How do you connect the dots between the business and IT for application security?
Security is rarely in the line of sight, but often ends up in the crosshairs. People on the business side who need to get things done 鈥渜uickly and efficiently鈥� rarely add 鈥渟afely and securely, too.鈥�
Security is often viewed as, at best, a necessary evil and, at worst, an impediment to efficiency to be overcome.
However, making things too easy is an open invitation for fraud, tampering or loss. Search anywhere on the internet and you will find alarming examples of unscrupulous employees who took advantage of subpar controls to embezzle millions of dollars over many years. Even more common are stories of how a lack of security policies led to inadvertent exposure of customers鈥� sensitive data.
None of this is new. But what is new is how a transition to the cloud will dial up the importance of protecting company data 鈥� in a big way.
With the cloud, significant software updates don鈥檛 come every 3 to 5 years, but every quarter鈥� and sometimes even faster. This happens whether the business wants them or is ready for them. And not being ready can create real risk. In other words, unless you鈥檙e mitigating risk, you鈥檙e accepting it.
For example, one cloud software provider made a 鈥渟mall鈥� change that repurposed two fields used to define an employee鈥檚 status. For most customers, the change was inconsequential. However, a few had HR and identity and access management systems with discordant assumptions about those fields. Suddenly some employees (and some former ones, too) had new powers and privileges that no one had accounted for. Another provider added a new feature that enabled people to cut and paste values in a spreadsheet-like UI 鈥� including million-dollar one-time payments to unfamiliar vendors.
Staying abreast of potential changes from cloud software vendors may sound like a Sisyphean task. The effort requires real commitment to a permanent application security program and to the organizational change required to make it effective, which can be surprisingly difficult. The alternative, however, is akin to opening the barn door and hoping for the best with the horse.
Consider that a single business process can easily span multiple systems, e.g., both legacy 鈥渙n-prem鈥� software and cloud-based solutions. While cloud software providers do a remarkably good job at security, many of those protections end at your front door. Providers can鈥檛 see into your processes, or the integrations with your other systems. Managing risk between systems and across the entire enterprise is completely out of their control.
It is a risk to focus so exclusively on applications that you forget the impacts on your complete business process. Before you accept or enable any new or changing features in a software update, you must ask and answer a host of questions to cover that broader context:
What impact could new features have on every existing business process? What effect will they have on the business more broadly? How will they come to bear on internal organizations, and will they affect different ones differently? Do they create any new risks or exacerbate existing ones? Do we need to change how we define roles? Do they have implications for KPIs or financial statements? Could they create a compliance or legal issue? The list of questions can be long.
There is no one right set of questions, no one set of 鈥渂est practices鈥� to implement either, because every organization is different. It is necessary to invent them, and then re-invent them, on a regular basis.
We find that many organizations have yet to adopt this process-centric, cross-application view and approach to security. Even when business leaders recognize the need, it鈥檚 more common than not to severely underestimate the effort and commitment required, including the magnitude of the organizational and cultural change involved.
No single internal function can possibly answer all these questions. You can鈥檛 just leave it to the CISO鈥檚 team 鈥� they don鈥檛 have the breadth and depth of perspective and experience to examine each change in all the necessary contexts.
And it鈥檚 critical to do more than play defense. If someone in your organization isn鈥檛 looking at new features for opportunities they could create, you鈥檙e leaving money on the table. Remember, your competitors get these same updates too.
In the age of cloud migration, your organization requires a dedicated, cross-functional team, designed and optimized for cooperation. But this can be more difficult than it sounds鈥nd it already sounds pretty difficult.
One thing we often encounter is a communications gap between stakeholders when it comes to even basic issues. For example, a manager on the business side might ask IT for permission to have someone on their team approve journal entries in their new cloud-based system. IT will likely ask what role the business wants to assign that person. The manager might not understand what is meant by 鈥渞ole鈥� and counter with the assertion that they just need someone to make journal entries.
Clearly, the lack of a common vocabulary can lead to a major disconnect between the business and IT. Appropriately, each comes from a different domain with a different perspective and a different set of skills. However, it鈥檚 easy to see how miscommunications like this can occur, and even how potentially serious consequences can arise as a result.听This highlights the need for strong governance over a dedicated, cross-functional application security team.
听
I know there鈥檚 a lot here, but frankly I鈥檓 just scratching the surface. If you鈥檇 like to hear more, shoot me a message. My team has conversations every day with companies facing these challenges.
The business support model is one of the most overlooked parts of a digital transformation project. Learn how you may already have a business support team in place without even knowing and how this team can improve support and mitigate risk.