From the Blogosphere
Guardians at the Gate: Securing Third-Party Access to Critical Systems | @CloudExpo #Cloud
Enterprises are encompassed with the challenges around managing access to clouds and their various flavors
By: Matthew McKenna
Aug. 1, 2015 11:00 AM
Access is everything. It is the fundamental pillar that determines whether critical enterprise assets are safe or exposed. Knowing the answers to the questions of who is accessing what, where they are accessing that information from, why they are accessing that information and, finally, what exactly they're accessing are the basic questions that stand between a breach and brand reputation.
Today, access extends well beyond the borders of the enterprise. Global supply chains are increasingly complex. This year at RSA, Josh Douglas, CTO at Raytheon, described the global supply chain as being comprised of shared processes and shared technology that distributes products used in creating, sharing and distributing information. The global supply chain is intertwined intimately and it doesn't seem it will unravel itself anytime soon.
Enterprises are encompassed with the challenges around managing access to clouds and their various flavors, along with their network infrastructure, applications and data. In doing so, third parties become more and more critical to help deploy, control and maintain this transforming and fluid IT landscape.
This access is not only about people accessing machines to undertake their daily operational activities. This access also includes machines talking to other machines in an automated fashion and the underlying content of those interactions.
Yet for some reason, managing third-party access often comes as an afterthought in the industry's overall security strategies and postures. However, the data would suggest that this topic warrants more attention:
The greater challenge in decreasing third-party risk exposure is what I call the "I got it, you take it" effect, where each party expects the other to take the primary responsibility for ensuring the security of the access. In reality, like any healthy relationship, security results from an equal continuous committed effort of both parties.
The data also suggest that solutions to this challenge are less complicated than they may appear. Basic measures put in place around people, processes and technology can help organizations decrease their risk exposure significantly.
Some basic measures include:
With over 63 percent of data breaches being introduced by third-party access and 60 percent of enterprises permitting remote access by their third-party vendors, it is clear that dedicated mechanisms to control this form of access must be introduced at a people, process and technology level to reduce risk. The complexity of the intermeshed supply chain and the direction that third-party access will continue to grow in the years to come begs the consideration that this can no longer be considered as a footnote in enterprise security strategies. Instead, it must be considered as an integral component to the core of the strategy.
Reader Feedback: Page 1 of 1
Latest Cloud Developer Stories
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
SYS-CON Featured Whitepapers
Most Read This Week