Triple-A ratings are normally associated with Chief Financial Officers (CFOs) keeping a tab on John Moody’s bond credit rating. In the world of IT, it can be a platform for businesses to rate the efficiency of their IT security implementation.
IT security is one of the main concerns for IT teams with recent attacks, such as Shellshock and Heartbleed, affecting organisations globally. Businesses are taking steps to protect their networks from threats of all sizes. However, as it stands, security is still at risk from an internal and external stand point.
How can businesses know when they have reached a level of security that will protect them from cyber-attacks, while still empowering employees to do their job better? A comprehensive security approach should encompass three factors:
- Be Adaptive to threats, business requirements and also the ever evolving use of the internet within the corporate network,
- Have Adapted to meet the specific requirements of an organisation, and
- Have been Adopted fully by end users.
These factors can be summarised as the ‘Triple A’ security approach. Achieving this strengthens the overall security posture of businesses and would grant organisations a ‘Triple A’ security rating, providing assurances to customers that their sensitive information is safe. But what do companies need to do in order to be Triple-A secure?
IT infrastructures are constantly changing. Previously, IT infrastructures would be static, however, the world is moving towards one of convergence. Security infrastructures need to adapt in order to be effective. An adaptive security architecture should be preventative, detective, retrospective and predictive. In addition, a rounded security approach should be context aware.
Gartner has outlined the top six trends driving the need for adaptive, context aware security infrastructures: mobilisation, externalisation and collaboration, virtualisation, cloud computing, consumerisation and the industrialisation of hackers. But what exactly does context aware mean? Gartner defines context aware security as “the use of supplemental information to improve security decisions at the time the decisions are made”. It predicts by 2015, 90% of enterprise security solutions deployed will be context aware.
The premise of the argument for adaptive, context aware security is that all security decisions should be based on information from multiple sources. This starts by looking at the context of the request and then allowing or denying it based on the information available, e.g. the method of authentication used, the time of day etc. By taking this adaptive approach security can be improved.Read more: App Security- the great unspoken
Adapted: To Changing Environments
No two organisations are the same, so why should security implementations be? Security solutions need flexibility to meet the specific business requirements of an organisation. Despite spending more than ever to protect systems and comply with internal and regulatory requirements, something is always falling through the cracks. In fact, 73% of organisations globally have experienced a security breach in the last twelve months according to a Dell commissioned survey by Vanson Bourne.
There are dozens of “best-of-breed” solutions addressing narrow aspects of security. Then there are monolithic security frameworks, attempting to address every aspect of security in one single solution, which are inflexible and expensive to administrate. Both of these solutions are imperfect and end up being costly to run and maintain.
Instead organisations should approach security based on simplicity, efficiency, and connectivity. These principals tie together the splintered aspects of IT security into one, integrated solution, capable of sharing insights across the organisation.Read more: Defending Your Castle from the Inside: Data Breaches and How to Minimise Their Impact
Businesses can manage the rules and policies, and end users can easily comply. This security solution ensures that the approach is adapted to meet the specific requirements and business objectives of an organisation, rather than taking a one size fits all approach.
Adopted: By Employees
Another essential aspect to any security approach is ensuring that employees understand and adopt security policies. IT and security infrastructure are there to support business growth. A great example of this is how IT enables employees to be mobile, increasing productivity. However, at the same time it is vital employees adhere to security policies and access data and business applications in the correct manner. If not mobility and other policies designed to support business growth become a security risk and could actually damage the business.
All too often people think security tools hamper employee productivity and impact business processes. In the real world, if users don't like the way a system works and perceive it as getting in the way of productivity, they will not use it. The business value of having the system is gone, not to mention the security protection.
By providing employees with training and guides around cyber security, this should lead to them being fully adopted. The results of which is a drop in the number of security risks from employee activity.
If your overall security policy ticks all of the three A’s, then you can rest assured you have a very high level of security. However, these checks are not something that you can do just once. To protect against tomorrows threats, businesses need to regularly run through this checklist. This ensures a maximum security level is achieved and maintained. It is also important to ensure any security solutions implemented, allow your organisation to grow on demand, without there being any impact on the existing part of the network.
By ensuring that the network is ‘Triple A’ rated, it becomes possible to ensure all areas of a corporate network are protected at all times. By working towards this framework, it becomes possible to identify gaps in the network security, helping to prevent against future attacks.
- The week in security: FREAKing out as bug joins human, nation-state threats
- Apple Watch debut highlights need to manage wearable, IoT security
- The human firewall has a soft spot: you
- Security-focused cloud analytics will drive local threat-intelligence growth: Splunk
- Top PC vendors bloatware undermine Windows 10 security