Welcome!

Cloud Security Authors: Elizabeth White, Liz McMillan, Pat Romanski, Lisa Calkins, Mamoon Yunus

Related Topics: Cloud Security, Microservices Expo

Cloud Security: Article

When Compliance Is at Odds with Security

Create a culture of compliance where security becomes the primary driver

Users are the weakest link when it comes to information security. Without intending to, they cost more money in security breaches than outside hackers. This is why all regulations require the demonstration of strong access security. But focusing purely on regulatory compliance proofs as a standard of security can cause one to lose sight of the intended goal.

Falling into the Compliance Rut
In a typical organization, IT administrators face an alphabet soup of regulatory requirements that have been put in place in an effort to protect sensitive information. And even in businesses that are not externally regulated, there are often compliance initiatives underway that require meeting some type of standard. There is a real temptation to define success as getting a passing mark on a list of criteria against which the security of the organization is going to be measured. However, in trying to pass an ever-growing and evolving list of tests, IT personnel may find themselves getting away from their real jobs - security. This is particularly true when the organization attempts to handle each standard on an individual basis and winds up getting preoccupied with creating or applying specific controls for each one. As individual standards change or requirement specifications are released, this approach of wearing two hats may quickly challenge security professionals' sanity.

Today, when asking security solution buyers "what problem(s) are you hoping to solve?" the reply is frequently, "I need a product with a HIPAA reporting package (or PCI, etc)." As a result, every software solution vendor worth their salt now has a HIPAA and/or other reporting packages to sell. But the reality is that these reporting packages are most often just an extracted and renamed set of best security practices, which - if implemented comprehensively - would more than satisfy any compliance standard AND provide a more saner approach to security.

Bottom line: compliance may not be the best end goal and security professionals should not get distracted by all the hype about solutions that purport to produce compliance.

Beyond Philosophy
While the points made above are important, it's instructive to go beyond the abstract issues and discuss how to put them into practice. Here are two additional, yet potentially controversial, recommendations to consider.

When selecting solutions to solve compliance or security challenges, choose those that deliver security domain capabilities (e.g., access security, DMZ security, web security, etc.) instead of ones that attempt to be a tool to use in multiple security domains. If you are concerned about access, an access security solution will always be able to employ methods that get you better information, context and answers with infinitely better performance than a solution that relies on an infrastructure and architecture intended to be a generic security information-gathering solution. I can use the word "always" because domain solutions are designed to answer questions that are crucial to that domain instead of being designed to gather data, which may be useful in many domains. Different methods are used. Data is analyzed differently. Information is presented differently. A solution whose goal is "compliance" may be great for a chief compliance officer, but will do little or nothing to advance the capabilities of access security or any other security specialty.

Access security solutions (like other domain security solutions) have the advantage of bringing together the data that is needed to both demonstrate compliance and provide context for IT action. For example, the ability to determine how access is derived (effective rights) is important for answering many compliance questions. But perhaps more importantly, it is also crucial for determining how best to prevent insecure events from reoccurring by identifying a root cause (explicit grants vs. group memberships, for example), which can be fixed as opposed to a symptom that can be band-aided. A broader security information management solution does not bring this context to the event data; they are concerned with how generic event data is harvested, organized and archived and far less or not at all concerned with how an access security professional has to do his/her job.

One final recommendation - audit continuously. There is a great analogy that a leading security luminary once made: Auditing is the most effective form of security - akin to police work in the real world. In the real world, the fact that police will investigate crimes and will tend to solve most of them is the best deterrent to future crime. Effective auditing is the digital equivalent of police investigation.

Rather than contemplate an approach to compliance that is based on responding to breaches or errors as they arise, decide instead to audit continuously. By auditing continuously, I mean define a desired state, audit your current state against that, develop event controls to maintain desired state, and audit desired state again at some interval. It may sound cumbersome and potentially expensive, but it is, in fact, the least expensive approach. This is because it leads to incremental process and control improvements over time, which serves as a much better deterrent to insecurity in the future than waiting for a major security event with all its cost and downtime implications.  And, it is something that can be effectively automated to ensure that its resource impact is purely positive.

