Building a security-vigilant organization
Chaitanya Kocherlakota
Engineering Leader, Technologist, Strategic Thinker and Mentor
Better?secure?than sorry! Security is?not?an afterthought, and security-vigilant organizations take proactive measures to safeguard consumer data & enterprise assets. They are foresighted of all the internal and external threats and invest upfront in creating a security-first mindset in their employees. Though there is higher responsibility on the product & engineering teams, the buck doesn't stop with them. There is enough emphasis on all department employees to equally develop this mindset, be it a customer service agent or a salesperson. Since Product & Engineering takes a more significant piece of the pie, I focus more on that here.
Start with building a security center of excellence(SCOE), responsible for establishing the enterprise strategy and vision of creating a security-first mindset. The SCOE comprises engineering leadership and technology architects who usually fill this role. But for the SCOE to be more effective, there has to be a representation of critical thinkers, mavericks, and diverse participants. Document the roles and responsibilities, along with the accountability of each member in the SCOE. Create clear and concise approval workflows for each of the SDLC phases. Let SCOE act as the approval authority and gatekeeper for any major decisions.
Create security guidelines and train the teams, laying the foundation for building secure systems. For example, these guidelines cover every detailed security aspect like:
Create comprehensive blueprints for repeated engineering tasks. It increases team efficiency and helps the SCOE and reviewers quickly identify deviations from approved/agreed practices. Note: Blueprints are standard reusable documents, templates, and libraries created for ready use by the engineering teams. Some examples include:
Automate security processes and reduce manual intervention as much as you can. E.g., automate credential/key rotations. They are so painful and error-prone when done manually, leaving much sensitive information in the hands of the SREs.?
领英推荐
Consumer data is gold, and safeguarding that is paramount. Define comprehensible policies for consumer data management (storage, access, and retention). Ensure your systems managing the consumer data comply with various compliances(e.g., PII/PCI, FCRA, GDPR, and CPRA) by engaging with your Risk & Compliance teams upfront.?Not all applications/services need consumer data, and restricting data access is essential. Data access requirements for a headless backend system/service vs. frontend applications like web/mobile apps and CRM tools vs. analytics/reporting systems are different. Leverage these requirements to understand the application cohorts to create data access policies.
Here are some more best practices to consider in system and database design:
Conclusion:?To create a security-first mindset and to lay a strong foundation, there is much commitment, patience, and investment needed in the beginning. Bringing in any change is not easy; leaders must develop a strong will to face resistance and criticism. You may receive questions like: Why do we need a pessimistic security model? Isn't it over-architected? Why do you make it so challenging to access consumer data? Why not invest more in innovation and new product ideas that generate revenue instead? How can we meet the performance SLAs because of these overarching security aspects? Be prepared to answer them, and ensure they understand that security is critical to run the business. Conduct roadshows to educate and train your employees on the cyber safety aspects. Educate them on various existing and new cyber threats, and show examples of companies impacted by security breaches.
There is much more happening at the ground level than the thoughts I shared. I wanted to hear more from you and learn all the good things you do in your organization to protect your systems and data.?
Senior Engineer (Enterprise Cloud) at American Express
1 年Very well written post
Pretty neatly written. I completely agree on templating the practices which would lead to automating it, this reduces errors, reduces dependencies and increases velocity. This would also prevent security aspects not to be an aftermath in one's development cycle.
Technologist, Mentor, Leader, Founding Angel
2 年Excellent Chaitanya
VP of Engineering at Gen
2 年Excellent advice Chaitanya on making security a first class citizen in the SDLC! Great callouts on adhering to a zero-trust model, templating for consistency/reducing human error, database best practices, and automation/tooling. Automating security is key to successful shift-left of security at scale, as well as empowering engineers to do their own scans and be responsible for the results. With the plethora of open source tools available, security is approachable for all businesses small and large. It just takes the right amount of drive and a bit of time.