Death Stars, IT and building security
In the world of Star Wars, we are fascinated by the epic space battles because of the technologies depicted – the Death Star being a prime example. Looking through the sysadmin’s eyes, how good was the security strategy of the gigantic planet-destroying structure?
In short
- Built to inflict overwhelming damage on the Rebels, the Death Star relied on fear, Tie fighters and defensive systems that overlooked a serious vulnerability.
- Lack of redundancy and inadequate security measures allowed Rebel attackers to quickly compromise the entire system.
- A holistic security strategy that identifies, prioritizes, remediates, and documents potential vulnerabilities is critical for minimizing security risks on Earth and in galaxies far, far away.
Editor’s note: this is the second in series of articles where we draw parallels between everyday IT and the Star Wars saga. In the first episode we imagined the advantages baramundi would bring as a character in the Star Wars universe. In Episode 2, we’re analyzing the security strategy of the much-feared planet-destroying Death Star.”
Some modern facilities like factories and office buildings on Earth – and a massive planet-destroying weapon in a galaxy far, far away – share a serious weakness: they are
overly dependent on inadequate security and defensive measures. In the case of the Death Star, it was the so-called Thermal Exhaust Port – a tiny secondary outlet for
venting reactor core heat -- exploited by the Rebels to destroy the entire station.
We see something similar in many real-world buildings. A single overlooked access point or incomplete security measure can quickly lead to the compromise of critical systems or the
structure itself. That makes it increasingly important to think comprehensively about how to identify and eliminate vulnerabilities in building operational technologies
(OT). These include internet-connected IoT devices, HVAC and lighting controls, industrial process controllers in manufacturing, and other systems.
Missing redundancies
Back to the Death Star: Its reluctant architect, Galen Erso, intentionally added the Thermal Exhaust Port as a hidden vulnerability that attackers might exploit. We see this scenario play out in various ways – usually as mistakes vs. sabotage – time and again in building security. Security protocols are neglected, and backup systems, firewalls or network and physical access controls are either inadequate or missing.
The easier it is to bypass half-hearted security measures, the easier it is for intruders to gain access to the entire system. For example, many companies lack safeguards that reliably deny access to unauthorized individuals. Electronic employee badges and other measures should prevent anyone from getting into the building. But have you ever asked an unaccompanied visitor how they got in? Unlocked server rooms or unsecured points of network access increase the danger. That means that layers of technical and physical security are crucial.
See it, say it, secure it!
Once a potential vulnerability has been identified, don’t dismiss it. The Death Star’s two-meter-wide Thermal Exhaust Port – not much bigger than a womp rat -- was considered such an
unlikely risk that it was not adequately protected.
Likewise, security vulnerabilities in many real-world buildings are not adequately addressed. Have you ever waited at a reception desk when the person behind the desk had
to step away briefly? Did they leave screens unlocked or documents out? While more prominent risks may be addressed, seemingly minor factors are often overlooked! After
identification, prioritization, remediation and documentation of vulnerabilities must follow. This is the only way to prevent attackers from easily exploiting security gaps.
Detect and act
In the case of the Death Star, the threat was noticed too late and past the point when effective countermeasures could be deployed. Similarly, building management processes often
lack rapid response capabilities.
One example? The building’s air-conditioning control system fails. Does the process involve calling in an outside service contractor, and does that consider possible risks?
Service manuals and instructions for some Internet-connected building systems can be easily found online. However unlikely, preventative and defensive measures should account for
possible vulnerabilities.
360 view of the entire space station
The Death Star’s demise is a dramatic example of the potential consequences of inadequate or missing security measures. Everything can “go south” in a big hurry if you are
overly dependent on a single security system, do not use layered and redundant protections, ignore potential weaknesses, or are not prepared for what-if worst-case scenarios.
A holistic and comprehensive security strategy that accounts for multiple aspects of building operations is essential to minimize such risks.
May the cybersecurity Force be with you
Don’t overlook “Thermal Exhaust Ports” in your cybersecurity practices. Find out how you can become your organization’s cybersecurity champion in our whitepaper “Vulnerability Management - Automatically Detect and Quickly Eliminate Vulnerabilities."