From updating AV software to creating security profiles, most IT professionals spend a portion of their day on tasks with a goal of securing their network. Since October is Cyber Security Awareness month, this is a good time for you to take a strategic look at your organization’s current security posture.
The key concerns should be whether your current solutions still provide the security you need, and whether your organization’s procedures are still in alignment with current best practices. The SANS 20 is a good checklist to start a quick strategic cyber security assessment. Comprised of current Critical Security Controls (CSCs), some of the items on the list may seem rudimentary to some organizations, but with technology and threats evolving daily, the deployed solutions may no longer support the full scope of current CSCs.
For example, Bridgestone’s Credit First National Association (CFNA) had a Network Access Control (NAC) solution in place, but during a routine network security assessment, they discovered that it failed to provide a comprehensive security solution. CFNA’s older NAC solution did not fully meet Critical Security Control (CSC) 1, identify all authorized and unauthorized devices on the network, or CSC 4 for continuous vulnerability monitoring and assessment. Timothy Lynch Childress, manager of CFNA Network Services, Bridgestone Firestone, was stunned. “Even with a NAC solution in place, an auditor was able to access our network in less than ten minutes just using his laptop,” Childress explained. “We are required to ensure compliance with Office of the Comptroller of the Currency regulations, and keeping our customer and employee data safe is paramount. We began looking for a new solution immediately,” he added.
CFNA upgraded to a Security Automation & Orchestration solution, Network Sentry, which meets several CSC recommendations. Network Sentry leverages the built-in commands of network switches, routers and access points to establish a Live Inventory of Network Connections (LINC) and enforce control over network access. It then assesses the risk of every endpoint, helps users self-remediate unauthorized devices, and enables role-based access to the network and data. By upgrading to newer technology, CFNA was able to attain full visibility into each device connected to the network, continuously monitor each device and automatically contain any suspicious or compromised endpoint devices, in addition to a number of other benefits, this Security Automation and Orchestration solution addresses several CSC goals, and supports a few additional CSCs.
CFNA is by no means alone – a recent survey shows only 37% of companies use endpoint monitoring that includes user activity and physical media.[i] A statistic that underscores the need for organizations to conduct strategic security assessment periodically.
A Security Automation and Orchestration solution can help you satisfy the following CSCs from the SANS 20:
While these are only some of the CSCs that a Security Automation and Orchestration solution helps you meet, you can see that this one solution has a huge impact – helping networks meet some of the critical SANS controls.
Even if your organization is not in a position to tackle all 20 goals immediately, this is a good time to assess your organization’s network security posture and prioritize technology upgrades to ensure end-to-end network visibility, dynamic access control and automated threat response.
If your staff is currently overcommitted, Bradford Networks, a leader in Security Automation and Orchestration technology, offers a free no cost, no obligation network security assessment to get you started. Sign up for your network security assessment today.
Connect with Secure Sense to protect data, your network, and systems 24/7, 365 days a year. If you have questions or want to learn more, please contact Secure Sense by calling 866-999-7506.
You can find Secure Sense on Facebook, LinkedIn and Twitter. Follow us for current company and industry news.
[i] http://www.mcafee.com/us/resources/misc/infographic-threats-report-sep-2016.pdf