[ISN] Yoran and Spaf's Law

From: InfoSec News (isn@private)
Date: Mon Nov 01 2004 - 00:51:29 PST


http://www.eweek.com/article2/0,1759,1679514,00.asp

By Ben Rothke
October 25, 2004

In his book "Practical Unix and Internet Security," Professor Gene
Spafford of Purdue University spells out Spaf's first principle of
security administration: "If you have responsibility for security but
have no authority to set rules or punish violators, your own role in
the organization is to take the blame when something big goes wrong."

Spaf's principle is a cruel reality faced by many of those responsible
for information security. They often are treated like a cross between
Charlie Brown, who is constantly picked on, and the late Rodney
Dangerfield, who got no respect.

Amit Yoran is a prime example of Spaf's principle in action. On Oct.  
1, Yoran resigned in frustration after one year as director of the
National Cyber Security Division of the Department of Homeland
Security. Yoran lacked both an important title and appropriate
authority - which are everything in government.

Yoran said he resigned because he had done all he could with limited
resources. That much is true. In principle, he had done all he could.  
But, in fact, he was severely limited. His hands were tied.

Yoran's very visible resignation motivated the House of
Representatives to change the language in the intelligence reform bill
that would have moved responsibility for cyber-security from DHS to
the Office of Management and Budget. Such a boost would give the
director the necessary power to bring about change in the government.

Further, DHS Secretary Tom Ridge, spurred by Yoran's departure, said
the cyber-security position would be upgraded to assistant secretary.

I, for one, sincerely hope that the cyber-security position will be
upgraded to assistant secretary. But the reality of Washington
politics is likely to preclude that.

The Yoran incident isn't unique. Many organizations like to state
publicly that information security is priority No. 1, but, privately,
they will not put their money where their mouths are.

Upper management often issues orders such as "Clean up the system at
any cost!" Yet when these same managers get recommendations for
pre-emptive security implementation, too often chief information
security officers are told, "The budget for this quarter has been
exceeded. Ask me again later in the year."

Information security is a challenging and technologically rewarding
profession. Unfortunately, those responsible for carrying out
information security often are not given the authority and budget to
get the work done.

Yoran knows what this is like. Without the means to do the job,
winning the security war is a nearly impossible fight.


-=-

Ben Rothke, CISSP, is a New York-based security consultant with
ThruPoint Inc. McGraw-Hill has just published his book: "Computer
Security: 20 Things Every Employee Should Know." He can be reached at
brothke@private Free Spectrum is a forum for the IT community
and welcomes contributions. Send submissions to
free_spectrum@private



_________________________________________
Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/



This archive was generated by hypermail 2.1.3 : Mon Nov 01 2004 - 11:32:16 PST