As the balance of security controls shifts, where does responsibility rest?

By on 20 Mar 2024

Category: Tech matters

Tags: , ,

Blog home

Adapted from Kevin T's orginal image at Flickr.

We are in the midst of a volley of ‘tussles‘ on security control points and surveillance/privacy protections. If you are unfamiliar with the term tussle, it refers to a paper by David Clark and fellow researchers that describes the evolving dance between technology and policy. Tussles surrounding privacy and surveillance arise every so often, sometimes including a rebalance of the ownership or access to metadata.

The current set of tussles involves a push and pull from industry, standards, and policy with the debate remaining open as to how it will all settle. As encryption becomes stronger and more pervasive on the Internet to protect our sessions while in transit, the ability to use traditional tools to detect malicious traffic has and will continue to diminish.

At the same time, strong encryption that cannot be intercepted is promoted as part of a zero-trust architecture and is important to adopt to prevent lateral movement. Another argument in favour of strong encryption is that it prevents having points of aggregation where all traffic is visible (such as intrusion prevention systems holding a shared key to access and view all data).

In the recent volley, the dance includes:

This tussle is a very interesting one, shaping significant changes on the Internet in terms of how we as an industry ensure the security of sessions, data, and endpoints. The distributed nature of the Internet along with the multistakeholder governance model allows for and encourages these debates.

The debates typically settle with slight differences when national laws are considered due to the slight differences in historical cultural norms between nations that we may consider similar in many regards.

In some cases, it is difficult to see through the trees when we are in the midst of change. How security is integrated into products, services, and the network itself is transforming at a rapid pace.

This means that security controls will settle differently in terms of placement and responsibility than they may have in the past. Ideally, we wind up with a more secure, resilient, and easier-to-manage infrastructure as we work through these tussles.

There are methods to provide security in these new models, and they may even provide improvements from the current state where security is not only built-in by design and by default but also managed on a scale, as I wrote in ‘Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain‘.

In terms of how the controls settle out, there is another important consideration — how does the responsibility balance shift with intrinsic changes to points in visibility?

Several considerations were raised in this blog on the changes specific to ECH, and summarized, those include:

  • As controls managed by the organization are eliminated (for example, intrusion detection / prevention systems), does the responsibility to protect data and systems shift away from the enterprise? Is the browser then liable? Is the CDN liable?
  • Are enterprises still responsible for security breaches when they have little ability to intercept and prevent them?
  • Are regulatory requirements required to shift the responsibility when control points shift-left or change?
  • Does this shift-left further motivate application providers, CDNs, and browser vendors to build secure code and ensure memory safety?

Additional questions should be considered as the tussle begins to take shape as it is too early to tell what will happen with the proposal to the eIDAS.

Suppose that dance settles as recommended in the referenced letter. In that case, a shift in balance will not occur at this time, as some technical adjustments will aid in the aims of the policy objectives, where parties work collectively.

Rate this article

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of APNIC. Please note a Code of Conduct applies to this blog.

Leave a Reply

Your email address will not be published. Required fields are marked *

Top