A COMPUTER WEEKLY BUYER'S GUIDE TO THREAT MANAGEMENT - BITPIPE

Page created by Danielle Oconnor
 
CONTINUE READING
A COMPUTER WEEKLY BUYER'S GUIDE TO THREAT MANAGEMENT - BITPIPE
Home
Home
                                             A Computer Weekly buyer’s
Making unified
                                            guide to threat management
threat management
a key security tool
How unified threat
management can be
a useful tool when
chosen correctly
according to
business needs

Layer your approach
to web security
Combining unified
threat management
with other security
systems is essential
to tackle threats

Choosing cloud-
based security
services
Cloud-based security
helps reduce costs for
firms with a growing
cloud footprint

                           Threat management has become a vital component in the cyber security strategy of many businesses. In this
                         19-page buyer’s guide, Computer Weekly looks at why threat management should be tailored to your company’s
                          needs, the strength in combining it with other security systems and how cloud-based security can reduce costs

                                                                                                                                                             ALEX/ADOBE
                                                                                                                      computerweekly.com buyer’s guide   1
A COMPUTER WEEKLY BUYER'S GUIDE TO THREAT MANAGEMENT - BITPIPE
BUYER’S GUIDE TO THREAT MANAGEMENT

                 Making unified
          threat management a
            key security tool
                                                                                         T          he 2018 Cyber Security Breaches Survey from the
                                                                                                    Department for Digital, Culture, Media and Sport
                                                                                                    (DCMS) found that 43% of the 1,519 UK businesses
                                                                                                    that participated admitted they had experienced a
                                                                                         cyber attack or security breach.
                                                                                           Fines for major data breaches may be among the main reasons
                                                                                         the industry is pushing unified threat management (UTM), says
                                                                                         Peter Wenham, a member of the BCS security community of
  As data protection becomes critical to businesses, Warwick Ashford                     expertise. The General Data Protection Regulation (GDPR) has
looks at how unified threat management can be a useful tool, providing                   driven many chief information security officers (CISOs) to reas-
   it is selected and deployed correctly according to business needs                     sess their security posture. The new data regulation, which came
                                                                                         into force in May 2018, means organisations face fines of up to
                                                                                         4% of global turnover. According to Wenham, UTM systems can
                                                                                         help reduce the threats that could lead to a breach.

                                                                                         Benefits of UTM
                                                                                         Emma Bickerstaffe, senior research analyst at the Information
                                                                                         Security Forum (ISF), says UTM systems were designed primar-
                                                                                         ily for small to medium-sized enterprises (SMEs), but suppli-
                                                                                         ers are increasingly promoting UTM as a viable and beneficial
                                                                                         option for large enterprises.
                                                                                            The advantage of implementing a UTM appliance is that there
                                                                                         is a single interface from which to both manage UTM appliance
                                                                                         functionality and to monitor network events in a consolidated
                                                                                         view. Other UTM appliance functions can include prioritising
                                                                                         events and the alerting of significant events via video screens, SMS
                                                                         FEODORA/ADOBE

                                                                                         text messages and email, in addition to comprehensive reporting
                                                                                         capabilities. Some products also offer artificial intelligence (AI) to

  HOME

                                                                                                                                      computerweekly.com buyer’s guide   2
A COMPUTER WEEKLY BUYER'S GUIDE TO THREAT MANAGEMENT - BITPIPE
BUYER’S GUIDE
Home

Making unified
threat management
                         aid diagnosis of security-related events, while most offer tools to      UTM tool that can be used to protect the organisation. “By inter-
a key security tool      aid investigations, says Wenham.                                         cepting web requests at the point of initiation and using pre-
How unified threat          The centralised management control is often the clincher, with        defined and frequently updated whitelists and blocklists of sites,
management can be
a useful tool when       administrators gravitating to this with the intention of being           an organisation can screen out and mitigate the threat posed by
chosen correctly         able to deploy policies uniformly by using a single console, says        a significant proportion of phishing attacks, malware-infected
according to
business needs
                         RV Raghu, director of information security professional asso-            emails and links, scams and other threats that could compro-
                         ciation Isaca. “But before getting carried away, it is imperative        mise user and data security,” she says.
Layer your approach
                         that enterprises understand that                                                                          According to De Leeuw, a UTM-
                         deploying a UTM tool requires that                                                                      based approach to centralised anti-
                                                                   “E
to web security
Combining unified        administrators have a deep under-              nterprises need to understand                            spam and antivirus provides a man-
threat management
with other security
systems is essential
                         standing of how the tool will inter-
                         face with the existing infrastructure
                                                                        that    deploying        a   UTM        tool
                                                                                                                                 ageable and difficult-to-circumvent
                                                                                                                                 layer of data and file protection.
to tackle threats
                         landscape,” he says.                         requires that administrators                               She says it reduces the risk of data
                            The other aspect which plagues                                                                       being compromised by malware
Choosing cloud-
based security
                         all implementations of UTM, says             have    a   deep     understanding             of          corruption or ransomware hijacking,
services                 Raghu, is the fall in performance,                                                                      machines being disrupted by mal-
Cloud-based security     which can be experienced when              how    the    tool     will  interface         with          ware infection, and also communi-
                                                                                                                     ”
helps reduce costs for
firms with a growing
                         several services are turned on, with          the existing infrastructure                               cations platforms being overrun by
cloud footprint          some users indicating a steep fall in                                                                   irrelevant and unwanted junk mail.
                         performance. “While this may seem                           RV   R aghu,  Isaca                           “A centralised approach can coun-
                         like a deal-breaker, it also points to                                                                  ter any local client preferences or
                         the need for proper planning and design prior to implementing            lapses in judgement and best practice. Thus, it can restore the
                         the solution, as well as close interaction between the enterprise        messaging signal-to-noise ratio to a level where email is a net ben-
                         and its implementation partner,” he says.                                efit to the organisation, rather than having inordinate amounts of
                            For Mary-Jo de Leeuw, director of cyber security advocacy for         storage space and user time wasted on junk mail, scams, threats
                         Europe, the Middle East and Africa (EMEA) at non-profit mem-             and other security challenges,” says De Leeuw.
                         bership association for certified cyber security professionals              To optimise the potential of a UTM system, Bickerstaffe recom-
                         (ISC) , web filtering is arguably the most powerful client-facing
                                2
                                                                                                  mends that an organisation determines which of its functions to

                                                                                                                                              computerweekly.com buyer’s guide   3
A COMPUTER WEEKLY BUYER'S GUIDE TO THREAT MANAGEMENT - BITPIPE
BUYER’S GUIDE
Home

Making unified
threat management
                         enable with reference to the threats faced by the business and        What are you protecting?
a key security tool      whether the respective functions offered by the UTM system            Mike Gillespie, vice-president of the C3i Centre for Strategic
How unified threat       meet security and business requirements.                              Cyberspace and Security Science (CSCSS), says using UTM
management can be
a useful tool when         “Consideration should be given to the capacity of the UTM sup-      means managing your own expectations. “It is vital before buy-
chosen correctly         plier to add new functions and improve the functionality of exist-    ing any security system to first establish what you are protect-
according to
business needs
                         ing ones as threats evolve,” she says.                                ing, why, and from what you are protecting it. Seems basic, but
                           The performance of the UTM platform should also be tested           you would be amazed at the thought that sometimes fails to go
Layer your approach
                         prior to adoption to ensure it has the capacity to handle the loads   into this part of a specification. For it to be the right tool for the
to web security          that existing and new features can generate.                          job, you need to know what the job is,” he says.
Combining unified
threat management
with other security

                                                                                                                                                                          FEODORA/ADOBE
systems is essential
to tackle threats

Choosing cloud-
based security
services
Cloud-based security
helps reduce costs for
firms with a growing
cloud footprint

                                                                                                                                            computerweekly.com buyer’s guide       4
A COMPUTER WEEKLY BUYER'S GUIDE TO THREAT MANAGEMENT - BITPIPE
BUYER’S GUIDE
Home

Making unified
threat management
                            In addition, BCS’s Wenham says there needs to be an under-             approach would be the implementation of a UTM appliance offer-
a key security tool      standing of whether an infrastructure is to be completely rede-           ing not just firewall, IDS [intrusion detection system] and IPS
How unified threat       signed and rebuilt, or it is greenfield build, or whether it is a case    [intrusion detection system] functions, but also content filtering
management can be
a useful tool when       of selectively updating an existing infrastructure.                       and email spam and message handling, data loss prevention, VPN
chosen correctly            “While the basics are the same in each case, such as the need          [virtual private network] and endpoint control,” he adds.
according to
business needs
                         for an effective set of IT and information security management              But implementing a UTM appliance with many functions may
                         processes and controls to be in place, there will be trade-offs           require a partial redesign of an organisation’s infrastructure.
Layer your approach
                         and compromises between these
to web security          approaches,” he says.                                                                                     Security failure
Combining unified
threat management
                            For a complete network rede-               A     complete network redesign                             With a UTM, there is a single point
with other security      sign of an existing infrastructure,                                                                       of failure in the corporate IT security
systems is essential     Wenham says there is greater scope              would       offer      greater     scope      in          systems, warns CSCSS’s Gillespie.
to tackle threats
                         in UTM tool selection, from on-site
                         UTM network appliances to out-
                                                                     UTM        tool selection and should                          “While you may have combined
                                                                                                                                   several functions into one platform
Choosing cloud-
based security
                         sourced cloud-based services, or a           lead to an optimal solution but                ,             (and supplier/manufacturer), you
services                 combination of approaches. He says                                                                        are relying on all of those func-
Cloud-based security     such a redesign should lead to an             it  would       cause     major    disruption               tions being carried out as efficiently,
helps reduce costs for
                         optimal solution for an organisation,                                                                     accurately and comprehensively
firms with a growing                                                         while being implemented
cloud footprint          but would typically cause major dis-                                                                      as a single function offering could
                         ruption while being implemented.                                                                          do, and to the same standard.
                            Updating existing infrastructure involves replacing existing           Therefore, it is as strong as its weakest component,” he says.
                         infrastructure devices with a UTM appliance that offers greater             Gillespie urges organisations that plan to deploy UTM to
                         capability and either a single unified management interface or            establish a security architecture based around the security prin-
                         implements a software-based central management system offer-              ciple of defence in depth by using technology from a variety of
                         ing UTM capabilities.                                                     suppliers and manufacturers.
                            Wenham says a basic approach to UTM could be to replace a                UTM is not a panacea. People are needed to configure the UTM
                         firewall with a UTM appliance offering a firewall with intrusion          systems, he says, so there is a risk of human error. “The ICO
                         detection and intrusion prevention. “A more comprehensive UTM             [Information Commissioner’s Office] tells us that misconfigured

                                                                                                                                                 computerweekly.com buyer’s guide   5
A COMPUTER WEEKLY BUYER'S GUIDE TO THREAT MANAGEMENT - BITPIPE
BUYER’S GUIDE
Home

