You will be redirected in 30 seconds or close now.

ColdFusion Authors: Yakov Fain, Jeremy Geelan, Maureen O'Gara, Nancy Y. Nee, Tad Anderson

Related Topics: ColdFusion

ColdFusion: Article

Security Matters

Is more always better?

It seems that not a week goes by without another story of a major organization inadvertently leaking private data. In one recent week, representatives of a Rhode Island government agency reported that tens of thousands of credit card transactions on a government-run site had been stolen by Russian data thieves. In the same week, the private firm, Providence Home Services, announced that backup tapes of patient records - some 365,000 of them - had been stolen from one of their employees' car.

Horror stories like these leave executives dizzy with fear of the liability they could bear if sensitive customer data were to be exposed. Network administrators, too, feel the pressure to ensure that such breaches will not happen on their watch. But fear rarely leads to wise decisions and, in the case of security, management too often neglects to examine the security risk profile of their organization, opting instead for a security paranoia that can lead to the equivalent of a security lockdown.

A recent experience got me thinking about the hidden costs of security. A network administrator, rightly concerned about maintaining security within the company, instituted a series of policies that made the business of software development very difficult to carry out. Networks were locked down to specific MAC addresses, and outside source control repositories were portrayed as disasters waiting to happen. At one point, the idea of using Superglue to seal USB ports (to prevent unauthorized data removal) was seriously discussed.

It would be both easy and inaccurate to view this as the sole result of an overzealous network administrator. Worse, such a simplistic analysis that localizes blame prevents the organization from examining the security choices that are being made. If we are to make sane choices, we must first recognize that choices are being made.

It's often assumed that where security is concerned, more is always better. But is it? The discussion (if there is any discussion at all) over the amount, type, and degree of security needed is skewed by the lack of differentiation between the risk profiles that different organizations have. Certainly where such things as payroll, credit card, social security, or health data are concerned, the need for data security is paramount. But for software development houses, the real damage of losing source code or employee contact information is much, much less. The problem is that the same solution is often urged for both types of risk profiles. "More is better" only works if we fail to recognize the real cost of security.

Thought leaders in the security community often come from the type of environments described above where it would be hard to overstate the validity of security concerns. Security conferences, security whitepapers, security briefs all detail the possible ways security can be compromised and this mindset filters down to network administrators. We can't blame them for wanting to do their job well!

An appropriate security response is impossible without a clear understanding of the risk profile of the company. Unfortunately, talking about risks is often unpopular. One tool I've found to be very helpful in thinking clearly about risks is what I call the "postmortem game." It's played like this: imagine that at some point in the future, a catastrophe occurs. It could, for example, be the failure of a project, a large initiative, or even an entire company. If you've ever been involved in such a failure, you may have also been involved in the obligatory "postmortem" where concerned parties meet to try to understand why the failure occurred and to determine how to prevent its reoccurrence. At their worst, postmortems are exercises in affixing blame to certain individuals. But such "analysis" is a terrible mistake for it deprives the organization from understanding the real nature of such failure.

Edwards Deming, the legendary management consultant often credited as the person who transformed Japanese products from the decidedly inferior perception they held in the 1960s to their present lofty status, had much to say about the nature of failure. Deming recognized that in a complex system such as a business, a significant failure is almost always a part of the system itself, not of individuals.

Quality (or the lack of it), he asserted, is built into the system. To illustrate this, audience members at his lectures were asked to come to the stage to participate in his "red bead game." Players were given special paddles that were used to draw small red and white beads from a large bowl. The paddles were designed to hold exactly 50 beads.

The players had no control over which beads fell into the cavities in the paddles. The ratio of red beads to white beads was fixed so that, over time, each draw of the paddle averaged 40 white beads and 10 red beads.

