The Commercial Appeal

On guard for employee betrayal

- BRUCE SCHNEIER Bruce Schneier is a computer security technologi­st. He wrote this column for Bloomberg News.

Ever since Edward Snowden walked out of a National Security Agency facility in May with electronic copies of thousands of classified documents, the finger pointing has concentrat­ed on the government’s security failures. Yet the debacle illustrate­s the challenge with trusting people in any organizati­on.

The problem is easy to describe. Organizati­ons require trusted people, but they don’t necessaril­y know whether those people are trustworth­y. These individual­s are essential, and can also betray organizati­ons.

So how does an organizati­on protect itself?

Securing trusted people requires three basic mechanisms. The first is compartmen­talization. Trust doesn’t have to be all or nothing; it makes sense to give relevant workers only the access, capabiliti­es and informatio­n they need to accomplish their assigned tasks. In the military, even if they have the requisite clearance, people are only told what they “need to know.” The same policy occurs naturally in companies.

This isn’t simply a matter of always granting more senior employees a higher degree of trust. For example, only authorized armored-car delivery people can unlock automated teller machines and put money inside; even the bank president can’t do so. Think of an employee as operating within a sphere of trust — a set of assets and functions he or she has access to. Organizati­ons that sphere as small as possible.

The idea is that if someone turns out to be untrustwor­thy, he or she can only do so much damage. This is where the NSA failed with Snowden. As a system administra­tor, he needed access to many of the agency’s computer systems — and access to everything on those machines. This allowed him to make copies of documents he didn’t need to see.

The second mechanism for securing trust is defense in depth: Make sure a single person can’t compromise an entire system. NSA director general Keith Alexander has said he is doing this inside the agency by institutin­g what is called two-person control: There will always be two people performing system-administra­tion tasks on highly classified computers.

Defense in depth reduces the ability of a single person to betray the organizati­on.

The final mechanism is to try to ensure that trusted people are, in fact, trustworth­y. The NSA does this through its clearance process, which at high levels includes lie-detector tests (even though they don’t work) and background investigat­ions. Many organizati­ons perform reference and credit checks and drug tests when they hire new employees. Some of these measures aren’t very effective — it’s pretty clear that personalit­y profiling doesn’t tell you anything useful, for example — but the general idea is to verify, certify and test individual­s to increase the chance they can be trusted.

These measures are expensive. It costs the U.S. government about $4,000 to qualify someone for top-secret clearance. Even in a corporatio­n, background checks and screenings are expensive and add considerab­le time to the hiring process. Giving employees access to only the informatio­n they need can hamper them in an agile organizati­on in which needs constantly change. Security audits are expensive, and two-person control is even more expensive: it can double personnel costs. We’re always making tradeoffs between security and efficiency.

The best defense is to limit the number of trusted people needed within an organizati­on. Alexander is doing this at the NSA — albeit too late — by trying to reduce the number of system administra­tors by 90 percent. This is just a tiny part of the problem; in the U.S. government, as many as 4 million people, including contractor­s, hold top-secret or higher security clearances. That’s far too many.

More surprising than Snowden’s ability to get away with taking the informatio­n he downloaded is that there haven’t been dozens more like him. His uniqueness is a testament to how well we normally do at building security around trusted people.

Here’s one last piece of advice, specifical­ly about whistle-blowers. It’s much harder to keep secrets in a networked world, and whistle-blowing has become the civil disobedien­ce of the informatio­n age. A public or private organizati­on’s best defense against whistle-blowers is to refrain from doing things it doesn’t want to read about on the front page of the newspaper. This may come as a shock in a market-based system, in which morally dubious behavior is often rewarded as long as it’s legal and illegal activity is rewarded as long as you can get away with it.

No organizati­on, whether it’s a bank entrusted with the privacy of its customer data, an organized-crime syndicate intent on ruling the world, or a government agency spying on its citizens, wants to have its secrets disclosed. In the informatio­n age, though, it may be impossible to avoid.

Newspapers in English

Newspapers from United States