Top 10 cybersecurity tips for digital transformation [Part 1]

You don’t want to see a headline about your cybersecurity lapses. Nor do you want vocal critics to sully your carefully cultivated stellar reputation. You want to avoid the cost and disruption of cleaning up after a cybersecurity incident.

Treating cybersecurity as an afterthought or something others will address during digital transformation projects is always a mistake. It leads to leaving avoidable cybersecurity holes that bad actors love to exploit.

Thankfully, there are steps you can take to guard against the vulnerabilities that digital transformation initiatives often uncover. Here are the first five of the top 10 actions organizations can take to minimize cybersecurity risks during digital transformation.

Conduct an IT cybersecurity risk assessment

Conduct an information technology (IT) cybersecurity risk assessment for every digital transformation project. The characteristics of the project will influence what the highest risks are. However, the following risks occur frequently:

  1. Gaps in the internal cybersecurity defences.
  2. Insufficient cybersecurity maturity exhibited by the application software or the software as a service (SaaS) vendor.
  3. Varying supply chain vendor cybersecurity maturity.
  4. Uneven employee and contractor level of cybersecurity awareness.

The typical responses to reduce cybersecurity risk include implementing the following:

  1. Multi-factor authentication (MFA).
  2. Advanced threat detection solutions.
  3. More extensive use of encryption.
  4. An employee and contractor cyber awareness education program.

Use the conclusions of your cybersecurity risk assessment to influence the requirements and design of your digital transformation project.

The author further explains what a comprehensive IT cybersecurity risk assessment includes in this video.

Understand compliance obligations

Some digital transformation projects touch on processes and data subject to various regulations for which organizations must demonstrate compliance. Data about people are particularly sensitive. Major example regulations that all include a cybersecurity component are:

  1. The Personal Information Protection and Electronic Documents Act (PIPEDA).
  2. Federal Information Security Management Act (FISMA).
  3. General Data Protection Regulation (GDPR).
  4. Health Insurance Portability and Accountability Act (HIPAA).
  5. North American Electric Reliability Corporation Reliability Standards (NERC-CIP).
  6. National Institute of Standards and Technology (NIST Cybersecurity Framework).
  7. ISO 27001 Information security management.
  8. ISO 27002 Information security, cybersecurity and privacy protection.
  9. Payment Card Industry Security Council’s Data Security Standard (PCI DSS).
  10. Service Organization Control (SOC) Type 2.

Each of these regulations lays out requirements with which organizations must comply. Relevant software vendors typically describe implementation and operation strategies that are helpful for digital transformation project planning.

Include tasks to implement the cybersecurity requirements of applicable regulations in the scope of your digital transformation projects.

Avoid over-permissioned accounts

Most digital transformation projects require establishing and managing end-user accounts and roles. When end-users are issued over-permissioned accounts and roles that allow them access to more data and databases than they need to perform their assigned duties, bad actors can more easily penetrate your organization to cause havoc.

To minimize this cybersecurity risk at design, digital transformation projects:

  1. Design software with many roles to limit the access of any one role.
  2. Pay for enhancements to SaaS software to increase the number of roles.

Most database management software (DBMS) packages include functionality for restricting access to tables and columns. Using this functionality for managing roles is tedious and error-prone for your database administrator (DBA) staff. Ultimately it’s unsuccessful.

For operating the system that your digital transformation project will deliver, this limited access concept is implemented by:

  1. Centrally managing all permissions.
  2. Continuously reviewing permissions to identify misconfigured permissions, over-permissioned accounts and roles.
  3. Considering the implementation of specialized software that makes recommendations to remediate problem permissions rapidly and efficiently.

Together these measures lower the risk of cyberattacks.

Incorporate cybersecurity in application software design

Digital transformation projects typically design, build and test some application software. Completing digital transformation projects using only data integration and application software packages is rare.

Incorporate cybersecurity functionality in custom application software design by following best practices that include:

  1. Maintain security around the software development environment.
  2. Perform extensive data input validation.
  3. Encrypt the data your application is creating and implement HTTPS.
  4. Include authentication, role management and access control.
  5. Include auditing and logging.
  6. Adhere to best practices for configuring virtual servers.
  7. Don’t shortcut quality assurance and testing.
  8. Upgrade application software as security threats evolve.
  9. Delete inactive virtual servers and databases.

Following these best practices will significantly reduce the risk of successful cyberattacks when your digital transformation application is in routine production.

Restrict access to cloud management consoles

Digital transformation projects with a cloud component will operate an associated management console. The console is a highly sought-after target for cyberattacks because these consoles control all aspects of an organization’s cloud resources. Unauthorized use of these powerful cloud consoles can create immediate havoc or data breaches.

The best response to management console risks is to treat access to the cloud management console as privileged access. This best practice is implemented by:

  1. Requiring end-users to justify every login and track all logins to quickly identify unusual, inappropriate, or fraudulent access.
  2. Authorizing every userid for only specific, limited access for a specified period to contain the damage any compromised userid can cause.
  3. Employing single sign-on (SSO) so that end-users experience a secure and frictionless sign-in.
  4. Implementing MFA to add an extra layer of protection before granting access to cloud consoles.

Together these privileged access measures prevent cyberattacks against your cloud management consoles.

For a more in-depth discussion of securing cloud consoles, please read 5 Best Practices for Securing Privileged Access and Identities for the Cloud Management Console.

Organizations materially reduce cybersecurity risks by including these actions in the scope of their digital transformation projects.

What ideas can you contribute to help organizations minimize cybersecurity risks? We’d love to read your opinion. You can share that with us below. Select the checkmark for agreement or the X for disagreement. In either case, you’ll be asked if you also want to send your comments directly to our editorial team.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada
Yogi Schulz
Yogi Schulzhttp://www.corvelle.com
Yogi Schulz has over 40 years of Information Technology experience in various industries. Yogi works extensively in the petroleum industry to select and implement financial, production revenue accounting, land & contracts, and geotechnical systems. He manages projects that arise from changes in business requirements, from the need to leverage technology opportunities and from mergers. His specialties include IT strategy, web strategy, and systems project management.

Featured Download

IT World Canada in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Latest Blogs

Senior Contributor Spotlight