Fundamentals for Better Security and IT Management
Nail these security fundamentals, and your organization will be well-positioned to succeed next year and in the years to come.
As 2019 draws to a close, we’ll see plenty of discussion of the year’s major security incidents, but few will focus on the foundational missteps that plague most organizations. These disruptions aren't a mystery; in many cases, organizations still make the mistake of implementing new tool after new tool without understanding the nature of their hardware and software assets, where they sit, and what applications and systems are running on them. Throwing more tools at problems of visibility and control will leave any security and IT management strategy inherently flawed.
Let’s cut through the clutter. Here are what organizations can do now, and throughout the coming year, to ensure that strong security and IT operations fundamentals are locked in.
1. Address Gaps in Visibility
IT teams simply can’ protect what they can’ see. Good IT hygiene begins with an accurate, up-to-date, and contextual inventory of an organization’s endpoints, including servers, laptops, virtual machines, and cloud instances on the network. But that’s just the beginning, and a mass of tools — from asset discovery solutions and security information and event management systems to configuration management databases and beyond — still leads to visibility gaps.
The reason is that a collection of point tools doesn't help organizations see the bigger picture — in other words, to have full visibility. Each product and tool has its own view of the IT environment. Individual tools may offer data that is relatively timely, contextual, or complete. But when IT teams look at this data in aggregate, visibility gaps begin to form.
Here’s an example. IT teams might have a tool that gets endpoint detection and response (EDR) telemetry up to the cloud every five minutes from all of their systems — but not their unmanaged hosts. They may get vulnerability scan results back once a week for peripheral component interconnect (PCI) systems, but only once a month for workstations. Their asset discovery solution might scan for unmanaged and managed assets, but only in the data center and only once a day. And if they need a new set of data that they didn't anticipate and is outside the scope of their existing tooling’s hard-coded capabilities, there’s no easy way to get it. Consequently, stitching all this asynchronous data together to garner usable insights becomes so difficult as to be almost impossible.
If this lack of visibility isn't rectified, IT teams will continue to suffer the consequences. They may continue to think they are more protected than they are, exposing themselves to vulnerabilities that should — and could — have been prevented.
One way for IT teams to address this lack of visibility is by using a unified endpoint management platform. [Editor’s note: The author’s company, Tanium, is one of a number of companies that provide such a service.] With a single source of endpoint data, those glaring visibility gaps start to close.
2. Declutter and Consolidate the IT Environment
Collections of point tools aren't just a challenge for visibility; they’ e also add needless complexity. A Forrester survey found that, on average, organizations today use 20 or more tools from more than 10 different vendors to secure and operate their environments. And many large enterprises have 40 to 50 point solutions — a staggering number.
This cluttered environment makes it a big challenge to implement good IT hygiene habits because each tool offers different data and different degrees of visibility. In addition, tools individually are expensive to learn, deploy, and upgrade. They often have short shelf lives because they were built for their time, usually for a specific use case, and not exactly future-proofed.
The good news is that it isn't difficult to pare down the volume of tools. IT teams need to first identify the capabilities and deliverables their organizations need to implement, regardless of their technology and tools. Then they should go through each tool individually and catalog its capabilities. And finally, they should create a Venn diagram to see where overlap exists between these tools. Auditing your estate like this can be cumbersome, but the overlaps are the opportunities for consolidation so that IT teams can operate with fewer tools and more visibility moving forward.
3. Remove IT Operations and Security Team Silos
You can’ enforce IT hygiene and cybersecurity best practices if your teams aren't working together. Existing point tools reinforce the silos we see crop up between IT operations and security teams instead of enabling the collaboration that isn't just a nice-to-have, but crucial for better business outcomes. As organizations look to build and strengthen their security fundamentals, IT operations and security teams should unite around a common set of actionable data for true visibility and control over all of their computing devices. This will enable them to prevent, adapt, and respond in real-time to any technical disruption or cyber threat.
Without security fundamentals firmly in place, IT teams will start the new year behind. Heading into 2020, they should be able to address visibility gaps, strategically reduce the number of IT tools that are used, and bring together IT operations and security teams.
Make 2020 a fresh start. If teams can focus on nailing their basic security fundamentals, they will be well-positioned to succeed not just this coming year, but in the years to come.