|By John Cowan||
|March 1, 2012 04:00 AM EST||
By Steven Wolford, Director of Information Security, 6fusion
During the season of politics here in the US, I would like to borrow shamelessly from topics in the political debate with a look towards the state of information security.
According to CNN (Poverty Rate Rises as Incomes Decline), the number of US citizens living below what is considered the bare essentials is on the increase. I believe we can say the same for information security programs. According to SANS, the top security controls can be boiled down to 20 Critical Controls (Top 20 Critical Controls). These are regarded as the “poverty line” for an Information Security Program. The bare essentials needed for a program to live at a level regarded as a minimum standard.
Have you turned down a security control because it was too expensive?
ENSIA (the European Network and Information Security Agency) has stated “the same amount of investment in security buys better protection” (Cloud Computing, Benefits, Risks, and Recommendations for Information Security). We have long understood that scale brings cost optimization. By spreading the cost of controls over a larger number of organizations, Cloud Service Providers (CSPs) are able to either deliver equivalent controls at a lower price or enhanced controls at a similar price.
Work with your CSP to understand the controls already implemented, those that are planned, and those that you require for the assets you are moving to the CSP. The different cloud models (software/platform/infrastructure as a service) will each be able to deliver a different set of controls. You should expect to bring more controls to an IaaS provider than to a SaaS provider. However, you should still expect to see cost efficiencies with IaaS.
What if the chosen CSP doesn’t offer the controls you need? Reinvest the capital expenditure (CAPEX) or operating expenditure (OPEX) savings into providing your own controls or even better negotiate with the CSP to get the controls installed and leveraged across all of their customers. Security is moving from “build your own” to “assemble your own” (that sounds like a blog all on it’s own). There is even a growing industry in Security as a Service (SecaaS or SaaS), which is a cloud computing model that delivers managed security services over the Internet. Technopedia defines Secaas as “based on the Software as a Service (SaaS) model but limited to specialized information security services.” Engaging a SecaaS provider is yet another way to help lower the cost of living at the information security poverty line.
Have you not implemented a security control because your environment is too complex?
Your business does not have to be listed on the NYSE for you to have not implemented a security control because your existing IT feels too complicated to integrate with a control or for the cost of applying a control to become cost prohibitive due to IT sprawl.
Most security frameworks today recommend taking a risk-based approach to identifying the controls that are appropriate for any given environment. In order to first identify risk you must know ALL of the components that collectively create an information system. Often the cost of implementing a proper set of controls spirals out of control when attempting to apply them to a complex or spread out system.
Moving an information system into an IaaS CSP is the perfect opportunity to identify, consolidate, and simplify an information system. Identifying all the components of an information system is potentially the most significant step towards proper control selection; you cannot protect what you do not know about. It is still not uncommon to hear about a critical business system that relies on the spreadsheet saved on a folder on the hard drive in someone’s workstation. As an example, when you plan for the security of your current monthly billing do you in fact remember this critical component or do you go about happily installing the latest IDS on the accounting server; congratulating yourself along the way for protecting the companies financial systems.
Consolidating components is at the same time a risk and a benefit (what in life isn’t a dichotomy?). Personally, I see far more benefits and, with the concept of cloud brokering, there are ways to enjoy the benefits while minimizing the risks. Let’s get the scary stuff over first. The risk is that consolidation puts all your eggs in one basket, so to speak. The target becomes a higher value target because the reward of breeching (or the cost of loss) becomes higher. Enter the cloud broker – enjoy the benefits of consolidation by information system but spread the risk by sprinkling your information systems over different CSPs.
What are the benefits that outweigh the risks? Reduced complexity to install, manage, and monitor the controls used to protect the system. There is a reason why banks put valuables into a safe – same risks identified above but even bankers know it is far easier and less costly to put them into a central location.
That leads us to simplify. By moving your information system to a CSP you are able to simplify the implementation of appropriate security controls. One of the leading causes of delay in detecting and responding to a security incident is an overly complicated control implementation. Even if controls are properly implemented in a complicated system, gathering the control information in one place can be difficult (if your environment was such that getting data in one place was easy you would probably already have the information system simplified).
Craig Balding in his cloudsecurity.org blog even lists centralized data as the number one security benefit of “The Cloud”. I think this understates the real benefits. While Craig believes reduced data leakage and monitoring benefits as the winners, I would extend that to improved knowledge of how the system as a whole works and is architected. Move the financial system into an IaaS provider and you will quickly find that critical spreadsheet on that workstation.
Have you not implemented a security control because it was too difficult?
Many modern security controls require infrastructure just as complex as the information systems they protect. Network, application, data, access, logging, and much more all require technical solutions to be implemented, updated, managed, monitored for relevant information, and then responded to when an interesting event happens. It is not surprising at all that some have had to make the decision that applying all of this is just far too difficult. You make a decision that doing that one thing for security is just too hard to digest into your other business responsibilities.
