In IT security, a sheep-dip is the process of using a dedicated device to test inbound files on removable media for viruses before they are allowed to be used with other computers. The approach takes its name from agriculture, where farmers routinely submerge sheep in a chemical solution to kill parasites and protect their animals from disease.
Organizations can adopt a range of sheep dipping processes, including the use of dedicated scanning stations that have restricted network access and specialist USB sanitization technologies designed to scan and clean USB drives. Each of these relies on a range of antivirus, sandbox and other security software tools to scan devices for malware.
Sheep dipping use cases
For cybersecurity professionals, the approach is designed to clean removable media of potential security threats. It can be applied across a number of use cases:
- Device sanitization: external devices, such as USB drives, smartphones and laptops, can be scanned for malware before they are connected to a network.
- Software scanning: some organizations use sheep dipping processes to scan software applications and updates before they are installed on their networks.
- File transfer scanning: sheep dipping can also be used to scan inbound files before they are released to users.
Sheep dipping is sometimes mandated when cross domain data transfers take place, including sensitive government, critical infrastructure and corporate environments where comprehensive security measures are needed.
Disadvantages of sheep dipping
While sheep dipping can help minimize the security risks associated with external media and devices, it does not eliminate the possibility that removable media can be used as an attack vector for the delivery of malware. Disadvantages include:
- Resource intensive: Sheep dipping requires significant resources, including dedicated hardware, software, and personnel to manage the scanning processes. This can be costly, especially for smaller organizations.
- Time-consuming: Scanning large volumes of data or devices can take a lot of time, leading to delays in workflow and productivity as devices and media are scanned.
- Not foolproof: Despite proving thorough scanning processes, advanced malware and zero-day threats can sometimes evade detection by traditional antivirus and sandboxing tools, increasing the potential for security breaches.
- Potential for false positives: Scanning tools may flag legitimate files or devices as malicious, requiring additional resources to investigate and resolve.
- Operational disruption: The need to sheep dip every device or file can create operational bottlenecks, impacting organizational efficiency, especially in environments with high throughput requirements.
How to optimize sheep dipping
There are a number of innovative technology solutions that can add significant value to traditional sheep dipping processes. In doing so, organizations can mitigate the disadvantages associated with legacy approaches and technologies. These include:
Content Disarm and Reconstruction (CDR)
CDR is an advanced cybersecurity technology designed to neutralize threats, such as malware and ransomware, within files.
It works by disassembling files (documents, images, etc.) and removing any potentially malicious elements. Advanced CDR solutions, such as Glasswall CDR technologies, are able to retain a document’s original functionality and appearance – providing seamless protection to the end user.
CDR delivers a number of important advantages for organizations focused on proactive file protection:
- CDR removes threats from files
CDR is a zero-trust data filter that rebuilds files and documents into a safe, clean standard, free from the risks of malware. It also prevents malicious files from entering a network and is used for secure file transfer across trust boundaries.
- CDR is more secure than antivirus and sandboxing
Unlike detection-based solutions, CDR doesn’t try to identify malicious code – it simply removes the ability for it to exist altogether. This zero-trust approach disarms often overlooked advanced persistent threats, such as zero-day malware, high-risk active code and anomalies within a file’s structure.
- CDR retains file functionality
Many conventional data filters flatten files (turn them into images) for use in high-risk environments. In contrast, files cleaned by CDR are visually identical and fully functional compared to the original.
- CDR helps teams manage risk
CDR offers organizations comprehensive analysis of the threats within files, empowering security teams to remove or manage high-risk content according to their risk appetite.
Hunna System USB Sanitizer
The Hunna USB Sanitizer is a portable, air-gapped solution that is integrated with Glasswall
CDR technology to ensure files and data imported or exported via USB are clean and safe. Built to the highest standards of security in the field, the Hunna USB Sanitizer delivers military-grade safety and complete peace of mind that users can trust with every file.
Used by government, military and intelligence agencies, it enables users to import and export
information on USB media, CD/DVD and SD cards, removing forensic traces of restricted information. Designed as a portable, air-gapped sanitizer for use in any field-based operation, it allows for the safe import and sharing of data in any physical environment.
More information about the Hunna System USB Sanitizer
Sheep dipping plus CDR – the benefits
About Glasswall CDR
Glasswall CDR is the market-leading CDR technology, offering zero-trust protection for known and unknown threats. Trusted by the world's most secure agencies, including the NSA, NATO, the NCSC and AUKUS, our battle-hardened CDR technology is mandated for use as a file filter in Cross Domain Solutions by the NSA and is trusted by the world’s most sophisticated security establishments.
Glasswall is recognized as SOC 2 Type II compliant – meaning our reporting and control activities are proven to be secure over the long term. In addition, we are NIST 800-171 approved and hold a Cyber Essentials Plus certification from the NCSC.
We collaborate closely with a network of esteemed partners, including Microsoft, Oracle, CGI, BAE and Carahsoft, to bring the benefits of our CDR to the world's leading government agencies.
Glasswall CDR case study: HM Government
A large UK government agency had terabytes of important data on an isolated network that could have contained malicious content. They required urgent access to this data, but the only option available to secure it was to ’sheep dip’ the data – use antivirus and analysis tools to test each file for malware on a separate computer. Understanding that antivirus detection only offers limited protection and not having the time or resources to analyze every file manually, they required a solution that didn’t rely on legacy detection-based methodologies.
A deployment of Glasswall CDR enabled the cleaning and transfer of files from the untrusted to the secure network. Glasswall was able to move fast, working seamlessly with the government agency. Terabytes of secure data were imported into the new environment within days, and the government agency had complete confidence that there was no malicious content in the data due to its zero-trust file protection capabilities.
Learn more about Glasswall CDR.