John Doley, REGIONAL SALES DIRECTOR – META WHO LEADS THE ACCESS MANAGEMENT SOLUTIONS AT THALES tells Anita Joseph, Editor, Security Advisor Middle East, that it is important to look for a solution that can protect and integrate with on premises and cloud services to help reduce complexity and help with regulatory compliance at the same time.
Where are we in the cybersecurity landscape at the moment-all the rhetoric, all the planning-how far are we, in keeping up with the attacks?
Cyber-attacks are on the rise and are becoming increasingly damaging. This is evident by the significant increase in ransomware attacks which are being carried out against all components of an organisation’s infrastructure. According to Group IB, ransomware attacks grew by 150% during 2020.1
What has 2020 taught you? What are the key learnings?
Cybersecurity professionals are always prepared to adapt. Our role is centered around helping businesses understand the potential risks and new threats and events that could put organisations’ sensitive information, whether it is customer data or IP at risk. We have learned a great deal over the last year, but I would like to highlight three major learnings:
- Cyber Resilience is an important business enabler in time of crisis. The pandemic has fast tracked the digital transformation journey and the urge to go remote instantly meant pushing forward with investment in cloud, connectivity, automation, and innovation that could have taken longer time to deploy in normal times. As we adapted to these new technologies and digitalisation we were exposed to new risk and challenges.
Even in the face of elevated threats, information security teams have risen to exceptional levels to support their organizations. But those organisations that were well equipped with an empowered and proactive security team could control and which were supported by robust processes and effective technology were in a better shape than the others.
2. Zero trust moves into the mainstream. The new wave of virtual workforces and the acceleration to adopting new technologies in a very short span of time gives us more reason to focus on security. With this in mind, making each device or user earn the trust to get on the network seems to be the way our security professionals are going to handle this escalation of connecting everything to the network. So our best bet is not to trust anything and move the risk/trust down to a Zero Trust Network.
The maturity to Zero Trust Network will take time and effort. We have seen organisations incorporating Zero Trust functionality incrementally as part of a strategic plan which definitely reduces risk accordingly at each step. As the Zero Trust implementation matures over time, enhanced visibility and automated responses will allow our security professionals to keep pace with the threat.
A significant challenge to achieving Zero Trust is finding solutions that cover identities. Enforcing access decisions dynamically at the application access point, irrespective of where the user resides and the device they are using. So, we could say Zero Trust starts with Managing Access to the network.
3. Remote workforce challenges. We see that security and risk management leaders are experiencing widespread disruption in Identity and Access Management space for many reasons, most notably because of the increased drive in user interactions on digital channels and the sudden and rapid expansion of the remote workforce because of the pandemic. The adoption of microservices architectures, move to the cloud, digitalisation of modern world and increase in cybercrime incidents have made it more difficult to manage users.
Cyber criminals continue to search for easy access and will continue to exploit gaps left by weak authentication methods. Unfortunately, a ‘one size fits all’ approach to authentication is no longer feasible as users are expecting to be able to authenticate from anywhere and on any device.
As data breaches continue and compliance mandates get more stringent, how can organisations protect sensitive data in both on-premises and cloud environments?
The first line of defence in protecting data in both on-premises and cloud environment is to make sure organisations have plugged in all gaps in their authentication footprint with a solution that can offer policy based access allowing them to enforce to earn the user trust by a broad range of authentication methods.
It is important to look for a solution that can protect and integrate with on premises and cloud services to help reduce complexity and help with regulatory compliance at the same time.
As cloud migration continues at a frenetic pace, tell us how Thales helps organisations in this journey.
It is important that your organisation strive to find a suitable balance between user experience and security especially in the context of today’s remote and/or hybrid workforces, cloud transformation and enterprise apps. Modern authentication comprises the latest innovations in authentication technology, which have been developed to enable authentication in a cloud based world. Thales can help organisations by:
- Protecting on premises and cloud services and apps
- Offering a powerful range of authentication methods that can support multiple authentication journeys
- Easily and flexibly integrating into an IT environment
What, in your opinion, are some of the best practices for secure cloud migration? What are organisations missing/overlooking?
- Prepare for the threat: Create, maintain, and test encrypted, offline backups of critical data. Develop and exercise both a cyber incident response & communications plan. Make digital asset management a key competency for your organisation. Create and maintain a cybersecurity awareness training program for your users.
- Centralise Identity Management: In a hybrid identity scenario, organisations must integrate their on-premises and cloud directories. With this integration, the security teams can manage accounts from one location, irrespective of where the account is created. It also enables users to access both cloud and on-premises resources with a common identity.
- Make sure secure access and identity protection is at the heart of your security strategy – identity is the new security perimeter. Don’t leave any authentication gaps, ensure you select a service that is scalable and flexible that can grow with your needs. Here are a few best practices to consider specific to authentication:
- Adopting MFA and modern authentication for Critical Apps – Critical apps that provide key services to employees or that give access to your network should be protected by a modern authentication solution that is able to make intelligent access decisions and enforce the right level of authentication. These critical apps differ across organisations, but they typically include VPN, remote desktop, cloud computing platforms, and customer-facing applications.
- Carefully Consider Authentication Factors – The choice of authentication factors is where user experience comes into the equation. Whether your users are employees or customers, you don’t want to alienate them by making it frustrating to log in to your app or to perform specific actions within your applications. For customer-facing authentication, a prudent strategy is to utilise adaptive authentication and combine it with other methods of stronger authentication when needed. The key here is to offer users a range of authentication options, such as a FIDO security keys, OTP tokens, or push notification on their registered smartphone.
- Monitor Identities Actively – Monitoring identities actively can help organisations quickly detect suspicious activities and trigger an alert to prevent the threat. You can be at risk of user credentials being compromised failing to do so.