Automate to collaborate: Automation holds the key to security governance and culture of collaboration

Information Technology Press Releases Thursday May 14, 2020 14:45
Bangkok--14 May--PC & Associates Consulting

Enterprise security is coming under intense scrutiny as cyberattacks and breaches become more prevalent. Massimo Ferrari, Consulting Product Manager, responsible for Red Hat’s Ansible Security Automation initiative, discusses how automation can help to unify security operations and open a dialogue with IT and other business stakeholders.

A typical FTSE 100 or Fortune 500 company has a vast and complex set of cyber security defenses in place; managed by multiple security operations teams spread across different business units and different geographies. A great deal of effort is put into securing an enterprise organisation. Yet, despite the high level of diligence and preparation, security teams still lack a common framework and a common language that they can use to share designs, processes and ideas.

This can be achieved by introducing automated workflows and processes based on a universal programmable language. However, the language must be accessible to all. It must be easy to understand and easy to write; so that information can be documented and shared amongst security professionals with different domain expertise.

It should also support a completely unbiased approach, rather than a closed, proprietary system. This would upset the delicate balance of the complex security ecosystems already in place in large organisations. Finally, the system needs to be modular by design so that it can accommodate the vast, and growing, number of cybersecurity tools that large enterprises amass over time.

IT and network operations teams have been using automated systems for some time. This is encouraging a culture of collaboration between different IT stakeholders. However, it’s an ongoing process and IT teams are always looking for the right combination of tools to support a comprehensive automation programme. With security becoming more tightly integrated with the IT department, security operations teams, operating on different protocols, now have an opportunity to embrace automation.

In recent years we’ve seen the posts of CIO and CTO elevated to boardroom level, with senior figures in IT now influencing corporate strategy. Due to a heightened awareness of cyber security, it won’t be long before the board looks to CSO and CISO executives for strategic direction. If security executives are having conversations at the highest level of an organisation, why shouldn’t security teams be having conversations across the entire business? With the right elements in place (universal language, unbiased system and a modular design) it’s possible to support a set of automated workflows and processes that will unify security operations.

However, security isn’t just a single entity, it’s made up of different elements such as endpoint, network and data security. Managing a sprawling mass of people, processes and applications can be daunting prospect without having automated workloads in place.

Security automation offers an elegant solution to all of this by uniting the different security practices together using a set of automated workflows. This breaks down barriers and allows security professionals to provide colleagues with access to systems and applications. Security professionals can communicate with each other via automated scripts that contain explicit instructions on how to address specific tasks. A system owner can provide as much access as is required to support wider enterprise security initiatives, safe in the knowledge that their systems won’t be compromised or their authority undermined. However, without a common language in place, teams are faced with impenetrable code and terminology that only a developer can understand.

Consequently, security operations managers have greater visibility across the entire security function, while the teams themselves can interact, learn more about each other’s responsibilities, develop better relationships and share accountability. However, any reluctance in the past to share accountability was born out of security being a very siloed practice rather than a lack of trust.

There are several different frameworks organisations can choose from, but it would be more conducive if the automated system was based on open standards. The system would then be unbiased by virtue of its design. This enables security operations to develop structured workflows that can be integrated into existing SOAR platforms and SIEM applications, helping to bolster capabilities.

An effective and open security automation framework connects disparate systems from across the enterprise through automated workflows. Meaning that security professionals can design and build code that can be executed to drive new processes and reduce human error. Subsequently, security operations teams can perform a series of actions across different products and solutions much faster.

Automation enables security operations to foster a spirit of openness and collaboration. However, real change is also dependent on the human factor and the ability of once disparate teams to get around a table to discuss how they can work together to achieve common goals.


Latest Press Release

VST ECS (Thailand) recognized as the winner of Thailand 2020 Microsoft Partner of the Year

VST ECS (Thailand) today announced it has won Thailand 2020 Microsoft Partner of the Year Award. The company was honored among a global field of top Microsoft partners for demonstrating excellence in innovation and implementation of customer solutions...

App Annie Ascend Unlocks Mobile Advertising and Monetization

App Annie, the leading mobile data and analytics company, today announced the availability of App Annie Ascend. This will introduce the first mobile performance suite that provides both app market data as well as advertising analytics. All of this is...

AIS joins forces with great allies "Green Phahonyothin" by raising the model network partners for the environment Create a challenge to save the world

AIS joins forces with great allies "Green Phahonyothin" by raising the model network partners for the environment Create a challenge to save the world by inviting a new generation of employees to build awareness to dispose of E-Waste correctly AIS...

Fujitsu Drives Data-driven Transformation as a Digital Business Enabler

Fujitsu is leveraging data as a foundation of digital transformation, enabling customers to extract new value and unlock exciting new business opportunities. As a digital business enabler, data must be explored, processed, protected and monetized....

Ivanti Wavelink Partners with Manhattan Associates to Support Windows to Android Migrations in Southeast Asia (SEA)

The Ivanti Rapid Platform will help validate multiple hardware platforms, providing the right solution for the right device Ivanti Wavelink announced its partnership with Manhattan Associates, in support of Windows to Android migrations. Using Ivanti(R)...

Related Topics