Cloud Security Authors: Elizabeth White, John Katrick, Pat Romanski, Rostyslav Demush, Yeshim Deniz

Related Topics: Cloud Security, Microservices Expo

Cloud Security: Article

When Compliance Is at Odds with Security

Create a culture of compliance where security becomes the primary driver

Users are the weakest link when it comes to information security. Without intending to, they cost more money in security breaches than outside hackers. This is why all regulations require the demonstration of strong access security. But focusing purely on regulatory compliance proofs as a standard of security can cause one to lose sight of the intended goal.

Falling into the Compliance Rut
In a typical organization, IT administrators face an alphabet soup of regulatory requirements that have been put in place in an effort to protect sensitive information. And even in businesses that are not externally regulated, there are often compliance initiatives underway that require meeting some type of standard. There is a real temptation to define success as getting a passing mark on a list of criteria against which the security of the organization is going to be measured. However, in trying to pass an ever-growing and evolving list of tests, IT personnel may find themselves getting away from their real jobs - security. This is particularly true when the organization attempts to handle each standard on an individual basis and winds up getting preoccupied with creating or applying specific controls for each one. As individual standards change or requirement specifications are released, this approach of wearing two hats may quickly challenge security professionals' sanity.

Today, when asking security solution buyers "what problem(s) are you hoping to solve?" the reply is frequently, "I need a product with a HIPAA reporting package (or PCI, etc)." As a result, every software solution vendor worth their salt now has a HIPAA and/or other reporting packages to sell. But the reality is that these reporting packages are most often just an extracted and renamed set of best security practices, which - if implemented comprehensively - would more than satisfy any compliance standard AND provide a more saner approach to security.

Bottom line: compliance may not be the best end goal and security professionals should not get distracted by all the hype about solutions that purport to produce compliance.

Beyond Philosophy
While the points made above are important, it's instructive to go beyond the abstract issues and discuss how to put them into practice. Here are two additional, yet potentially controversial, recommendations to consider.

When selecting solutions to solve compliance or security challenges, choose those that deliver security domain capabilities (e.g., access security, DMZ security, web security, etc.) instead of ones that attempt to be a tool to use in multiple security domains. If you are concerned about access, an access security solution will always be able to employ methods that get you better information, context and answers with infinitely better performance than a solution that relies on an infrastructure and architecture intended to be a generic security information-gathering solution. I can use the word "always" because domain solutions are designed to answer questions that are crucial to that domain instead of being designed to gather data, which may be useful in many domains. Different methods are used. Data is analyzed differently. Information is presented differently. A solution whose goal is "compliance" may be great for a chief compliance officer, but will do little or nothing to advance the capabilities of access security or any other security specialty.

Access security solutions (like other domain security solutions) have the advantage of bringing together the data that is needed to both demonstrate compliance and provide context for IT action. For example, the ability to determine how access is derived (effective rights) is important for answering many compliance questions. But perhaps more importantly, it is also crucial for determining how best to prevent insecure events from reoccurring by identifying a root cause (explicit grants vs. group memberships, for example), which can be fixed as opposed to a symptom that can be band-aided. A broader security information management solution does not bring this context to the event data; they are concerned with how generic event data is harvested, organized and archived and far less or not at all concerned with how an access security professional has to do his/her job.

One final recommendation - audit continuously. There is a great analogy that a leading security luminary once made: Auditing is the most effective form of security - akin to police work in the real world. In the real world, the fact that police will investigate crimes and will tend to solve most of them is the best deterrent to future crime. Effective auditing is the digital equivalent of police investigation.

Rather than contemplate an approach to compliance that is based on responding to breaches or errors as they arise, decide instead to audit continuously. By auditing continuously, I mean define a desired state, audit your current state against that, develop event controls to maintain desired state, and audit desired state again at some interval. It may sound cumbersome and potentially expensive, but it is, in fact, the least expensive approach. This is because it leads to incremental process and control improvements over time, which serves as a much better deterrent to insecurity in the future than waiting for a major security event with all its cost and downtime implications.  And, it is something that can be effectively automated to ensure that its resource impact is purely positive.

Next-Generation Compliance
In the end, the ultimate goal is to identify sensitive information or access, de-risk it, and provide audit trailsof critical access rights changes and uses. Continuous security audit solutions will need to deliver a set of best-practice policies and include contextual event response so that businesses have the answers (not just data), they need to truly evaluate their state of security and respond to events appropriately, rather than simply collecting mountains of event data.  By moving beyond checkbox compliance and generic event management solutions, businesses can become self-auditing and create a culture of compliance where security becomes the primary driver and compliance becomes a byproduct of providing sound security.

More Stories By David Rowe

David Rowe is the CEO of NetVision, a privately funded company providing compliance and control solutions for enterprise access auditing. An experienced IT security and management entrepreneur, Rowe has held director, advisor and executive-level roles with startups including Imperva, Cerberian, PS’Soft, Doyenz, and Avinti and has helped raise more than $50M growing, launching and re-launching companies.

Previously, Rowe served as chief marketing officer for Trend Micro, where he was accountable for strategy, marketing, product management, business and channel development for the global company during a period of growth from $300M to $600M. Rowe spent twelve years at Intel as a business unit manager and director of marketing, products and business development in the U.S., Japan, Europe, and Israel.

Rowe holds a master’s degree in business administration from the Ross School of Business at the University of Michigan.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@ThingsExpo Stories
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DXWorldEXPO LLC announced today that "Miami Blockchain Event by FinTechEXPO" has announced that its Call for Papers is now open. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expe...
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER give you detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPO also offers s...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive ov...