SlideShare a Scribd company logo
Equifax, the FTC Act, and
Vulnerability Scanning
July 2017
Regulatory Frameworks and the FTC
Regulatory Expectations
Open Source Considerations
Proactive Vulnerability Management
Agenda
You May Have Heard About Equifax…
FTC Investigation Begins
Increasing regulatory scrutiny
• Force of law and penalties
• Expanding and overlapping
Common Goals
• Focus on protecting sensitive
information
• Documented responsibilities and
processes
• Require visibility to risks (e.g.,
vulnerability assessments)
Regulatory Landscape is Expanding and Overlapping
GLBA Sarbanes - Oxley
• Section 5 of the Federal Trade Commission Act
• Food and Drug Administration (“FDA”) Guidance on Cybersecurity
in Medical Devices
• European Union
• General Data Protection Regulation (GDPR)
• Proposed Regulation on Privacy and Electronic Communications
But It Doesn’t End There…
• California and Massachusetts
• Information security standards applicable to entities that maintain information
about their residents, regardless of where the entity itself is located.
• New York and others
• Regulate a business’ request for, and retention of, social security numbers.
• 48 States
• Data breach notification statutes, with different standards
• Many States
• State Attorneys General also enforce “Baby FTC Acts” for privacy and security
concerns.
• Follow HIPAA with respect to the treatment of health information
Plus, State Law Must Be Considered
Section 5 – The
Federal Trade
Commission Act
Traditionally, the United States Federal Trade
Commission (“FTC”) & others pursued the company that
stored the data it collected from consumers (e.g., a
merchant) for not doing what they said they’d do.
Over time, the focus has shifted to failures to keep up
with the advantages and challenges changes in
technology present.
With mobile devices, increasingly the consumer is
storing & creating lots of data on one device.
And regulatory focus is shifting to holding the makers of
devices and apps for failing to properly secure data . . .
FTC Enforcement is Evolving
Theory of liability: Entity committed an “unfair or deceptive” practice
in violation of FTC Act § 5 by virtue of its data practices
• Data practices allegedly are unfair when:
•They are not reasonably calculated to protect consumer from theft or use is harmful to
consumer and
•They caused, or are likely to cause, substantial consumer injury that consumers could
not have reasonably avoided.
• Data practices allegedly are deceptive if:
• The targeted entity made a material representation or omission regarding its
information security that is likely to mislead a consumer, acting reasonably, to the
consumer’s detriment.
Section 5 of the FTC Act
Physician surgically inserts a medical device that monitors certain body functions into
patient.
Device uses a cellular signal to transmit recorded body function data directly to
physician.
Information is populated into an electronic patient record retained by the physician.
Manufacturer has remote access to device(s) and information on it and transmitted to
physician to provide technical support. Manufacturer does not store or retain any of
the patient’s information.
Scenario 1: Medical Device Stores Patient Information
HIPAA
• Manufacturer is not a covered entity, but may be a business associate
FTC
• Information security vulnerability may give rise to FTC scrutiny.
FDA
• FDA cybersecurity requirements continue to govern device safety and information security.
State Law
• If Manufacturer receives or maintains consumer information (whether or not considered
health care information), it will be subject to state law security and privacy requirements.
EU:
• GDPR privacy and security requirements apply to devices in EU patients
• Device data transmission will need to comply with the EU Proposed Regulation.
Scenario 1: Medical Device Stores Patient Information
Regulatory
Expectations
HIPAA restricts the ability of covered entities and business associates to use or
disclose protected health information (“PHI”) without patient authorization,
except under circumstances prescribed by regulation.
HIPAA
A) Risk analysis (Required).
Conduct an accurate and
thorough assessment of the
potential risks and
vulnerabilities to the
confidentiality, integrity, and
availability of electronic protected
health information held by the
covered entity.
(B) Risk management
(Required). Implement
security measures sufficient
to reduce risks and
vulnerabilities to a
reasonable and
appropriate level to comply
with § 164.306(a).
PCI-DSS
6.1 Establish a process to identify
security vulnerabilities, using
reputable outside sources for security
vulnerability information, and assign a
risk ranking (for example, as “high,”
