<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

CISA is Coming, But It’s Useless Without Visibility

November 5, 2015

It’s sad to say but governments and businesses don’t seem to be winning the cyber security war. These criminals are becoming so sophisticated that it’s starting to look like an NFL team playing against a high school football squad. Today 80 to 90 million cyber security attacks are launched annually and only 30% are detected. As hackers become more persistent and successful, organizations of all sizes are struggling to defend their infrastructures, customers and private data.

Let's dive into what the Cybersecurity Information Sharing Act (CISA) is all about and how it could effect you.

If there’s one thing that governments and businesses can agree on, things have to change if we want to eliminate these threats on a permanent basis. As a result, the government is stepping in with an effort to help change the big picture. Now, a new law is in the works—the Cybersecurity Information Sharing Act (CISA), which passed through the Senate on October 27, 2015.

Of course the first question everyone is asking —how much will it really help?

Understanding CISA Provisions

As far as laws go, the CISA proposal is actually fairly simple. In an effort to improve cyber security, CISA gives private companies a system for sharing information with the federal government as it pertains to cyber protection. Threat information can then be shared with the Department of Homeland Security, the FBI or NSA for further investigation. 

CISA prevents any personally identifiable information (PII) from being shared and mandates that data can be shared and used for security purposes only. The hope is that CISA will enable businesses and governmental agencies to work together to change the dreary cyber security picture—but it’s not without opposition. 

Opponents of CISA point out the privacy concerns regarding a company deciding to share information when customers have not been given the chance to approve it. Privacy concerns have led to over a year of debate over the bill, but there’s a bigger question at hand—will CISA even help the cyber security outlook?  

CISA

Can Companies Share What They Can’t See?

There is a lot of debate surrounding the effectiveness of CISA from a defense perspective. In fact, the Princeton Center for Information Technology Policy makes a good point saying that this bill will fail to encourage companies to improve their cyber security defenses if they can just send their data to the government. But do they have the data they need to make it worthwhile? Clearly, companies must be missing something or there wouldn’t be so many breaches to discuss.

In truth, many companies just don’t have the level of visibility they need to see the whole threat. It’s mainly because their security solutions aren’t seeing 100% of a network’s traffic so they can’t fully characterize the attacks lobbied against them. Too many companies are still using SPAN ports to connect their security appliances, opening the door for dropped packets and insufficient visibility. Additionally, companies need to have a process in place to understand their baseline traffic, ie. “what is normal?” Because they then can ‘see’ what is NOT normal or possible aberrant behavior. Once a total picture of the network is visible, traffic then they can relate a more valuable well of information to share with others.

Privacy concerns aside, shared information could be the key to stopping cyber threats in their tracks. After all, cyber criminals communicate underground and collaborate to improve their attacks. It makes sense for companies to stop thinking they can combat cyber crime on their own. However, before everyone starts sharing information, more needs to be done to ensure network traffic visibility. And the only reliable way for security appliances to see 100% of traffic is with properly connected network TAPs.

Protect your company’s assets by implementing the right network design in your security projects, download Garland Technology’s guide, Optimizing Network Design in Security Projects.

How to Guide: Optimizing Network Design in Security Projects

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES