Proactive Approach to Security
Proactive Approach to Security
For security measures to be effective, a comprehensive and proven approach is needed. This puts you in a position to address security in a proactive manner rather than always being forced to take reactionary measures or make decisions based on fear. Logicalis examines the following areas when developing a security strategy:
Security must be the enabler of “yes,” not the facilitator of “no.”
Security must be aligned with business. The role of security is to enable business objectives in a non-disruptive manner. We need to move beyond the days where security is used as an excuse to stop business objectives.
Leverage proven industry standard cybersecurity frameworks.
Building a house without blueprints known to be structurally sound would be considered risky. The same is true when it comes to security. Starting with a proven cybersecurity framework that is accepted throughout the industry will position you for better results. Examples are CIS CSC20 (Center for Internet Security), NIST CSF, ISO 27000, HITRUST, and CSA (Cloud Security Alliance). This approach helps organisations ensure that the most critical aspects of cybersecurity are addressed and provides a non-biased, evidence-based approach.
Don’t make security decisions based on fear.
The risk of a cybersecurity incident can be scary, but making a decision based on fear has unfortunate results. Buying on fear can result in Shiny-Object Syndrome, where technology is purchased without proper thought to business objectives and incorporation into the existing security architecture. This is analogous to buying a €1,000 safe to protect a one hundred-euro note.
Look at security from both a risk- and threat- centric perspective.
Security is about managing risk by using the best people, processes, and technology. Effective risk management identifies and prioritises risk as it relates to your business. In conjunction with risk management, a threat-centric approach should be used. A threat-centric model looks at how a threat actor (whether malicious or unintentional) could negatively affect your enterprise by leveraging data-driven and evidence-based approaches.
Leverage your existing investments.
Our approach incorporates existing investments you’ve already made in security and provides solutions which leverage that investment. A “rip and replace” approach is neither cost effective nor realistic.
Take a holistic, architectural approach to security infrastructure.
A collection of security technologies that lack integration and automation is ineffective. A proper architecture creates a “1+1=3” scenario by sharing threat data across devices and automating responses.
Compliance and security are not the same.
Security plays a role in compliance, but it is important to understand that compliance is not the same as a security strategy. Typically, compliance regulations focus on protecting one element of your business, such as credit card data with PCI-DSS. If you rely solely on your compliance requirements when approaching security, you leave a large part of your organization vulnerable to breaches without a framework for addressing them.