“medium,” or “low”) to newly
discovered security vulnerabilities.
<snip>
This is not achieved by an ASV scan or
internal vulnerability scan, rather this
requires a process to actively monitor
industry sources for vulnerability
information.
6.2 Ensure that all system components and
software are protected from known
vulnerabilities by installing applicable vendor-
supplied security patches. Install critical
security patches within one month of
release.
<snip>
This requirement applies to applicable
patches for all installed software.
HIPAA +
FTC Act +
FDA Regulations +
State laws +
Enforcement actions + . . . .
What is the FTC (and others) looking for?
}=
LabMD & In re Accretive Health
• Security is important, and FTC will fill regulatory “gaps”
HTC
• Don’t distribute platforms with basic security flaws
Snapchat
• Know the features of the platform your app is on
Goldenshore Technologies
• Don’t abuse the platform’s features
Trendnet
- The Internet of Things needs to be secure
Fandango & Credit Karma
• Don’t disable security, and think about possible man-in-middle attacks
• And protect “Sensitive Information,” not just PII
FTC Enforcement Actions Themes
Regulators set a baseline expectation: Companies “should implement reasonable security.”
“Reasonable Security” includes:
• Building Security into devices at outset – “security by design”
• Conduct privacy or security risk assessment
• Minimize data collected and retained
• Test security before product launch
• Adopting strong internal security program, including
• Tone from top & training
• Overseeing service providers and supply chain’s ability to meet security requirements
• Implementing reasonable access controls on devices
• For more complex systems, adopting “defense-in-depth” security architecture
• Monitoring products throughout life cycle
• Including patching known vulnerabilities (to extent feasible)
What Constitutes Reasonable Security?
Human Error
“… the individual who is
responsible for communicating
in the organization to apply the
patch, did not,”
Richard Smith
Oral Testimony
How Did Equifax Mess Up?
Technical Error
On March 15, Equifax’s
information security department
also ran scans that should have
identified any systems that were
vulnerable to the Apache Struts
issue identified by U.S. CERT.
Unfortunately, however, the scans
did not identify the Apache Struts
vulnerability.
Richard Smith
Written Testimony
Equifax, the FTC Act, and Vulnerability Scanning
Open Source
Considerations
Open Source is Widely Used Across All Industries
Vulnerabilities in Open Source Are Common
Why Open Source is “Different” for Attackers
Open Source Licensing
and Support
OPEN SOURCE IS USED EVERYWHERE
VULNERABILITIES ARE PUBLICIZEDEASY ACCESS TO SOURCE CODE
STEPS TO EXPLOIT READILY AVAILABLE
Information Available
to Attackers
Bad Guys Have Quotas Too (Non-Targeted Attacks)
Rational Choice Theory
• Criminals make a
conscious, rational choice
to commit crimes
• Behavior is a personal
choice made after
weighing costs and
benefits of available
alternatives
• The path of least
resistance will be taken
• Solution: Patch early
Source: Kenna Security
Proactive
Vulnerability
Management
Vendor Patches
• Schedule updates as deemed necessary
Vulnerability assessments
• Ad hoc internal assessments
• “Continuous monitoring” (daily scans)
Vulnerability assessment (VA) tools focus on:
• System configurations
• Operating systems (including Linux)
• Commercial applications (Office, Adobe, Oracle, etc.)
How Do Organizations Handle This Today?
Popular Tools
• Nessus (Tenable)
• Nexpose (Rapid7)
• QualysGuard (Qualys)
How Well Do VA Tools Cover Open Source?
2015
• NVD – 2,186 CVE disclosed in open source
• Nessus - Roughly 500 plug-ins generated
• Focus on major components and OS
• Lots of overlapping rules
• 34 rules for Poodle
• 14 for Freak
• 205 for Linux
• 35 for Red Hat
• 42 for SuSE
• 25 for Ubuntu
• 33 for Fedora
• 28 for Debian
• 14 for CentOS
• 11 for Mandriva
What if the Automotive Market Treated Recalls Like Open
Source Users Treat Vulnerabilities?
Quantified Unquantified
A Software Bill of Materials Solves the Problem
• Components	and	serial	numbers
• Unique	to	each	vehicle	VIN
• Complete	analysis	of	open	source	components*
• Unique	to	each	project	or	application
• Security,	license,	and	operational	risk	surfaced
• Section 5 of the FTC Act can cover “white space” not addressed by
other regulatory standards
• Patching requirements are not limited to patches delivered to you
for commercial software
• Vulnerability Assessment tools are valuable, but
• Don’t cover custom software
• Don’t maintain knowledge of components
• A Bill of Materials solves the issue of visibility, but updating the
components remains a requirement
Key Takeaways
Questions?

