Advice about Cybersecurity Blind Spots Including Cloud Access

30 October 2015 Internet, IT & e-Discovery Blog Blog
Author(s): Peter Vogel

A report from Tenable Network Security identifies that blind spots “can increase legal risk because information retention policies designed to limit legal liability are very unlikely to be applied to electronically stored information (ESI) contained on unauthorized cloud, mobile and virtual assets.” Tenable Network Security’s April 15, 2015 report entitled “Eliminating Cybersecurity Blind Spots” includes these three continuous activities:

  1. Passive Network Monitoring
  2. Active Scanning
  3. Event Log Analysis

Here are more details on Passive Network Monitoring from the Report which includes detection of access cloud connections:

Passive network monitoring continuously analyzes network traffic at the packet layer to build a model of active devices and applications on the network. Because passive detection operates 24/7, it will detect transitory assets that may only be occasionally and briefly connected to the network and can send alerts when new assets are detected.

Passive monitoring can frequently determine a device’s operating system and version using OS fingerprinting techniques that can also identify protocols and protocol versions. More importantly, passive monitoring can identify client applications used on the network, such as email clients, web browsers and chat programs. It can also detect FTP peer-to-peer file sharing, and connections to cloud services such as DropBox, YouSendIt and As described earlier, when protected/proprietary data is sent to unsanctioned cloud applications, organizations are frequently exposed to significant hidden risk. Sophisticated passive monitoring tools have the ability to examine unencrypted data sent to the cloud to determine if it contains protected/proprietary data that should not leave the premises.

Advanced passive monitoring tools can associate discovered operating systems, protocols and applications with known vulnerabilities, enabling organizations to prioritize remediation as vulnerabilities are discovered. These tools can also detect when systems are compromised based on application intrusion detection.

Advantages of passive network monitoring are: it identifies transient systems that may only be on the network a brief time; it does not perturb the network or devices on the network; it has visibility of Internet and cloud services being accessed from systems on the network; and it can identify vulnerabilities in real-time, 24/7, to eliminate gaps between active scans (described below) and accelerate threat remediation. The shortcoming of passive network monitoring is that passive detection sensors must be strategically deployed throughout the network so they can monitor all desired traffic, and if the network is reconfigured without reconfiguring or deploying additional passive sensors, devices and applications may not be detected.

All business should heed this advice about protecting the blind spots.

This blog is made available by Foley & Lardner LLP (“Foley” or “the Firm”) for informational purposes only. It is not meant to convey the Firm’s legal position on behalf of any client, nor is it intended to convey specific legal advice. Any opinions expressed in this article do not necessarily reflect the views of Foley & Lardner LLP, its partners, or its clients. Accordingly, do not act upon this information without seeking counsel from a licensed attorney. This blog is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Communicating with Foley through this website by email, blog post, or otherwise, does not create an attorney-client relationship for any legal matter. Therefore, any communication or material you transmit to Foley through this blog, whether by email, blog post or any other manner, will not be treated as confidential or proprietary. The information on this blog is published “AS IS” and is not guaranteed to be complete, accurate, and or up-to-date. Foley makes no representations or warranties of any kind, express or implied, as to the operation or content of the site. Foley expressly disclaims all other guarantees, warranties, conditions and representations of any kind, either express or implied, whether arising under any statute, law, commercial use or otherwise, including implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Foley or any of its partners, officers, employees, agents or affiliates be liable, directly or indirectly, under any theory of law (contract, tort, negligence or otherwise), to you or anyone else, for any claims, losses or damages, direct, indirect special, incidental, punitive or consequential, resulting from or occasioned by the creation, use of or reliance on this site (including information and other content) or any third party websites or the information, resources or material accessed through any such websites. In some jurisdictions, the contents of this blog may be considered Attorney Advertising. If applicable, please note that prior results do not guarantee a similar outcome. Photographs are for dramatization purposes only and may include models. Likenesses do not necessarily imply current client, partnership or employee status.


Related Services