Security Is A Journey
Many information technology (IT) people today have become more aware of
the problems associated with securing the systems they have designed,
implemented and managed. Indeed, security has become the number two hot
topic in the computer arena, falling only behind the impending Y2K crisis
in priority and budgeting. Yet while security professionals see this as
an awakening, many of us are afraid that IT staff members may still have
an incomplete view of the big picture.
In today's information security marketplace there are hundreds of
vendors, products, ideas, technologies and consultants. Each of them has
their own spin on the way security should be handled by an organization.
There are so many "standards", proposals and rfp's, how could anyone
possibly consider all this information and reach the "best" solution. The
answer is it can not be done. The prudent IT manager has her staff
perform some research, gathers the data, mines it for summaries and
prepares the plan for action based on that level of detail. While many
vendors refer to this as "management by magazine", for many it is the
only possible process for decision due to the amazing volume of the
information to be managed.
The largest danger in this type of management process is that often it
leads to the development of the "infosec magic bullet" theory. This
occurs when a manager becomes so excited and convinced by the hype
generated around a specific product or technology that they begin to see
that option as a total security solution. This type of excitement and
product belief was best exemplified by the early days of the firewall
market. During the height of the firewall rush, it was a common thing to
hear an IT manager say, "We are secure. We have a firewall." Even today,
this pipedream still echoes in many boardrooms and meetings. Today's
technologies, and all the hype associated with them could be rebuilding
this idea of a "magic bullet" that secures the entire enterprise just by
being present on the network. Intrusion detection technologies and
virtual private networks seem to be the products driving the hype engines
today, bringing with them the resulting blind belief in a single soluti!
on.
IT managers need to realize that while technology is a great aspect of
security, it is only the point solution. Technology is deployed to
protect information, act as a perimeter sentry and provide insight into
threats faced by your organization. That technology requires a further
level of policy, however, to be effective. Without an underlying
information security policy to build a baseline for the deployment of the
technology and the creation of a ruleset for the systems and the people
involved to follow, all the security products in the enterprise are
weakened. In addition, as a base for that policy and ruleset, awareness
must be created within the organization to educate people about what is
deemed acceptable behavior and how to respond to events that threaten the
intellectual capitol of the company.
While "management by magazine" is here to stay, and will only be growing
in presence, it is our duty as security professionals to help combat the
"magic bullet" theory with a policy of full and factual disclosure. We
also need to realize the position of IT managers and staff and assist
them as best we can to make educated and effective decisions. While this
may extend the sales cycle a small bit it does help progress the entire
industry into the next level. And remember, security is a journey, not a
destination...