More Related Content

What's hot (20)

PPTX
Computer Hacking Forensic Investigator - CHFI
EC-Council
 
PPTX
BSIMM-V: The Building Security In Maturity Model
Cigital
 
PPTX
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Black Duck by Synopsys
 
PPTX
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Black Duck by Synopsys
 
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
Black Duck by Synopsys
 
PDF
Flight East 2018 Presentation–Patents and Open Source Known and Unknown Risks
Synopsys Software Integrity Group
 
PPTX
Utilizing the Critical Security Controls to Secure Healthcare Technology
EnclaveSecurity
 
PPTX
Recent changes to the 20 critical controls
EnclaveSecurity
 
PDF
Slide Deck CISSP Class Session 2
FRSecure
 
PPTX
Incident response
Anshul Gupta
 
PPTX
Vulnerability Testing Services Case Study
Nandita Nityanandam
 
PDF
Incident Response: How To Prepare
Resilient Systems
 
PPTX
Prioritizing an audit program using the 20 critical controls
EnclaveSecurity
 
PPTX
Overview of the 20 critical controls
EnclaveSecurity
 
PPTX
Leveraging Federal Procurement to Improve Cyber Security
John Gilligan
 
PPTX
More practical insights on the 20 critical controls
EnclaveSecurity
 
PDF
A Case Study of the Capital One Data Breach
Anchises Moraes
 
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Dilum Bandara
 
Computer Hacking Forensic Investigator - CHFI
EC-Council
 
BSIMM-V: The Building Security In Maturity Model
Cigital
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
Black Duck by Synopsys
 
Flight East 2018 Presentation–Patents and Open Source Known and Unknown Risks
Synopsys Software Integrity Group
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
EnclaveSecurity
 
Recent changes to the 20 critical controls
EnclaveSecurity
 
Slide Deck CISSP Class Session 2
FRSecure
 
Incident response
Anshul Gupta
 
Vulnerability Testing Services Case Study
Nandita Nityanandam
 
Incident Response: How To Prepare
Resilient Systems
 
Prioritizing an audit program using the 20 critical controls
EnclaveSecurity
 
Overview of the 20 critical controls
EnclaveSecurity
 
Leveraging Federal Procurement to Improve Cyber Security
John Gilligan
 
More practical insights on the 20 critical controls
EnclaveSecurity
 
A Case Study of the Capital One Data Breach
Anchises Moraes
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Dilum Bandara
 

Similar to Equifax, the FTC Act, and Vulnerability Scanning (20)

PPTX
Technology Law: Regulations on the Internet and Emerging Technologies
Infinity Software Solutions
 
PPTX
Technology Law: Regulations on the Internet and Emerging Technologies
Infinity Software Solutions
 
