Risk
11/20/2013
09:06 AM
Ed Amoroso
Ed Amoroso
Commentary
Connect Directly
LinkedIn
RSS
E-Mail
100%
0%

The New Security Architecture

Recent high profile attacks reflect a new reality in which perimeter-based security models are increasingly less effective in protecting key corporate assets and information.

Over the past 18 months, many corporations have been forcefully introduced to a new era of highly visible security events, from large scale Distributed Denial of Service (DDoS) attacks to social media account takeovers. To those outside the security community, this may feel like a sudden assault on the world’s organizations, but these attacks are merely the tip of an iceberg that has been growing inside enterprise networks for more than two decades.

What lies beneath
Since businesses first opened up their networks with Internet gateways in the early 1990s, we’ve seen security administration become increasingly distributed, enterprise perimeters become less effective, and frantic protections impede user experience. For organizations realistic enough to accept that their perimeter no longer protects key assets and intellectual property, there is a new model for enterprise security that brings together mobile devices, identity and access management, virtual private networks, and cloud infrastructure.  

However, this new model requires security teams to rethink their reliance on traditional firewalls and adopt a new paradigm better suited to protecting against ever more sophisticated and stealthy threats such as Advanced Persistent Threats (APTs). Audits and certifications will also have to be redesigned and businesses will need to prioritize their protection decisions.

Management priorities 
Understanding where to reduce, maintain, or increase security investments will be critical to mounting an effective defense against the next evolution of threats. Reducing investments in legacy systems, including perimeter-based firewalls, untethers essential resources that support the trajectory of today’s business transformations into mobile and the cloud. Maintaining existing protections while transitioning to advanced architectures is important, but adding more sandbags to traditional perimeter strategies will provide limited return.  

The challenge, then, for senior management and audit teams, is to focus protection efforts on the most critical resources. But this strategy will require a major change in thinking since the most basic tenet of today’s corporate audit involves testing controls to ensure 100 percent compliance with corporate policy. This mentality needs to change so businesses can prioritize investments on protections that will yield the best possible security posture. Forward-thinking security teams are already heavily invested in network-based protection, and are increasing investments in virtual security operations. 

Securing mobile business
For now, the most pressing security needs for most businesses include the rise of BYOD, mobile threats, and the cloud.  Other threats include the ever-increasing sophistication of DDoS attacks and APTs. Network-based protections, also known as cloud-based protections, are minimal defenses against all of these threats because of the network visibility required to detect and mitigate them.  

With the network as the foundation, security teams can then create security “zones” to provide customized levels and types of protection for each asset based on its individual risk profile. For example, access to an asset categorized as high risk could require device level controls, multi-factor identity authentication, VPN/secure tunnels, and API verification. Access to a low-risk asset could be managed with fewer controls.

Look up to the cloud
The future of cybersecurity will be virtualized, moving management and threat detection to the cloud. When deployed properly, the cloud provides several critical security advantages over perimeter-based models including greater automation, self-tailoring, and self-healing characteristics of virtualized security. In this new architecture, identify and access management should be viewed as primary controls enabling the cloud to become the platform for enterprise security. This approach allows security teams to decouple security software from hardware and deliver on-demand protection rapidly and flexibly via APIs. 

Do you see the demise of traditional perimeter-based security in your organization any time soon? Let’s chat about what that will mean in the comments. 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Kim Davis
50%
50%
Kim Davis,
User Rank: Apprentice
11/20/2013 | 12:12:47 PM
Re: Compliance vs. security
I've been hearing healthcare IT professionals recently describing how they're torn between the need to release patient data to patients, security concerns, and compliance issues.  It's a minefield.
Susan Fogarty
50%
50%
Susan Fogarty,
User Rank: Apprentice
11/20/2013 | 11:51:42 AM
Re: Compliance vs. security
David, my interpretation was that the strict focus on compliance is taking away from organizations' ability to protect their most critical/sensitive resources, which Ed notes should be the goal. 

Another point I found really interesting was the statement that "cloud-based protections are minimal defenses against all of these threats because of the network visibility required to detect and mitigate them." I was surprised to hear that coming from AT&T. Is there no hope for network-operator-based security improvements to help screen out more of the threats?
David F. Carr
50%
50%
David F. Carr,
User Rank: Apprentice
11/20/2013 | 10:08:05 AM
Compliance vs. security
I was left wondering by the statement about audit requirements focusing too much on compliance issues. Is that in conflict with the security imprerative for some reason? Or you just saying that security needs to be given an even higher priority?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
11/20/2013 | 10:03:18 AM
Investment priorites
Ed, You paint a pretty sobering picture for IT security executives & the new paradigm you describe will clearly require a major shift in thinking. What are some suggestions on  how IT senior management and audit teams  should start to refocus protection their efforts?  Your point noting that "the most basic tenet of today's corporate audit involves testing controls to ensure 100 percent compliance with corporate policy" sounds to me like it wil l be to be a heavy lift.

 
<<   <   Page 2 / 2
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

CVE-2014-7292
Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

CVE-2014-8071
Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.