Site icon Andy M Mallon – AM²

Why Best Practices Exist: Learning from others’ mistakes

The latest malware to make the headlines is really interesting to me. It’s a ransomware worm called Petya. Ransomware is particularly interesting to me as a DBA, because DBAs are responsible for keeping data safe, and ransomware is specifically designed to destroy your data. I’m not a security expert, and I don’t even pretend I am–but security is something we should all be interested in.

Petya worms its way across networks, encrypting files both locally and on network shares. It infects other computers. What happens if one of those servers is a database server. Do you have backups? Sure, they’re on….a network share? Did that network share get pwned?

Andy, you’re paranoid

First off–no, I’m not. I have a personal story that I’ll write about soon. But let’s think of a worst-case scenario:

Everyone makes mistakes. Perhaps you opened an attachment you shouldn’t have. Or maybe you were the victim of a phishing attempt. Maybe it was a malicious, well-formed spear-phishing attack. However it happened, your machine is Patient Zero, and you are logged in. Do you have access to the network shares holding your backups? Do you have access to your database servers? Are you logged into your desktop using the same credentials as you use to access those shares/servers? If you use different credentials, did you save the password on your RDP connection?

Back to the headlines

Major multi-national companies are being slammed by this ransomware this week. Maersk (a conglomerate with $47 billion USD revenue) had a worldwide IT shutdown that brought employee desktops to a hault. WPP (a $15 billion USD marketing company on the FTSE 100) had to remove entire offices from their network to prevent the spread. These aren’t the only victims–there are many companies that have been hit by Petya.

I don’t know any of the details or specifics of how these companies were affected (or infected), but they are major companies that surely have their IT act together. Right?

What is Petya, anyway?

If these big multinational conglomerates are being hit, this is probably some zero-day exploit that caught them by surprise. The Microsoft Malware Protection Center blog has a great post about Petya. (At this point, I want to reiterate: I’m not security expert. )Once one machine is infected (perhaps via phishing), it worms its way across the network. That’s where things get interesting. How does it spread?

If you follow best practices, you’ve got some protection against all three of those attack vectors:

And let’s talk about other best practices that you may or may not be following:

Rules are meant to be broken

Best practices are just rules. Everyone knows rules are meant to be broken. Sometimes best practices are silly, or require extra work. That extra work might be worth it. Those rules exist for a reason. You need to understand why the rule exists before you break. There are loads of cases where best practices won’t be a good fit for you–and it’s OK to not follow them. Just make sure that your reason is based in reality, and you’ve got a good reason to do it. “It’s hard” is not a good reason.

A separate admin account might slow you down in an emergency…by 30 seconds? Does 30 seconds matter? Installing the latest Windows Updates quickly might mean your organization needs to test faster. Testing faster might mean you miss things. The faster patch cadence might mean a patch causes some other unintended outage of an application. Would your business rather have an application be offline for a day while you roll back a Windows Update, or would your business rather have their data disappear into the ether when it’s encrypted by malware?

Exit mobile version