Skip to main content

The deadly sins of startup security


For startups, user growth, product growth, virality, marketing usually goes on the top of their priority list. As part of product planning cycles, embedding information security into their product/service is the last concern for most startups.

Which is deeply ignored here? Information and data security.
Often you see devops engineers, systems engineers, infrastructure engineers or system administrators wear the security hat in these startups and performs some of the small security fixes or patches. Even though they can perform research on the procedures to apply patches, harden databases, or implement remediation as a result of the industry breaches, they might not take every decision or option from security perspective.
Consider the Code Spaces startup breach that basically caused them to go out of business due to improper hardening of the root passwords and not following the AWS security best practices. This deeply ignored lack of security awareness has actually caused millions, and in the case of some companies has even lead to shutdown  because of the loss of data and reputation.
Robert Hansen, the director of product management at WhiteHat Security, said persuading start-ups to invest in security could often feel like "talking to a brick wall."
I'm going to share some of my startup security experiences about 7 deadly sins that startup security professionals often fail to recognize. Applying information security practices in startups and medium and large sized organizations needs shifting your mindset in deciding the right controls for your organization.

1. Lack of understanding of your business threats

Cyber security is not just an issue for governments and FTSE 100 companies, cyber attacks can affect every business, however large or small.
According to last year's Information Breaches Survey conducted by PwC for the Department of Business Innovation & Skills:
87% of SMEs had a security breach in the last year; and only 9% of small organizations know that outsiders have stolen confidential data.
It is very important that you understand your business threats before you can protect your data. Perform risk assessment and prioritize your data, assign threat levels, assign risk score and evaluate the appropriate controls that you want to protect against. Pragmatic risk management isn't about trying to anticipate and mitigate every source of risk. For example, the risks for bitcoin startup will be different than the risks for a startup that specializes on IoT.

2. Misalignment with your IT strategy

Security engineers need to be fully involved while setting up the IT Strategy. Unless you clearly know whether your servers will be hosted in the third party public cloud by a third party firm (SSAE16/ISO27001 certified) or if it's better to bring your infrastructure in-house in the near-term (2 years), you cannot clearly frame your security strategy around this.
What happens if you introduce network stack and invest millions of dollars at this third party vendor to monitor the ingress/egress flow of traffic and then after several months, your IT decides to bring their critical servers in-house? You will have to again scale, re-scope this exercise and perform thorough gap analysis to fix this.
As a startup security engineer, you will wear multiple hats and it's your responsibility to be part of the architectural review board, voice your opinions and ideas with IT, vendor management, HR and any other critical functions.

3. Lack of security governance on third party vendors

Do startups need to care about protecting their data first before evaluating the third party vendors who store their data? This is not always true.
Most of the startups run their servers and infrastructure hosted in a third party public cloud (such as AWS, Google Cloud, Rackspace etc). With the amount of cloud security breaches happening, it's important to select the right hosted solution for your organization who cares about customer's data. And there are these third party email ticketing solutions & other vendors who manages company's payroll, staffing solutions and the list goes on. Your role as security assessor is critical when startups establishes relationship with these third party vendors. Seek to establish cloud assessment criteria (BITS, CSA, ISO etc) and ensure that these cloud hosted vendors meet your standards.

4. Continuous deployment lacks security checks

Startups cannot afford to have extensive change management process and only deploy the code on a weekly or bi-weekly basis as big companies do. The ability to continuously deploy the code to production (multiple times daily) with minimal QA checks and peer review has become part of the code deployment process and there is no time to perform secure code review, threat modeling etc. As security engineers, it is important to develop secure coding framework but still be able to educate developers about secure coding practices without hindering the deploy process. It's not easy to integrate security into the code review process and have developers validate improper exception handling, XSS, XSRF, verbose errors etc but this is something that can be managed through education, training the developers and have proper stage gate review process.

