SBN

Assessing Duplication of Security Controls.

Assessing Duplication of Security Controls.

2 min read·Just now

Organizations during COVID-19 were placed in a challenging position to deploy newer security controls to meet the immediate of supporting a remote workforce. Many next-generation technologies became deployed parallel to existing solutions, including zero-trust architecture (ZTNA), extended detection and response (XDR), and cloud-based multi-factor authentication.

After COVID-19, many organizational IT and security operations teams continued to support dual security internal controls, contributing to an alarming trend of duplication.

Importance of Assessing Duplication of Security Controls.

CIOs and CISOs wanting to address the duplication of security controls continue to engage cybersecurity consulting firms with little or nothing to do with COVID-19 rapid deployment strategies. These arbitrary third-party firms with expertise in security assessments can deliver an exceptional value to these C-level executives by identifying duplications and dependencies.

Benefits of Assessing Duplication of Security Controls.

By identifying the various duplications of security controls, organizations can reduce their cost of licenses and operational costs and mitigate cyber-attack risk.

Annual assessments also help organizations understand the various interlocking dependencies their internal and external system have regarding their various security controls. Overlapping security controls often face the challenge of becoming part of a split deployment. This common yet challenging problem within IT centers on enabling a new control while attempting to phase out the legacy solution. The problem arises when the phasing-out engagement is forced to stop partially because of technical or operational dependencies. Until these dependencies are resolved, the organization could face a split deployment issue.

Consultants with experience in legacy and replacement technology can help undo the split deployment dependency issue while creating a net-new strategy for replacing existing solutions.

Why Assessing Before Investing in New Security Controls?

In the post-COVID-19 work environment, CIOs and CISOs should take extra caution, mandating their SecOps and IT engineers to hire third-party accessors to review their enterprise environments, look for control duplication, and document the various dependencies. With this fresh approach, organizations can save money, time, and effort in staying current with the latest security control technology and processes.

*** This is a Security Bloggers Network syndicated blog from Stories by John P. Gormally, SR on Medium authored by John P. Gormally, SR. Read the original post at: https://jpgormally.medium.com/assessing-duplication-of-security-controls-84f02c11a1a9?source=rss-160023698d42------2

Secure Guardrails