Why deception is a must have in cybersecurity
“Although to use deception in any action is detestable, nevertheless in waging war it is praiseworthy and brings fame: He who conquers the enemy by deception is praised as much as he who conquers them by force.”
— Machiavelli, Discourses on Livy
It is interesting to hear from colleagues that deception technology is not in their portfolio and many of them are not sure where to fit it within their cybersecurity landscape. The themes I have been hearing have been either that the technology too risky (from a legal perspective), that there is no budget for it this year, or the general lack of knowledge about the maturity of deception technology.
There is a serious disconnect currently within the cybersecurity industry between tool makers, processes, leaders and operators to effectively defend private assets. Almost everyone in the cybersecurity world has heard about the tactics of Sun-Tzu, but few outside of the military know of a modern tactician named Carl Von Clausewitz. To understand the value of deception, we take a page from his book, titled “The Theory of War” that underlines the points that the goal of good defensive tactics, is to include deception. “Deception can be used as a way to lure the enemy out of their defensive positions and into attack mode. In this mode, the singular focus on committing to an attack changes behaviors and creates a mental state where the peripherals are all but lost, thereby allowing the attacker to be deceived and thereby put in a weakened defensive state themselves.”
As mentioned, the majority of cyber defensive postures within organizations has been the deployment of a classical “area defensive” strategy, with the only tactics utilized being the divert or block, which requires the enemy to engage with a siege solution and becomes a lengthy battle. Additionally, we have failed to see the benefit of funneling an attack to learn the enemy’s weakness. By continually fighting in this type of art, siege warfare has been described as not being an intellectual game, meaning in that to use brute force and to use direct approaches was how this type of battle went and each subsequent activity was performed like clockwork. Von Clausewitz in Chapter II of “The Theory of War” goes into these same remarks of using brute force and he refers to this activity as “automation and lacking any value or achieving victory on the modern battlefield.”
Deception has been classified as a tool, but in reality, it should be looked at as a strategy. Key components of tools that provide deception strategies can funnel, divert, and identify attackers that may have circumvented the classical defensive strategies to allow for faster decisions and mitigation actions. Strategies and tools must include bait, trap and diversion operations to lure attackers with fictitious data and configurations into traps. The traps create fake attack surfaces that should be camouflaged as network connected assets.
When thinking of tools to make the strategy successful these tools should be:
1) Agentless to ensure that attackers cannot determine that something is running.
2) Reduces risk by not allowing traps to be used a jumping point for attacking other assets or other organizations.
3) Zero hardware that can be fingerprinted and leveraged for weaknesses in alerting the attacker that the tool is running.
There is only one tool in my opinion, that approaches this concept as a true strategy: TrapX Security’s DeceptionGrid. It is a cyber security deception platform that can help organizations truly implement a deception-based strategy within a cyber defense and meets those requirements to ensure the right intelligence is collected while keeping the advisories in the dark and successfully preventing any advanced persistent threats (APTs) while providing early breach detection.
Richard Moore III is the Chief Information Security Officer (CISO) of Atrion. Richard has over 25 years of experience in designing, leading, and maintaining the implementation and assurance frameworks for organizational information. The foundation of his operational and technical skills began during his 15 years of Military Service with the U.S. Marine Corps Intelligence Community, concluding his military service as Regimental Intelligence Chief. He then continued his passion for protecting information and creating sound cyber risk practices in the private sector, ascending in security leadership roles within KPMG and the Royal Bank of Scotland – Citizens Bank, leading the regulatory and data protection programs. Prior to joining Atrion, Richard Moore served as Chief Information Security Officer at New York Life Insurance Company and Managing Director at Alvarez & Marsal. Richard’s extensive background, vast experience, and creative vision establish him as a thought leader in cybersecurity today.