Will a CISO Board Delta Airlines?

The Internet has been abuzz with the discovery by Dani Grant, a writer at BuzzFeed, that she had found an easy way to explore – and print, and use – lots of boarding passes from Delta, even those for other people and other airlines.

When you ask for your mobile boarding pass, Delta sends you a URL to click and view your boarding pass QR code as well as all of the “human-readable” details of your flight: name, flight number, frequent flier number, etc. Grant played around with the URL and, by changing a digit or two, was able to view flight information of lots of other people.

In other words, the entire security is in the URL, and the security method of that URL is just serial numbers. Not every single number gives a valid boarding pass, but many do.

First things first, let’s clarify that this is not a serious airline security breach.

Someone cannot use a different boarding pass to get on a flight. The boarding pass is proof that someone with the name on the pass is entitled to board the plane; it is not proof that the holder of the pass is that person. At 2 different points – TSA security and gate boarding – the boarding pass is checked and matched against government-issued ID. You may or may not like that as a security method, but holding someone else’s boarding pass will not get you onto the plane without government ID that matches your picture to that name. If you can make counterfeit passports, a fake or unmatched boarding pass is probably small potatoes.

What this is, however, is a serious business security breach. It can create great inconvenience to travelers. Someone can maliciously change someone else’s flight, blackmail them, find out when they are traveling along with their family and thus their home will be unoccupied, cancel their flight, etc.

The inconvenience and financial risk to individual travelers, and in aggregate to Delta, can be high.

The more interesting question is, how could Delta possibly let this happen? Some basic information security rules include:

  • Use more than one identifier; the single number, however long, should not have been enough.
  • Never use a security identifier that can easily lead to guessing another. If my secret code is “123” and I am employee number 123, it is pretty easy for someone who gets my code to figure out that someone else has “125” and break in.

What could Delta have done? There are a lot of solutions. Some include:

  • Keep the boarding pass behind a login-secured area.
  • Make the boarding pass available only from 24-hours before the flight until 24 hours after.
  • Use a UUID rather than a simple number. With 2^122 (2 to the power of 122) possible combinations, Delta will never use more than such an insignificant fraction that it would not be worth anyone’s time to try and check them.
  • Use some additional information, such as a hash of the serial number and other information, that guessing is nearly impossible.

How did Delta make such a rookie mistake and expose itself? I suspect there are 2 prime causes, both executive:

  1. CISO: Look at Delta’s executive leadership. While there is a CIO, there is no CISO, no one at the top level responsible for information security. Actually, there is no one at that level with any type of “security” title. No one at the top level owns auditing of systems and applications, checking compliance, responding to security incidents, working with outsiders, and instilling a security-conscious culture. In the era of Target and Sony, not having a CISO is a guarantee of serious mistakes.
  2. Merger: Delta does have a CIO, which is great. Her biography is here. Her greatest achievement appears to be merging Northwest and Delta. Having lived through the United-Continental mess of a merger as a customer, successfully merging the systems which are the lifeblood of these companies is no small feat. But with a focus on the merger, security often will fall by the wayside, and clearly did.

Apparently, this past summer, someone noticed that Delta is running Windows XP – long past end of life – in its customer- and agent-facing terminals. I suspect there are dozens of major security weaknesses at Delta with no one owning them.

What should Delta do? Here is a 3-step plan.

  1. Hire a CISO. Now.
  2. Fix the breach. Immediately. Apparently they did, although I have yet to read reports on how they did and whether or not it is a bandaid or a real fix.
  3. Open to white hat. Grant found the issue and submitted it to Delta… only to get a standard “customer service” letter. When she got no material response she publicized it. Delta should have a path for people finding security weaknesses to submit them to immediate review.

But the first is still most important, and will affect all of the others. Delta needs a CISO to board the airline’s executive.

 

About Avi Deitcher

Avi Deitcher is a technology business consultant who lives to dramatically improve fast-moving and fast-growing companies. He writes regularly on this blog, and can be reached via Facebook, Twitter and avi@atomicinc.com.
This entry was posted in business, policy, security, technology. Bookmark the permalink.