{"id":236,"date":"2015-09-16T12:02:16","date_gmt":"2015-09-16T18:02:16","guid":{"rendered":"http:\/\/ericlambert.net\/blog\/?p=236"},"modified":"2015-09-16T12:02:16","modified_gmt":"2015-09-16T18:02:16","slug":"ftc-opens-their-nationwide-tour-to-promote-start-with-security","status":"publish","type":"post","link":"https:\/\/ericlambert.net\/blog\/2015\/09\/16\/ftc-opens-their-nationwide-tour-to-promote-start-with-security\/","title":{"rendered":"FTC opens their nationwide tour to promote Start with Security"},"content":{"rendered":"<p>It&#8217;s not the latest group on tour with a band name and album name that needed a lot more thought. \u00a0Earlier this year, the FTC announced that they would be releasing guidance for businesses on data security.\u00a0 In June, they did just that, releasing a guide\u00a0called <a href=\"https:\/\/www.ftc.gov\/system\/files\/documents\/plain-language\/pdf0205-startwithsecurity.pdf\" target=\"_blank\" rel=\"noopener\">Start with Security: A Guide for Business<\/a>.\u00a0 It&#8217;s subtitled &#8220;Lessons Learned From FTC Cases&#8221; for a reason &#8212;\u00a0it uses the 50+ FTC enforcement actions on data security to provide <strong>ten\u00a0lessons<\/strong>\u00a0companies should learn when\u00a0approaching to security to avoid others&#8217; missteps that led to enforcement actions, and <strong>practical guidance<\/strong> on reducing risks. \u00a0The lessons are:<\/p>\n<ol>\n<li><span style=\"text-decoration: underline;\">Start with security<\/span>. \u00a0The FTC has long advocated the concept of &#8220;privacy by design,&#8221; meaning\u00a0companies should bake an understanding of and sensitivity to privacy into every part of the business, making it part of the design process for new products and processes. \u00a0The FTC is advocating a similar concept of &#8220;<span style=\"text-decoration: underline;\">security by design<\/span>.&#8221; Guidance: \u00a0<strong>don&#8217;t collect personal information you don&#8217;t need<\/strong> (the <em>RockYou<\/em>\u00a0enforcement action); <strong>don&#8217;t use personal information when it&#8217;s not necessary<\/strong> (<em>Accretive<\/em> and <em>foru International<\/em>); <strong>don&#8217;t\u00a0hold on to information longer than\u00a0you have a legitimate business need for it<\/strong> (<em>BJ&#8217;s Wholesale Club<\/em>).<\/li>\n<\/ol>\n<ol>\n<li value=\"2\"><span style=\"text-decoration: underline;\">Control access to data sensibly<\/span>. \u00a0Keep data in your possession secure by controlling access to it &#8211; limit access to those with a need to know for a legitimate business purpose (e.g., no shared user accounts, lock up physical files). Guidance: <strong>don&#8217;t let employees access personal information unless they need to access it as part of their job<\/strong> (<em>Goal Financial<\/em>); <strong>don&#8217;t give administrative access to anyone other than employees tasked administrative duties<\/strong>\u00a0(<em>Twitter<\/em>).<\/li>\n<\/ol>\n<ol>\n<li value=\"3\"><span style=\"text-decoration: underline;\">Require secure passwords and authentication<\/span>. \u00a0Use strong password\u00a0authentication and sensible password hygiene (e.g., suspend password after x unsuccessful attempts; prohibit common dictionary words; require at least 8 characters; require at least one upper case character, one lower case character, 1 numerical character, and 1 special character; prohibit more than 2 repeating characters; etc.) \u00a0Guidance: <strong>r<\/strong><b>equire complex and unique passwords<\/b> (<em>Twitter<\/em>); <b>store passwords securely<\/b> (G<em>uidance Software<\/em>,\u00a0<em>Reed Elsevier<\/em>,\u00a0<em>Twitter<\/em>); <strong>guard against brute force attacks<\/strong>\u00a0(<em>Lookout Services<\/em>,\u00a0<em>Twitter<\/em>, <em>Reed Elsevier<\/em>);\u00a0<strong>protect against authentication bypass\u00a0<\/strong>such as predictable resource location (<i>Lookout Services<\/i>).