has more than 35 years’ experience
with telecommunications and security systems and has directed
research in those areas for the US government and in the
private sector. His work has taken him all over the world, and
he has lived in Belgium, Canada, Germany, Israel, Egypt,
Vietnam and the US. He is a registered professional electrical
engineer in the Commonwealth of Massachusetts. Stanley is a
member of the New York Electronic Crimes Task Force and a
founding member of the New England Electronic Crimes Task
Force. He often speaks at professional gatherings, and he holds
appointment as an adjunct professor at Worcester Polytechnic
Institute, where he teaches security-related topics in electrical
engineering and computer science.
Editor’s Note:
This article is excerpted from research being published by
the IT Governance Institute in a publication titled Managing
Risk in the Wireless LAN Environment: Security, Audit and
Control Issues, by Richard A. Stanley, Ph.D., PE, CISSP. This
research is written from a business and risk management
perspective. It provides a technical, as well as functional,
assessment of the wireless landscape and will be available in
second quarter 2004. A white paper on wireless security can be
found at www.isaca.org/wirelesswhitepaper.htm. The
publication will be offered through the ISACA Bookstore at
www.isaca.org/bookstore.
Information Systems Control Journal, formerly the IS Audit & Control Journal, is published by the Information Systems Audit and Control Association, Inc.. Membership in the association, a voluntary
organization of persons interested in information systems (IS) auditing, control and security, entitles one to receive an annual subscription to the Information Systems Control Journal.
Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of the Information Systems Audit
and Control Association and/or the IT Governance Institute® and their committees, and from opinions endorsed by authors' employers, or the editors of this Journal. Information Systems Control Journal
does not attest to the originality of authors' content.
© Copyright 2004 by Information Systems Audit and Control Association Inc., formerly the EDP Auditors Association. All rights reserved. ISCATM Information Systems Control AssociationTM
Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the
association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles
owned by the Information Systems Audit and Control Association Inc., for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume,
and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the
association or the copyright owner is expressly prohibited.
www.isaca.org
INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 3, 2004
Download