PPT
Insider Breaches and Data Theft by Employees and Contractors
ButlerRubin
 
PPTX
Iamers presentation-2
DFLABS SRL
 
PDF
Data breaches at home and abroad
Law Practice Strategy
 
PPTX
A guide to Sustainable Cyber Security
Ernest Staats
 
PDF
Scot Secure 2019 Edinburgh (Day 2)
Ray Bugg
 
PPTX
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
centralohioissa
 
PPTX
How to Build and Validate Ransomware Attack Detections (Secure360)
Scott Sutherland
 
PDF
Data Security Regulatory Lansdcape
Brian Bauer
 
PPTX
Data Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
PPTX
Date Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
PPTX
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
William Tanenbaum
 
PPTX
Capstone Final Presentation
Kartik Uppal
 
PPTX
Date Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
PPTX
Wm Tanenbaum Data Business Cases
William Tanenbaum
 
PPTX
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum
 
PPTX
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Raleigh ISSA
 
PPTX
Date Use Rules in Different Business Scenarios:It's All Contextual
William Tanenbaum
 
PPTX
Date Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
Technology Law: Regulations on the Internet and Emerging Technologies
Infinity Software Solutions
 
Technology Law: Regulations on the Internet and Emerging Technologies
Infinity Software Solutions
 
Insider Breaches and Data Theft by Employees and Contractors
ButlerRubin
 
Iamers presentation-2
DFLABS SRL
 
Data breaches at home and abroad
Law Practice Strategy
 
A guide to Sustainable Cyber Security
Ernest Staats
 
Scot Secure 2019 Edinburgh (Day 2)
Ray Bugg
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
centralohioissa
 
How to Build and Validate Ransomware Attack Detections (Secure360)
Scott Sutherland
 
Data Security Regulatory Lansdcape
Brian Bauer
 
Data Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
William Tanenbaum
 
Capstone Final Presentation
Kartik Uppal
 
Date Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
Wm Tanenbaum Data Business Cases
William Tanenbaum
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Raleigh ISSA
 
Date Use Rules in Different Business Scenarios:It's All Contextual
William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
Ad

More from Black Duck by Synopsys (20)

PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Black Duck by Synopsys
 
PDF
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
Black Duck by Synopsys
 
PDF
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
Black Duck by Synopsys
 
PDF
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
Black Duck by Synopsys
 
PDF
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Black Duck by Synopsys
 
PDF
Open-Source- Sicherheits- und Risikoanalyse 2018
Black Duck by Synopsys
 
PDF
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
Black Duck by Synopsys
 
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Black Duck by Synopsys
 
PDF
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
Black Duck by Synopsys
 
PPT
FLIGHT Amsterdam Presentation - From Protex to Hub
Black Duck by Synopsys
 
PPTX
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Black Duck by Synopsys
 
PDF
Open Source Rookies and Community
Black Duck by Synopsys
 
PPTX
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Black Duck by Synopsys
 
PPTX
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Black Duck by Synopsys
 
PPTX
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Black Duck by Synopsys
 
PPTX
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Black Duck by Synopsys
 
PDF
20 Billion Reasons for IoT Security
Black Duck by Synopsys
 
PPTX
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Black Duck by Synopsys
 
PPTX
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Black Duck by Synopsys
 
PPTX
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Black Duck by Synopsys
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
Black Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Black Duck by Synopsys
 
Open Source Rookies and Community
Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Black Duck by Synopsys
 
20 Billion Reasons for IoT Security
Black Duck by Synopsys
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Black Duck by Synopsys
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Black Duck by Synopsys
 
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Black Duck by Synopsys
 
Ad

Recently uploaded (20)

PDF
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PDF
introduction to computer hardware and sofeware
chauhanshraddha2007
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
introduction to computer hardware and sofeware
chauhanshraddha2007
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 