<\/li>\n<\/ol>\n<ol>\n<li value=\"4\"><span style=\"text-decoration: underline;\">Store sensitive personal information securely (&#8220;at rest&#8221;) and protect it during transmission (&#8220;in motion&#8221;)<\/span>. Use strong encryption when storing and transmitting data, and ensure the personnel implementing encryption understand how you use sensitive data and can determine the\u00a0right approach on a situation-by-situation basis. \u00a0Guidance:\u00a0<strong>Keep sensitive information secure throughout the data life-cycle (receipt, use, storage, transmission, disposal)<\/strong> (<em>Superior Mortgage Corporation<\/em>);\u00a0<strong>use industry-tested and accepted methods<\/strong> (<em>ValueClick<\/em>);\u00a0<strong>make sure encryption is properly configured<\/strong> (<em>Fandango<\/em>,\u00a0<em>Credit Karma<\/em>).<\/li>\n<\/ol>\n<ol>\n<li value=\"5\"><span style=\"text-decoration: underline;\">Segment your network and monitor who&#8217;s trying to get in and out<\/span>. \u00a0Be sure to use firewalls to segment your network to minimize what an attacker can access. \u00a0Use intrusion detection and prevention tools to monitor for malicious activity. \u00a0Guidance:\u00a0<strong>segment your network<\/strong> (<em>DSW<\/em>);\u00a0<strong>monitor activity on your network<\/strong> (<em>Dave &amp; Buster&#8217;s<\/em>,\u00a0<em>Cardsystem Solutions<\/em>).<\/li>\n<\/ol>\n<ol>\n<li value=\"6\"><span style=\"text-decoration: underline;\">Secure remote access to your network<\/span>. Make sure you develop and implement a remote access policy, implement strong security measures for remote access, and put appropriate limits on remote access such as by IP address and revoking remote access promptly when no longer needed. \u00a0(The compromise of a vendor&#8217;s system via phishing, leading to remote network access,\u00a0is how the Target breach started.) \u00a0Guidance:\u00a0<strong>ensure remote computers have appropriate\u00a0security\u00a0measures in place, e.g., &#8220;endpoint security&#8221;<\/strong> (<em>Premier Capital Lending<\/em>,\u00a0<em>Settlement One<\/em>,\u00a0<em>LifeLock<\/em>);\u00a0<strong>put sensible access limits in place<\/strong> (<em>Dave &amp; Buster&#8217;s<\/em>).<\/li>\n<\/ol>\n<ol>\n<li value=\"7\"><span style=\"text-decoration: underline;\">Apply sound security practices when developing new products<\/span>. Use &#8220;security by design&#8221; to ensure data security is considered at all times during the product development life-cycle. \u00a0Guidance:\u00a0<strong>Train engineers in secure coding<\/strong> (<em>MTS, HTC America, TrendNet<\/em>);\u00a0<strong>follow platform guidelines for security<\/strong> (<em>HTC America<\/em>,\u00a0<em>Fandango<\/em>,\u00a0<em>Credit Karma<\/em>);\u00a0<strong>verify that privacy and security features work<\/strong> (<em>TRENDnet<\/em>,\u00a0<em>Snapchat<\/em>);\u00a0<strong>test for common vulnerabilities<\/strong> (<em>Guess?<\/em>).<\/li>\n<\/ol>\n<ol>\n<li value=\"8\"><span style=\"text-decoration: underline;\">Make sure your service providers implement reasonable security measures<\/span>. Make sure you communicate your security expectations to your\u00a0service providers and vendors, and put their feet to the fire through contractual commitments and auditing\/penetration testing.\u00a0Guidance: <b>put it in writing<\/b> (<em>GMR Transcription<\/em>);\u00a0<strong>verify compliance<\/strong>\u00a0(<i>Upromise<\/i>).<\/li>\n<\/ol>\n<ol>\n<li value=\"9\"><span style=\"text-decoration: underline;\">Put procedures in place to keep your security current and address vulnerabilities that may arise<\/span>. \u00a0Data security is a constant game of cat-and-mouse with hackers &#8211; make sure to keep your guard up. \u00a0Apply updates to your hardware and software as they are issued, and ensure you are spotting vulnerabilities\u00a0in, and promptly patching, your own software. Have a mechanism to allow security warnings and issues to be reported to IT. \u00a0Guidance:\u00a0<strong>update and patch third-party software<\/strong> (<em>TJX Companies<\/em>);\u00a0<strong>heed credible security warnings and move quickly to fix them<\/strong> (<em>HTC America<\/em>,\u00a0<em>Fandango<\/em>).