Trustworthy Security was born on a regular Tuesday afternoon, during the month of January in the year of 2002. The security would be about to change drastically, with its front line commander, Bill Gates, telling his troops about his plans. It all started with an email:
From: Bill Gates
Sent: Tuesday, January 15, 2002 5:22 PM
To: Microsoft and Subsidiaries: All FTE
Subject: Trustworthy computing
The internet was being heavily attacked by many viruses, worms and other applications such as Code Red, Nimda, and LoveLetter. They were about to face a new enemy: Trustworthy Computing
[0001] What is Trustworthy Computing?
Bill Gates first introduced Trustworthy Computing by sending out an e-mail to more than 50,000 Microsoft employees, defining the moment for both the company's future and the industry. It is an approach to computer software and hardware aimed to enable security, reliability, privacy and business integrity. In Bill Gates email, he states one of the primary reasons to push the project forward:
"In the past, we've made our software and services more compelling for users by adding new features and functionality, and by making our platform richly extensible. We've done a terrific job at that, but all those great features won't matter unless customers trust our software. " - Bill Gates 2002
Trustworthy Computing was introducing a new mindset for software and hardware business: the choice between adding features and resolving security issues. Creating a Trustworthy Computing environment requires several steps which can be challenging and a slow process.
[0010] The Four Pillars of Trustworthy Computing
Microsoft when first introduced the concept of Trustworthy Computing specified four core areas in which build up the idea: Security; Privacy; Reliability; and Business Integrity.
Security
" Information Security- the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measure necessary to detect, document, and counter such threats " - National Information Systems Security Glossary
Information security applies to many aspects or ideas regarding securing data, not matter in what form ( such as databases, credentials, sensitive data, etc). It is crucial that companies learn how to manage the vulnerabilities found in their systems, software or hardware products, and how to properly protect their data. This pillar of Trustworthy Computing depends heavily on three widely accepted elements of information security: Confidentiality, Integrity, and Availability.
Privacy
" Privacy- a) the quality or state of being apart from company or observation b) freedom from unauthorized intrusion " - Merriam-Webster
Microsoft has privacy as the second pillar for Trustworthy Computing. The world of internet has always been the target of many threats. Spam, hackers, malware, unwanted pop-ups. Lack of privacy, created a lot of concern back in 2002, about insecurities of personal information being shared on the internet. PrivacyRights.org list some of the concerns about such topic:
- Hackers penetrating the most secure facilities of the military and financial institutions
- Identity thieves are able to shop online anonymously using the credit-identities of others.
- Web-based information brokers sell sensitive personal information, including Social Security numbers.
Reliability
Reliability is an attribute of any computer-related component (software, or hardware, or a network, for example) that consistently performs according to its specifications. - Margaret Rouse 2005
Bill Gates explains in his email about the importance of their system be available to their costumers: " Our products should always be available when our costumers need them." Systems outages were common, and Microsoft decided to focus on change their software architecture that supports automatic recovery. Today, self-management systems are everywhere, where it allows for a service resumption without user interaction in almost every case.
Business Integrity
"In looking for people to hire, you look for three qualities: integrity, intelligence, and energy. And, if they don't have the first, the other two will kill you." – Warren Buffett
- Be responsive
- Be transparent
Bill Gates believed that everyone should be responsive to their actions. Take responsibility for problems and take action to correct them. People are afraid to take responsibility for mistakes, especially within a large corporation. However, the lack of communication and responsibility can result in a larger loss.
He also believed that his employees should be transparent. Be open in dealing with costumers, keep motives clear, keep promises, and make sure costumers know where they stand in dealing with the company.
[0011] Implementing Trustworthy Computing
The Bussiness Aspect
The term of Trustworthy Computing has been applied to computing systems that are inherently secure, available, and reliable.
Conducting a Security Risk Assessment, allows companies to assess security-related risks from internal and external threats to an entity, its assets, or personal. Based on the core idea of Trustworthy Computing, businesses should be able to identify the people and assets at risk, while prioritizing assets that support the business's primary goal. Understand the loss events, where the company is aware of threats that could occur, such as DDoS, or inside threat. On top of that, the impact of events, for example, if a threat has a minor impact on the business or could it keep the business from being functional for a long period of time. Taking into consideration of options to mitigate and feasibility of options of implementing mitigation on vulnerable, such as ensuring every computer in the company is protected by some type of anti-malware software.
It is important to contain a Security Policy. The core meaning of a Security Policy is what it means to be secure for a system. It outlines what needs to be done to ensure security but not how to do it. It brings another important step: the enforcement of Security Policies. For example, if a written policy states that a password must be changed every 30 days, then all systems should be configured to enforce this policy automatically.
Least but not least, educating employees. They must be educated about the importance of security, so they will understand how security is crucial for their environment and motivated to follow security policies.
Resources
https://searchsecurity.techtarget.com/opinion/Trustworthy-computing-Dont-compromise-security-for-conveniencehttps://www.wired.com/2002/01/bill-gates-trustworthy-computing/
https://www.giac.org/paper/gsec/4243/pillars-trustworthy-computing-displayed-patch-management/106837
https://en.wikipedia.org/wiki/Trustworthy_computing
https://www.merriam-webster.com/dictionary/privacy
https://cybersecurity.seas.wustl.edu/ning/teaching/F19cse569s/paper/BootstrappingTrustBook.pdf
Comments
Post a Comment