Making unified
threat management
                         software or hardware is one of the top causes of data breach            with insight. You need to make sure you have your people and
a key security tool      in the UK,” adds Gillespie. People are going to run, manage and         plans ready to make the most of that insight.
How unified threat       patch the UTM itself.                                                     Like all security technologies, UTM is constantly evolving. In
management can be
a useful tool when         As an antidote to UTMs becoming a single point of failure, Isaca’s    the age of GDPR and similar legislation around the world, where
chosen correctly         Raghu says enterprises are encouraged to implement paired               businesses are under increasing pressure to disclose breaches,
according to
business needs
                         devices, ensuring high availability. “It is imperative to understand    the ability to forensically report on attacks will be key, says
                         that a UTM by itself is only one part of the puzzle and needs to        Simon McCalla, chief technology officer at Nominet. “Knowing
Layer your approach
                         be part of an overall security strategy, especially considering that    what data was stolen, and where it went, will need to be a key
to web security          a host of new technologies that are                                                                    offering for all cyber security sup-
Combining unified        being adopted by enterprises bring                                                                     pliers,” he adds.
threat management
with other security
systems is essential
                         their own challenges,” he says.
                                                                      “W      e need to manage our own                            UTM can be a useful tool to ena-
                                                                                                                                ble businesses of all sizes to bolster
to tackle threats
                         Manage expectations                            expectations of what a                 UTM              their data protection capabilities
                         So on its own, a unified threat man-                                                                   by providing a consolidated view of
Choosing cloud-
based security
                         agement system will not make a                  can    and     can   t ’
                                                                                                do  ,as  well      as           what is going on in the network, but
services
Cloud-based security
                         business compliant with legislation
                         like GDPR. Nor can it train staff.
                                                                     knowing         what     we  need     it to    do   ”      UTMs alone cannot solve all chal-
                                                                                                                                lenges relating to data protection.
helps reduce costs for
firms with a growing
                            “We need to manage our own                             Mike Gillespie, CSCSS                          Unified threat management tools
cloud footprint          expectations of what a UTM can                                                                         must be carefully selected and
                         and can’t do, as well as knowing                                                                       tuned to meet the data protection
                         what we need it to do,” says Gillespie. “There is no point replac-      needs of the particular business, staff must have the skills to inter-
                         ing a number of unnecessary security solutions from a range of          pret what the UTM system tells them, and care must be taken to
                         suppliers with a number of unnecessary security solutions from          ensure that a UTM does not represent a single point of failure by
                         a single supplier.”                                                     incorporating it in a robust, multilayered security architecture.
                            You need to make sure you have the skills, plan and team in place      “An analysis of the pros and cons in the context of your organi-
                         and that you are able to act on intelligence that systems like these    sation must be conducted before implementation and on an
                         generate. Again, this is part of managing your own expectation of       ongoing basis to ensure that the UTM continues to meet your
                         what it can achieve and knowing that it can and will provide you        requirements,” says Raghu. n

                                                                                                                                               computerweekly.com buyer’s guide   6
A COMPUTER WEEKLY BUYER'S GUIDE TO THREAT MANAGEMENT - BITPIPE
BUYER’S GUIDE TO THREAT MANAGEMENT

                       Layer your approach
                             to web security                                 T           he World Wide Web (WWW) is celebrating its 30th
                                                                                         birthday. Among the many benefits it has given soci-
                                                                                         ety, the web has also become the perfect vehicle to
                                                                                         trick unsuspecting users into visiting rogue websites
                                                                             containing malware.
                                                                               Bridget Kenyon, global chief information security officer (CISO)
                                                                             at Thales, says search engines such as Google and Microsoft
                                                                             Bing have worked hard to remove malicious search results, but
                                                                             while web browsers are filtering out most of the bad sites, it is
                                                                             difficult to prevent the worst attacks. “Spear phishing is a lot
                                                                             harder to recognise,” she adds.
                                                                               The web has made it possible for users to jump easily between
                                                                             different servers across the internet, without even being aware
                                                                             that it is how web pages are rendered on their browsers.
                                                                               For security professionals, ensuring users don’t acti-
                                                                             vate malware that could attack the corporate network is
                                                                             an uphill battle, often involving multiple security systems,
                                                                             with each requiring administration. Unified threat man-
                                                                             agement (UTM) is an attempt by the industry to simplify
                                                                             security management.
                                                                               Traditionally, UTM has focused on preventing and detecting
                                                                             cyber attacks. Ideally, security incidents and breaches should be
                                                                             prevented, says Maxine Holt, research director at Ovum.
                                                                               However, organisations recognise that not everything can be
                   Combining unified threat management with other security   prevented, so Holt says it is essential that the potential for a
                      systems and a strategic CISO is essential to defend    security breach is detected while an attacker is in the network,
ALEX/ADOBE

                              against threats, writes Cliff Saran            before the breach happens.