<\/li>\n<\/ol>\n<ol>\n<li value=\"10\"><span style=\"text-decoration: underline;\">Secure paper, physical media, and devices<\/span>. \u00a0Lastly, while the focus these days seems to be on cybersecurity, don&#8217;t forget about physical security of papers and physical media. \u00a0Guidance:\u00a0<strong>securely store sensitive files<em>\u00a0<\/em><\/strong>(<em>Gregory Navone<\/em>,\u00a0<em>Lifelock<\/em>);\u00a0<strong>protect devices that process personal information\u00a0<\/strong>(<em>Dollar Tree<\/em>);\u00a0<strong>keep safety standards in place when data is en route<\/strong> (<em>Accretive<\/em>,\u00a0<em>CBR Systems<\/em>);\u00a0<strong>dispose of sensitive data securely<\/strong> (<em>Rite Aid<strong>,\u00a0<\/strong>CVS Caremark<strong>,\u00a0<\/strong>Goal Financial<\/em>).<\/li>\n<\/ol>\n<p>As this guidance is based on what companies did wrong or didn&#8217;t do\u00a0that led to FTC enforcement actions, it will be interesting to see how the FTC treats a company that suffers a data breach but\u00a0demonstrates that they used reasonable efforts to comply with the FTC&#8217;s guidance. \u00a0I suspect the FTC will\u00a0take a company&#8217;s compliance with this guidance into consideration when\u00a0determining penalties\u00a0in an enforcement action. The guidance is very high-level,\u00a0so companies must rely on their IT and Legal teams to determine what steps, processes and protocols need to be implemented in alignment\u00a0with the FTC&#8217;s\u00a0guidance.<\/p>\n<p>In addition to publishing the guide, the FTC has embarked on a conference series aimed at\u00a0SMBs (small and medium-sized businesses), start-up companies, and developers to provide information on &#8220;security by design,&#8221; common security vulnerabilities, secure development strategies, and vulnerability response. \u00a0The first conference took place September 9 in San Francisco, CA; the second will take place <span style=\"text-decoration: underline;\">November 5<\/span> in <span style=\"text-decoration: underline;\">Austin, TX<\/span>.<\/p>\n<p>The FTC also announced a new website at which they&#8217;ve gathered all of their data security guidance, publications, information and tools as a &#8220;one-stop shop&#8221;. \u00a0You can find it at <a href=\"http:\/\/www.ftc.gov\/datasecurity\" target=\"_blank\" rel=\"noopener\">http:\/\/www.ftc.gov\/datasecurity<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s not the latest group on tour with a band name and album name that needed a lot more thought. \u00a0Earlier this year, the FTC announced that they would be releasing guidance for businesses on data security.\u00a0 In June, they &hellip; <a href=\"https:\/\/ericlambert.net\/blog\/2015\/09\/16\/ftc-opens-their-nationwide-tour-to-promote-start-with-security\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,9,10,11,1],"tags":[68,69,96,141,163],"class_list":["post-236","post","type-post","status-publish","format-standard","hentry","category-legal","category-otherlegal","category-privacy","category-security","category-uncategorized","tag-data-breach","tag-data-privacy","tag-ftc","tag-privacy","tag-security"],"_links":{"self":[{"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/posts\/236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/comments?post=236"}],"version-history":[{"count":0,"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/posts\/236\/revisions"}],"wp:attachment":[{"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/media?parent=236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/categories?post=236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/tags?post=236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}