Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Talking about the digital transformation, is your security model really suitable for the digital world?

2025-02-27 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

With the ever-changing network environment, intruders are always looking for new ways to take advantage of weaknesses in organizational systems and applications. As a result, network-related events have become one of the biggest risks for enterprises as they try to understand their network resilience and threats.

As a result, security becomes critical in helping organizations manage network risks effectively, comply with regulatory and legal compliance requirements, and prevent costly security vulnerabilities. Many institutions are already aware of this shift: according to MarketsandMarkets research, the global security market is expected to grow to $5.48 billion by 2023.

Security is designed to provide organizations with confidence and trust in the effectiveness of their security controls through a variety of methods, such as evidence-based risk assessment, control gap analysis, and security testing, to help identify risks to the organization. However, the increasing number of security vulnerabilities and the inability of some organizations to comply with basic safety and health reflect the shortcomings of our current security model.

The challenges faced by the contemporary security model

Our current approach is reactive-there is evidence that organizations do not respond until most security threats occur. A proactive security model is a key supporting factor in delivering an effective operational model that includes the protection of people, processes, and technologies. One of the main obstacles to achieving reliable digital security is the flexibility of the organizational process, which hinders the active defense strategy.

The shelf life of our model is also very short, because threats are always changing. Internal and external audits assess the effectiveness of threat controls based on risk trends and themes during the exercise. If you do not continuously monitor, evaluate and update the assurance model, it will become obsolete.

Finally, the current model is static. With the popularity of cloud computing and the emergence of the tactile Internet, more and more enterprises are looking for opportunities through digital technology. Agile methods are accelerating the delivery of digital transformations. The modern guarantee model can not adapt to this iterative incremental development and deployment model.

Several elements of successful security function

Consider cooperation. In order for security capabilities to succeed, organizations need to break down silos and achieve more collaboration among key stakeholders.

First, critical business assets are identified, classified, and prioritized, which can have a serious impact on business strategy if they are utilized or accessed.

Next, you need centralized control. Organizations should centrally manage strategic enterprise security controls in order to better understand the operational effectiveness of these controls.

Finally, keep up-to-date on security policies, standards, and compliance requirements. Understand how policies, processes, standards, and compliance affect the required control status. These must be driven by business goals and the organization's specific risk preferences.

Establish an active and dynamic security model

In order to adapt to modern challenges, it is important that organizations redefine and adjust their security assurance operational models to improve speed and agility. An effective safeguard model needs to find an appropriate balance between active and passive approaches in order to build a more secure organization and maintain the trust of stakeholders. Start with the following steps:

● links your security assurance policy to your business goals to improve your organization's security

● combines your security assurance operational model with risk management and governance to achieve operational efficiency

● defines an organization's maturity roadmap for control based on your risk preference

● conducts evidence-based assessments to generate trust. Evidence collection should focus on key control objectives

● will guarantee integration into development iterations to assist in agile delivery. Adjust the assurance process to promote the DevSecOps culture and resolve any security issues during the development phase

● ensures that security is embedded from the start. Incorporate security into the product delivery process according to design principles. For agile development, this means ensuring that the security plan is included in the sprint goals

Companies should also conduct smarter and more balanced support activities to help with frequent evaluations. Security should be carried out in a pragmatic and appropriate manner to prevent cyber attacks and intrusions. This includes the following aspects:

● rationalizes multiple network security frameworks into control objectives and prioritizes targets according to the threats faced by the organization to provide a more targeted assessment

● develops security control directories / listings based on security configuration files or assets. Implement the response assessment method according to the risk preference of the organization

Where possible, ● uses automated tools to support security assessments, such as third-party network security risks and privacy impact assessments

● leverages automated testing (internal source code and third-party code assessment) as part of a continuous integration / continuous delivery (CI/CD) pipeline to support agile development

● automates evidence collection by performing scenario-based security tests based on the MITRE ATT&CK framework. Critical security controls should be tested to continuously assess the effectiveness of the controls and provide additional levels of trust. Ask yourself: "can point-in-time, evidence-based assessments stand the real test?"

In summary, a successful digital security model must help accelerate continuous, evidence-based security assessments, effectively manage network security risks, demonstrate compliance with changing regulatory requirements, and empower organizations to gain confidence in their security posture.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report