               HOME

                                                                                                                       computerweekly.com buyer’s guide   7
BUYER’S GUIDE
Home

Making unified
threat management
                           “As we have seen with enterprise approaches                                                     McCalla urges CISOs to be wary of marketing
a key security tool      to security across all sectors and in organisa-               ❯Implementing UTM will            hype. He says one major cyber security player
How unified threat       tions of all sizes, there is increased focus on the          help  maintain good  security      was recently criticised for the inefficient alerts it
management can be                                                                   and so help prevent breaches –
a useful tool when       third objective of technology security controls –             but it must be maintained
                                                                                                                         was giving the teams that used it. The technol-
chosen correctly         responding to an attack,” she says.                               to work effectively.          ogy was essentially accused of crying wolf, mean-
according to
business needs
                            More of these types of technology capabilities                                               ing that security professionals ignored alerts, or
                         will be deployed as part of UTM. Data loss pro-                                                 turned them off all together. “This doesn’t mean
Layer your approach
                         tection (DLP) is generally included, but may be                                                 that the system wasn’t also flagging legitimate
to web security          joined by data breach reporting capabilities to comply with the                 threats, but they were likely lost in the maelstrom,” he adds.
Combining unified        EU’s General Data Protection Regulation (GDPR), for example.                       According to McCalla, one of the key areas which is often
threat management
with other security                                                                                      underlooked is domain name system (DNS) security, which
systems is essential     Multiple layers of security                                                     offers a layer of protection that sits at the very gateway to your
to tackle threats
                         For Holt, the benefits of UTM, led by the reduction of complexity               network. DNS is usually a reliable attack vector, as firewalls
                         in the security environment for small and medium-sized enter-                   often allow traffic through this way.
Choosing cloud-          prises (SMEs), mean that UTM will be around for years to come.                     However, as McCalla points out, what is weak in the event
based security
services                   However, Simon McCalla, chief technology officer (CTO) at                     of an attack can be made strong in defence – if every packet of
Cloud-based security     Nominet, says: “Having one system in place means there’s only                   data leaves or enters via the DNS, it can be used as a strong
helps reduce costs for
firms with a growing
                         one system to go wrong. A lack of redundancy systems means                      first line of defence.
cloud footprint          that if the worst were to happen, there’s nobody on the subs’                      “At the moment, UTM systems don’t pay much attention to
                         bench ready to come on and change the game. If the UTM sys-                     the DNS,” he says. “CISOs would be wise to consider a layered
                         tem fails, the criminals can essentially walk right in.”                        approach to cyber security, with bespoke tools for each poten-
                           Given that the profile of cyber criminals is changing and attack              tial attack vector. Or, if a UTM system is the preferred method
                         vectors continually change, McCalla warns: “With a UTM sys-                     of protection, a backup system that sits at a DNS level should
                         tem, you’re reliant on the threat intelligence provider to be as                be considered.”
                         quick as the criminals. If it’s not up to date, a business’s whole                 The other thing CISOs need to consider is what type of busi-
                         security posture is weakened, instead of just one element. This                 ness they are in, and where it might be vulnerable. For example,
                         leaves multiple attack vectors open to criminals, and makes the                 a manufacturing or industrial business will be vulnerable in dif-
                         business more vulnerable.”                                                      ferent areas to a bank.

                                                                                                                                                    computerweekly.com buyer’s guide   8
BUYER’S GUIDE
Home

Making unified
threat management
                           One thing that is clear, however, is that as businesses continue   with malware – this happened to a casino when its connected
a key security tool      to transform digitally, connecting more devices online, maintain-    fish tank was hacked. To that end, CISOs should consider their
How unified threat       ing a secure network environment becomes harder. Due to the          spend. UTM systems may give them protection in areas they
management can be
a useful tool when       interconnected nature of today’s businesses, a UTM tool likely       don’t need, while leaving them vulnerable in others.
chosen correctly         wouldn’t cover all bases anyway.
according to
business needs
                           Firewalls and anti-spam software are effective at catch-           UTM is not a silver bullet
                         ing phishing emails aimed at employees, but they may not             Simon Persin, director of Turnkey Consulting, warns that over-
Layer your approach
                         notice packets of data leaving a connected device infected           reliance on a UTM system must be avoided. “If alerts are
to web security
Combining unified
threat management
with other security
systems is essential
to tackle threats

Choosing cloud-                                                            Firewalls and anti-spam
based security
services                                                                  software are effective at
Cloud-based security
helps reduce costs for
firms with a growing                                                  catching phishing emails aimed
                                                                      at employees, but they may not
cloud footprint

                                                                      notice packets of data leaving
                                                                        a connected device infected
                                                                                    with malware

                                                                                                                                                                    ALEX/ADOBE
                                                                                                                                      computerweekly.com buyer’s guide      9
BUYER’S GUIDE
Home

Making unified
threat management
                         switched off – possibly as part of an attack, as this would be         Jirasek believes UTM, or any other technology for that mat-
a key security tool      a target – effectiveness is seriously compromised,” he says. “In     ter, is no good without well-executed processes. “Start with
How unified threat       other words, using UTM shouldn’t mean foregoing controls at          the critical controls implemented as processes, supported by
management can be
a useful tool when       other levels throughout the organisation.”                           trained people, good configuration and managed technolo-
chosen correctly           He adds that storage is another consideration. “UTM systems        gies,” he says. “It is only then that we stand a realistic chance
according to
business needs
                         rely on vast amounts of stored data to detect patterns over          to protect against data breaches.”
                         time as well as identify immediate threats. When implementing
Layer your approach
                         UTM, the team must understand the data requirements, avail-          What next for UTM?
to web security          ability of storage and potential impact on key applications prior    As threats continue to evolve, so too will UTM tools. In the age
Combining unified        to installing,” he says.                                             of GDPR and similar legislation worldwide, where businesses are
threat management
with other security        Vladimir Jirasek, managing director of specialised cyber secu-     under increasing pressure to disclose breaches, McCalla believes
systems is essential     rity consultancy and services company Jirasek Security, says:        that the ability to forensically report on attacks will be key.
to tackle threats
                         “Sometimes I get into discussions pertaining to the use of the       “Knowing what data was stolen and where it went will need to
                         latest technologies to thwart data                                                                   be a key offering for all cyber secu-
Choosing cloud-          breaches. In many cases, the debate                                                                  rity suppliers,” he adds.
based security
services                 quickly steers into suppliers, capa-          “C  yber security starts with                            Nominet’s McCalla expects
Cloud-based security     bilities and features. I try to get my      processes at the hygiene level                           UTM tools to become more
helps reduce costs for
                         point across: cyber security starts                                                                  expansive as they cover the ever-
                                                                   –
firms with a growing
cloud footprint          with processes at the hygiene level          once these are implemented to                           increasing attack vectors available
                         – once these are implemented                                                                         to criminals.
                         to a satisfactory level, add more               a satisfactory level add         ,                     “They will also look at offering
                         advanced processes.”
                           He believes cyber security pro-
                                                                       more advanced processes                   ”            protection at a deeper network
                                                                                                                              level to cope with the plethora
                         cesses are undervalued in the                   Vladimir Jirasek, Jirasek Security                   of devices now connected to the
                         portfolio of security programmes.                                                                    internet. Some sort of DNS protec-
                         “Companies put various technologies in place, in some cases          tion capability will be essential,” he says.
                         implementing these without a care for how they will be managed,        Ultimately, UTM systems – as with all types of threat pre-
                         monitored and integrated into the rest of processes,” he says.       vention – will always be in responsive mode, tracking the

                                                                                                                                           computerweekly.com buyer’s guide   10
BUYER’S GUIDE
Home

Making unified
threat management
                         latest threats and adapting accordingly. To that end, it will still        or security camera – requires an open connection to the inter-
a key security tool      require the guile of a strategic CISO to understand their own              net, this provides a network port through which hackers can
How unified threat       network, identify the weak points, and deploy tools accord-                target attacks.
management can be
a useful tool when       ingly. Whether that’s a UTM system, bespoke tools, or com-                   Understanding the health of the corporate network from
chosen correctly         bination of the two, nothing will beat the strategic outlook of a          a security standpoint – where are attacks being targeted or
according to
business needs
                         well-versed CISO.                                                          which exploits have broken through – is key to stopping or
                           The threat landscape has exploded as the web and services                limiting damage from any attacks. UTM may go some way
Layer your approach
                         built on web technologies gain in popularity. Given that every             to helping security admins manage the ever-changing threat
to web security          device – whether it is a corporate PC, a smartphone or an inter-           landscape by providing a single console to assess the overall
Combining unified        net of things (IoT) device such as an internet-connected TV                security posture of the corporate network. n
threat management
with other security
systems is essential
to tackle threats

                            Three network traffic patterns to watch out for and what to do about them
Choosing cloud-
based security
services                    1. Generic patterns, known within the industry and likely to affect many organisations: Tools to detect these can be delivered by the UTM
Cloud-based security           provider, and is potentially an area for the customer to consider when undertaking due diligence on the prospective supplier.
helps reduce costs for
firms with a growing
                            2. P atterns specific to individual organisations that are known about: This requires the UTM solution to be extendable so that custom
cloud footprint                 patterns can be defined to meet specific needs.
                            3. Patterns that are not yet known and therefore need to be defined: The UTM product could analyse the source data, for example, and
                                propose potentially undetected scenarios outside the previously known threats. This is where artificial intelligence may be most effec-
                                tively applied.
                            Once patterns have been identified, the right tools are needed in the operational world to generate a relevant response – such as an alert
                            or notification – direct to a nominated user, or the incident response system, should an anomaly occur. This should also include an aspect
                            of machine learning to assist where a potential violation has been repeatedly marked as an exception or false positive.

                                                                                                                  Source: Simon Persin, director of Turnkey Consulting

                                                                                                                                                 computerweekly.com buyer’s guide   11
BUYER’S GUIDE TO THREAT MANAGEMENT

                            Choosing cloud-based
                                  security services                                   I    n early 2018, Niall Merrigan, an Irish cyber security expert
                                                                                           living in Norway, chanced upon the personal data of tens of
                                                                                           thousands of mobile phone subscribers in Thailand using
                                                                                           a free tool that scans content stored on Amazon’s Simple
                                                                                      Cloud Storage Service (S3). The data, including image scans of
                                                                                      drivers’ licences belonging to customers of Thai telco service
                                                                                      True Move H, was stored in S3 buckets with allegedly no security
                                                                                      measures in place to protect it.
                                                                                        “Simply, if you found the URL, you could download all their cus-
                                                                                      tomers’ scanned details,” Merrigan wrote on his blog. “In all, over
                                                                                      32GB of data existed in this bucket, totalling 46,000 files, neatly
                                                                                      organised by year.”
                                                                                        True Corp, the company that operates the True Move H ser-
                                                                                      vice, defended its security measures after the breach, claim-
                                                                                      ing that it had a “good security system” and that the data was
                                                                                      hacked by Merrigan.
                                                                                        The True Move H incident, following other S3 data leaks that
                                                                                      hit organisations globally, underscores the importance of cyber
                                                                                      security when moving to the cloud.
                                                                                        “There are still a lot of misconceptions about the cloud and the
                                                                                      kind of security and protection that companies will get when they
                                                                                      store their data there,” says Aaron Bugal, global solutions engi-
                        Cloud-based security services can help organisations with a   neer at Sophos. “The most important thing to remember is that
CHAIWUTNNN/ADOBE

                                                                                      when companies put data in the cloud, it is imperative that they
                          growing cloud footprint to reduce costs and address the     understand how it is being protected, and do not assume that
                           manpower crunch in cyber security, writes Aaron Tan        security is being taken care of.”

                     HOME

                                                                                                                                computerweekly.com buyer’s guide   12
BUYER’S GUIDE
Home

Making unified
threat management
                           After a spate of S3 data leaks, Amazon rolled out another           at Symantec. “This is one of the key benefits that all organisa-
a key security tool      layer of protection in November 2018 to prevent accidental data       tions welcome – especially small and medium-sized enterprises
How unified threat       leakages. This includes tools to make sure administrators do          [SMEs] that tend to have limited resources.”
management can be
a useful tool when       not make data publicly accessible through a simple mistake or           The increased use of mobile devices and applications in line with
chosen correctly         misunderstanding.                                                     the bring-your-own-device (BYOD) trend has also contributed
according to
business needs
                           Although such tools are handy and should help enterprises to        to the growth in adoption of cloud-based security systems, says
                         avoid costly cloud security mistakes, they are often not enough.      Cunningham, noting that cloud-based security will give organisa-
Layer your approach
                           “More can still be done to ensure that data on the cloud is not     tions greater business agility while ensuring critical information
to web security          easily compromised,” says Bugal,                                                                      remains protected.
Combining unified        such as the need to understand the                                                                      Other benefits of cloud-based
threat management
with other security      type of data and whether or not                 C         -
                                                                            loud based security will                           services are the always-on avail-
systems is essential     that data should be in the cloud in                                                                   ability of such services to monitor
to tackle threats
                         the first place. Enterprises should            give    organisations         greater                  real-time threats, as well as simplic-
                         also understand the types of cloud                                                                    ity, with suppliers taking care of the
Choosing cloud-          models used by the provider, and
                                                                             business      agility    while                    heavy lifting without enterprises
based security
services                 ensure the proper layers of protec-          ensuring critical information                            needing to become cyber security
Cloud-based security     tion, such as firewalls or intrusion                                                                  experts. “Complexity is the enemy
helps reduce costs for
firms with a growing
                         prevention, are in place.                              remains protected                              of security,” says Sophos’s Bugal. “If
cloud footprint                                                                                                                technical controls demand a high
                         Enter cloud-based security                                                                            degree of knowledge to operate,
                         But faced with limited budgets and a dearth of cyber secu-            they will most likely negatively affect the overall security posture
                         rity talent, many enterprises can’t do it all alone. That’s where     of the business.”
                         cloud-based security – a growing market that Gartner expects            In fact, the benefits of adopting cloud-based security are not too
                         to be worth $9bn by 2020 – comes in.                                  different from those that drive enterprises to move to cloud-based
                           “Cloud-based solutions can help organisations save signifi-         infrastructure or, more generically, IT outsourcing, according to
                         cant costs by eliminating the need to power the hardware-based        the Cloud Security Alliance (CSA) APAC. “That would include
                         security equipment and physical space taken up by datacentres,”       greater business agility, data availability, collaboration, simplicity
                         says John Cunningham, APAC vice-president for cloud security          of updates and cost savings,” it says. “The scale stemming from

                                                                                                                                            computerweekly.com buyer’s guide   13
BUYER’S GUIDE
Home

Making unified
threat management
                         cloud service providers’ extensive and distributed infrastructure      of IDC’s IT security practice in Asia-Pacific.
a key security tool      also provides the economies of scale and performance that are            Enterprises should also consider their ability to manage these
How unified threat       beneficial in protecting enterprises against attacks such as dis-      offerings effectively, he says, because having a broad range of
management can be
a useful tool when       tributed denial of service [DDoS].”                                    supplier products inevitably leads to complexity and inefficiency –
chosen correctly           However, the CSA APAC notes that the adoption of cloud-              as well as the regulatory environment in which they are operating.
according to
business needs
                         based security is often a function of where an enterprise is                 Piff notes that some industries have more regulatory hur-
                         on the cloud adoption readiness scale. “Without the                                 dles than others, and with privacy a growing issue
Layer your approach
                         right organisational mindset, governance and                                             worldwide, enterprises should consider data
to web security          compliance, architecture, skilled manpower,                                                 management as part of their cloud-based
Combining unified        understanding of service level agreements                                                     security portfolio.
threat management
with other security      and the shared responsibility model, just
systems is essential     to name a few, an enterprise is essen-                                                                        Managed security services
to tackle threats
                         tially not yet ready to take on anything                                                            In some cases, managing a suite of
                         cloud-based,” it says.                                                                               cloud-based security services may not
Choosing cloud-            “Just like you cannot port an enter-                                                              be viable because of a lack of in-house
based security
services                 prise’s on-premise infrastructure to the cloud overnight, the          expertise and resources, or the need for customised cyber secu-
Cloud-based security     same applies, even more so, to security. Of course, if an enter-       rity programmes. A managed security service (MSS) could be
helps reduce costs for
firms with a growing
                         prise’s infrastructure is not fully cloud-based, there will be some    the answer, providing a range of services from different security

                                                                                                                     CHA
cloud footprint          areas of security that would still practically require some form of    suppliers that scale on demand, including threat detection and

                                                                                                                        IWU
                         on-premise and hybrid solutions.”                                      response, security testing, proactive threat hunting and digital

                                                                                                                           TN
                                                                                                                             N
                                                                                                forensic investigations.

                                                                                                                              N/A
                         Broad considerations

                                                                                                                                 DO
                                                                                                  “Some organisations, but very few, have the monetary and time

                                                                                                                                   B
                                                                                                                 E

                         Before settling on any cloud-based security service (see the           resources needed for building out and maintaining an infrastruc-
                         array of options on page 16), there are a number of broad con-         ture that will deliver the same level of security that MSS provides,”
                         siderations to bear in mind. First, enterprises need to evaluate       says Chris Schueler, senior vice-president of MSS at Singtel-
                         the pros and cons of each service delivery method and how it           owned Trustwave. “In most cases, it is simply not feasible.”
                         fits into the current security infrastructure – and, critically, the     Schueler notes that the talent gap, in particular, is driving some
                         future strategy of the business, says Simon Piff, vice-president       enterprises to consider MSS offerings that are typically delivered

