Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Technologies & SolutionsSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceAccess Management

Balancing security & agility in today's networks is a continuous effort

By John Moran
Networking

Image via Pixabay

March 16, 2023

The recent pandemic fundamentally altered enterprise operations in many ways. The unforeseen and rapid onset of the pandemic presented challenges for which few enterprises were prepared. Chief among these challenges was the mass migration of workers from offices to their homes. Enterprise network and security teams were suddenly tasked with delivering secure, reliable access to sensitive enterprise resources to home networks they could neither see nor control.

Balancing security and agility is a continuous effort: Enterprises constantly strive to deliver the speed and agility required to remain competitive, while simultaneously ensuring the level of security necessary to protect the enterprise from an increasingly diverse threat landscape. In the early days of the pandemic, when not just the productivity, but the health and safety of the workforce was in question, agility often trumped security. Even in retrospect, it is difficult to find fault in these decisions. However, as the dust of the pandemic settles, many enterprises have been left with potentially unsecure network configurations, the result of changes made rapidly and outside of normal change control processes.

While the pandemic amplified this problem, it is not new. Temporary access, testing and development, mergers and acquisitions and human error are just a few common sources of unsecure network configurations. In fact, any change introduces risk, which increases exponentially with the speed of change. This can be represented as “Degree of Change Speed of Change = Potential Risk.” If we accept this to be true, the pandemic may be the greatest single source of potential risk most will experience in their careers.

Despite the perpetual risk, change must occur with increasing speed for an enterprise to remain competitive and undertake business transformation initiatives. If the resulting risk cannot be avoided, how can enterprises reduce this risk to an acceptable level? Enterprises must establish processes to both mitigate existing risk and reduce future risk. To be effective, these processes must be run continuously and in parallel.

Mitigating existing risk

The objective of mitigating existing risk is to detect and address pre-existing unsecure configurations in the enterprise network. This requires defining a set of security requirements, or guardrails, which can be used to uniformly assess the entire enterprise network. What defines an unsecure configuration will vary between enterprises and may be influenced by applicable laws, regulations, standards, industry best practices and the enterprise’s risk tolerance. Although varied, there are generally two groups of security requirements.

First are requirements which would be considered unsecure, regardless of the individual enterprise. For example, Telnet being permitted from the internet to a demilitarized zone network (DMZ) is almost always a bad idea. If the enterprise is subject to The Payment Card Industry Data Security Standard (PCI DSS), allowing almost any traffic from the internet to a PCI data network would create risk and be a violation of PCI.

This category of security requirements is normally the easiest to define and is an effective way to begin identifying low hanging fruit while the process matures.

Security requirements which are specific to the individual enterprise fall into the second group. Security requirements in this category will take longer to define and must be continuously re-examined to remain congruent with the risk profile of the enterprise. Examples might include only allowing access to a critical network from a few select subnets over secure protocols, like HTTPS and SSH, or not permitting any access from a development network to a production network.

While opportunistic attackers are most likely to find only the unsecure configurations in the first group of security requirements, determined actors executing targeted attacks will dig deeper. Properly defining these security requirements must involve input from a wide range of stakeholders. The enterprises who are most successful in defining these requirements often start with the most critical or highly regulated network segments or with very high-level segmentation requirements. As the security requirements and processes are tested and proven, future iterations can expand to additional network segments and become more granular.

Reducing future risk

However successful mitigating existing risk is, it is a reactive process. A proactive, secure-by-default approach is much more efficient and effective at reducing risk from unsecure configurations. The objective of reducing future risk is to proactively detect potentially risky configurations before they are provisioned to the network.

The same security requirements designed to detect existing risk can be leveraged within change control processes to identify potentially risky configuration changes before they are made. Performing this security assessment on changes at scale, while continuing to provide business agility, requires automation, which can be achieved through scripting or purpose-built solutions. Reliable, automated security assessments provide enterprises with the ability to conditionally automate the entire change process, from request to provisioning, if no risk is identified and any other required conditions are met, further increasing business agility.

Automating security assessments of changes is especially critical in DevOps or CloudOps processes, where enterprise security teams tend to have less direct control and oversight. Because of the autonomy of these teams and the transient nature of the assets they control, the most effective way to enforce security is to create security guardrails within which the teams can operate freely. In this manner, enterprises can retain the agility of these new processes and technologies without sacrificing security.

Like death and taxes, change and the resulting risk are inevitable. In most enterprise networks, this risk through unsecure configurations has accumulated through years of normal network operations and increased dramatically over the course of the pandemic. Demand for increased speed to support DevOps, cloud adoption and business transformation initiatives will continue to grow, compounding the probability that these unsecure configurations will lead to a serious security incident. Mitigating the resulting risk requires parallel efforts to continually identify and correct existing unsecure configurations and to automate the proactive detection of potentially unsecure configurations in DevOps, CloudOps and change processes.

KEYWORDS: attacks enterprise cyber security pandemic remote access risk mitigation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Moran is the Technical Director, Business Development, with Tufin.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security-officer-fp1170x658v437.jpg

    For security specialists, continuous training is a must

    See More
  • cybersecurity-laptop

    Persistent data exposure is a much riskier problem in today’s remote world

    See More
  • malware-cyber-crime-freepik.jpg

    Malware-as-a-service is the growing threat every security team must confront today

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Security of Information and Communication Networks

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing