Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/8/2019
10:00 AM
Menny Barzilay
Menny Barzilay
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

9 Principles to Simplify Security

This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.

Complexity has become a significant issue. Enterprises suffer from overcomplicated cybersecurity environments that are underutilized, undermanaged, undermonitored, and laced with misconfigurations.

Complex environments cause a number of problems. They aren't cost-efficient, it is impossible to optimize them, they significantly lengthen the incident response process, and they act as a barrier for innovation, often turning small requirements for technical changes into large-scale projects.

While cybersecurity threats are constantly rising, security professionals are expected to achieve more with the same amount of resources. This means choosing simplicity over complexity, making cybersecurity environments easy to manage, control, change, and maintain.

Follow these nine principles to simplify your cybersecurity environment:

1. Automation
Automation is the key to the future of cybersecurity. Many companies have already implemented various automation products, such as security orchestration, automation, and response (SOAR) and breach and attack simulation (BAS). But automation is not a product, it's an approach. There are numerous activities that security teams can automate.

Action Items

  • Define "automation" as a strategic goal.
  • Ask each security team member for three ideas for tasks or processes that can be automated.
  • If possible, assemble an automation task force that will identify opportunities for process automation and simplification.

2. Utilization
Underutilization of security products is a global epidemic. Companies tend to purchase new solutions without realizing that they could have utilized existing ones.

Action Items

  • Make sure your team is familiar with your products to feel comfortable administrating them. (If they are not, the team will probably push to buy a new product instead of trying to utilize the current one.)
  • Ask your vendors to provide you with product training and inform you about new product features.
  • Learn from your peers about better ways to use the product.

3. Suites Over Individual Products
Companies should prioritize purchasing product suites over buying several separate point solutions, even if that means compromising, to some extent, on product quality.

Action Item

  • When possible, purchase suites instead of several separate solutions.

4. Managed Services
Depending on your specific situation, it might be highly preferable and cost-effective for you to use managed security services. Such services could shift some of the complexity to the service provider, allowing you to maintain a lighter technological environment.

Action Item

  • Consider managed services as an alternative for current solutions.

5. Overcome the Cross-Units Barrier
In most enterprises, it is almost impossible to implement and utilize a particular solution when more than one department wants to use it. In such cases, it is common for such projects to face issues such as "which unit is going to finance this?" and "who will get the credit?"

As an undesired consequence, in many cases, a relevant department will try to avoid such an issue either by implementing it without involving other potential stakeholders, or, worse, by passing on the product purchase altogether.

Action Items

  • Figure out if you can utilize solutions that are already implemented within the company.
  • Find out whether other departments can also benefit from your existing security products.
  • Overcome organizational barriers and look for cross-departmental solutions.

6. Cybersecurity Approach
A company's approach toward cybersecurity is influenced by many factors, such as organizational culture, risk appetite, the CISO's personal approach, and so on. Some approaches are much simpler to maintain compared with others. For example, a zero-trust strategy can save you a lot of time by creating a unified access methodology for employees, suppliers, and/or partners.

Action Item

  • Be smart about devising your strategy. Make sure it contains achievable goals.

7. Training and Knowledge Management
The more trained your security team is, the simpler it will be for team members to manage your security environment.

Action Item

  • Invest in workforce training!

8. Life-Cycle Management
When evaluating a new product, make sure to assess its entire life cycle. Sometimes, the product implementation seems straightforward, but then the organization discovers that the day-to-day operation of the product consumes an unacceptable amount of resources. This can happen for various reasons: The vendor issues critical patches frequently, the product's documentation is lacking, the vendor has a poor support mentality, etc.

Action Item

  • Evaluate the product's entire life cycle. Ask the vendor questions regarding product maintenance, patches, upgrade/update mechanism, documentation, etc.

9. Back to Basics
This is a hype-oriented industry. It's easy to get excited about the next-generation-AI-powered-autonomous-anomaly-detection-prevention-response-and-remediation-system with smart-integration and advanced-data-visualization that runs on dedicated-quantum-computing-chip. But it is imperative to remember that the basic security controls are still the most important ones: Patch management, permissions, network segmentation, USB restrictions, etc.

Action Item

  • Don't get swept away by new buzzwords. Make sure your foundations are strong.

As the quote often attributed to Einstein goes, "Everything should be made as simple as possible, but not simpler." Simplification should become a strategic goal for every security team. Nevertheless, it's not a one-size-fits-all situation. Simplify as much as you can, but no more than that.

Related Content:

 

Menny  Barzilay is a strategic adviser to leading enterprises worldwide as well as states and governments, and he also sits on the advisory boards of several startup companies. Menny is the CEO of Cytactic, a cybersecurity services company, and the founder of the ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...