Special FeaturesIdentity & AccessThreat Detection & Defense

Should You Put All Your Eggs in One Firewall? The Perils of Blind Trust in Cybersecurity Vendors

Tracing the arc of cybersecurity, from the days of rudimentary antivirus software to today’s advanced AI-driven defences, it’s clear that protecting our digital world has never been more critical. In many ways, strong cyber defences have become the backbone of a secure digital world.

However, a recent disclosure of critical flaws on Fortinet, a cybersecurity industry leader, which may have been exploited in the wild, raises a chilling question: What happens when the guardians themselves become the target?

When Cybersecurity Becomes a Liability

In 2022 and 2023, hackers believed to be linked to China exploited a zero-day vulnerability in Fortinet’s FortiGate firewalls, a cornerstone security product for countless organisations. This breach compromised at least 20,000 devices, primarily targeting Western governments, defence contractors, and international organisations. The Fortinet incident exposes a terrifying domino effect—a breach at a cybersecurity company can leave its clients vulnerable and scrambling to patch their exposed systems.

Perhaps the most concerning example comes from the 2020 SolarWinds supply chain attack. This attack came to light after FireEye, a prominent cybersecurity firm known for its threat intelligence capabilities, identified a sophisticated intrusion within its own systems. FireEye’s investigation uncovered malicious code hidden within a software update they received from SolarWinds, a widely used network management tool provider. Apparently, hackers had infiltrated SolarWinds and injected this code, compromising the update and unknowingly impacting numerous organisations that relied on SolarWinds software.

Should You Put All Your Eggs in One Firewall? The Perils of Blind Trust in Cybersecurity Vendors

The SolarWinds attack showcased the interconnectedness of the technology landscape and the potential for a single breach to have far-reaching consequences. It also opened the world’s eyes to the vulnerability of even cybersecurity companies, which can become targets themselves and serve as unwitting entry points for attackers.

These incidents clearly show that no security solution is foolproof. So, how can businesses navigate this ever-evolving threat landscape and ensure their defences remain strong, even when the trusted solutions they rely on might be vulnerable?

Building Defences Beyond Vendor Trust

Kelvin Lim, Senior Director and Head of Security Engineering, APAC, at Synopsys Software Integrity Group
Kelvin Lim, Senior Director and Head of Security Engineering, APAC, Synopsys Software Integrity Group

According to Kelvin Lim, Senior Director and Head of Security Engineering, APAC, at Synopsys Software Integrity Group, there are valuable practices that businesses and consumers can adopt to minimise their exposure to security breaches, even when trusted security vendors are affected.

First and foremost, Kelvin advises purchasing IT products and solutions from trusted vendors recognised in national certifications, such as the Cyber Security Agency of Singapore’s Cybersecurity Labelling Scheme (CLS). This can help organisations identify products with robust cybersecurity provisions and enable more informed decision-making.

However, Kelvin notes that “it is not uncommon for IT solutions to have bugs.” To mitigate risks, businesses and consumers should proactively update their IT products and solutions when vendors release security fixes. Staying current with updates ensures that known vulnerabilities are promptly addressed.

Implementing a defence-in-depth strategy is also crucial. “Defence in depth is a strategy that employs multiple security approaches to protect an organisation’s assets,” Kelvin explains. By having multiple layers of defence, organisations can ensure that if one line of defence is compromised, additional layers will act as backups to neutralise threats. This approach addresses security flaws in hardware, software, and human factors, as ignorance or human error are often sources of breaches.

As part of these “layers,” businesses should consider implementing security solutions from multiple vendors. For instance, deploying two firewalls from different manufacturers can provide an extra layer of protection. If a security bug compromises the first firewall, the second firewall from a different manufacturer may not share the same vulnerability.

Last but not least, Kelvin emphasises the importance of continuously monitoring security conditions. This way, he elaborates, “organisations can identify and address security breaches or vulnerabilities before they are exploited by continually monitoring applications, systems, and network activities.”

Kelvin believes these practices can help businesses and consumers bolster their defences and maintain resilience, even when their most trusted security partners are breached or compromised.

Limiting the Blast Radius

Robin Doherty, Business Information Security Officer, APAC at Thoughtworks
Robin Doherty, Business Information Security Officer, APAC at Thoughtworks

“All companies, even those selling security software, have a supply chain that could involve hundreds of partners, and just as many, if not more, open-source software libraries,” says Robin Doherty, Business Information Security Officer, APAC at Thoughtworks. This interconnectedness means vulnerabilities in one part of the supply chain can affect many others.

While Robin acknowledges that breaches are not a matter of if, but when, in the case of a supply chain compromise, he stresses the importance of limiting the “blast radius.” This involves regular practice in managing smaller incidents and conducting tabletop exercises with fictitious scenarios. “The practice should not be limited to the security team alone – in a vendor breach scenario, everyone from the executive leadership team to lawyers to the HR team could get involved,” he advises. Regular incident response drills help identify and address problems before they escalate.

When a security incident occurs, it’s crucial to activate the incident response team to follow the predefined plan, quickly rotate credentials, and decommission, patch, or reconfigure systems as necessary. Companies should also enhance their security monitoring to detect potential intrusions early on.

Robin notes that security tools often have broad privileges within an organisation and should be managed with the highest level of scrutiny. While most security partners will have basic certifications like ISO 27001 and SOC 2, it’s vital to seek additional information to assess their internal security practices thoroughly. Building strong relationships with partners and holding them accountable is essential for effective security management.

“Information flow can be sporadic when security incidents do happen, which means companies should not be completely dependent on their security partners,” Robin warns. Organisations must be prepared to disconnect partners from their networks and investigate impacted systems using their own security tools.

Remember, Who Guards the Guardians?

We tend to believe that cybersecurity companies are the most capable of defending against cyber threats, as it is the core of their business. This trust is well-placed, but we must remember the age-old question: Who guards the guardians?

In today’s era of highly sophisticated attacks, it is not surprising that some attempts to compromise these vigilant defenders will succeed, with potentially catastrophic results. It is crucial for companies to keep this in mind and to apply the steps discussed in this article to enhance their own security measures. By doing so, if a breach does occur, they can stay protected and at the very least minimise its impact.

Syed Ahmad Hafez

In his role as Editor, Syed oversees the editorial content and daily operations of the editorial content and day-to-day news operations of AOPG’s IT portals, primarily Data Storage Asia, Disruptive Tech News and Cyber Security Asia. Syed started out his career in IT, where he was involved in IT projects subcontracted by companies such as Mesiniaga, Standard Chartered and Fujitsu. Having a background in engineering in his tertiary years as well as a penchant for language and translation, Syed has been able to pull together his varied background along with his wealth of copy-writing experience to, through informed articles and interviews, help readers stay updated with the ever-evolving world of enterprise IT.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *