Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • 3 Areas of Your IT Infrastructure that SCM Can Help to Secure
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

3 Areas of Your IT Infrastructure that SCM Can Help to Secure

5 years ago David Bisson
3 Areas of Your IT Infrastructure that SCM Can Help to Secure

Gone are the days when security teams could focus all of their efforts on keeping attackers out of the network. There’s no inside or outside anymore. The modern network is porous; it allows greater numbers and types of devices to connect to it from all over the world.

This characteristic might serve organizations’ evolving business needs as they pursue their respective digital transformations. But it complicates their security efforts. Each and every one of those connections constitutes an attack vector through which a malicious actor could attempt to gain a foothold into the network. As they continue to accumulate, these attack vectors expand organizations’ attack surface.

That’s a problem. Once malicious actors are inside the network, traditional security solutions such as firewalls and IDPSes don’t do much good. Those attackers can then exploit that oversight to move laterally throughout the network in an attempt to steal access to and exfiltrate organizations’ sensitive information.

These issues raise an important question: how can organizations defend themselves against threats that make it inside their network?

SCM to the Rescue

Secure configuration management provides organizations with one option. As discussed in a previous blog post, SCM is a critical security control that enables security teams to monitor the desired state of the organization’s assets. This state more often than not disagrees with the default configurations available for POS terminals, laptops, tablets, applications and other network devices. Indeed, those settings tend to favor ease of installation rather than security.

Having documented that desired state for each IT asset, security teams can then use SCM to continuously monitor for deviations from a secure baseline configuration. These types of deviations are known as “configuration drift.” They may be accidental or malicious nature, and they might arise from internal or external changes within the organization. In any of those scenarios, they leave systems more vulnerable by taking them out of their secure state. Security teams must therefore be vigilant for configuration drift so that they can take remediation steps to return a monitored asset to its given baseline as quickly as possible.

SCM Throughout the Organization

For SCM to be effective, security teams want to make sure they can monitor and manage all critical computing resources including remote users’ laptops, physical servers, network devices and/or cloud-based assets. They therefore need to make sure that they have the capabilities to implement SCM throughout the organization. Provided below are some recommendations on how security teams can implement SCM for three different types of scenarios: cloud-based assets, industrial environments and remote work.

SCM in the Cloud

Most organizations’ assets are not stored in one type of environment. Indeed, organizations commonly use both on-premise and cloud environments to adapt to their evolving needs. Unfortunately, these “hybrid” networks add complexity to the attack surface. Hybrid models necessitate that organizations secure their assets across multiple types of environments, which might include the offerings of more than one cloud service provider. This makes it difficult for some security solutions to uniformly work across the entire hybrid network.

With that said, organizations can secure their hybrid networks by focusing on security fundamentals such as SCM. They can specifically use automated tools to conduct the same level of configuration monitoring in the cloud as they do across physical systems. In the cloud, they should direct this monitoring to accord with the duties they hold under the Shared Responsibility Model with their cloud service provider.

Industrial SCM

Industrial environments are a bit more complicated to secure as they incorporate both OT assets and IT systems. As such, they contain a growing number of Industrial Internet of Things (IIoT) devices that use the web to carry out crucial industrial functions. This connectivity expands the attack surface, as it potentially exposes once-isolated OT assets like operational workstations, SCADA equipment and programmable logic controllers to the Internet.

To secure all of these industrial devices, security teams must first correctly configure them. They must then follow the model they implemented with the employer’s IT infrastructure and continuously monitor those devices’ configurations. The last thing they want to do is disrupt the functionality of those assets in some way, so security professionals should strive to perform that monitoring in a way that doesn’t interfere with each device’s operability.

Remote Work and SCM

Last but not least, security teams need to make sure that their organization’s secure configuration management strategy extends to remote workers. That’s a must in light of the fact that most organizations shifted to a majority remote workforce in response to COVID-19.

Security teams can best apply SCM to the organization’s remote workforce by first building an inventory of all assets that need protecting. Those devices don’t just include employees’ laptops; they also include the authentication infrastructure and the helpdesk that facilitate the possibility of remote work, for instance. Once they have that inventory, security teams can deploy SCM tools to all of the components involved. This will help to mitigate digital threats introduced by remote connectivity.

Keeping It All in Perspective

Security teams need not feel overwhelmed by implementing SCM across all the different segments of their organization’s infrastructure. All they needed to do is start with a risk management perspective in mind. From there, it will be relatively straightforward for them to prioritize their efforts and move from one environment to the next.

For more information on how to apply SCM to your organization’s infrastructure, please download Tripwire’s eBook.


FURTHER READING ON SCM:
  1. SCM: Understanding Its Place in Your Organization’s Digital Security Strategy

The post ” 3 Areas of Your IT Infrastructure that SCM Can Help to Secure” appeared first on TripWire

Source:TripWire – David Bisson

Tags: Cloud, COVID-19, Critical Severity, Exploit, TripWire

Continue Reading

Previous Google Fixes High-Severity Chrome Browser Code Execution Bug
Next Google Researcher Reported 3 Flaws in Apache Web Server Software

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

3 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

3 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup

3 days ago [email protected] (The Hacker News)

Recent Posts

  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
  • Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
  • China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT