Page 76 - Cyber Defense eMagazine for September 2020
P. 76

Think outside the network

            The  persistence  of  a  siloed mentality,  complete  with  an  insistence  on treating  network  segments  as
            though they had perimeters (and as though those perimeters mattered) consistently limits our thinking.
            This  puts  us  at  risk.    The  compromise  of  the  most  minor  system  can  lead  to  the  compromise  of
            significantly  more  important  systems,  and  an  inability  to  think  holistically  will  ultimately  lead  to
            compromise.

            Consider, for example, the caching of credentials.  In many cases, merely logging into a system with
            administrative credentials once (and then forgetting to wipe the cache) is enough to leave a copy of those
            credentials on the system in question.  That cache can be exploited by attackers to then compromise
            other systems that are part of the network and which share those credentials.

            In this manner the compromise of a small edge node located on the other side of the world could result
            in a devastating compromise of central databases.  What's worse, these sorts of compromises happen
            not because anyone along the chain of responsibility between those two systems does anything wrong,
            but because their areas of responsibility were so disconnected that the security implications of how doing
            something to A would affect B were never even considered.



            Machines managing machines managing machines…


            This is the challenge of the 2020s.  In order to cope with perpetually increasing scale we must begin to
            turn the definition and daily management of policies, profiles and templates over to machines.  Machine
            Learning (ML), Artificial Intelligence (AI), and other Bulk Data Computational Analysis (BDCA) tools are
            a must.

            Initially, these tools will make suggestions, and automate very simple tasks - the sort of things we're
            seeing from AIOps vendors today.  But this is only the beginning; in order for the networks of tomorrow
            to even be possible, virtually everything that IT administrators do today must be done by BDCA tools
            without any form of human input.
            This is not about replacing IT personnel.  It isn't about an attempt to save money.  The problems we're
            running up against are the limits of human capability.

            Humans can only hold so many things in working memory at a time.  Call it a RAM limit, if you will.  We
            can only conceive of so many nodes on a network.  We can only wrap our minds around so many
            permissions interactions.  Enterprise networks are already bigger than we can fit in our brains, and that
            means we are running up against human limits in terms of even being able to architect these networks,
            let alone defend them.

            For security  to  be  effective,  it  needs  to  be  holistically  integrated  into  network  architecture  decisions.
            Network and security are inseparable, and the challenge of the next 10 years is going to be redesigning
            how  we  represent  these  networks  for  human  consumption,  and  how  we  translate  human-scale
            architectural  and  security  decisions  into  the  practical  application  of  configuration  for  a  literally
            incomprehensible number of systems that, even for small businesses, can span the entire globe.





            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         76
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   71   72   73   74   75   76   77   78   79   80   81