Welcome!

Cloud Security Authors: Nishanth Kadiyala, Kevin Jackson, Elizabeth White, Stackify Blog, Peter Davidson

Related Topics: Cloud Security, Microservices Expo

Cloud Security: Article

When Compliance Is at Odds with Security

Create a culture of compliance where security becomes the primary driver

Users are the weakest link when it comes to information security. Without intending to, they cost more money in security breaches than outside hackers. This is why all regulations require the demonstration of strong access security. But focusing purely on regulatory compliance proofs as a standard of security can cause one to lose sight of the intended goal.

Falling into the Compliance Rut
In a typical organization, IT administrators face an alphabet soup of regulatory requirements that have been put in place in an effort to protect sensitive information. And even in businesses that are not externally regulated, there are often compliance initiatives underway that require meeting some type of standard. There is a real temptation to define success as getting a passing mark on a list of criteria against which the security of the organization is going to be measured. However, in trying to pass an ever-growing and evolving list of tests, IT personnel may find themselves getting away from their real jobs - security. This is particularly true when the organization attempts to handle each standard on an individual basis and winds up getting preoccupied with creating or applying specific controls for each one. As individual standards change or requirement specifications are released, this approach of wearing two hats may quickly challenge security professionals' sanity.

Today, when asking security solution buyers "what problem(s) are you hoping to solve?" the reply is frequently, "I need a product with a HIPAA reporting package (or PCI, etc)." As a result, every software solution vendor worth their salt now has a HIPAA and/or other reporting packages to sell. But the reality is that these reporting packages are most often just an extracted and renamed set of best security practices, which - if implemented comprehensively - would more than satisfy any compliance standard AND provide a more saner approach to security.

Bottom line: compliance may not be the best end goal and security professionals should not get distracted by all the hype about solutions that purport to produce compliance.

Beyond Philosophy
While the points made above are important, it's instructive to go beyond the abstract issues and discuss how to put them into practice. Here are two additional, yet potentially controversial, recommendations to consider.

When selecting solutions to solve compliance or security challenges, choose those that deliver security domain capabilities (e.g., access security, DMZ security, web security, etc.) instead of ones that attempt to be a tool to use in multiple security domains. If you are concerned about access, an access security solution will always be able to employ methods that get you better information, context and answers with infinitely better performance than a solution that relies on an infrastructure and architecture intended to be a generic security information-gathering solution. I can use the word "always" because domain solutions are designed to answer questions that are crucial to that domain instead of being designed to gather data, which may be useful in many domains. Different methods are used. Data is analyzed differently. Information is presented differently. A solution whose goal is "compliance" may be great for a chief compliance officer, but will do little or nothing to advance the capabilities of access security or any other security specialty.

Access security solutions (like other domain security solutions) have the advantage of bringing together the data that is needed to both demonstrate compliance and provide context for IT action. For example, the ability to determine how access is derived (effective rights) is important for answering many compliance questions. But perhaps more importantly, it is also crucial for determining how best to prevent insecure events from reoccurring by identifying a root cause (explicit grants vs. group memberships, for example), which can be fixed as opposed to a symptom that can be band-aided. A broader security information management solution does not bring this context to the event data; they are concerned with how generic event data is harvested, organized and archived and far less or not at all concerned with how an access security professional has to do his/her job.

One final recommendation - audit continuously. There is a great analogy that a leading security luminary once made: Auditing is the most effective form of security - akin to police work in the real world. In the real world, the fact that police will investigate crimes and will tend to solve most of them is the best deterrent to future crime. Effective auditing is the digital equivalent of police investigation.

Rather than contemplate an approach to compliance that is based on responding to breaches or errors as they arise, decide instead to audit continuously. By auditing continuously, I mean define a desired state, audit your current state against that, develop event controls to maintain desired state, and audit desired state again at some interval. It may sound cumbersome and potentially expensive, but it is, in fact, the least expensive approach. This is because it leads to incremental process and control improvements over time, which serves as a much better deterrent to insecurity in the future than waiting for a major security event with all its cost and downtime implications.  And, it is something that can be effectively automated to ensure that its resource impact is purely positive.