Next-Generation Compliance
In the end, the ultimate goal is to identify sensitive information or access, de-risk it, and provide audit trailsof critical access rights changes and uses. Continuous security audit solutions will need to deliver a set of best-practice policies and include contextual event response so that businesses have the answers (not just data), they need to truly evaluate their state of security and respond to events appropriately, rather than simply collecting mountains of event data.  By moving beyond checkbox compliance and generic event management solutions, businesses can become self-auditing and create a culture of compliance where security becomes the primary driver and compliance becomes a byproduct of providing sound security.

More Stories By David Rowe

David Rowe is the CEO of NetVision, a privately funded company providing compliance and control solutions for enterprise access auditing. An experienced IT security and management entrepreneur, Rowe has held director, advisor and executive-level roles with startups including Imperva, Cerberian, PS’Soft, Doyenz, and Avinti and has helped raise more than $50M growing, launching and re-launching companies.

Previously, Rowe served as chief marketing officer for Trend Micro, where he was accountable for strategy, marketing, product management, business and channel development for the global company during a period of growth from $300M to $600M. Rowe spent twelve years at Intel as a business unit manager and director of marketing, products and business development in the U.S., Japan, Europe, and Israel.

Rowe holds a master’s degree in business administration from the Ross School of Business at the University of Michigan.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. Jack Norris reviews best practices to show how companies develop, deploy, and dynamically update these applications and how this data-first...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, shared examples from a wide range of industries – including en...
Intelligent Automation is now one of the key business imperatives for CIOs and CISOs impacting all areas of business today. In his session at 21st Cloud Expo, Brian Boeggeman, VP Alliances & Partnerships at Ayehu, will talk about how business value is created and delivered through intelligent automation to today’s enterprises. The open ecosystem platform approach toward Intelligent Automation that Ayehu delivers to the market is core to enabling the creation of the self-driving enterprise.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
SYS-CON Events announced today that Massive Networks will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Massive Networks mission is simple. To help your business operate seamlessly with fast, reliable, and secure internet and network solutions. Improve your customer's experience with outstanding connections to your cloud.
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution and join Akvelon expert and IoT industry leader, Sergey Grebnov, in his session at @ThingsExpo, for an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
Because IoT devices are deployed in mission-critical environments more than ever before, it’s increasingly imperative they be truly smart. IoT sensors simply stockpiling data isn’t useful. IoT must be artificially and naturally intelligent in order to provide more value In his session at @ThingsExpo, John Crupi, Vice President and Engineering System Architect at Greenwave Systems, will discuss how IoT artificial intelligence (AI) can be carried out via edge analytics and machine learning techn...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, will examine the regulations and provide insight on how it affects technology, challenges the established rules and will usher in new levels of diligence a...
In the enterprise today, connected IoT devices are everywhere – both inside and outside corporate environments. The need to identify, manage, control and secure a quickly growing web of connections and outside devices is making the already challenging task of security even more important, and onerous. In his session at @ThingsExpo, Rich Boyer, CISO and Chief Architect for Security at NTT i3, discussed new ways of thinking and the approaches needed to address the emerging challenges of security i...
SYS-CON Events announced today that Datera, that offers a radically new data management architecture, has been named "Exhibitor" of SYS-CON's 21st International Cloud Expo ®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datera is transforming the traditional datacenter model through modern cloud simplicity. The technology industry is at another major inflection point. The rise of mobile, the Internet of Things, data storage and Big...
An increasing number of companies are creating products that combine data with analytical capabilities. Running interactive queries on Big Data requires complex architectures to store and query data effectively, typically involving data streams, an choosing efficient file format/database and multiple independent systems that are tied together through custom-engineered pipelines. In his session at @BigDataExpo at @ThingsExpo, Tomer Levi, a senior software engineer at Intel’s Advanced Analytics ...
SYS-CON Events announced today that Datera will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datera offers a radically new approach to data management, where innovative software makes data infrastructure invisible, elastic and able to perform at the highest level. It eliminates hardware lock-in and gives IT organizations the choice to source x86 server nodes, with business model option...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, Cloud Expo and @ThingsExpo are two of the most important technology events of the year. Since its launch over eight years ago, Cloud Expo and @ThingsExpo have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, I provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading the...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business - from apparel to energy - is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
Internet of @ThingsExpo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devic...
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...