Explore chapters and articles related to this topic
The Battle for Cloud Supremacy and the Remaking of Enterprise Security
Published in Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland, Next-Generation Enterprise Security and Governance, 2022
Matthew Ryan, Frank den Hartog
One of the foundation principles of establishing and maintaining an effective cybersecurity environment is implementing effective access control. Despite this, Identity and Access Management (IAM) and Privileged Access Management (PAM), has remained one of the MitreCorporations top security weaknesses for the past decade [45]. Typically, this problem is magnified through the use of legacy on-prem solutions because they are often weak in providing proper visibility over the provisioning and validation of the access logs. For example, many legacy (non-cloud) and hybrid-cloud enterprise environments may utilize a specialized IAM platform, maybe a PAM platform, and a Security Information and Event Management (SIEM) system. The SIEM system may also be outsourced to a third-party Managed Security Services Provider. Additionally, internal audit functions are generally geographically separated from their business and information security departments. For some enterprises, this function may even be outsourced to an external auditor due to a lack of internal technology expertise. As a result, this often makes it very difficult to accurately and efficiently validate the access permissions and activities for potentially up to a few hundred thousand staff that are spread across global offices. To address some of these challenges, many enterprises have implemented a formal attestation process, where business owners are required to periodically validate user access to their systems. The problem is that some systems may have thousands of users, of which the system owners only know very few.
Architectural choices for cyber resilience
Published in Australian Journal of Multi-Disciplinary Engineering, 2019
Geoffrey Brennan, Keith Joiner, Elena Sitnikova
The advantage of open architectures in outsourcing security and keeping pace with cybersecurity is outlined by Chan (2018) as follows, similar to the USN C2C24 Principle 4 outlined earlier: ‘MSP responsibilities are increasingly shifting from repairs, patches, delivery of new software, and incorporation of cloud services to that of data-related security services. According to Gartner, a new class of MSP, the Managed Security Service Provider (MSSP), has emerged to provide outsourced monitoring and management of security devices and systems. Prototypical managed services now include, among others, managed firewall, virtual private network, vulnerability scanning, anti-viral services, and intrusion detection. Outsourcing to MSSPs has typically improved the client ability to deter cyberthreats … . MSSPs have burgeoned not only in industries that have experienced massive compromises in recent times (e.g. healthcare), but also in areas that are at unprecedented levels of risk (e.g. energy sector).’