CSPs can help ease that pain. Many security vendors offer solutions that take advantage of cloud architectures and make the implementation process much easier.
Take antivirus (AV) for example. Most major vendors today offer a cloud ready solution where AV can be offered as a SecaaS or in cloud optimized versions to let you maintain total control over the AV solution. Either way, actually implementing the AV solution can be as easy as install the client in a base image and deploy that client with each and every server turned on. EASY.
As we hear the political messages of the day, I encourage your to consider the “Information Security Poverty Line.” Take a look at your security posture and tolerance for risk. Are you forcing the information security program to live below the poverty line? If so, is there something that you can do about that?
I would say YES! The first step, to paraphrase James Carville, is to remember, “It’s the risk, stupid.” Stay tuned for more on that politically inspired theme.
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have s...
May. 27, 2015 11:00 PM EDT Reads: 6,379
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrategies, will examine why IT must finally fulfill its role in support of its SBUs or face a new round of...
May. 27, 2015 10:00 PM EDT Reads: 5,735
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device experiences grounded in people's real needs and desires.
May. 27, 2015 09:00 PM EDT Reads: 6,411
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
May. 27, 2015 09:00 PM EDT Reads: 5,341
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of WebRTC adoption today, but the potential is limitless when powered by IoT.
May. 27, 2015 09:00 PM EDT Reads: 6,791
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
May. 27, 2015 07:00 PM EDT Reads: 6,301
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
May. 27, 2015 06:45 PM EDT Reads: 2,223
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will addresses this very serious issue of profound change in the industry.
May. 27, 2015 06:00 PM EDT Reads: 1,510
SYS-CON Events announced today that BMC will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. BMC delivers software solutions that help IT transform digital enterprises for the ultimate competitive business advantage. BMC has worked with thousands of leading companies to create and deliver powerful IT management services. From mainframe to cloud to mobile, BMC pairs high-speed digital innovation with robust IT industrialization – allowing customers to provide amazing user experiences with optimized IT per...
May. 27, 2015 05:30 PM EDT Reads: 1,277
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover how hardware commoditization, the ubiquitous nature of connectivity, and the emergence of Big Data a...
May. 27, 2015 04:00 PM EDT Reads: 6,825
SYS-CON Events announced today that O'Reilly Media has been named “Media Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York City, NY. O'Reilly Media spreads the knowledge of innovators through its books, online services, magazines, and conferences. Since 1978, O'Reilly Media has been a chronicler and catalyst of cutting-edge development, homing in on the technology trends that really matter and spurring their adoption by amplifying "faint signals" from the alpha geeks who are creating the future. An active participa...
May. 27, 2015 03:37 PM EDT Reads: 769
The world is at a tipping point where the technology, the device and global adoption are converging to such a point that we will see an explosion of a world where smartphone devices not only allow us to talk to each other, but allow for communication between everything – serving as a central hub from which we control our world – MediaTek is at the heart of both driving this and allowing the markets to drive this reality forward themselves. The next wave of consumer gadgets is here – smart, connected, and small. If your ambitions are big, so are ours. In his session at @ThingsExpo, Jack Hu, D...
May. 27, 2015 12:49 PM EDT Reads: 812
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
May. 27, 2015 12:00 PM EDT Reads: 2,452
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data retrieval. They can easily adapt to new data sets and provide access to both structured and unstruc...
May. 27, 2015 12:00 PM EDT Reads: 2,389
We’re entering a new era of computing technology that many are calling the Internet of Things (IoT). Machine to machine, machine to infrastructure, machine to environment, the Internet of Everything, the Internet of Intelligent Things, intelligent systems – call it what you want, but it’s happening, and its potential is huge. IoT is comprised of smart machines interacting and communicating with other machines, objects, environments and infrastructures. As a result, huge volumes of data are being generated, and that data is being processed into useful actions that can “command and control” thi...
May. 27, 2015 11:51 AM EDT Reads: 793
As the Internet of Things unfolds, mobile and wearable devices are blurring the line between physical and digital, integrating ever more closely with our interests, our routines, our daily lives. Contextual computing and smart, sensor-equipped spaces bring the potential to walk through a world that recognizes us and responds accordingly. We become continuous transmitters and receivers of data. In his session at @ThingsExpo, Andrew Bolwell, Director of Innovation for HP's Printing and Personal Systems Group, discussed how key attributes of mobile technology – touch input, sensors, social, and ...
May. 27, 2015 11:30 AM EDT Reads: 4,412
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be
May. 27, 2015 11:15 AM EDT Reads: 2,874
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
May. 27, 2015 10:30 AM EDT Reads: 5,531
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem fil...
May. 27, 2015 10:00 AM EDT Reads: 2,306
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
May. 27, 2015 09:30 AM EDT Reads: 7,194