Webinar recap: configuration compliance for 2020
Whether you work in IT, Security, Compliance, DevOps or Audit, your job just got harder; you need to, as Apple famously said, think different. That’s the takeaway from a recent BrightTALK webinar, Configuration Compliance Management for 2020 and Beyond. You can watch it here.
In the webinar, Lockpath’s Sam Abadir shares how cybersecurity is changing regulations, standards and frameworks, along with the greater reliance on technology, and how these changes have created a perfect storm for IT assets.
These webinar highlights reveal the challenges impacting the teams listed above and, more importantly, delivers the straight scoop on the solution to protecting IT assets from risks and threats.
A growing risk of breaches is due to poor configuration of newly developed assets and end-user assets like laptops. It’s forcing organizations to apply a series of critical capabilities to better understand what type of security and configurations you need. For example, how are host and application assets identified? Are assets mapped to processes? That’s just two of the ten critical capabilities cited in the webinar.
Unfortunately, many organizations aren’t positioned to manage cybersecurity’s demand. Their processes and compliance are not well defined or able to take on more. The tools they rely on to identify hosts and applications are also cost-prohibitive in terms of outlay and overhead.
Cybersecurity and technology in the workplace have changed and expanded job descriptions.
IT has more ground to cover and an increase in demands from departments. Security must accommodate mobile and remote workforces. Compliance is seeing requirements expand to include cybersecurity and secure configuration requirements. DevOps is under added pressure to develop faster with stronger configurations. Audit’s workload is greater, but the challenge is the same—make IT data meaningful in an audit and gain faster access to the data produced by IT.
With more to do and for many, fewer or the same resources, departments use the tools at their disposal. If it’s spreadsheets and email, it can be difficult to manage all the details. You’ll also outgrow these manual tools as your organization expands. Some departments use server-based tools and audit assets periodically. These tools require system downtime like monthly server maintenance, which leaves the organization exposed to misconfiguration risk in the intervening weeks. As a configuration management solution, server-based tools have high overhead, are cumbersome to deploy and come with limitations in reporting and ability to cover a desktop environment.
Continuous security monitoring platforms
While server-based tools analyze assets monthly or quarterly, continuous security monitoring platforms assess and audit assets just like their name says—continuously. They’re cloud-based and offer real-time updates. Anytime you can audit asset configurations, reporting on how they differ from established benchmarks, and then generating misconfiguration risk scores.
Rely on continuous security monitoring platforms to not only protect assets but also to streamline your findings investigations. You can tailor reporting to different audiences within the organizations. These platforms like Lockpath’s Blacklight empower your expanded role to meet cybersecurity’s demand.
IT has more reliable information and ability to monitor cyber posture over a broader area. Security teams have a configuration management solution that can account for mobile and a remote workforce. Compliance can correlate asset configuration findings for cybersecurity requirements. DevOps now has a solution that supports their ticketing/development platforms. Audit teams can pull trending information and drill-down to detail as needed rather than wait for IT reports.
No matter what corner of the organization you call home, cybersecurity and the technology shift have impacted your daily responsibilities. For some teams, like IT, Security, Compliance, DevOps and Audit, the impact has been profound. It’s time to think differently. Continuous security monitoring platforms offer a way to put technology to work for you and the organization by offering a platform that continuously assesses and audits assets, enabling you to reduce the risk of breaches and lower compliance costs.
Learn about CIS’s first five controls and examine what each control addresses.
Learn about how privacy programs and the importance of being prepared for a breach.
Learn about the constant vigilance of continuous security monitoring.