A Framework for Maturing Security

Mission

Enterprise security exists to empower the rest of the organization by optimizing risk.

Group Structure

Enterprise cybersecurity has several disciplines, and their structure can vary from one enterprise to the next. The following diagram describes what I’ve found to be a reasonable way to structure these disciplines.

What’s the security team gotta do?

It may seem obvious, but these disciplines need to be defined, scoped, managed and matured somewhere in the organization. It’s also true that the tsunami of cloud technologies hitting the enterprise must be mapped into these disciplines. It seems like these are among the principal tasks for a central security team.

Outcomes

I’ve yet to encounter a company that’s achieved security nirvana. There’s always room to improve, there’s always another summit to achieve, there’s always a new bit of shiny technology, and there’s always another threat to mitigate. This reality creates some gnarly challenges. Namely, it’s often hard to set meaningful goals and to communicate intent across the organization (“why” are we doing something). It’s in this context that I think maturity models shine. Others have come to the same conclusion.

What’s the security team gotta do?

4 levels of maturity in the 4 cyber security disciplines yields 16 possible sets of maturity criteria. A more advanced and organized audience might want to include sub-disciplines in maturity models. Either way, it seems like defining the maturity criteria for each of the cyber disciplines is a principal task for the security team. By itself, defining this matrix of maturity criteria is a mountain of work that regularly evolves.

Synaptic Structures

Cyber disciplines aren’t stove-pipes. Information must flow between them. Let’s call these channels of information synapses.

Synaptic Outcomes

Let’s take a few examples of information flow and see concrete opportunities for maturity. For the sake of this post, let’s assume Controls, Tests, and Monitoring (CTM) are part of the fully mature state.

The Application & Platform <=> Security Operations Synapse

In the simplest case, we know that applications and platforms emit log data, and the Security Operations team needs to make sense of that data. The following are a few examples of targeted investment to improve this information flow:

  1. CTM to ensure application and platform logs are ‘always on’ and always forwarded to security operations.
  2. CTM to ensure logs are always complete and in the correct format.
  3. CTM to ensure logs don’t contain sensitive information.
  4. CTM to ensure FIM and HIDS are installed on every node, enabled, and emitting events.
  5. CTM to ensure all systems are scanned for vulnerabilities.

Application & Platform <=> Identity & Access Management

In the most obvious case, applications consume user identity. This consumption represents another synapse. Like the prior example, a synapse is an opportunity to create stuff that matters to both groups. Here are some specific examples:

  1. CTM to ensure applications consume Single Sign On Identity services.
  2. CTM to ensure applications properly implement token validation.
  3. CTM to ensure applications properly implement the user session lifecycle (session state synchronize with logout and credential changes).
  4. CTM to ensure applications describe their authorization strategy and implement RBAC in approved ways.
  5. CTM to ensure correct provisioning for applications and platform instances.

Competencies

If there’s one thing I’ve learned about hiring, it’s:

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store