Equifax, the FTC Act, and Vulnerability Scanning

  • 1. Equifax, the FTC Act, and Vulnerability Scanning July 2017
  • 2. Regulatory Frameworks and the FTC Regulatory Expectations Open Source Considerations Proactive Vulnerability Management Agenda
  • 3. You May Have Heard About Equifax…
  • 5. Increasing regulatory scrutiny • Force of law and penalties • Expanding and overlapping Common Goals • Focus on protecting sensitive information • Documented responsibilities and processes • Require visibility to risks (e.g., vulnerability assessments) Regulatory Landscape is Expanding and Overlapping GLBA Sarbanes - Oxley
  • 6. • Section 5 of the Federal Trade Commission Act • Food and Drug Administration (“FDA”) Guidance on Cybersecurity in Medical Devices • European Union • General Data Protection Regulation (GDPR) • Proposed Regulation on Privacy and Electronic Communications But It Doesn’t End There…
  • 7. • California and Massachusetts • Information security standards applicable to entities that maintain information about their residents, regardless of where the entity itself is located. • New York and others • Regulate a business’ request for, and retention of, social security numbers. • 48 States • Data breach notification statutes, with different standards • Many States • State Attorneys General also enforce “Baby FTC Acts” for privacy and security concerns. • Follow HIPAA with respect to the treatment of health information Plus, State Law Must Be Considered
  • 8. Section 5 – The Federal Trade Commission Act
  • 9. Traditionally, the United States Federal Trade Commission (“FTC”) & others pursued the company that stored the data it collected from consumers (e.g., a merchant) for not doing what they said they’d do. Over time, the focus has shifted to failures to keep up with the advantages and challenges changes in technology present. With mobile devices, increasingly the consumer is storing & creating lots of data on one device. And regulatory focus is shifting to holding the makers of devices and apps for failing to properly secure data . . . FTC Enforcement is Evolving
  • 10. Theory of liability: Entity committed an “unfair or deceptive” practice in violation of FTC Act § 5 by virtue of its data practices • Data practices allegedly are unfair when: •They are not reasonably calculated to protect consumer from theft or use is harmful to consumer and •They caused, or are likely to cause, substantial consumer injury that consumers could not have reasonably avoided. • Data practices allegedly are deceptive if: • The targeted entity made a material representation or omission regarding its information security that is likely to mislead a consumer, acting reasonably, to the consumer’s detriment. Section 5 of the FTC Act
  • 11. Physician surgically inserts a medical device that monitors certain body functions into patient. Device uses a cellular signal to transmit recorded body function data directly to physician. Information is populated into an electronic patient record retained by the physician. Manufacturer has remote access to device(s) and information on it and transmitted to physician to provide technical support. Manufacturer does not store or retain any of the patient’s information. Scenario 1: Medical Device Stores Patient Information
  • 12. HIPAA • Manufacturer is not a covered entity, but may be a business associate FTC • Information security vulnerability may give rise to FTC scrutiny. FDA • FDA cybersecurity requirements continue to govern device safety and information security. State Law • If Manufacturer receives or maintains consumer information (whether or not considered health care information), it will be subject to state law security and privacy requirements. EU: • GDPR privacy and security requirements apply to devices in EU patients • Device data transmission will need to comply with the EU Proposed Regulation. Scenario 1: Medical Device Stores Patient Information
  • 14. HIPAA restricts the ability of covered entities and business associates to use or disclose protected health information (“PHI”) without patient authorization, except under circumstances prescribed by regulation. HIPAA A) Risk analysis (Required). Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity. (B) Risk management (Required). Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with § 164.306(a).
