10:30 AM
Ameesh Divatia
Ameesh Divatia
Connect Directly
E-Mail vvv

Is Security Accelerating Your Business?

With an ever-growing list of security and compliance requirements, security can hinder or slow business initiatives. Is your security department stuck in slow gear or can it go faster?

There's a fundamental push and pull between business and security that has introduced friction over the years. With data breaches commonplace, security requirements have continued to grow in scope and, in many cases, have slowed the ability of businesses to release to market faster. Business leaders often view security as a necessity in a world of frequent data breaches, and they have learned to (or are forced to) tolerate an ever-growing list of security requirements. But why is the validation and vetting of security requirements so slow, and does it have to be?

Circumventing Security and IT
A lack of agility and responsiveness to the business ultimately gave rise to software-as-a-service (SaaS) applications that were fast and simple to deploy. Small, departmental SaaS footprints expanded enterprise-wide and eventually evolved into cross-functional application and services platforms. To a certain degree, shortcomings and delays in application deployments also gave rise to "shadow IT" — a complete circumvention of the security process.

This trend of embracing simplicity and speed has progressed into the consumerization of the infrastructure, as shown by the continued growth of infrastructure-as-a-service (IaaS) offerings such as Amazon Web Services and Microsoft Azure. With the increased adoption and simplicity of cloud deployment, the barrier to entry to spin up and deploy services has dropped dramatically, and this has increased the security gap in visibility and controls for these types of deployments.

A recent survey from RightScale on cloud adoption revealed that less than half of application or business owners plan to delegate authority to central IT for the selection of public cloud services, which supports the notion that business leaders are opting for the easiest path forward when it comes to application deployment. The flip-side of this equation is that close to half of enterprises also report slowing their cloud adoption due to a lack of security knowledge and skills according to a 2016 survey from Intel. The disparity in these perspectives on cloud authority and the ability to adopt cloud between business owners and security shows the lack of alignment on a common cloud delivery and security model.

Shifting Gears for Security
There are a number of best practices and solutions that you can embrace to accelerate security and your business. Below is a fundamental recommendation around DevOps, but also some approaches that have the potential to revolutionize application and data security while speeding things up at the same time.

1. Integrate DevOps and Security 
In its current form, security teams cannot keep pace with the existing reviews and gates for production release, and in many cases, they are running significantly behind on approvals. One Fortune 500 company I spoke with had a backlog of over 800 inbound requests from the business awaiting review. With over 80% of enterprises adopting DevOps and 30% going to a company-wide DevOps strategy, according to the RightScale survey, the pace of development and release will only accelerate.

The answer to speeding things up lies in changing the security validation process and drastically rethinking architectural and technology strategies. Some practitioners refer to these development process changes as "shifting left" — a more proactive approach that builds security into development and testing cycles earlier and continuing throughout the overall process. While integrating security practices into the overall development process provides some significant optimization and should be implemented, this only affects a portion of the application development and deployment strategy.

2. Implement a Secure Computing Layer
Secure computing solutions come in different forms and provide a common method to enable secure application processing and computation on data that either eliminates exposure of data in the clear or limits the execution and memory space to a trusted computing base. With the former method, there have been innovations in cryptography and compute methodologies that facilitate computation on encrypted data while in use. These newest methods do not utilize or attempt to utilize homomorphic encryption (which is still a long way from being a reality). More importantly, they are not subject to side-channel memory attacks (like Meltdown and Spectre) and do not require application code-level modifications, which can help facilitate the migration of more workloads to cloud infrastructure environments and still mitigate security risks.

Another secure computing method utilizes enclave technologies, such as specialized processors that isolate applications and code execution to prevent them from being hacked or compromised. The Apple iPhone's Secure Enclave storage of fingerprints and face IDs is a common implementation of this technology, and there are ongoing efforts to extend enclave capabilities to more traditional applications. This technique relies on specialized processors to isolate system memory and restrict access to an application's execution environment. While the methodology has been evolving for quite some time and shows some promise, it does require code-level modifications and depends on hardware, making it less adaptable for cloud workloads in the shorter term.

3. Utilize Advanced Application Access Control Frameworks
The dynamic nature of today's computing environment, especially in cloud and hybrid environments, requires a different access control model that goes beyond traditional network access control lists. The heavy utilization of containers, microservices, and API-based calls means that security needs to better understand the overall access model and leverage alternate ways to authenticate users, applications, and service calls.

There are emerging, policy-driven approaches that establish access profiles based on explicit identifiers and attribution to build a more dynamic access and authorization security model. These access frameworks ultimately reduce the amount of work involved in architecture reviews and provide the flexibility to remain secure when the infrastructure changes or moves.

It's not news that businesses are trying to leverage technology infrastructure that can move faster. By circumventing the traditional security requirements review and validation process, and inventing a new one with alternative technological approaches, security can also move faster and accelerate the business.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry's most knowledgeable IT security experts. Check out the Interop ITX 2018 agenda here.

Ameesh Divatia is Co-Founder & CEO of Baffle, Inc., which provides encryption as a service. He has a proven track record of turning technologies that are difficult to build into successful businesses, selling three companies for more than $425 million combined in the service ... View Full Bio
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Author
6/19/2018 | 2:58:20 AM
DevOps and SecOps
Great article and great point on the need to rethink how security and development are working in unison to optimize how security is being applied as part of the building, deploying and operating software.
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
PUBLISHED: 2018-10-16
Z-BlogPHP (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.