Security Program Spring Cleaning - Part 3 of 3

Security Program Spring Cleaning - Part 3 of 3

Now we’ve dusted the bunnies under the furniture, steam cleaned the carpets, and nearly fell asleep reviewing documentation and logs. This week — the Febreeze™ final touch to leave your network smelling fresh and ready for Summer.

Tidy Up Your Security Program
Variety may be the spice of life but it is variety or exceptions in your security program that lead to breaches. Vendors with Windows XP systems on your network? I’m looking at you. Let’s look at auditing controls and risk assessments for security practitioners.

What are the projects on your comprehensive security strategy roadmap? Do they address the gaps in your security program or increase your capabilities? Most mid-large organizations have an audit team responsible for their security risk program. As a technical security practitioner, I recommend self-auditing to evaluate, with your understanding of the environment, how you score your organization versus what the auditors focus on. Start by measuring your security controls against a security standards framework UCF/NIST/SANS/DISA etc. Are your security projects for the year filling the gaps or are narrowly focused in an area where you are already strong? Do your own audit before the audit team shows up and you’ll be more productive.

Do you know about ALL the end-points on you network? Are your vendors in compliance with your security policies? How often do they patch? How is your vendor risk management program going? Say what — you don’t have one? Tsk, tsk. The number of third party breaches due to deviations from your security program serve as warning signs. Don’t be the next Target, JPMorgan, HomeDepot, Sony, you name it! Make certain you have a thorough understanding of your partner’s security program and maintain a healthy liability cap (or no cap) with your vendors. Ensure you have the right to audit the partner and validate the controls mandated by your risk program. We have seen companies do everything right only to get breached through a third-party playing by a different set of rules.    

To-Do To-day

  • Measure your security controls against a security standards framework UCF/NIST/SANS/DISA etc.
  • Review your security roadmap to make sure your program is focused on closing the gaps
  • Identify deviations from configuration standards
  • Assess vendor hosts on your network. 

As we wrap up all the spring cleaning it’s time to take a little down time and enjoy the beach (the letter 'r' in beach intentionally omitted). Don’t stay way too long; attackers thrive on complacency. 

Steven Andrés, PhD

Information Security Leader & Professor of Cyberwarfare

10y

"Vacuum" tubes? I see what you did there.

To view or add a comment, sign in

More articles by Josh Lemos

  • Given Enough AIs, All Bugs Are Shallow

    We're in the best era ever for finding security vulnerabilities quickly and at scale. Linus' Law, Eric Raymond's famous…

    9 Comments
  • Agents of Order - Agentic Defense

    The AI landscape continues to transform at a blistering pace. Over the past year, I often hypothesized the asymmetric…

    14 Comments
  • AuthZ Agent of Chaos: MCP

    There’s a lot of excitement around agentic AI open protocols such as Model Context Protocol (MCP) and Agent2Agent…

    5 Comments
  • AuthZ Agents of Chaos

    The emergence of agentic AI represents a significant inflection point in computing that requires strategic…

    8 Comments
  • Authorization - The Forgotten Second A

    It seems that everyone in InfoSec is focused on solving three problems: identity, identity, and identity. Its the Who…

    3 Comments
  • Death of Traditional Penetration Testing

    Yes, another $something is dead article. What I mean is the traditional one-size-fits-all cookie-cutter engagement of…

    20 Comments
  • Honeypots - Bringing Stealthy Back

    Deception and passive monitoring have a long history What is new is old: Cuckoo's Egg 2.0 (if you don't know what I'm…

    3 Comments
  • Security Experts Versus the Layperson

    If you are like most technology professionals family and friends come to you for advice on anything tangentially…

    2 Comments
  • Security Program Spring Cleaning - Part 2 of 3

    Last week I kicked off a series of “Spring Cleaning” security tips to freshen up those dusty networks; we moved the…

  • Security Program Spring Cleaning - Part 1 of 3

    The weather is warming and as we reach mid-Spring in North America, it is time when one must ask - is my security…

    3 Comments

Others also viewed

Explore content categories