After medical science, if any professional stream has the most number of acronyms, Cybersecurity would be it. Every acronym represents a concept, framework, or tool with substantial overlapping features with others. It is not always easy to find how these different solutions interact with each other.
While I may not know about all, let's contextualize a few of the most prominent ones which often find a
place on CISO’s agenda.
If we could visualize all of them in a single frame, the picture may look something like this.
Now, let's look at the different parts of this picture in brief.Security of End Point
Endpoints are essentially devices
used to access applications and services. It may include laptops, desktops
computers, smartphones, tablets, IoT devices, and edge servers among many
others. Endpoint security focuses on securing these devices, along with cloud or on-prem resources, when they are
connecting to the network and accessing or storing the data.
Endpoint detection and response (EDR)
is an evolution of EPP in the sense that it can also identify unknown
sophisticated cyber threats.
XDR (also referred to as X-EDR) bridges the gaps left
by EDR. It extends endpoint detection and response capabilities to networks,
cloud services, and the entire threat surface. It is also called X-EDR.
As X-EDR is mostly machine surveillance, it may generate a lot of noise – duplicate alerts and false negatives. MDR brings human experts and AI to take care of that experience.
MDR (also referred to as M-XDR) is managed service provided by a third-party security provider who delivers the XDR solution reducing the workload of enterprise security professionals. MDR is especially relevant when the organization doesn't have the skills or adequate bandwidth to provide holistic security coverage to its technology ecosystem.If you considering applying an XDR/MDR solution, your consideration set may start with these:
Security of SaaS SSE and SASE – When Gartner coined these two terms in 2021, frankly, it took me a while to figure out what exactly Gartner is trying to cover that is not already covered in existing security frameworks.
While SSE facilitates
secured access to websites, SaaS applications, and custom-developed
applications hosted on the cloud-hosted cloud, SASE (security access service
edge) extends the security to the wide area network (WAN) when the cloud
resources are not only accessed from the public internet but also private
on-premise networks.
Run-time security components (Enterprise Architect / CTO organization)
DDoS (distributed denial of service attack) is one of the most prominent patterns of security attacks. Most of the Content Delivery Network (CDN) service providers and hyperscalars provide a basic level of DDoS protection complimentary as part of their services. Load Balancers also play an important role in blocking DDoS attacks.
Once a user request passes through Edge or CDN Network, WAF (Web-application Firewall) provides a second line of defense. It is generally attached to CDNs and external Load-balancers. WAF provides critical protection mainly by creating a baseline of access parameters like URLs, cookies, and sessions; blocking external attacks defined by OWASP such as SQL injection, Cross-site scripting, etc.
Often, a Network Firewall is also placed before WAF to ensure Layer-4 attacks are prevented before the WAF gets into action to prevent layer-7 attacks. In fact, solutions like Next-gen firewalls (NGFW) combine the capabilities of WAFs and network firewalls into one, providing extra context to organizational security policies.
NACL (network access control list) and Security groups are software-defined security features that secure Subnet and Virtual machines. Cloud providers may have differently named components and ways to configure this layer. For example. while AWS has NACL and Security Groups as separate configurable resources, Azure has the capability of Network Security groups (NSG). Google Cloud facilitates global network protection using the software-defined firewall as a service.
IDPS (IDS / IPS) aims at detecting all intrusions or attacks as they occur and preventing them. It is a gatekeeper that analyzes inbound and outbound network traffic for signs of known attackers. It sits in the perimeter before Firewall and can catch packets missed by a firewall. They can be Virtual Machine-based, Host-based, Network-based, and Wireless, and they can also do Network Behavior Analysis.
If you have already implemented an IDPS solution, it's highly probable that it would be one of these:
IAM or Identity access management is the foundation of the IT security landscape. Driving the Least Privilege philosophy and codified policies, IAM has its impression on all cyber security frameworks including Security Service Edge (SSE).
While, within IAM, RBAC (Role-based access control) is the most popular framework, ABAC (Attribute-based access control) augments the security layer by providing a dynamic way to grant access based on specific attributes of the requester.
Following the Shift-left approach to IT security, secured code review (SCR), static application security testing (SAST), and dynamic application security testing (DAST) jointly provide the first line of defense for your custom applications. If every line of code released to production has gone through this first line of defense, it will substantially reduce the security threat to the organizations.
Security Operations (CISO’s organization)
Once the IT infrastructure and applications are up and running in production, the next step to is keep it secured through robust security operations, Although, planning for security operations starts from the time a new technologies component is being designed and developed, the real work starts when these newly developed components go to production. Solutions like SIEM, SOAR, and platforms like TIP play a role in keeping the business technology landscape secure.
SIEM solutions are designed to ingest all the logs and telemetry data (users, application, network, and other tech assets) in storage, and analyze them using event correlation and analytics to uncover a potential security incident. It can integrate with other security solutions to get data and share the events. It is mainly an alert generation solution
TIPs aggregate security
intelligence feeds (threats and suspicious activities) from vendors, analysts,
and other sources across the globe. This data includes malicious IP addresses,
domains, file hashes, etc.
TIPs drive actionable
intelligence from this data and feed them into other security solutions such as
EDR, SIEM, IDPS, and firewalls.
SOC or Security Operations Centre – a centralized function within an organization to monitor, prevent, detect, investigate, and respond to cyber threats to protect the organization’s technology and data assets such as IPs (intellectual properties), data, systems, and applications.
If you have made up your mind to implement SIEM/SOAR solution, you may start from this list for evaluation:
Most of the time, organizations either don't have enough bandwidth, or skillset to set up a Security operations center (SOC). In those situations, a managed security service provider (including a system integrator) may help set up and operationalize SOC.
Also, as it could be overwhelming for any organization to evaluate every solution listed here, they must ask their SI partner to provide the best set of solutions aligned with business needs and the existing tech landscape.
I hope this article helped in your understanding of the overall security landscape and how different solutions help provide a layer security framework to business-critical information and processes.