Welcome!

Cloud Security Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, Pat Romanski, Yeshim Deniz

Related Topics: Cloud Security, Microservices Expo

Cloud Security: Article

When Compliance Is at Odds with Security

Create a culture of compliance where security becomes the primary driver

Users are the weakest link when it comes to information security. Without intending to, they cost more money in security breaches than outside hackers. This is why all regulations require the demonstration of strong access security. But focusing purely on regulatory compliance proofs as a standard of security can cause one to lose sight of the intended goal.

Falling into the Compliance Rut
In a typical organization, IT administrators face an alphabet soup of regulatory requirements that have been put in place in an effort to protect sensitive information. And even in businesses that are not externally regulated, there are often compliance initiatives underway that require meeting some type of standard. There is a real temptation to define success as getting a passing mark on a list of criteria against which the security of the organization is going to be measured. However, in trying to pass an ever-growing and evolving list of tests, IT personnel may find themselves getting away from their real jobs - security. This is particularly true when the organization attempts to handle each standard on an individual basis and winds up getting preoccupied with creating or applying specific controls for each one. As individual standards change or requirement specifications are released, this approach of wearing two hats may quickly challenge security professionals' sanity.

Today, when asking security solution buyers "what problem(s) are you hoping to solve?" the reply is frequently, "I need a product with a HIPAA reporting package (or PCI, etc)." As a result, every software solution vendor worth their salt now has a HIPAA and/or other reporting packages to sell. But the reality is that these reporting packages are most often just an extracted and renamed set of best security practices, which - if implemented comprehensively - would more than satisfy any compliance standard AND provide a more saner approach to security.

Bottom line: compliance may not be the best end goal and security professionals should not get distracted by all the hype about solutions that purport to produce compliance.

Beyond Philosophy
While the points made above are important, it's instructive to go beyond the abstract issues and discuss how to put them into practice. Here are two additional, yet potentially controversial, recommendations to consider.

When selecting solutions to solve compliance or security challenges, choose those that deliver security domain capabilities (e.g., access security, DMZ security, web security, etc.) instead of ones that attempt to be a tool to use in multiple security domains. If you are concerned about access, an access security solution will always be able to employ methods that get you better information, context and answers with infinitely better performance than a solution that relies on an infrastructure and architecture intended to be a generic security information-gathering solution. I can use the word "always" because domain solutions are designed to answer questions that are crucial to that domain instead of being designed to gather data, which may be useful in many domains. Different methods are used. Data is analyzed differently. Information is presented differently. A solution whose goal is "compliance" may be great for a chief compliance officer, but will do little or nothing to advance the capabilities of access security or any other security specialty.

Access security solutions (like other domain security solutions) have the advantage of bringing together the data that is needed to both demonstrate compliance and provide context for IT action. For example, the ability to determine how access is derived (effective rights) is important for answering many compliance questions. But perhaps more importantly, it is also crucial for determining how best to prevent insecure events from reoccurring by identifying a root cause (explicit grants vs. group memberships, for example), which can be fixed as opposed to a symptom that can be band-aided. A broader security information management solution does not bring this context to the event data; they are concerned with how generic event data is harvested, organized and archived and far less or not at all concerned with how an access security professional has to do his/her job.

One final recommendation - audit continuously. There is a great analogy that a leading security luminary once made: Auditing is the most effective form of security - akin to police work in the real world. In the real world, the fact that police will investigate crimes and will tend to solve most of them is the best deterrent to future crime. Effective auditing is the digital equivalent of police investigation.

Rather than contemplate an approach to compliance that is based on responding to breaches or errors as they arise, decide instead to audit continuously. By auditing continuously, I mean define a desired state, audit your current state against that, develop event controls to maintain desired state, and audit desired state again at some interval. It may sound cumbersome and potentially expensive, but it is, in fact, the least expensive approach. This is because it leads to incremental process and control improvements over time, which serves as a much better deterrent to insecurity in the future than waiting for a major security event with all its cost and downtime implications.  And, it is something that can be effectively automated to ensure that its resource impact is purely positive.

Next-Generation Compliance
In the end, the ultimate goal is to identify sensitive information or access, de-risk it, and provide audit trailsof critical access rights changes and uses. Continuous security audit solutions will need to deliver a set of best-practice policies and include contextual event response so that businesses have the answers (not just data), they need to truly evaluate their state of security and respond to events appropriately, rather than simply collecting mountains of event data.  By moving beyond checkbox compliance and generic event management solutions, businesses can become self-auditing and create a culture of compliance where security becomes the primary driver and compliance becomes a byproduct of providing sound security.

More Stories By David Rowe

David Rowe is the CEO of NetVision, a privately funded company providing compliance and control solutions for enterprise access auditing. An experienced IT security and management entrepreneur, Rowe has held director, advisor and executive-level roles with startups including Imperva, Cerberian, PS’Soft, Doyenz, and Avinti and has helped raise more than $50M growing, launching and re-launching companies.

Previously, Rowe served as chief marketing officer for Trend Micro, where he was accountable for strategy, marketing, product management, business and channel development for the global company during a period of growth from $300M to $600M. Rowe spent twelve years at Intel as a business unit manager and director of marketing, products and business development in the U.S., Japan, Europe, and Israel.

Rowe holds a master’s degree in business administration from the Ross School of Business at the University of Michigan.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...