Site icon IT World Canada

The cyber security “as a service” strategy

Neptune Duo smart watch

Cyber security is, without doubt, the biggest elephant in the IT room. Like the blind men and the elephant parable, security isn’t easy to define and it is seldom possible to claim anything is completely secure. Over the past decade, security has probably been the single biggest inhibitor to the emerging digital transformation.

There are simply too many publicized examples of serious breaches, including loss of data (e.g., identities), loss of control and direct financial cost (such as from ransomware). The Dyn DDOS attack in October 2016 and the recent Yahoo disclosures show that, even in 2016, the security problem has not been adequately solved. It is especially bad when it takes several years to detect the intrusion!

The next big security challenge will be the Internet of Things. The estimate of 50 billion connected “things” by 2020 makes assuring high security into a “never ending story.” Many of these IoT things will be associated with safety-critical systems. It’s hard even to imagine someone hacking your watch and listening via its microphone, but the idea is not that far-fetched.

There is increasing demand for security and privacy to be more than an after-thought. The idea of privacy and security by design was first introduced by Ann Cavoukian and has been taken up around the world. A 1997 book by Don Tapscott and Ann Cavoukian called “Who Knows?” also talked about privacy in a networked world.

Robust security should be a characteristic of any well-designed IT component, network, system and ecosystem. However, purely protective measures will not be sufficient as long as intruders remain both innovative and motivated. No one can predict all possible future threats, especially when the systems are cloud-based, the apps are dynamically composable and most functions are virtualized and/or containerized.

Developers need to integrate security into their software at all levels – infrastructure, platform and applications – and should include standard interfaces to allow security services to be integrated across multiple clouds, networks, data centres and providers.

Basic security requirements include:

Since these security requirements are closely aligned with IT governance and overall systems management they should share the underpinning services and support systems, even if there are third party providers involved.

The three basic approaches to security are:

Three options exist for organizations to implement security services, regardless of the approach chosen:

Option 1 – Do-it-yourself: Many organizations have their own security centre of excellence that is responsible for advocating security. Some also have separate groups for privacy oversight. These groups often have trouble obtaining adequate funding and must also compete for expert resources.

Option 2 – Fully outsourced: Another possibility is to outsource most or all security functions to a third party, although accountability must remain with the company. This option can be valuable if a trusted partnership can be established. It is also useful if substantially all assets are cloud-based.

Option 3 – Security-as-a-Service: A SaaS-based approach can be the best approach when selective outsourcing is preferred or when in-house resources are not available. The SaaS approach also minimizes capital costs, encourages state-of-the-art processes and encourages a joint effort that can be better aligned with hybrid cloud environments.

I recently wrote a whitepaper on cyber security as a service, which is available from Stratejm Inc. Stratejm provides a range of security support services that would fit into Option 3 above.

This is what I’ve been doing; your comments would be welcomed!

Exit mobile version