Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Data Diodes: Super Security or Super Pain?

Data diodes can create architectural complexity despite design simplicity of the data diodes themselves, but do they increase security?

Data diodes can create architectural complexity despite design simplicity of the data diodes themselves, but do they increase security?

The concept of a data diode – a hardware device that only lets data out of the perimeter and prevents any data from coming in – isn’t new, but it’s been adopted recently in the critical infrastructure sector, and in so doing limiting the visibility needed to protect against targeted attacks. The North American Electric Reliability Corporation (NERC) is certified by the Federal Energy Regulatory Commission (FERC) to establish and enforce reliability standards for the bulk-power system. NERC develops and enforces reliability standards, and monitors the bulk power system, among other responsibilities.

Data Diode and Network SecurityNERC has developed a number of standards, of which the most widely recognized is NERC 1300, a modification/update of NERC 1200, called CIP-002-1 through CIP-009-2 (CIP=Critical Infrastructure Protection). These standards are used to secure bulk electric systems although NERC has created standards within other areas.

CIP-002 requires the identification of Critical Cyber Assets (CCAs) that must be protected through stringent controls and procedures subject to auditing per the guidance in the rest of the NERC standards. In plain language, if it’s an important server, it needs strong protection.

As one would expect, CCAs must be protected within a security perimeter with well-defined access control. Data diodes presumably protect the CCAs from attacks and possible compromise.

Sounds ideal on the surface, but is it really practical?

The first problem is that data diodes exclude any application that uses TCP communications since TCP is bi-directional. This restricts data to one-way UDP communications. First off, UDP datagrams are limited to just under 1,500 bytes; it’s sort of the Twitter of IP communications.

Since I’m in the security intelligence (SIEM, log management, risk management, etc.) world, my first thought is how do data diodes affect event collection and centralization? Syslog uses UDP by default, which works in this context, although there are other protocols for log collection, all of which use TCP (Windows DCOM/WMI, Check Point OPSEC/LEA, JDBC, FTP, SCP, SDEE, to name a few). As a reminder, many SCADA systems are built on Windows, and many Windows server events exceed 2,000 bytes, blowing past the UDP datagram limit. So already, centralized log management is hampered.

But what about transferring files from inside the protected perimeter to the general purpose network? Some of the data diode solutions accept TCP connections, such as FTP or SMTP, to a specialized server on the protected side of the perimeter, carve up the data into UDP datagrams, and send them across the diode to another specialized server on the other side that reassembles the datagrams and initiates a new connection to the eventual destination. The manufacturers have effectively created an application proxy firewall composed of a data diode sandwich.

Advertisement. Scroll to continue reading.

There’s no doubt that data diodes can create architectural complexity despite the design simplicity of the data diodes themselves, but do they increase security? Are they really a better mousetrap? Don’t forget, the early bird may get the worm, but the second mouse gets the cheese.

One-way communications security only works if you never need to send data from outside the perimeter to a highly secured zone. Clearly, all CCAs will eventually need updates: to the operating system, to the SCADA software, and to drivers that support both. It’s also likely that other files will need to be copied to CCA at some point. Since the data diode prevents network-based file transfer, there have to be other options.

In talks with manufacturers of data diode solutions, they suggest using sneaker nets or dial-up. The latter is just a side-door to bypass the data diode, and removable media is just as effective, if not more, at infecting machines. Let’s not forget that Stuxnet is thought to have contaminated the Iranian nuclear enrichment plant’s SCADA systems through USB sticks brought into the facility.

The point is that data diodes only provide armor for one attack vector: the network. And they impose a level of difficulty in performing occasional, yet routine, tasks that doesn’t justify the purported increase in security over a well-managed firewall.

The only benefit of data diodes over firewalls is they remove the negligent user and developer factor. Because data diodes are implemented at the hardware level, users can’t misconfigure a data diode, and because of its simplicity, it’s unlikely that a data diode has a latent design flaw, or at least one that will let data flow back into the protected perimeter.

Common firewall technology, on the other hand, imposes access control in software or firmware. I’m not as concerned about product defects: when is the last time a dedicated firewall solution was compromised due to a software bug? Certainly there have been some, but none catastrophic enough to allow full-on bypass of rules. Assuming the rules only allow inside-out, UDP-based communication, and there is no misconfiguration in the firewall, I can’t recall a firewall exploit that would allow an external attacker to gain access into the CCA perimeter.

Misconfiguration is another issue altogether. The human factor is always the weakest link in any security program. But what makes the most sense is risk management, not risk avoidance. Humans will make mistakes in misconfiguring firewalls; they’ll also make mistakes by inserting a USB drive that hasn’t undergone rigorous anti-malware scrutiny.

My view has always been that you can spend 20% of your security budget on protection technology and cover 80% of your risk. All too often organizations eat the the remaining budget trying to cover the remaining 20% security risk with the diminishing returns endemic to the long tail without ever reaching absolute protection, which is a pipe dream.

Most organizations don’t need a new protection technology like data diodes. Sure, we need active defense, but only insofar as it balances the security benefits with the operational burden and complexity. What I’m saying, is deploy traditional firewalls configured for the specific needs of CCA protection, and add configuration management and behavior profiling with anomaly detection. Whenever a change happens on a firewall, have the event trigger an automated configuration validation against the perimeter traffic policy. Monitor traffic in real-time and detect when data is heading into the CCA perimeter and put a stop to it before the attacker finds a way through. And produce regular reports that informs both technical administration and management of activity in and around CCAs—some threats require the human mind to detect.

Read More of Chris’ Columns Here

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...