The Real Reason for Breaches (and How to Avoid Them)
Security is a tough job – we invest so much effort, and yet the breaches keep on happening. Why? In a word, complexity.
The digital world brings so many great efficiencies and innovations – the pressure to move fast and exploit opportunities is irresistible to every organization. But crossing all these online frontiers brings the unavoidable frontier challenges – lawlessness, chaos, and rapid change. Security is easiest in mature, well understood, and above all, in simple infrastructures. Every added bit of complexity and change moves away from security, and towards chaos. The security professional has a thankless task – we cannot simply demand that our employers be more orderly or cease changing. Instead, we have to adapt constantly, and try to keep up with all the new territory that is constantly opening up, with new threats and new ways to get it all wrong.
When you analyze any of the major breaches in detail, you find they are always multi-component – there is never just one simple, single cause. Attackers are stealthy, persistent, and they move from one foothold to another. This means that when a breach happens, it’s a system-level failure, not just one component that could have been isolated and fixed. Worse, even if you put all your effort into fixing as many components as possible, you’ll never get to 100% secure and impervious to attack. The bad guys will search and search for anything you missed, then exploit it, gain a new foothold, and work outwards from there.
Clearly, the road to security doesn’t come from finding and fixing everything – it’s impossible to fix every issue in your network today, and even if you could, there will be new defects tomorrow, because the rate of change is so high. Instead, we have to learn to thrive in a world with inherent vulnerability, just the way animals and people do in the biological world. Biological systems are resilient rather than perfectly protected – they can adapt and bounce back from infection, since Mother Nature long ago learned that blocking every pathogen just wasn’t going to work. Of course, this doesn’t mean you should give up and just accept every possible attack – biological systems still aim to be hard targets, they just actively maintain an immune system so they can detect, isolate, and remove the inevitable successful attacks.
So the way forward is to find what you have, in the cloud and across your physical sites, see how it’s all connected, and understand where you can block incoming attacks, as well as thwart lateral movement for attackers who do make it past your defenses. The first goal is a complete inventory – in itself, that’s a hard challenge because of the diverse and changing fabric we use to get the work done. The second goal is to harden any assets that are exposed. The third goal is based on recognizing that perfect hardening at step two won’t happen, so instead, it’s essential to understand what is connected to what, so that you can stay ahead of attacks and block them before they get a chance to spread. This is why RedSeal focuses on these three disciplines – gather and map the network in all its hybrid complexity, then harden the individual elements, then help our customers conduct war games where they can think at a system level, and prioritize their defensive efforts to become a resilient hard target.
For further details on how RedSeal tackles cloud security, check out our solution brief: “Redseal Ensures Your Critical Cloud Resources Aren’t Exposed To The Internet”