                                                                                                                                                    computerweekly.com buyer’s guide   14
BUYER’S GUIDE
Home

Making unified
threat management
                         by a team of highly skilled security specialists operating out of         “Outsourcing all the knowledge and skills to a cloud vendor will
a key security tool      security operations centres around the globe. “Enterprises are          leave a skills gap should the need occur to bring offerings back
How unified threat       finding it necessary to fight fire with fire by eliciting the help of   on-premise,” says Piff. “Also keep an eye on the pricing, since it
management can be
a useful tool when       ethical hackers, threat hunters and digital forensic investigators      too is flexible.”
chosen correctly         who have deep insight into cyber criminals’ tactics and ways that         There is also the challenge of integrating cloud-based secu-
according to
business needs
                         they exploit vulnerabilities,” he says.                                 rity offerings with on-premise security systems. To that end,
                           “If an enterprise is lucky enough to obtain these specialists, they   Symantec’s Cunningham notes that many cloud-based security
Layer your approach
                         are finding it increasingly difficult to retain them because better     services offer enterprises the ability to integrate with common
to web security          offers and perks are always available. This puts the enterprise in a    on-premise security information and event management (Siem)
Combining unified        difficult situation because just one of these experts leaving to pur-   and service orchestration platforms.
threat management
with other security      sue another opportunity has the potential of crippling the entire         But what is really needed is a shared security model, says Bruce
systems is essential     security programme. The MSS model ensures expert support is             Olson, director for worldwide public cloud sales at Fortinet.
to tackle threats
                         available and can scale as needed.”                                     “A growing number of security vendors now offer cloud-
                           But IDC’s Piff warns that managed security services can               based solutions that mirror tools available for local networks.
Choosing cloud-
                         be more expensive, with incident response and data being                Standardising on a single set of solutions can reduce complex-
based security
services                 co-managed by a third party, and there could also be unique             ity and enable the establishment of a single, consistent security
Cloud-based security     challenges in data recovery.                                            postures,” he says. “Make sure that these tools, whether local
helps reduce costs for
firms with a growing
                                                                                                 or in the cloud, can be seen and managed through a single man-
cloud footprint          Pitfalls and integration challenges                                     agement interface to facilitate the collection and correlation of
                         For all their benefits, cloud-based services are updated as and         threat intelligence and the ability to track and orchestrate uni-
                         when necessary by security suppliers. IDC’s Piff says this is not       versal security policies.”
                         a problem if there is limited or no customisation, but organi-            For software-as-a-service (SaaS) applications, Olson advises
                         sations often seek to customise systems to meet a perceived             enterprises to adopt cloud access security brokers (CASBs) that
                         unique need, which can lead to problems.                                can be deployed either on-premise or in the cloud to establish
                           Also, consider that cloud is currently the most effective data-       security policy enforcement points between cloud users and
                         centre operating model, and although IDC does not see anything          cloud service providers to maintain security and inspect and
                         on the horizon to change this perception, other issues may arise
                         from a move back to an on-premise security infrastructure.                                                          continued on page 17...

                                                                                                                                           computerweekly.com buyer’s guide   15
BUYER’S GUIDE
Home

Making unified
threat management
a key security tool
How unified threat
                                                             The various types of cloud-based services
management can be
a useful tool when       Cloud-based security services run the gamut of risks, from data          Email security: Phishing, business email compromise and user
chosen correctly         loss prevention and email security to identity and access manage-        impersonation are the most requested functions when it comes
according to
business needs
                         ment. Here are the common services of most interest to enter-            to email security. Targeted attacks are on the rise, and success-
                         prises and security professionals, as well as Sophos’s take on what      ful breaches are often attributed to a phishing attack or an email
                         enterprises should look out for in each service.                         account being compromised by poor password use.
Layer your approach
to web security
Combining unified        Identity and access management (IAM): Flexibility is key to an           Intrusion management: Clarity on discovered events is key here.
threat management
with other security      identity and access management system. Given the vast number of          Many products provide a dump of all attempts made and do not
systems is essential     authentication directories available and some being proprietary in       classify the severity of the event. Look for tools that have a very
to tackle threats
                         nature, it would be advantageous if the IAM system could be made         good signal-to-noise ratio, where the noisy, low-priority events are
                         interoperable with third-party resources.                                filtered down, with potentially threatening events highlighted.
Choosing cloud-
based security
services                 Data loss prevention (DLP): Passive discovery is important in            Security information and event management (Siem): When evalu-
Cloud-based security     data loss prevention. Many organisations start down a path of            ating a Siem system, do not necessarily base your organisation’s
helps reduce costs for
firms with a growing
                         DLP without knowing where their data is, how it is being used or         needs on a supplier’s capabilities. Instead, decide based on what
cloud footprint          how it should be classified. Data classification can become such a       your current security, gateway and authentication controls declare
                         roadblock in a DLP project that it makes many enterprises give up.       as best for the information they generate.
                         Look for a DLP provider that can enumerate data and use rules and
                         artificial intelligence to classify the data and simply report on its    Encryption: Although many organisations consider encryption on
                         location and how it is being transported.                                mobile devices’ hard drives, they also need to consider where the
                                                                                                  data from that device could end up eventually. As such, ensure your
                         Web security: Core features of a web security product should be          encryption supplier does not just encrypt the data on the disk, but
                         user and device identification, requested destination, content filter-   offers a choice of encryption before it reaches the public or private
                         ing, secure session decryption, inspection and solid reporting.          cloud, and most definitely before it is copied to removable media.

                                                                                                                                                computerweekly.com buyer’s guide   16
BUYER’S GUIDE
Home

Making unified
threat management        ...continued from page 15
a key security tool
How unified threat       secure data moving to cloud domains.
management can be
a useful tool when         “As the use of SaaS applications grows from both enterprise and
chosen correctly         remote locations, so does the need to enforce a consistent secu-
according to
business needs
                         rity policy at the user level. Cloud security must integrate security
                         controls from perimeter firewalls used to inspect all outbound
Layer your approach
                         traffic, including that generated by SaaS applications.”
to web security            This gives enterprises an integrated view of their cloud and
Combining unified        on-premise security posture, as well as a single feed and work-
threat management
with other security      flow for incident response management.
systems is essential       CSA APAC also recommends deploying software-defined
to tackle threats
                         perimeter (SDP) architecture as an alternative to a virtual private
                         network (VPN) for managing network security.
Choosing cloud-            “SDP is able to provide the benefits of VPN – message confi-
based security
services                 dentiality and integrity – while overcoming the limitations of tra-
Cloud-based security     ditional VPN products such as all-or-nothing access control to
helps reduce costs for
firms with a growing
                         the network.” it says. “It also allows organisations to have a cen-
cloud footprint          tralised, policy-driven network security platform that covers their
                         on-premise infrastructure, cloud infrastructure and user popu-
                         lace, while reducing the attack surface.” n

                                                                                                                                         CHAIWUTNNN/ADOBE
                                                                                                 computerweekly.com buyer’s guide   17
BUYER’S GUIDE
Home

