From tech stack to cyber security MESH architecture

0
131

By Edwin Doyle, Global Cyber ​​Security Strategist, Check Point Software

The technology cartridge is no longer a neat and organized pile! Cloud, endpoints, network and IoT have scattered the pile into a mess – or what the industry calls “network”.

DevSecOps does not make stacks

This tremendous move away from the traditional stack, including the people at DevSecOps, means that more groups of people, including those outside the CISO department, are adopting a new approach to security that Gartner called the Cyber ​​Security Mesh Architecture.

Neil Hopper, chief information security officer and board member of ISACA, puts it this way: “The increase in remote access to local data centers and cloud resources drives the need for flexible, compostable architecture that combines distributed and differentiated security. Services. Also around identities and objects that are not in place or on the same network – especially, users who access objects from anywhere at any time and with a variety of device shapes.It also allows organizations to bring cloud services to zero trust architecture and adaptive access control of employees with more detailed analysis of issues and objects alike . “

Vendor consolidation provides the best mesh

Some vendors have understood this for quite some time and have encouraged a unified approach. They say there is nothing new under the sun … Remember back to the days of UTM! The only glass glass ever promised (which never really happens, but less than six perfectly possible glazing) provides this visibility to all of these different technologies, and most importantly, provides an overall policy embedded in every technology in the organization.

The trick is to host a broad global policy, but allow individual site offices and / or departmental responsibilities to engage in their follow-up policies under the hierarchy of the global organizational agreement.

Mesh saves money

Gartner predicted that cyber security network architecture would help reduce the financial impact of security incidents by 90% and that by 2025 it would support more than 50% of digital access control requests.

Security on the go

This new approach requires a full configuration of our current network history, bringing security teams to the early planning stage, which will help activate the processes needed to implement a stronger overall security position for the organization.

Like zero trust, cyber security network architecture creates what is called peripheral, but in the identity layer and focuses on consolidating different security tools into a complete, interoperable system.

This matures security teams from managing split and individually defined security services to deploying a smaller number of vendors to detect specific threats, thus reducing noise from fragmented systems that warn of a myriad of potential false results.

The possibility of network architecture stemmed from a more agile API approach, which ensures multiple cloud ecosystems and the flexibility of DevSecOps – on-the-go security access.

For more information by Edwin Doyle, please read CyberTalk.org’s past coverage. Finally, to get more innovative cyber security news, best practices and analyzes, please subscribe to CyberTalk.org Newsletter.

Source