Welcome!

Cloud Security Authors: Liz McMillan, Pat Romanski, Shelly Palmer, Jim Hansen, Elizabeth White

Related Topics: Cloud Security, Microservices Expo

Cloud Security: Article

When Compliance Is at Odds with Security

Create a culture of compliance where security becomes the primary driver

Users are the weakest link when it comes to information security. Without intending to, they cost more money in security breaches than outside hackers. This is why all regulations require the demonstration of strong access security. But focusing purely on regulatory compliance proofs as a standard of security can cause one to lose sight of the intended goal.

Falling into the Compliance Rut
In a typical organization, IT administrators face an alphabet soup of regulatory requirements that have been put in place in an effort to protect sensitive information. And even in businesses that are not externally regulated, there are often compliance initiatives underway that require meeting some type of standard. There is a real temptation to define success as getting a passing mark on a list of criteria against which the security of the organization is going to be measured. However, in trying to pass an ever-growing and evolving list of tests, IT personnel may find themselves getting away from their real jobs - security. This is particularly true when the organization attempts to handle each standard on an individual basis and winds up getting preoccupied with creating or applying specific controls for each one. As individual standards change or requirement specifications are released, this approach of wearing two hats may quickly challenge security professionals' sanity.

Today, when asking security solution buyers "what problem(s) are you hoping to solve?" the reply is frequently, "I need a product with a HIPAA reporting package (or PCI, etc)." As a result, every software solution vendor worth their salt now has a HIPAA and/or other reporting packages to sell. But the reality is that these reporting packages are most often just an extracted and renamed set of best security practices, which - if implemented comprehensively - would more than satisfy any compliance standard AND provide a more saner approach to security.

Bottom line: compliance may not be the best end goal and security professionals should not get distracted by all the hype about solutions that purport to produce compliance.

Beyond Philosophy
While the points made above are important, it's instructive to go beyond the abstract issues and discuss how to put them into practice. Here are two additional, yet potentially controversial, recommendations to consider.

When selecting solutions to solve compliance or security challenges, choose those that deliver security domain capabilities (e.g., access security, DMZ security, web security, etc.) instead of ones that attempt to be a tool to use in multiple security domains. If you are concerned about access, an access security solution will always be able to employ methods that get you better information, context and answers with infinitely better performance than a solution that relies on an infrastructure and architecture intended to be a generic security information-gathering solution. I can use the word "always" because domain solutions are designed to answer questions that are crucial to that domain instead of being designed to gather data, which may be useful in many domains. Different methods are used. Data is analyzed differently. Information is presented differently. A solution whose goal is "compliance" may be great for a chief compliance officer, but will do little or nothing to advance the capabilities of access security or any other security specialty.

Access security solutions (like other domain security solutions) have the advantage of bringing together the data that is needed to both demonstrate compliance and provide context for IT action. For example, the ability to determine how access is derived (effective rights) is important for answering many compliance questions. But perhaps more importantly, it is also crucial for determining how best to prevent insecure events from reoccurring by identifying a root cause (explicit grants vs. group memberships, for example), which can be fixed as opposed to a symptom that can be band-aided. A broader security information management solution does not bring this context to the event data; they are concerned with how generic event data is harvested, organized and archived and far less or not at all concerned with how an access security professional has to do his/her job.

One final recommendation - audit continuously. There is a great analogy that a leading security luminary once made: Auditing is the most effective form of security - akin to police work in the real world. In the real world, the fact that police will investigate crimes and will tend to solve most of them is the best deterrent to future crime. Effective auditing is the digital equivalent of police investigation.

Rather than contemplate an approach to compliance that is based on responding to breaches or errors as they arise, decide instead to audit continuously. By auditing continuously, I mean define a desired state, audit your current state against that, develop event controls to maintain desired state, and audit desired state again at some interval. It may sound cumbersome and potentially expensive, but it is, in fact, the least expensive approach. This is because it leads to incremental process and control improvements over time, which serves as a much better deterrent to insecurity in the future than waiting for a major security event with all its cost and downtime implications.  And, it is something that can be effectively automated to ensure that its resource impact is purely positive.

