COBIT 5 Open for Review

ISACA has released what they call an “exposure draft” of COBIT 5 and is asking for public comment.

The primary objective of this exposure is to obtain public input and comment regarding the completeness, quality and value of the development work undertaken. Please complete the short survey questionnaire below to provide your feedback on the work completed to extend, improve and advance ISACA guidance in this area. This online questionnaire will remain open until 31 July 2011.

The primary differences from COBIT 4.1 seem to be twofold:

1) A move to pull all the ISACA frameworks and guidance together under COBIT as well as synchronize better with external standards

– Board Briefing on IT Governance, 2nd Edition
– Business Model for Information Security™(BMIS™)
– IT Assurance Framework™ (ITAF™)
– Risk IT Framework
– Taking Governance Forward
– Val IT™ Framework
Connect to other major frameworks and standards in the marketplace (ITIL, ISO standards, etc.)

Most notable is the integration with a capability maturity model to measure progress (e.g. ISO/IEC 15504 Based Capability Levels). This helps COBIT audits work on a more standardized measurement system.

2) Streamlined guideline process. Version 4.1, for example, had 36 processes to follow while version 5 is trying to organize them into just 7 slices (21 total — no bullseye). I heard it originally had 8 slices but “Where do you want to go today” ran into some kind of legal issue. The following graphic also has the advantage of being easily converted into a fortune wheel of audit that IT managers can spin or throw darts at…

COBIT 5 Wheel

10 Days of Rain Mistakes: McAfee Whitepaper

McAfee Labs has released an interesting analysis of recent DoS attacks that targeted South Korea. They criticize the code for numerous mistakes; and they speculate the mistakes were caused by multiple teams working together and unsuccessful at developing a cohesive product. Here are a few examples of the criticisms.

Short-term objectives

While highly destructive code like this was common with early malware, it has long since given way to bots that allow for long-term command and control. Cybercriminals realized that compromised computers under their full control are much more valuable to them for sending spam, proliferating malware, and for harvesting valuable data from the compromised device.

Lack of flexibility

Unlike many other botnets, the malware installed as these C&C clients lacked command interpreter functionality. This results in very limited flexibility in how the bots are used.

Inconsistent use of encryption

While the C&C application also decrypts the configuration’s filename with 128-bit AES, the initial dropper contains this filename in plain text. This design hints at multiple authors that were not all aware of this filename being encrypted in other parts of this attack.

Typos from cut/paste in the code

The code to check file extensions suffers from some mistakes due to copy and paste; for example, not only .java but .javanything files will be deleted.

Inconsistent execution

…the code then utilizes a huge C++ CAB file implementation to create a new CAB file per overwritten file and adds the already zeroed-out file to the CAB. This is another indicator of multiple engineers working on this codebase without everyone understanding the entirety of the code.

Despite all the criticism, McAfee analysis still rates this as “sophisticated”.

The level of technical sophistication behind Ten Days of Rain, being used for the relatively simplistic act of a DDoS attack, doesn’t track.

What are those levels of sophistication? They don’t say but they give us this simile.

DDoS, malware-leveraging encryption, and multitier botnet architectures are not new. Nor are attacks against South Korea that suspiciously align with North Korea’s agenda. However, the combination of technical sophistication juxtaposed with relatively limited execution and myopic outcome is analogous to bringing a Lamborghini to a go-cart race.

On the one hand their analysis pushes us to consider the engineering flaws and disconnected “myopic” work, while on the other hand it concludes with the imagery of a Lamborghini.

I suspect they do not mean bringing a Lamborghini hat to a go-cart race. They must mean the car, and a modern one at that.

Lambo Hat

Ooops, I meant the other imagery of a Lamborghini.

Lambo Shoes

Ah, well, maybe they are making a more subtle point. If you see someone show up to a go-cart race wearing a pair of shiny red suede Lamborghini slippers…

It also is worth noting that although almost 20% of the command and control servers they tracked were in the US, far more than the next country, McAfee steps away completely from any mention of motives tied to national interests.

Beyond the threat mitigation, the questions of how, who, and why still remain.

They did a very nice job in this whitepaper on the how, and they admit to speculation (based on an odd assumption about collaboration instead of plagiarism) about the why, but they basically don’t touch the question of who.

Too bad they did not go for the who too; I had fun writing Operation Sloppy Night Dragon.

2011 BSidesLV: A Cloud Odyssey

I will be presenting at the 2011 BSidesLasVegas conference:

“2011: A Cloud Odyssey”

When: August 3 or 4, 2011
Where: The Artisan Hotel, 1501 West Sahara Avenue, Las Vegas, NV 89102
Cost: Free (as always!)

Are you ready to fly into the clouds? This presentation takes the audience on a humorous review of technology and progress since the 1968 American epic science-fiction film by Stanley Kubrick and Arthur C. Clarke. It explores a philosophical evolution as it relates to technology and proposes some surprising new answers to four classic questions about managing risk:

  1. What defines human nature
  2. How can technology change #1
  3. Does automation reduce total risk
  4. Fact, fiction or philosophy: superuser

2011 a cloud odyssey

This is the next installment in my series of 1960s-film themed presentations. The last one (“Dr. Stuxlove”) was at BSidesSF 2011.

Copy of Presentation: 2011acloudodyssey.75dpi.PDF