Cybersecurity asset management: where we're and how we got here.

in Project HOPE5 years ago (edited)

Even though cybersecurity asset management isn’t as attractive as AI, ML, and some of the other hot subject matters in cyber tech today, it’s an predicament whose time has come. In this put up, we’ll appear at why asset administration continues to be a problem, what success appears like, and an process to getting there.

images-43.jpg
Image source

The more a organization can inform me about their property the simpler their safety is, and the extra comprehensive and realtime the stock is, the more mature they're. This has been real for me over 15 years of consulting across hundreds of firms.

Organizations pay countless numbers of countless numbers a yr to maintain snacks within the ruin rooms. They pay to send people to coaching and conferences that generally have very few tangible advantages. And we dump hundreds of thousands into advertising campaigns that we can’t tie to revenue outcome.

What price is being compliant with an knowledge safety law if that you may move at the same time having zero proposal the place your knowledge is and what techniques you have? How is that even feasible?

Looking just on the fundamentals of the CIS 20 controls, the first two are:

  • Inventory and Control of Hardware Assets: Actively control (inventory, monitor, and right) all hardware devices on the network so that handiest licensed contraptions are given entry, and unauthorized and unmanaged devices are determined and avoided from gaining entry.

  • Inventory and Control of Software Assets: Actively manage (inventory, track, and correct) all software on the community in order that most effective approved application is mounted and can execute, and that unauthorized and unmanaged software is found and prevented from set up or execution.

Why asset administration is a massive challenge and getting larger.

The hindrance is getting worse when you consider that within the final 5–10 years, there had been essential shifts in the way we compute:

  • BYOD: Who is liable for instruments that aren’t owned by means of the institution? Is it IT’s accountability to realise which gadgets are gaining access to company resources? Must IT simply make sure contraptions can hook up with the network and access resources, or is access administration now a safety function?

  • Cloud and SaaS: When corporate information is saved on bodily, on-premise networks, it’s cheap to expect IT and safety departments to have ownership. When knowledge is saved in a couple of 0.33-occasion cloud offerings, how will we anticipate our possess IT/security resources to maintain information secure?

  • Virtualization: Consider of how easy it is to spin up a VM or an Amazon instance. Then feel of how easy it's to omit them. Additionally, for the reason that digital instances are ephemeral, they damage security units that don’t do lively discovery. How do you be certain your VA tools are scanning situations that most effective exist for unpredictable intervals?

  • Mobile Devices: Now that every body has access to e mail, applications, and company information on their smartphones and tablets, how are the IT and security departments to know whether these gadgets are satisfactorily secure?

  • IoT Devices:With thousands of invariably-on, continuously-connected gadgets, how can IT and safety be aware of which gadgets are sanctioned, comfy, and must be allowed? How can they even preserve up?

SOLVING THE CONTINUOUS ASSET MANAGEMENT PROBLEM.

Cybersecurity Asset management Platform as the silver bullet, let’s talk about an approach as a substitute. Businesses have already got instruments that include gadget expertise like:

images-48.jpg
Image source

  • Active directory
  • Endpoint protection
  • Vulnerability assessment tools
  • SIEM solutions
  • Mobile device management
  • Switches and routers
  • Firewalls

One technique would be to connect to all these methods, acquire the data about gadgets, correlate the information and present a view of what’s managed and unmanaged, including things like:

  • All software established on each device with variation understanding
  • Platch repute
  • All customers which have logged in to the gadget
  • Which endpoint marketers are walking
  • The last time they were scanned
  • gadget profile information like CPU status, RAM, whether the device is presently on
    the place the device is

HOW LONG DOES IT TAKE TO GET A FULL INVENTORY ON ALL ASSETS AT ANY GIVEN TIME?

And despite the fact that /u/spydum on the cybersecurity subreddit recommended the next in regards to the Miessler piece and asset management more commonly:

100% agree but right here’s the challenge: Asset management isn’t attractive. Penetration testing and crimson crew and analysis will get the entire job reqs, when you consider that it’s a long way extra flashy.

sources.

1,2,3,4,5.

Sort:  



HIVE IS ALIVE!!!

JOIN US, YOU'LL HAVE EXACTLY THE SAME BALANCE AS YOU HAVE HERE ON STEEM WITHOUT THE CENTRALIZATION AND CENSORSHIP!!

https://hive.blog
https://twitter.com/innerhive
br>





































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































Resteemed already :) Upvote on the way

 5 years ago 

Hi @henry-9ja

After reading your publication and based on current technology, I realize that in some way it is linked to my accounting career.
I explain to you the rationale of this publication, many times it is based on its origins and the origins, although you may not believe it, are strictly accounting, in which way you can measure the utility of a company in terms of profit or loss, since it is very simple based on its assets Both tangible and intangible assets in this case, technology is part of those intangible assets that help a company to keep all its records digitally. therefore all the security in which a company must invest this.

As a consultant, I see that you handle the subject very well, and I know that you know that accounting art is closely linked to absolutely everything.

Companies only see and look for ways to maximize their income, and it is only in accounting that they can measure it.

 5 years ago 

You certainly leave me with things to think about. In the current things that are discussed, certainly the issue of security and management is not such an exciting topic for many people, but personally I consider it fundamental and I find it very and dangerous not to take it into account.

In fact one of the things that I found troubling was when I was reviewing information about the development of autonomous or human-driverless cars thanks to an AI and the study authors noted that they had found a serious vulnerability in security, a flaw of the type that could Allowing a moderately competent hacker to take control of the car ... I can only say that it gave me a chill to think what a malicious hacker could do, the range of options is varied and none of the options is good for passengers, from kidnapping of people to request a ransom until the homicide or generate a traffic accident for simple and perverse unhealthy and sickly fun.