0

To-Do Lists Are Old News. Security Tools Need to Adapt to Keep Up

 1 year ago
source link: https://devm.io/security/security-tools-automated
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Focusing on proactive mitigations

To-Do Lists Are Old News. Security Tools Need to Adapt to Keep Up

07. Dec 2022


For years, the world of enterprise technology has been filled with cringeworthy catchphrases like “ditch your reports” and “more than a dashboard”, resulting in group eyerolls during sales pitches. The proliferation of these sales references causes industry angst, but there is merit to the context – if not the delivery of these clichés.

Reports have long been seen as one of the least efficient legacy business practices, and for good reason. Reports lack context, require additional investigation to become actionable, and create backlogs of tasks that frequently go unfinished.

As a result, reports evolved from static lists to real-time alerts, dashboards, and finally to prescribed actions, taking us beyond the finding and straight to the solution. In this new process data is translated not into to-do lists, but into directions with appropriate context and actualized resolution. This increases the likelihood of corrective action and reduces response times. One area where this evolution has been less visible is within the security industry, where solutions have remained alert or list oriented, often focusing on reports as an outcome rather than a step in the process of solving risks.

A trailing industry

Though list-oriented processes are seen as outdated, much of the security world still revolves around audits which result in lists, and nowhere is this more evident than within the list driven process of user access reviews, a periodic and retroactive view of excessive access risks which requires multiple stakeholders and often results in inconsistent action or no resolution at all.

User access reviews are well intended, designed to secure assets by maintaining least-privilege on a regular basis. The reality, however, is that properly analyzing access requires a level of granularity that cannot be expected through manual efforts, and even organizations with aggressive monthly audit cadences are looking at old data – imagine what can be accomplished over 29 days with stolen access credentials. This approach results in a shallow analysis and delayed response to permissions governance.

Those who oversee access reviews also face a well-known dilemma: multiple managers are unlikely to adhere to a singular policy definition, but a single auditor lacks the context necessary to determine which privileges are necessary. In many cases the audit is conducted by one team, and then passed to development managers who are expected to know exactly which permissions are needed, leaving many important decisions to each manager. How do you define the “need” for access? Is it their current project’s scope? Their overall role’s responsibility? A combination of both? Each manager is likely to have a different answer.

Because this list is received differently by each reader and business unit, policy adherence can suffer due to lack of action, rubber stamping, or in the best of scenarios – inconsistent application of policies as action and urgency are defined by the audience.

Solving the problem

Irregular permissions audits and quarterly access reviews are just a few examples of this problem. Compliance audits, third party vulnerability assessments, and code analysis are all done retroactively, often after the risk has already been introduced.

These challenges can be overcome by focusing on proactive mitigations rather than retroactively creating lists. An automated and policy-driven approach to security can incorporate more granularity and actively reduce risks before they occur. Continuous analysis ensures fast, accurate, and consistent policy adherence. This means a more secure development ecosystem, more timely and accurate resolution to risks, and less confusion around governance.

Without automated processes in place to expedite risk mitigation, vulnerabilities can be exploited while lists change hands, and partial solutions can leave you feeling protected while still at risk. Ultimately, dashboards and fix-it lists are feel-good solutions that just don’t cut it anymore.

Mark Maney
Mark Maney

Mark Maney is Head of Customer Success at Arnica, a software supply chain security company that leverages behavior-based machine learning and automated risk mitigation to secure the development ecosystem. Over the last 10 years, Mark has been responsible for the design, development and implementation of automation solutions throughout multiple sectors including engineering, transportation, retail and software security.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK