{"id":659859,"date":"2013-05-23T08:55:03","date_gmt":"2013-05-23T12:55:03","guid":{"rendered":"http:\/\/gigaom.com\/?p=646270"},"modified":"2013-05-23T08:55:03","modified_gmt":"2013-05-23T12:55:03","slug":"sponsored-post-determining-the-root-cause-of-a-data-breach-using-the-5-whys","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/659859","title":{"rendered":"Sponsored post: Determining the root cause of a data breach using \u201cthe 5 Whys\u201d"},"content":{"rendered":"<p>There is a fun little question-asking technique called <a href=\"http:\/\/www.varonis.com\/solutions\/by-business-need\/entitlement-reviews.html?utm_campaign=GigaOM+Ads&#38;utm_source=Sponsored+Post+The+5+Whys\" rel=\"nofollow\">the 5 Whys<\/a>. It was developed by Sakichi Toyoda at Toyota to determine the root cause &#8212; and solution &#8212; to any given problem in the manufacturing process. The technique has been borrowed by coders, sysadmins and executives alike. Let\u2019s say a CIO just learned that a data breach occurred in which 50,000 sensitive files had been stolen from the company. Below is the 5 Whys exercise that this exec worked out:<\/p>\n<p>Problem: 50,000 files were stolen.<br \/> Why? The files were accessible to everyone in the company, even guests.<br \/> Why? The folder\u2019s access control list was configured incorrectly.<br \/> Why? Chuck the intern configured that file server in 2007 and it hasn\u2019t been reviewed since.<br \/> Why? We don\u2019t have a process to review file system permissions.<br \/> Why? Because manually reviewing every folder\u2019s ACL for problems is like searching for a needle in a haystack . . . and THERE\u2019S ONLY THREE OF US AND A THOUSAND FILE SERVERS! SHEESH!<\/p>\n<p>See, behind every technical problem is usually a human problem!<\/p>\n<p>It seems like the above fictional security incident was technical in nature &#8212; the ACL was configured incorrectly. The value of the 5 Whys technique is that it encourages us to really understand the underlying cause: a nonexistent entitlement review policy.<\/p>\n<p>We hope this post has started you thinking about your entitlement procedures.<\/p>\n<p>Varonis <a href=\"http:\/\/www.varonis.com\/solutions\/by-business-need\/entitlement-reviews.html?utm_campaign=GigaOM+Ads&#38;utm_source=Sponsored+Post+The+5+Whys\" rel=\"nofollow\">DatAdvantage and DataPrivilege<\/a>\u00a0improve your company\u2019s breach mitigation solutions by automating the entitlement review and permissions audit process.<\/p>\n<p> <img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/stats.wordpress.com\/b.gif?host=gigaom.com&#038;blog=14960843&#038;%23038;post=646270&#038;%23038;subd=gigaom2&#038;%23038;ref=&#038;%23038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n<p><a href=\"http:\/\/pubads.g.doubleclick.net\/gampad\/jump?iu=\/1008864\/GigaOM_RSS_300x250&#038;sz=300x250&#038;%23038;c=373938\"><img decoding=\"async\" src=\"http:\/\/pubads.g.doubleclick.net\/gampad\/ad?iu=\/1008864\/GigaOM_RSS_300x250&#038;sz=300x250&#038;%23038;c=373938\" \/><\/a><\/p>\n<p><img width='1' height='1' src='http:\/\/gigaom.feedsportal.com\/c\/34996\/f\/646446\/s\/2c4e4254\/mf.gif' border='0'\/><\/p>\n<div class='mf-viral'>\n<table border='0'>\n<tr>\n<td valign='middle'><a href=\"http:\/\/share.feedsportal.com\/share\/twitter\/?u=http%3A%2F%2Fgigaom.com%2F2013%2F05%2F23%2Fdetermining-the-root-cause-of-a-data-breach-using-the-5-whys%2F&#038;t=Sponsored+post%3A+Determining+the+root+cause+of+a+data+breach+using+%E2%80%9Cthe+5+Whys%E2%80%9D\" ><img