The goal given to the players was to draw as many white beads as possible. Players whose draws selected more white beads were praised while those whose draws selected too many red beads were criticized. White bead players were given promotions, made "Employee of the Month," given "bonuses," and even selected as management material, while their red bead counterparts were scheduled for special training, received bad reviews for their performance, and even risked firing. To inspire better performance, banners signaling that "Quality is Job # 1" were installed, but since the outcome of the draws was outside of the players' control, no amount of "management programs" could possibly affect the outcome. The "red bead game" was a powerful illustration that success or failure is determined by the system, not the individual.

But postmortems don't have to go down this dreary route. Instead, they can be used to find ways in which the system produces undesirable results. In the "postmortem game," failure is imagined - and players are asked why such failure occurred. They are, in effect, asked to uncover the most likely risks of failure. Given the imaginary nature of the failure, there are no individuals to blame. Instead, the players find themselves analyzing the viability of the system. The "postmortem game" can produce a remarkably clear risk profile and lead to discovering ways to improve the system so that failure remains imaginary.

What does this have to do with security? I recommend that you and your colleagues try the "postmortem game." What role does lack of security play in possible failure? If it plays a significant role, you will know that security ought to be a major concern. Often, though - especially with software development - other reasons come to the fore: lack of product acceptance, slowness to market, etc. Now, we can begin to examine the costs of excessive security.

What are those costs? Lack of productivity is one of the chief ones. Developers may find that the constant drag caused by excessive security undermines their best efforts. Implementing security that imposes draconian restrictions is like weighing down an athlete. Performance cannot help but suffer.

Worse, developers may lose their enthusiasm for producing great software. Working against constant friction imposed by security constraints can sap even the most energetic of developers.

There is another kind of friction - that which occurs between different departments. Developers will resent the network administrators who make their work so difficult while network administrators will be upset that developers seem so heedless of the need for security. Infighting and conflict results. Relations are strained. But the real cause for these problems is the failure of management to (1) properly assess their company's risk profile and (2) communicate this throughout the company.

One of management's key tasks is mediating between competing interests such that decisions in the best overall interest of the company are made. The amount, type, and extent of security within an organization are issues too crucial to be left for any single department to decide upon. Where security is concerned, a na•ve posture that "more is better" places the entire system at risk and may produce a result where the "postmortem game" is no longer an imaginary one.

More Stories By Hal Helms

Hal Helms is a well-known speaker/writer/strategist on software development issues. He holds training sessions on Java, ColdFusion, and software development processes. He authors a popular monthly newsletter series. For more information, contact him at hal (at) halhelms.com or see his website, www.halhelms.com.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@ThingsExpo Stories
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Michael Maximilien, better known as max or Dr. Max, is a computer scientist with IBM. At IBM Research Triangle Park, he was a principal engineer for the worldwide industry point-of-sale standard: JavaPOS. At IBM Research, some highlights include pioneering research on semantic Web services, mashups, and cloud computing, and platform-as-a-service. He joined the IBM Cloud Labs in 2014 and works closely with Pivotal Inc., to help make the Cloud Found the best PaaS.
In his Opening Keynote at 21st Cloud Expo, John Considine, General Manager of IBM Cloud Infrastructure, led attendees through the exciting evolution of the cloud. He looked at this major disruption from the perspective of technology, business models, and what this means for enterprises of all sizes. John Considine is General Manager of Cloud Infrastructure Services at IBM. In that role he is responsible for leading IBM’s public cloud infrastructure including strategy, development, and offering m...
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
Founded in 2000, Chetu Inc. is a global provider of customized software development solutions and IT staff augmentation services for software technology providers. By providing clients with unparalleled niche technology expertise and industry experience, Chetu has become the premiere long-term, back-end software development partner for start-ups, SMBs, and Fortune 500 companies. Chetu is headquartered in Plantation, Florida, with thirteen offices throughout the U.S. and abroad.
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
I think DevOps is now a rambunctious teenager - it's starting to get a mind of its own, wanting to get its own things but it still needs some adult supervision," explained Thomas Hooker, VP of marketing at CollabNet, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...