One of the things on my mind lately is a deceptively simple idea/question:
How replaceable is an asset type?
And a nagging question/observation:
Why do we spend the majority of our time in IT security on the most replaceable assets like regulated credit card data – at the opportunity cost and neglect of less-and-irreplaceable assets like Intellectual Property, Corporate Secrets and Critical Infrastructure?
If we draw a continuum from “Highly Replaceable” through “Irreplaceable”, we can then map 1..n various asset types against said continuum. Please see Figure 1 below.
At the extremes, a human life is irreplaceable – whereas my mother-in-law’s Credit Card Number (CCN) is highly replaceable.
Highly Replaceable:
Let’s start with one of the most replaceable asset types… Who hasn’t had a Credit Card stolen (or several)? Think about it. How bad is it really? At most you are liable for a mere $50 – a fee I’ve yet to see anyone have to pay. What it tends to mean is an inconvenience of getting a new card issued, and the nuisance of direct billing logistics. Can it be worse? I’m sure it can be (and has been), but/and I’m pretty sure it isn’t worse than less replaceable assets types.
Irreplaceable/Less Replaceable:
On the other end of the continuum, we find less replaceable asset types: your Intellectual Property, your trade secrets, your corporate secrets, your proprietary research and development, etc. Whether this is, for example (but not limited to):
- “the Colonel’s” secret herbs and spices which go into his world famous fried chicken (including the alleged “addictive chemical that makes you crave it fortnightly” #NameThatMovie)
- Coca-Cola’s highly guarded recipe for brown sugar water
- research data for the next wonder-drug (think Viagra)
- Mergers & Acquisition files
- Oil & Mineral Prospecting Data
- Military Defense Secrets like the F-35 Joint Strike Fighter plans
Why do we spend the majority of our time in IT security on the most replaceable assets like regulated credit card data – at the opportunity cost and neglect of less-and-irreplaceable assets like Intellectual Property, Corporate Secrets and Critical Infrastructure?
- As a CIO once told me, “I might be hacked, but I will be fined”
- Is it that we “Fear the Auditor more than the attacker?”
- Are we erroneously assuming that these “best practices” for defending card data equally apply to other adversary classes (think state sponsored espionage and/or ideologically fueled chaotic actors) seeking other asset classes (which are often in other parts of our IT)? More on this later.
- Is it that we have more available data on regulated data types due to mandatory disclosure laws and we’re looking “where the light is best”?
*There are caveats per your contracts. E.g. you may need to report the fraud in a reasonable timeframe.