Next-Generation Compliance
In the end, the ultimate goal is to identify sensitive information or access, de-risk it, and provide audit trailsof critical access rights changes and uses. Continuous security audit solutions will need to deliver a set of best-practice policies and include contextual event response so that businesses have the answers (not just data), they need to truly evaluate their state of security and respond to events appropriately, rather than simply collecting mountains of event data.  By moving beyond checkbox compliance and generic event management solutions, businesses can become self-auditing and create a culture of compliance where security becomes the primary driver and compliance becomes a byproduct of providing sound security.

More Stories By David Rowe

David Rowe is the CEO of NetVision, a privately funded company providing compliance and control solutions for enterprise access auditing. An experienced IT security and management entrepreneur, Rowe has held director, advisor and executive-level roles with startups including Imperva, Cerberian, PS’Soft, Doyenz, and Avinti and has helped raise more than $50M growing, launching and re-launching companies.

Previously, Rowe served as chief marketing officer for Trend Micro, where he was accountable for strategy, marketing, product management, business and channel development for the global company during a period of growth from $300M to $600M. Rowe spent twelve years at Intel as a business unit manager and director of marketing, products and business development in the U.S., Japan, Europe, and Israel.

Rowe holds a master’s degree in business administration from the Ross School of Business at the University of Michigan.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 20th Cloud Expo, which will take place on June 6-8, 2017 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 add...
TechTarget storage websites are the best online information resource for news, tips and expert advice for the storage, backup and disaster recovery markets. By creating abundant, high-quality editorial content across more than 140 highly targeted technology-specific websites, TechTarget attracts and nurtures communities of technology buyers researching their companies' information technology needs. By understanding these buyers' content consumption behaviors, TechTarget creates the purchase inte...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, will discuss some of the security challenges of the IoT infrastructure and relate how these aspects impact Smart Living. The material will be delivered i...
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), will provide an overview of various initiatives to certifiy the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldw...
Your homes and cars can be automated and self-serviced. Why can't your storage? From simply asking questions to analyze and troubleshoot your infrastructure, to provisioning storage with snapshots, recovery and replication, your wildest sci-fi dream has come true. In his session at @DevOpsSummit at 20th Cloud Expo, Dan Florea, Director of Product Management at Tintri, will provide a ChatOps demo where you can talk to your storage and manage it from anywhere, through Slack and similar services ...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
SYS-CON Events announced today that Ocean9will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Ocean9 provides cloud services for Backup, Disaster Recovery (DRaaS) and instant Innovation, and redefines enterprise infrastructure with its cloud native subscription offerings for mission critical SAP workloads.
SYS-CON Events announced today that Linux Academy, the foremost online Linux and cloud training platform and community, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. Industry leaders in quality training, provided services, and student certification passes, its goal is to c...
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
SYS-CON Events announced today that Loom Systems will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Founded in 2015, Loom Systems delivers an advanced AI solution to predict and prevent problems in the digital business. Loom stands alone in the industry as an AI analysis platform requiring no prior math knowledge from operators, leveraging the existing staff to succeed in the digital era. With offices in S...
SYS-CON Events announced today that T-Mobile will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. As America's Un-carrier, T-Mobile US, Inc., is redefining the way consumers and businesses buy wireless services through leading product and service innovation. The Company's advanced nationwide 4G LTE network delivers outstanding wireless experiences to 67.4 million customers who are unwilling to compromise on ...
SYS-CON Events announced today that Cloudistics, an on-premises cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloudistics delivers a complete public cloud experience with composable on-premises infrastructures to medium and large enterprises. Its software-defined technology natively converges network, storage, compute, virtualization, and management into a ...
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
SYS-CON Events announced today that Infranics will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Since 2000, Infranics has developed SysMaster Suite, which is required for the stable and efficient management of ICT infrastructure. The ICT management solution developed and provided by Infranics continues to add intelligence to the ICT infrastructure through the IMC (Infra Management Cycle) based on mathemat...
Now that the world has connected “things,” we need to build these devices as truly intelligent in order to create instantaneous and precise results. This means you have to do as much of the processing at the point of entry as you can: at the edge. The killer use cases for IoT are becoming manifest through AI engines on edge devices. An autonomous car has this dual edge/cloud analytics model, producing precise, real-time results. In his session at @ThingsExpo, John Crupi, Vice President and Eng...