5. Bad investment on unnecessary security tools

For some companies, availability might be more critical than security. Invest more time in selecting the appropriate DDoS solutions, CDN providers than investing in centralized SSO solutions, for example.
As a startup security engineer and lead, you set the tone for security across the organization and it's important that you invest in the right tools for the organization as you cannot afford bad investment.

6. Not empowering your employees.

In startups, things move really fast. That means the ability to quickly identify the vulnerabilities and fix them. Who do you think in your organization is better able to spot those weak spots before the bad hackers? Of course, it will be your employees. It's imperative to create the ecosystem where your smartest employees are motivated to identify security incidents and report them without worrying about the repercussions. Security awareness is even more important in startups than in large companies. In large companies, you will have the ability to use automated emails, phishing solution to educate the employees, have security programs as part of new hire orientations, etc. However, in startups, you have to look for creative ways to educate employees about breaches and incidents.

7. Managing bug bounty programs

With the limited amount of security budget and resources startups have, try to leverage these third party bug bounty programs such as Hackerone, Bugcrowd and many others. Once you know you have sufficiently hardened the infrastructure and fixed the known vulnerabilities, then you can open this upto one of these bounty programs. Fix the low-hanging fruits first.
Scoping the program is very important as you don't want to get an influx of multiple redundant vulnerabilities reported by researchers. Also remediate the low priority vulnerabilities that can be found through regular automated software checks before engaging with these programs.

Alternatively, you can choose to set up a public sandbox environment that people can test against that runs the same code as production.


Comments

Popular posts from this blog

How to lose weight

More than one-third of adults in the United States are obese. In fact, the furor over obesity, which some have termed an “epidemic,” has reached such proportions that one big-city mayor has gone about banning large-sized, sugary soft drinks and the First Lady has been on a crusade to control the dietary offerings in public schools. Even many adults who do not fit the clinic definition of obese are still overweight, and a large percentage are looking for the best ways to lose weight. Shedding pounds largely comes down to the two-pronged factors of diet and exercise. Not modifying the first one enough, and not getting enough of the second one, ends up giving the individual a recipe for being overweight.  Conditions related to obesity include heart disease, stroke, type 2 diabetes, and certain types of cancer, according to the Centers for Disease Control and Prevention. Counseling someone to eat less and exercise more might be the simplest advice possible, but it’s also, partiall...

How to discover space hogs on your hard drive

If you have a hard drive that is quickly approaching capacity, sorting through the files and folders for the ones taking up the most space can be a really time-consuming process. There’s an easier way to do it—it’s the subject of our latest Tech Tip. For help identifying space hogs, let’s turn to TreeSize Free, which is available for Windows 8, as well as Windows 7, Vista, and XP. Launch the program, go to scan, and select the drive you want to take a look at. The application shows you, in gigabytes, megabytes, and kilobytes, how big each folder is, ranked from most to least. One of the nice things you can do with TreeSize Free is drill down into subfolders to see what sort of space is being taken up. If I want to right click on a folder and see what the files are like or delete them, I can go ahead and do that. Note that TreeSize Free does not dynamically update, so after you delete the data you’ll have to run the scan again to get an accurate count of file...

You MUST Ask Yourself These Before Ending Your Relationship

Are you staying for the stuff? When a relationship is fizzling out, you know it. The intense chemistry you once had with your partner has shifted, and you spend more time not talking than talking. It isn't bad but it certainly isn't good either. If you and your mate are considering parting ways, it is a serious thing for both of you. The one ingredient that I believe you must have to make it work is collaboration. Have you ever stayed in a relationship just for the stuff ? For example, do you have a great bed? One woman said she stayed in her relationship just because of a Tempur-Pedic mattress. Do you belong to a country club? Do you own a second home in another state that would no longer be yours if you left the relationship? All of this stuff can tempt you to stay in the relationship even if you know it should be over. Is your happily-ever-after starting to look a little dim?    When is it time to move on? It's important to real...