Investigation into how a competitor may have obtained copies of the confidential architectural drawings

 

 

Padgett-Beale’s Corporate Security Office has recently completed an investigation into how a competitor may have obtained copies of the confidential architectural drawings and design plans for a new type of resort that the company had planned for a recently acquired island property. It is suspected that an Advanced Persistent Threat mechanism may have been used to exfiltrate information.
In your opinion, what processes and procedures should be used to discourage or make it difficult for employees, managers, and executives to inadvertently misuse and/or steal the company’s intellectual property (consider data classification and marking, separation of duties, and least privilege).

Sample Solution

Following the suspected theft of confidential architectural drawings, Padgett-Beale’s Corporate Security Office needs to implement a robust strategy to safeguard intellectual property (IP). Here’s a multi-pronged approach that addresses data classification, separation of duties, and least privilege principles:

  1. Data Classification and Marking:
  • Classify Data: Categorize all information assets based on their sensitivity (e.g., confidential, secret, internal). Architectural drawings and design plans would likely fall under the “confidential” category.
  • Marking System: Implement a clear and consistent marking system to identify the confidentiality level of documents. This could include visible watermarks, stamps, or headers on physical and electronic documents.
  • Training: Train employees, managers, and executives on the data classification system and its importance in protecting sensitive information.
  1. Separation of Duties (SoD):
  • Minimize Access: Limit access to confidential data only to those who have a legitimate business need. This reduces the number of potential entry points for a malicious actor.
  • Restrict Permissions: Implement role-based access control (RBAC). Assign permissions based on an individual’s job function, ensuring they only have the level of access required for their specific tasks. For example, design engineers might need access to the drawings, but marketing personnel likely wouldn’t.
  • Dual Control: For highly sensitive information, consider a dual-control system where two authorized individuals need to approve access or data transfers. This adds an extra layer of security.
  1. Principle of Least Privilege:
  • Grant Minimum Access: Provide users with the minimum level of access needed to perform their jobs effectively. This minimizes the potential damage if a user’s credentials are compromised.
  • Regular Reviews: Conduct periodic reviews of user access privileges. Revoke access for employees who no longer require access to certain data or have changed roles within the company.
  • Monitor User Activity: Implement a system to monitor user activity, especially access to highly sensitive data. This can help detect unusual patterns or suspicious behavior.

Additional Measures:

  • Technical Safeguards: Implement strong technical safeguards, including firewalls, intrusion detection/prevention systems (IDS/IPS), and data encryption, to deter unauthorized access attempts.
  • Security Awareness Training: Regularly conduct security awareness training for all employees to educate them on social engineering tactics, phishing scams, and best practices for protecting confidential information.
  • Incident Response Plan: Develop a comprehensive incident response plan outlining procedures for detecting, investigating, and responding to security breaches.

By implementing a combination of these measures, Padgett-Beale can create a layered defense to protect its intellectual property. Continuous monitoring and improvement of security protocols are crucial to stay ahead of evolving threats.

Addressing Advanced Persistent Threats (APT):

While focusing on internal controls is important, acknowledging the suspected APT use suggests a more sophisticated attack. Therefore, consider:

  • External Threat Intelligence: Utilize threat intelligence feeds to stay updated on APT tactics and vulnerabilities.
  • Endpoint Security: Implement endpoint detection and response (EDR) solutions to monitor user activity and detect malicious behavior on company devices.
  • Penetration Testing: Conduct regular penetration testing to identify potential security weaknesses in the system before they can be exploited by attackers.

By adopting a comprehensive approach that addresses both internal procedures and external threats, Padgett-Beale can significantly reduce the risk of future intellectual property theft.

 

This question has been answered.

Get Answer