Making unified
threat management
a key security tool                                  Common cloud-based security services (1/2)
How unified threat
management can be        Service                Threats addressed          Challenges                        Optional features
a useful tool when       Identity and access    ✓ Identity theft           ✓ Lack of standards and           ✓ Support for DLP
                         management             ✓ Unauthorised access         vendor lock-in                 ✓ Granular activity auditing broken down
chosen correctly                                ✓ Privilege escalation     ✓ Identity theft                     by individual
according to                                    ✓ Insider threat           ✓ Unauthorised access             ✓ Segregation of duties based on
business needs                                  ✓ Non-repudiation          ✓ Privilege escalation               identity entitlement
                                                ✓ Excess privileges                                          ✓ Compliance-centric reporting
                                                ✓ Delegation of
Layer your approach                                authorisations
to web security                                 ✓ Fraud
Combining unified
threat management        Data loss prevention   ✓   Data loss/leakage      ✓   Data may be stolen from       ✓   Rate domains
                                                ✓   Unauthorised access        the datacentre virtually or   ✓   Smart Response (integrated remediation
with other security                             ✓   Malicious                  even physically                   workflow)
systems is essential                                compromises of         ✓   Data could be misused by      ✓   Automated event escalation
to tackle threats                                   data integrity             the datacentre operator       ✓   Automated false positive signature
                                                ✓   Data sovereignty           or others employees               compensation
                                                    issues                     with access                   ✓   Unstructured Data Matching
Choosing cloud-                                 ✓   Regulatory sanctions   ✓   Compliance requires           ✓   File / directory integrity via hashing
based security                                      and fines                  certifying cloud stack at     ✓   Integration with intrusion detection systems
services                                                                       all levels repeatedly
                                                                           ✓   False negatives/false
Cloud-based security                                                           positives (tuning)
helps reduce costs for
firms with a growing     Web security           ✓   Keyloggers             ✓   Constantly evolving           ✓   Rate domains
cloud footprint                                 ✓   Domain content             threats                       ✓   Categorise websites by URL/IP address
                                                ✓   Malware                ✓   Insider circumvention of      ✓   Rate sites by user requests
                                                ✓   Spyware                    web security                  ✓   Transparent updating of user mistakes
                                                ✓   Bot network            ✓   Compromise of the web         ✓   Categorise and rate websites as needed
                                                ✓   Phishing                   filtering service by proxy    ✓   Categorise websites for policy enforcement
                                                ✓   Virus                  ✓   Potentially higher cost of
                                                ✓   Bandwidth                  real time monitoring
                                                    consumption            ✓   Lack of features versus
                                                ✓   Spam                       premise-based solutions
                                                                           ✓   Lack of policy granularity
                                                                               and reporting
                                                                           ✓   Relinquishing control
                                                                           ✓   Encrypted traffic
                                                                                                                                    SOURCE: CLOUD SECURITY ALLIANCE

                                                                                                                                         computerweekly.com buyer’s guide   18
BUYER’S GUIDE
Home

Making unified
threat management
a key security tool                                      Common cloud-based security services (2/2)
How unified threat
management can be            Service                Threats addressed          Challenges                        Optional features
a useful tool when           E-mail security        ✓ Phishing                 ✓ Portability                     ✓ Secure archiving
chosen correctly                                    ✓ Intrusion                ✓ Storage                         ✓ Web-mail interface
according to                                        ✓ Malware                  ✓ Use of unauthorised             ✓ Full integration with in-house identity system
business needs                                      ✓ Spam                        webmail for business              (LDAP, Active Directory, etc)
                                                    ✓ Address spoofing            purposes                       ✓ Mail encryption, signing and time-stamping
                                                                               ✓ Management of logs and          ✓ Flexible integration
Layer your approach                                                               access to logs                 ✓ Data loss prevention (DLP) for SMTP
                                                                               ✓ Ensuring no access to              and webmail
to web security
                                                                                  emails by cloud provider       ✓ E-discovery
Combining unified                                                                 staff                          ✓ Email system backup
threat management
with other security          Intrusion management   ✓   Intrusion              ✓   Proliferation of SSL          ✓   Central reporting
systems is essential                                ✓   Malware                    required by deployment in     ✓   SIEM integration
to tackle threats                                                                  public clouds adds            ✓   Administrator notification
                                                                                   complexity or blocks          ✓   Customisation of policy (automatic or manual)
                                                                                   visibility to network-based   ✓   Mapping to cloud-layer tenancy
Choosing cloud-                                                                    IDS/IPS                       ✓   Cloud sourcing information to reduce false
based security                                                                 ✓   Complexity and                    positives and improve coverage
services                                                                           immaturity of Intrusion       ✓   Remote storage or transmission of integrity
Cloud-based security                                                               Management for APIs               information, to prevent local evasion
helps reduce costs for                                                         ✓   Lack of tools to manage
                                                                                   instance-to-instance
firms with a growing
                                                                                   relationships
cloud footprint
                             Security information   ✓   Abuse and nefarious    ✓   Standardisation of log        ✓   Heuristic controls
                             and event management       use                        formats                       ✓   Specialised systems
                                                    ✓   Insecure interfaces    ✓   Timing lag caused by          ✓   Physical log monitoring
                                                        and APIs                   translations from native      ✓   Access control system monitoring
                                                    ✓   Malicious insiders         log formats                   ✓   Physical security integration (cameras,
                                                    ✓   Shared technology      ✓   Unwillingness of                  alarms, phone, etc)
                                                        issues                     providers to share logs       ✓   Integration with call/ticketing system
                                                    ✓   Account or service     ✓   Scaling for high volumes
                                                        hijacking              ✓   Identification and
                                                    ✓   Unknown risk profile       visualisation of key
                                                    ✓   Fraud                      information
                                                                                                                                        SOURCE: CLOUD SECURITY ALLIANCE

                         

                                                                                                                                             computerweekly.com buyer’s guide   19
You can also read