Composite approach critical to effective security

December 2007 Information Security

Organisations struggle to find the resources to maintain a balance between security and operations.

But automated, integrated security management enables organisations to set up an immediate framework to monitor enterprise security and address all concerns in realtime, says Ulrich Weigel, EMEA director of security management practice at NetIQ (distributed and supported in South Africa by 10Net ICT Solutions).

Automated and integrated security management opens up a plethora of opportunities by integrating existing and new security systems and software with strategic security processes and practices. Constantly changing hardware requirements, software changes and regulatory compliance make integrated security mission-critical for many organisations. Only integration gives organisations full visibility into what is happening on their networks and allows them to act accordingly.

But integration must follow the correct methodology that offers a united front of people, processes and technology.

That amounts to involving employees from each business unit in the process to secure an action plan to implement agreed on security systems and procedures. Secondly, it requires internal coordination of structures, roles, responsibilities and reporting relationships. Lastly, businesses must certify programmes, which entail each business unit deciding, within certain bounds, the timescale in which its responsibilities can be introduced.

Security central nervous system

That results in thoroughly amalgamated realtime intrusion detection, log archiving, analysis capabilities, forensic capabilities and fault tolerance with other benefits and features attached to specific products, such as Web-based access consoles. Every server, router, switch, firewall and appropriate application reveals its activities to this process for monitoring, reaction and proactive measures. It offers businesses a security central nervous system that allows technicians, managers and executives to interpret, correct and enhance smooth and stable operations.

Although this approach sounds as if it is intended for large South African banks and insurance companies only, it is not. Regardless of the size of companies, they can derive the same basic benefits: clear visibility and the opportunity to take appropriate action. Those that need to comply with regulations only have a further need to employ this approach.

But how do they do it? The best way is to protect the investments they have already made. Integration is a common requirement today and best-of-breed tools exist to integrate most security solutions. It is imperative to ensure that all security solutions in organisations are integrated since it is critical to have all security information available.

Failure means reinventing the wheel

Failure to do so, besides the legal ramifications of failure to comply with regulations, means reinventing the wheel. That is costly and leaves companies reacting to security issues instead of proactively catering to them before they consume valuable IT dollars in fixes.

IT dollars are an increasingly rare commodity. Integrated security, if properly planned and rolled out, offers great return on investment (ROI). Loopholes are closed, communication barriers removed and processes employed for repeated actions. Ensuring that processes are transparent to all parties and that they understand them from their particular points of view allows them to employ the correct measures in reaching strategic business goals, again saving unwarranted expense.

Some pundits may suggest that good system administrators could take care of this problem without the need for automated systems, additional security solutions and the integration tools that may be necessary to link existing software into the loop. However, corporations sometimes work against themselves. Change processes and procedures prohibit rapid action. For example, missing patches cannot be installed because the ramifications to applications must first be investigated across the organisation. Without integrated security, that takes far longer than is necessary and often required, leaving corporate systems exposed.

Another strong argument in favour of integrated and automated security solutions is that the field becomes enormously complex. There are multiple operating systems to consider, applications abound, networks interconnect, files are spread across departments, divisions, businesses and geographies, databases are larger, more complex and geographically dispersed than ever before. Forget about maintaining a custody chain for audits. Even performing a simple log file correlation rapidly becomes tricky in such environments.

Information critical

Integrating them is so critical because administrators, who have a higher priority in organisations today, cannot afford to miss information. Without centralised log file administration, it is nigh impossible to manage them and removes the ability to conduct forensic analyses.

Information is the greatest threat to organisations today. Not having it, or having only partial information, has dire implications for organisational security and one of companies' most critical assets - data. Automated systems are the only method for effectively bridging the gap between the multiplicity of solutions employed in modern corporations and the administrative guards that watch over them.

Administrators need a comprehensive solution consisting of several components. However, each solution will contain different components depending on its intended objective. But all security solutions should factor in the three pillars of people, process and technology, incorporating existing components and fostering tightly coupled integration. The critical question to answer when selecting components is: how can we sufficiently report the state of security without drowning in different types of reports, multiple Excel spreadsheets and non-updatable PDF documents? The biggest challenge is obtaining a reporting utility that allows integration of all key aspects and becomes a 'role-based model' to give different people access only to appropriate information based on their role in the organisation.

Generally, solutions should contain the following components:

* Policy and process management.

* Systems management.

* Identity and access management.

* Incident and event management.

* Process automation management to enable macro process handling and integration of IT runbooks.

Integrated solutions with those components will be both reactive and proactive. They will provide continually updated audit reports for compliance against regulatory standards, best practices or other criteria to ensure ongoing changes are tracked. They will detect and prevent changes to operating systems and applications if required. They will alert in realtime and give predictive warnings.

That meets the minimum baseline that all systems require and convergence of systems and security management will ensure that all-important aspects of the IT lifecycle are covered.

For more information contact 10Net ICT Solutions, +27 (0)11 783 7335, [email protected], www.10net.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...