{"id":29164,"date":"2015-02-12T02:41:04","date_gmt":"2015-02-12T07:41:04","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encryption-wouldnt-have-stopped-anthems-data-breach.php"},"modified":"2015-02-12T02:41:04","modified_gmt":"2015-02-12T07:41:04","slug":"encryption-wouldnt-have-stopped-anthems-data-breach","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-wouldnt-have-stopped-anthems-data-breach.php","title":{"rendered":"Encryption Wouldn\u2019t Have Stopped Anthem\u2019s Data Breach"},"content":{"rendered":"<p><p>    To prevent breaches companies must strictly control which    employees can access sensitive data.  <\/p>\n<p>    The recent data breach at health insurer Anthem saw criminals    access the personal details and Social Security numbers of more    than 80 million peoplethe biggest health-care data theft to    date. Medical and payment data was not compromised, but the    names, addresses, birthdays, and Social Security numbers    accessed can be used by criminals to commit various types of    fraud.  <\/p>\n<p>    Many people have been surprised to hear that this sensitive    data was not encrypted and that the federal mandate for    securing health-related data, HIPAA, does not require it to be.    In fact, HIPAA only strongly encourages encryption.    Organizations that choose not to use encryption are supposed to    document the reasons why not and implement an equivalent    alternative measure if reasonable and appropriate. The    vagueness of this requirement is the crux of class action and    other lawsuits being filed against Anthem.  <\/p>\n<p>    But even if Anthem had used encryption, the data could have    still have been compromised. Encryption is just one part of the    arsenal that organizations need to deploy to secure sensitive    data. Encryption is great for securing data in transit and at    rest, but if the credentials and keys are compromised it does    little to protect the data.  <\/p>\n<p>    The bigger issue in many breaches is that organizations havent    properly implemented data access security controls. They need    to have safeguards in place in case attackers can bypass    perimeter defenses and compromise administrator level    credentials.  <\/p>\n<p>    This is precisely what happened to Anthem, which says its    attackers gained access to at least five sets of employee credentials.  <\/p>\n<p>    Its ridiculously easy for cybercriminals to find the    information they need to compromise almost any organization. A    quick look at Anthem job postings and LinkedIn profiles was    enough for me to identify the software Anthem uses for its data    warehouse.  <\/p>\n<p>    From there, I could easily identify more than 100 people, such    as system architects and database administrators, who would    have privileged access to the data warehouse storing tens of    millions of sensitive personal records. This was probably the    first thing Anthems attackers researched before conducting a    phishing campaign to distribute the malware used to harvest    employee credentials.  <\/p>\n<p>    An attacker who can compromise a system via the credentials of    a user with administrator-level access to the data warehouse    can easily steal more credentials, find monetizable    information, and exfiltrate unencrypted data.  <\/p>\n<p>    So what should organizations do to secure sensitive customer    data? Sophisticated attackers with enough time and resources    can get into any organization eventually.    Cybercriminals are fully aware of the constant trade-offs that    organizations make to balance security with operational    efficiency, and theyve repeatedly demonstrated that theyre    fully capable of exploiting even tiny security weaknesses.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.technologyreview.com\/view\/535111\/encryption-wouldnt-have-stopped-anthems-data-breach\" title=\"Encryption Wouldn\u2019t Have Stopped Anthem\u2019s Data Breach\">Encryption Wouldn\u2019t Have Stopped Anthem\u2019s Data Breach<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> To prevent breaches companies must strictly control which employees can access sensitive data. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-29164","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29164"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29164"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29164\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}