  • 15. PCI-DSS 6.1 Establish a process to identify security vulnerabilities, using reputable outside sources for security vulnerability information, and assign a risk ranking (for example, as “high,” “medium,” or “low”) to newly discovered security vulnerabilities. <snip> This is not achieved by an ASV scan or internal vulnerability scan, rather this requires a process to actively monitor industry sources for vulnerability information. 6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor- supplied security patches. Install critical security patches within one month of release. <snip> This requirement applies to applicable patches for all installed software.
  • 16. HIPAA + FTC Act + FDA Regulations + State laws + Enforcement actions + . . . . What is the FTC (and others) looking for? }=
  • 17. LabMD & In re Accretive Health • Security is important, and FTC will fill regulatory “gaps” HTC • Don’t distribute platforms with basic security flaws Snapchat • Know the features of the platform your app is on Goldenshore Technologies • Don’t abuse the platform’s features Trendnet - The Internet of Things needs to be secure Fandango & Credit Karma • Don’t disable security, and think about possible man-in-middle attacks • And protect “Sensitive Information,” not just PII FTC Enforcement Actions Themes
  • 18. Regulators set a baseline expectation: Companies “should implement reasonable security.” “Reasonable Security” includes: • Building Security into devices at outset – “security by design” • Conduct privacy or security risk assessment • Minimize data collected and retained • Test security before product launch • Adopting strong internal security program, including • Tone from top & training • Overseeing service providers and supply chain’s ability to meet security requirements • Implementing reasonable access controls on devices • For more complex systems, adopting “defense-in-depth” security architecture • Monitoring products throughout life cycle • Including patching known vulnerabilities (to extent feasible) What Constitutes Reasonable Security?
  • 19. Human Error “… the individual who is responsible for communicating in the organization to apply the patch, did not,” Richard Smith Oral Testimony How Did Equifax Mess Up? Technical Error On March 15, Equifax’s information security department also ran scans that should have identified any systems that were vulnerable to the Apache Struts issue identified by U.S. CERT. Unfortunately, however, the scans did not identify the Apache Struts vulnerability. Richard Smith Written Testimony
  • 22. Open Source is Widely Used Across All Industries
  • 23. Vulnerabilities in Open Source Are Common
  • 24. Why Open Source is “Different” for Attackers Open Source Licensing and Support OPEN SOURCE IS USED EVERYWHERE VULNERABILITIES ARE PUBLICIZEDEASY ACCESS TO SOURCE CODE STEPS TO EXPLOIT READILY AVAILABLE Information Available to Attackers
  • 25. Bad Guys Have Quotas Too (Non-Targeted Attacks) Rational Choice Theory • Criminals make a conscious, rational choice to commit crimes • Behavior is a personal choice made after weighing costs and benefits of available alternatives • The path of least resistance will be taken • Solution: Patch early Source: Kenna Security
  • 27. Vendor Patches • Schedule updates as deemed necessary Vulnerability assessments • Ad hoc internal assessments • “Continuous monitoring” (daily scans) Vulnerability assessment (VA) tools focus on: • System configurations • Operating systems (including Linux) • Commercial applications (Office, Adobe, Oracle, etc.) How Do Organizations Handle This Today?
  • 28. Popular Tools • Nessus (Tenable) • Nexpose (Rapid7) • QualysGuard (Qualys) How Well Do VA Tools Cover Open Source? 2015 • NVD – 2,186 CVE disclosed in open source • Nessus - Roughly 500 plug-ins generated • Focus on major components and OS • Lots of overlapping rules • 34 rules for Poodle • 14 for Freak • 205 for Linux • 35 for Red Hat • 42 for SuSE • 25 for Ubuntu • 33 for Fedora • 28 for Debian • 14 for CentOS • 11 for Mandriva
  • 29. What if the Automotive Market Treated Recalls Like Open Source Users Treat Vulnerabilities? Quantified Unquantified
  • 30. A Software Bill of Materials Solves the Problem • Components and serial numbers • Unique to each vehicle VIN • Complete analysis of open source components* • Unique to each project or application • Security, license, and operational risk surfaced
  • 31. • Section 5 of the FTC Act can cover “white space” not addressed by other regulatory standards • Patching requirements are not limited to patches delivered to you for commercial software • Vulnerability Assessment tools are valuable, but • Don’t cover custom software • Don’t maintain knowledge of components • A Bill of Materials solves the issue of visibility, but updating the components remains a requirement Key Takeaways