A long time ago, in a galaxy far, far away, a movie franchise captivated the world and introduced us to a new way of thinking about security. Star Wars taught us that security is about more than just keeping bad people out – it is about making sure good people can do their jobs and fulfill their missions, even in the face of overwhelming odds. Today, those same lessons are applied to the field of information security. As our world grows more interconnected, we are learning that the best way to protect our data is not to keep it hidden away from prying eyes, but to make it accessible only to those who need it.
When it comes to data security the Star Wars franchise provides some valuable lessons. In a galaxy filled with advanced technology, the characters are constantly faced with hacking threats. From the Death Star’s data breach to the infiltration of the Rebels’ base on Hoth, these stories show that no system is completely secure. If Darth Vader had better information security in place, maybe his planet-killing weapon wouldn’t have been squashed by rebel spies – thrice. For those who haven’t seen Star Wars – spoilers ahead!
Attackers exploiting hidden vulnerabilities
Was the Death Star the most powerful weapon in the galaxy? – Yes.
Did it take a powerful weapon to destroy it? – No, it only took 2 torpedoes.
How was that possible? – Thanks to Galen Erso, the genius scientist behind the construction of the Death Star, who hid a critical flaw that made the planet-sized weapon vulnerable.
In large systems introducing a vulnerability or missing out on a system flaw is easy. If the Empire had invested some resources to perform a third-party audit and penetration testing of their system then such a critical flaw would’ve been identified right away. Organizations must keep in mind that sometimes all it takes is a small vulnerability for a threat actor to gain complete control of a network. Hidden backdoor programs and unpatched security vulnerabilities in forgotten systems are prime targets. Regular patch updates can help mitigate the attack surface. For instance, a security flaw in Apache Log4j has rendered over 89% of all IT environments to have vulnerable Log4j libraries. According to Check Point, over 48% of global corporate networks have been exploited.
Protecting an IoT world: Droids, robots, and artificial intelligence
The Star Wars series introduced us to an interconnected technology ecosystem where robots and artificial intelligence (AI) are controlled by both sides – the Jedi and the Sith. Droids and clones were used by both sides at one point, playing critical roles in the Clone Wars and the Galactic Civil War. Yet, they were frequently sliced (hacked), sabotaged, reprogrammed, and memories wiped.
The droids posed a significant security challenges but were mostly left on their own. Remember K-2SO from the film Rogue One? The imperial security drone was reprogrammed to serve the Rebel Alliance. Or the Jawas fitting droids with crude restraining bolts to hack into their systems and incapacitate their autonomous function. The destruction of the Death Star makes you question the security systems of your IoT vendors. R2-D2, a mobile droid, was able to gain unauthorized access to the Imperial network, hack into the Death Star, and basically infiltrate any system despite being shut down for years.
Every time a new droid or Internet of Things (IoT) device is added we expand our network footprint and attack surface. Addressing the security issues of IoT devices requires expertise in AI, machine learning, and data analytics. If you’re just getting started with AI and machine learning, don’t worry; you can still gain access to historic data and practice your R2-D2 skills.
An overwhelming amount of security design flaws
The Empire spent a whopping $192 quintillion to build. But despite its power, the entire system had flaws (most fatal) that could be exploited to execute arbitrary code. The Imperial network was riddled with security by design flaws from lack of network segmentation, intrusion detection systems, data leaks, and an inability to learn and adapt from mistakes.
Security by design, especially in the cloud, helps prevent system errors from an early stage. According to Gartner, a cybersecurity mesh architecture approach (CSMA) provides “a composable and scalable approach to extending security controls, even to widely distributed assets”. A CSMA is a responsive security approach that moves past siloed security and builds a more collaborative security force – just like the Rebel Alliance.
Do, or do not. There is no try.
In the information security world, we can learn a lot from Star Wars – both in terms of what to do, and what not to do. The Rebel Alliance were able to defeat the Empire not just because they had better technology but also because they had better people. In the same way, we need to focus on developing the right skills and capabilities in our people if we want to win the fight against cybercrime.
May the force be with you.