Lock down everything and EVERYBODY

Certainly you need to do everything you can to secure your systems. Goes without saying (yeah, I know, I just said it, so sue me). But the fact is, you also need to lock down your people.
Bill Clinton, years back, issued an exec order authorizing only twenty individuals to classify information. But these twenty also got the authority to delegate that same authority to many others. In the end, literally millions of government employees and contractors gained the right to classify material.
In early 2009, Obama issued an order mandating that those who classify information put their names on the material they classify. What a great freaking idea! Non-repudiation, right? If you’re going to make a mess, take responsibility for it.
Let’s recall the prime directive of NERC compliance: identify your critical cyber assets, then establish a perimeter around them. Well, by classifying millions of documents, the government made its job that much harder.
Wikileaks didn’t steal the material. They published what they were given by an idiot Army private by the name of Manning. He was able to download a metric ton of documents, and the only reason they caught him was that a hacker friend of his turned him in. This was an IT security failure of massive proportions.
PEOPLE are the weakest link, many times. Just a couple of years ago, the Pentagon granted clearances of various levels to over 600,000 people. If everybody in the neighborhood is in the play, who is your audience?
Recently, on a plane from Chicago to Boston, the moron next to me had a loud phone cel phone conversation in which I learned the details of not only the inefficient inner workings of his company, but the dishonest sales reps in his org, and another guy they were planning to fire for fraud (and he took particular satisfaction in the idea of denying the guy unemployment benefits). In my book, I detail a couple of other stories about the horrors of mouthy guys on planes giving away otherwise secret info.
All the policies in the world won’t keep you perfectly safe if you’ve got loudmouths, idiots, or crooks in your chain of command. However, they CAN limit the damage (check out my blog entry of 12/10 to discuss this). And there’s one more item to consider. Regardless of how things happen, a decent identity and access framework will provide you an audit trail to tell you EXACTLY how, so that you know who to beat with sticks once you’ve discovered a breach. It’s good to be able to point fingers. Of course, it’s better to not have a REASON to point fingers in the first place.