The Goose Strategy: Getting Out Of Scope


The Goose Strategy: Getting Out Of Scope

Many organisations focus on how they can protect networks and platforms. Using the analogy of a house, they are putting better locks on their doors, installing video cameras and so on. But this is a different approach- have less valuable stuff in your house, so it’s less attractive to break in to. And if there is a break in, there isn’t much to steal.

This is the “Get Out of Scope” strategy. The first stage is easy - are there any processes that your platform does that involve sensitive data?

Spoiler alert - pretty much everyone starts off thinking they don’t have any sensitive data on their platform. That they don’t do payments - or at least the transaction information is somehow separate and not their responsibility. Or that step where your users need to upload a photo of their drivers license to prove ID hasn’t resulted in gigabytes of sensitive data.

The common one here is transactions - taking payments from users. Especially with older apps, we see a lot of platforms either storing transaction information or using a payment gateway in a way that leaves transaction information hanging around. Your development team might pinkie promise there isn’t, but you’d be surprised how much of this kind of data hangs around.

Another one is health data - even things you personally might not consider to be “sensitive health data” like weight. There are specific definitions for different regions - so if you have users in say California, you might want to get up to speed on their definitions.

And the one that gets a lot of people is children’s data. It doesn’t matter if you didn’t intentionally collect child data. If your UI wasn’t set up to determine age when the user data was collected, then you may be unknowingly collecting sensitive child data.

The Goose approach is to move any sensitive process out, and put a solid wall between your app and that data. Taking payments as an example: although it might seem really attractive to hoard lots of data points and transactional information about your users, the “get out of scope” strategy involves moving this completely out of your system. 

Payments moved away from we app system

Here’s how best practice looks:

  • Your app stores only the minimum amount of information it needs to know about that user
  • Anything else, like payments, is sent to a 3rd party payments provider you trust (which means you’ve done due diligence and reviewed their processes and setup)
  • If your app does need to know something sensitive about a user (eg: “are they up to date with loan payments?”), then make a de-identified request to a separate, locked down API. Even better would be to ask a separate, trusted 3rd party service.
  • This is all done via an iframe - no server code or JavaScript ever deals with it. No “digital lint” hangs around on your server, in logs, or in tracking tools. It still blends in seamlessly with the rest of the UI
  • The payments provider API responds with a transaction ID & payment intention
  • This transaction ID can then get used to grab additional detail - like say your user hits a page that shows billing information. The app asks the payment API for summary data for transaction id 1234. Nothing is stored locally, and nothing in that request can be used to identify the user.

The next stage is to look at technical architecture. Many organisations have complex apps that need to connect to the internet. Nothing amazing there. But what tends to happen is all of the complexity exists in this one big app - even if 90% is internal rather than customer facing. 

The strategy here is to try to split out parts which don’t need to live on the open internet - so into customer facing and internal. The internal platform and databases may still live on a cloud based server, but access can be locked down via VPN or similar. The two parts don’t share databases or server instances, and can exist independently. They can still share data, just via a carefully managed API rather than common databases.

The final stage of the Goose strategy is to look at what data you’re collecting, and start on a plan to remove what you don’t need. Most of the recent exploits of corporate data have revealed organisations hoarding arguably useless data - people that hadn’t been customers for decades. And over time this grows. In one that was revealed as I was writing this article, the company in question only had 330k customers. But the eventual breach was for 14 million customer records - partially due to hoarding old customer data. And that data was probably of very limited use anyway.

You can still keep old customer data - but best practice is to run an obfuscation process to remove anything that could be used to identify that user. It might be useful to know that you sold 50 of WidgetX to men living in Newcastle in 2016, but you don’t need to keep their names, payment data, DOB or address details.

This data might exist in your own databases, or it might live inside marketing tools. If this marketing data is obfuscated (for example many shopping data tools obfuscate user data) then you’re OK. But if it can be all downloaded, or can be easily keyed to actual data (eg: Facebook IDs)  then (a) it’s still your data, and (b) still your problem.

If anyone in your marketing team has suggested a “Data Lake”, start there. In the league table of Really Terrible Security Ideas, the “Data Lake” strategy would be up there. There was a trend espoused at various marketing conferences to collect and store all these data points about customers. And in doing so an organisation would grow wise, rich and all knowing. The reality is they probably became litigated and poor. Having data can be an asset, but it can also become a massive liability - especially if you’re not using it. Evaluate the actual (rather than desired) ROI and weigh that up against the impact of a data breach.

Any data collection process (eg: signing up new customers) should also have some kind of automated “garbage collection” process. Say a customer has signed up but never progressed. Or they cancelled. Or they failed subscription payments. After a few months, an automated process could delete any remotely sensitive information.

The point of the Goose strategy is to avoid the need for any intensive security audit by staying out of scope as much as possible. 

Make your platform a small target by:

  1. Not touching any sensitive information. Use a 3rd party payments provider and they can worry about PCI etc
  2. Not having all your eggs in one basket. Split your technical architecture out into the bits that customers need to access via the open internet, and everything else.
  3. Share data internally via APIs rather than common databases. Any internet facing API should be locked down, and kept as simple as possible.
  4. Review what data is already being stored - particularly in 3rd party tools and analytics.
  5. Get rid of what isn’t being used, and set up automated processes to automatically clean out old data.

If you need help getting your Goose on, let us know! We can help with a review of your 3rd party providers and tools, as well as your existing development team and processes. We approach security from a development perspective, so we often start with a review of code to help evaluate and understand risks and threats.


The Goose strategy - move your application out of scope as much as you can. Try to keep the really complex parts of your app behind the scenes, and only expose the simple stuff which can be more easily locked down and quicker to audit.

  1. Does every part of your platform need to be connected to the internet? Is there any way to silo or relocate this?
  2. Move complex stuff out and on private network. Limit exposure to an API end point.
  3. Avoid tying everything together into a mega Voltron structure (aka all your eggs in one basket)
  4. Avoid keeping hold of data longer than you actually need it for. Automate the removal.


Ben Still

-

13 Apr 2023


Related to this work

Let's build something awesome together

Hire us