decoding=\"async\" src=\"http:\/\/res3.feedsportal.com\/social\/twitter.png\" border=\"0\" \/><\/a>&nbsp;<a href=\"http:\/\/share.feedsportal.com\/share\/facebook\/?u=http%3A%2F%2Fgigaom.com%2F2013%2F05%2F23%2Fdetermining-the-root-cause-of-a-data-breach-using-the-5-whys%2F&#038;t=Sponsored+post%3A+Determining+the+root+cause+of+a+data+breach+using+%E2%80%9Cthe+5+Whys%E2%80%9D\" ><img decoding=\"async\" src=\"http:\/\/res3.feedsportal.com\/social\/facebook.png\" border=\"0\" \/><\/a>&nbsp;<a href=\"http:\/\/share.feedsportal.com\/share\/linkedin\/?u=http%3A%2F%2Fgigaom.com%2F2013%2F05%2F23%2Fdetermining-the-root-cause-of-a-data-breach-using-the-5-whys%2F&#038;t=Sponsored+post%3A+Determining+the+root+cause+of+a+data+breach+using+%E2%80%9Cthe+5+Whys%E2%80%9D\" ><img decoding=\"async\" src=\"http:\/\/res3.feedsportal.com\/social\/linkedin.png\" border=\"0\" \/><\/a>&nbsp;<a href=\"http:\/\/share.feedsportal.com\/share\/gplus\/?u=http%3A%2F%2Fgigaom.com%2F2013%2F05%2F23%2Fdetermining-the-root-cause-of-a-data-breach-using-the-5-whys%2F&#038;t=Sponsored+post%3A+Determining+the+root+cause+of+a+data+breach+using+%E2%80%9Cthe+5+Whys%E2%80%9D\" ><img decoding=\"async\" src=\"http:\/\/res3.feedsportal.com\/social\/googleplus.png\" border=\"0\" \/><\/a>&nbsp;<a href=\"http:\/\/share.feedsportal.com\/share\/email\/?u=http%3A%2F%2Fgigaom.com%2F2013%2F05%2F23%2Fdetermining-the-root-cause-of-a-data-breach-using-the-5-whys%2F&#038;t=Sponsored+post%3A+Determining+the+root+cause+of+a+data+breach+using+%E2%80%9Cthe+5+Whys%E2%80%9D\" ><img decoding=\"async\" src=\"http:\/\/res3.feedsportal.com\/social\/email.png\" border=\"0\" \/><\/a><\/td>\n<td valign='middle'><\/td>\n<\/tr>\n<\/table>\n<\/div>\n<p><a href=\"http:\/\/da.feedsportal.com\/r\/165664351363\/u\/49\/f\/646446\/c\/34996\/s\/2c4e4254\/a2.htm\"><img decoding=\"async\" src=\"http:\/\/da.feedsportal.com\/r\/165664351363\/u\/49\/f\/646446\/c\/34996\/s\/2c4e4254\/a2.img\" border=\"0\"\/><\/a><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"http:\/\/pi.feedsportal.com\/r\/165664351363\/u\/49\/f\/646446\/c\/34996\/s\/2c4e4254\/a2t.img\" border=\"0\"\/><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/OmMalik?a=-VkWdDJq-1E:4KqwG3WDucY:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/OmMalik?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/OmMalik\/~4\/-VkWdDJq-1E\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a fun little question-asking technique called the 5 Whys. It was developed by Sakichi Toyoda at Toyota to determine the root cause &#8212; and solution &#8212; to any given problem in the manufacturing process. The technique has been borrowed by coders, sysadmins and executives alike. Let\u2019s say a CIO just learned that a [&hellip;]<\/p>\n","protected":false},"author":6612,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-659859","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/659859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/6612"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=659859"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/659859\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=659859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=659859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=659859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}