In an article created by Fortune.com, Steve Schmidt (Amazon CISO) outlines the 6 questions that any board should be asking their CISO. We highly recommend having a read, as it is a great insight into the demands that are and should be made of IT leadership.
When we read Steves interview, we were delighted that the ditno network security solution would help any CISO and their security team not just answer, but proactively evidence, that these questions are being managed effectively. Even better, most of these questions can start to be answered after our initial Health Check has been undertaken – here's how:
Your board will ask: Who owns security?
The initial phase of our health check is focused on framing risk. Framing risk within the context of NIST (National Institute of Standards and Technology) guidelines is crucial for effective network security management. NIST provides a comprehensive framework for managing information security risks, and it emphasises the importance of understanding and addressing risks systematically. We work with you to identify the risk executive and agree on the framework and network security model together to bring all elements of your organisation together in one view and improve the overall risk posture of your business.
Your board will ask: What kind of visibility do we have over our property?
Our health check is a crucial process for gaining a comprehensive understanding of the connected devices within your network and therefore improves your network visibility. Comprehending network connectivity and the ports and protocols used within and across applications is fundamental for maintaining network security, optimizing performance, troubleshooting issues, and ensuring compliance. It empowers organisations to make informed decisions about resource allocation and risk management, ultimately contributing to the overall effectiveness and security of their network infrastructure. By conducting a network discovery exercise, organisations can enhance their network's security, optimise performance, and ensure compliance with network policies, as they gain a comprehensive view of their network's architecture, which is vital for making informed decisions and managing network resources effectively.
Your board will ask: Who has access to what data? Why do they need it and for how long?
It’s simple, if something doesn't need to connect to something else, don’t let it. Restricting network access to essential resources reduces risk by providing controlled and monitored pathways for data interaction, allowing for granular access control and enhanced data integrity. This principle aligns with best security practices, ensuring that users and external parties are only granted direct access when absolutely necessary, thereby minimising potential vulnerabilities and safeguarding sensitive information.
Your board will ask: How do we rank our assets, such as client data or trade secrets, by importance?
During the health check process, we classify each application and digital asset with a CIA (NIST definition: Confidentiality, Integrity, Availability) rating and trust rating. This provides a structured approach to managing and securing applications within an organisation. This practice enables organisations to prioritise security measures, allocate resources efficiently, comply with regulations, and make informed decisions regarding the trustworthiness of applications and their sources. Ultimately, it contributes to a more robust and tailored approach to network security.
Your board will ask: How many layers of protection do we have?
The statement, "if you can't connect to it, you can't hack it," underscores the fundamental principle that network security is the first line of defence against cyber threats. In a comprehensive multilayered security strategy, network security takes centre stage, acting as the crucial defence that effectively curtails lateral movement and minimises the attack surface, thereby mitigating potential vulnerabilities and threats. While aiming for a multilayered approach having a strong network security foundation ensures that threats will be contained.
Your board will ask: How will we respond to an attack?
An organisation that comprehensively understands every network connection, categorises applications by criticality through CIA and trust ratings, is better equipped to respond to an attack by swiftly identifying high-priority targets, containing breaches, and deploying resources efficiently. In contrast, an organisation unaware of its digital footprint, operating in an open network, and oblivious to application criticality is likely to face significant challenges in promptly recognizing and mitigating threats, potentially leading to prolonged and more damaging security incidents.
So what now?
Learn more about our Health Check and get yours started today!