Self-defending networks: reality or fiction?
9 mins read by Marco Essomba , Last Updated Feb 2022
The concept of a self-defending network is not new. In the early 2000s, leading network and security vendors such as IBM [1] and Cisco [2] used the term to describe a network-as-a-platform. A collection of network and security devices working together as one unit to defend against cyber-attacks by adapting continuously to stay one step ahead of cyber threats.
10 years ago, the technology and tools required to bring together multiple vendors to create a self-defending network was very limited. Moreover, the cost of building such a system was prohibitive, and the market as a whole was not ready. Most security vendors had closed systems with no ability to integrate them with other third-party systems using Application Programming Interfaces (API). Self-defending networking was more fiction than reality since organisations did not have a mature enough network and security ecosystem to implement it.
Things have changed. Today, the technology glue to bring different devices in a homogeneous framework is ripe, and the market is ready. The advances in data analytics, Robotic Process Automation (RPA), Machine Learning, Artificial Intelligence, and APIs, combine all the ingredients necessary to create self-defending networks.
In this article, I cover the fundamental components of self-defending networks, how enterprises can benefit and how the BlockAPT Central Management Platform has turned the fiction of ten years ago into reality today.
Self-defending networks: why it?matters
Enterprises worldwide are facing increasing challenges to protect their digital assets against the growing number of cyber-attacks. The global skills shortage in cybersecurity is not making it easier. [3] Cybercrime is growing rapidly worldwide. The global cost is estimated to reach $8 trillion annually by 2022 [4]. Enterprises are continuously looking for ways to stay one step ahead of cybercriminals by ensuring that their network and security infrastructure can detect and act quickly against active cyber-attacks before any damage is done. Doing this in an efficient and cost-effective manner remains a challenging task for all organisations globally.
There is no lack of technology to defend against cyber-attacks. What is lacking is a fully integrated ecosystem that can ensure that people, processes, and technology are working better together in a synchronised manner to defeat even the most persistent, sophisticated, and well-resourced attacker.
Of course, technology alone is not the solution to stop cyber-attacks. The glue between people, technology, and processes must be in place. A self-defending network can help achieve that. The key business objectives of a self-defending network or network-as-a-platform include: (1) ensuring that security practises and policies are aligned to business needs; (2) ensuring that the cost of security operations is manageable; (3) reducing complexity and simplifying the overall network and security infrastructure to maximise effectiveness; and (4) detecting and responding to cyber threats faster. Ultimately the aim is to improve the Mean Time To Detect (MTTD) and Mean Time To Respond (MTTD).
Self-defending networks: what is?it?
As a whole, self-defending networks comprise technology, processes and people. From a technology point of view, the ability to manage, monitor, orchestrate, automate and respond to cyber-attacks faster and in a cost-effective manner is at the centre. All the components of a self-defending network are brought together using a set of tools and automation processes that provide the glue to all the network and security layers.
An effective layered defence approach also referred to as defence-in-depth ensures that all the components are working together as one. Devices providing anti-virus, proxy, firewalling, VPN, endpoint detection, IDS/IPS, vulnerability assessment, patch management, SIEM, policy compliance, routing, and switching are fully integrated. All these components are combined and tightly integrated using a vendor agnostic approach to provide deep monitoring, management, orchestration, and automated proactive response in order to effectively defend against cyber-attacks.
In multi-vendor security infrastructures, the ability to integrate different technologies from different vendors is key. A best of breed approach adopted by many medium and large organisations means that a self-defending network must provide a communication layer between all the systems involved in a highly secure and seamless manner. The ability to manage and integrate several vendors in order to automate and orchestrate processes is also key. A vendor agnostic approach is required to ensure that an organisation security investment is protected to defend effectively against current and future cyber threats. Depending on the needs of the organisation, over time, vendors and technologies can be swapped as needed, seamlessly, ensuring minimum disruption of the overall security infrastructure.
Self-defending networks: how it?works
The core components of a self-defending network can be grouped into 5 key categories: central management, monitoring, automation, orchestration and proactive response.
Central management and deep integration (digital nervous system):
In order to enforce an organisation policy, central management is required to bring all the different components into a unified ecosystem. A single command and control view ensures that policies and processes can be managed from a single pane of glass. By using APIs and native plugins, devices that are part of the system can be controlled in a consistent manner. A central management engine enforces the organisation’s security policy at a global level.
Continuous monitoring:
Monitoring is key in order to ensure visibility across the entire ecosystem. A SIEM solution is used as a central collecting engine for all raw logs and events collected from devices. That data is then sent to an engine for correlation and long-term storage. Using Big Data and security analytics, events correlation can be used to give the overall self-defending network more intelligence. Anomalies can be detected faster. Automated insights and rules can be pushed to devices in order to respond to cyber-attacks in real-time using known patterns, heuristics and machine learning models. The data collected overtime across the network provides greater threat intelligence. The more data the better. As the self-defending network matures, it can ‘learn’ faster overtime by self-tuning, reducing false positives, maximising its effectiveness and helping reduce the organisation overall cost in security operations.
Automation and orchestration:
Automation refers to the use of playbooks, insights, and rules that provide an abstraction layer required to formulate proactive response plans. Using various tools and technology such as RPA, automation is allowing processes to be systematised. Menial network tasks can be automated freeing valuable time for security teams so that they can focus on critical incidents. Policies are pushed to network and security devices in a secure and consistent manner in order to enforce an overall defence-in-depth approach. Proactive defence is implemented at several layers in order to defend efficiently and effectively against cyber-attacks - better than current point solutions can.
Responding faster to attacks:
The end result of an effective and proactive self-defending network with the ability to respond faster than current individual systems can. By leveraging deep integration with devices that are part of the self-defending network, playbooks and rules are used to take specific actions. For example, a ransomware is detected at the endpoint device, not only is that threat neutralised at the end point, but the adjacent network switches can also quarantine the device by blocking the port until a successful remediation is applied. Many other rules can be created and applied at global level. With all these components working together in a coherent and consistent manner, security teams can reduce operational cost and complexity dramatically. The bottom line is that organisation can dramatically improve their Mean Time To Detect (MTTD) and Mean Time To Respond (MTTD).
Self-defending networks: business?benefits
The benefits to organisations are tangible. Network and security automation means that security teams can free up valuable time by automating menial tasks so that they can focus on critical incidents. Playbooks can be created and re-used on demand throughout the enterprise, cutting down online enterprise applications delivery lead times and ensuring that online business applications are delivered in a fast and secure manner in the cloud or on-premises. Key business benefits can be summarised as:
1. A central management (entreprise connective fabric) of network and security infrastructures that simplifies management of disjoint and different technologies.
2. Automation of menial tasks in order to free up time from security teams given the resourcing challenges facing many organisations worldwide.
3. Consistency in delivering services across the organisations since automation provides a way to re-use rules and playbooks in a predictable and consistent manner.
4. Integration of network and security processes with overall organisations business workflows which brings security operations and development operations together.
5. Institutional memory within the self-defending network ecosystems means that knowledge transfer is consistent, and the intelligence acquired within the enterprise over time can be safeguarded given the global cybersecurity resourcing challenge.
Multi-Vendor Central Management Dashboard
领英推荐
Visual Playbook Builder For Automation
Monitoring & Security Analytics — Top?Attacks
Monitoring & Security Analytics — Top Violations
Monitoring & Security Analytics — Global View
Full Stack Cyber Defence?Platform - Central Digital Nervous System
BlockAPT ?consulting experience acquired from working closely with leading organisations in banking, finance, telecom, gaming, gambling, etc, means that our expertise in designing and implementing state-of-the-art cyber defence systems has given us a unique insight in the ongoing security challenges facing enterprises.
Our approach to security is to arm organisations with a defence-in-depth framework that combines people, technology, and processes, all working together in a unified manner. Our?BlockAPT ?Central Management Platform is Central Digital Nervous System or Entreprise Connective Fabric that brings together existing and disjointed network and security ecosystems for better integration in order to drive huge efficiencies and cost savings within enterprise security operations.
Our current version of the platform is already helping our clients in various sectors such as gaming, gambling, banking/financial services, and manufacturing to drive down the costs of security operations by more than 80%, and to get the best out of their existing security investment.
From a single pane of glass, our clients can fully manage, monitor, automate, and orchestrate their entire network and security ecosystems. Our growing list of leading network and security vendors include?F5 Networks ,?Cisco ,?Palo Alto ,?Juniper ,?Splunk ,?Qualys ,?Jira ,?Kemp ,?EdgeNexus ,?Cloudflare ,?Stella Blockchain ,?BlackstoneOne ,?Fortinet ,?Stormshield ,?SentinelOne ,?ntopng ,?Kibana/Elastic ,?Check Point ,?AlienVault ,?Microsoft Azure, ?etc.
The?BlockAPT ?Central Management Platform is helping organisations get the best out of their existing network and security infrastructure by significantly improving the Mean-Time-To-Detect (MTTD), and Mean-Time-To-Respond (MTTR) and given them the confidence to respond faster to security incidents. To learn more about the?BlockAPT Central Management Platform ?or to request a trial please visit our website or social media site:
Website:?https://www.blockapt.com/
Twitter:?https://twitter.com/blockapt
References
[3]https://www.csoonline.com/article/3331983/the-cybersecurity-skills-shortage-is-getting-worse.html
[4]https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ & https://www.darkreading.com/threat-intelligence/cybercrime-costs-to-reach-8-trillion-by-2022
About the Author:
Marco Essomba is the Founder & CTO of BlockAPT . A leading edge UK-based cybersecurity firm empowering organisations with an advanced, intelligent cyber defence platform. The BlockAPT platform allows organisations to Monitor, Manage, Automate & Respond (MMAR ) to cyber threats – 24/7. Marco’s passion, expertise and knowledge over 15 years of providing cybersecurity solutions has culminated in the design of our unique BlockAPT platform. Developed over time as a toolkit to help small and large enterprises with business security issues, BlockAPT’s platform brings together threat intelligence, vulnerability management, device management and proactive incident response management to help fight the war against cyber attackers.
Company website: https://www.blockapt.com
Founder & CTO @ BlockAPT | Cybersecurity Expert
5 年Steve Murgatroyd