Next-Generation Compliance
In the end, the ultimate goal is to identify sensitive information or access, de-risk it, and provide audit trailsof critical access rights changes and uses. Continuous security audit solutions will need to deliver a set of best-practice policies and include contextual event response so that businesses have the answers (not just data), they need to truly evaluate their state of security and respond to events appropriately, rather than simply collecting mountains of event data.  By moving beyond checkbox compliance and generic event management solutions, businesses can become self-auditing and create a culture of compliance where security becomes the primary driver and compliance becomes a byproduct of providing sound security.

More Stories By David Rowe

David Rowe is the CEO of NetVision, a privately funded company providing compliance and control solutions for enterprise access auditing. An experienced IT security and management entrepreneur, Rowe has held director, advisor and executive-level roles with startups including Imperva, Cerberian, PS’Soft, Doyenz, and Avinti and has helped raise more than $50M growing, launching and re-launching companies.

Previously, Rowe served as chief marketing officer for Trend Micro, where he was accountable for strategy, marketing, product management, business and channel development for the global company during a period of growth from $300M to $600M. Rowe spent twelve years at Intel as a business unit manager and director of marketing, products and business development in the U.S., Japan, Europe, and Israel.

Rowe holds a master’s degree in business administration from the Ross School of Business at the University of Michigan.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Silicon India has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Published in Silicon Valley, Silicon India magazine is the premiere platform for CIOs to discuss their innovative enterprise solutions and allows IT vendors to learn about new solutions that can help grow their business.
The Internet giants are fully embracing AI. All the services they offer to their customers are aimed at drawing a map of the world with the data they get. The AIs from these companies are used to build disruptive approaches that cannot be used by established enterprises, which are threatened by these disruptions. However, most leaders underestimate the effect this will have on their businesses. In his session at 21st Cloud Expo, Rene Buest, Director Market Research & Technology Evangelism at Ara...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that TMC has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo and Big Data at Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Global buyers rely on TMC’s content-driven marketplaces to make purchase decisions and navigate markets. Learn how we can help you reach your marketing goals.
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
SYS-CON Events announced today that TechTarget has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget storage websites are the best online information resource for news, tips and expert advice for the storage, backup and disaster recovery markets.
Artificial intelligence, machine learning, neural networks. We’re in the midst of a wave of excitement around AI such as hasn’t been seen for a few decades. But those previous periods of inflated expectations led to troughs of disappointment. Will this time be different? Most likely. Applications of AI such as predictive analytics are already decreasing costs and improving reliability of industrial machinery. Furthermore, the funding and research going into AI now comes from a wide range of com...
SYS-CON Events announced today that Ayehu will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on October 31 - November 2, 2017 at the Santa Clara Convention Center in Santa Clara California. Ayehu provides IT Process Automation & Orchestration solutions for IT and Security professionals to identify and resolve critical incidents and enable rapid containment, eradication, and recovery from cyber security breaches. Ayehu provides customers greater control over IT infras...
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex software systems for startups and enterprises. Since 2009 it has grown from a small group of passionate engineers and business...
SYS-CON Events announced today that GrapeUp, the leading provider of rapid product development at the speed of business, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company, specialized in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market acr...
SYS-CON Events announced today that Conference Guru has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organi...
In this presentation, Striim CTO and founder Steve Wilkes will discuss practical strategies for counteracting fraud and cyberattacks by leveraging real-time streaming analytics. In his session at @ThingsExpo, Steve Wilkes, Founder and Chief Technology Officer at Striim, will provide a detailed look into leveraging streaming data management to correlate events in real time, and identify potential breaches across IoT and non-IoT systems throughout the enterprise. Strategies for processing massive ...
Internet of @ThingsExpo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devic...
SYS-CON Events announced today that Cloud Academy named "Bronze Sponsor" of 21st International Cloud Expo which will take place October 31 - November 2, 2017 at the Santa Clara Convention Center in Santa Clara, CA. Cloud Academy is the industry’s most innovative, vendor-neutral cloud technology training platform. Cloud Academy provides continuous learning solutions for individuals and enterprise teams for Amazon Web Services, Microsoft Azure, Google Cloud Platform, and the most popular cloud com...