Thursday, August 18, 2011

Playing to win - Active network security

Current information security doctrine leads to reactive security. We incorporate layers of firewalls and monitoring tools into our networks in the vain hope of stopping most hackers and slowing down and monitoring the smart few who can penetrate the security.

This defensive only playbbook is a recipe for disaster as can be seen in the news every week as company after company suffers data breaches.
With the complexity of modern networks and the inability to fully automate everything fully the human error factor will eventually leave an opening for hackers to get in.

Its time to re-evaluate our approach to security and take a page out of another playbook. The information security battle is just that, a battle between two teams, The good guys trying to protect confidentiality - integrity and availability of the data, and the bad guys trying to access that data or deny others access to it.

You dont win a battle by sidelining your offense. Admittedly legal issue prevent us from hacking the hackers but we can safely integrate passive defensive tequniques and systems to make it much more difficult for hackers to gain access. And if its too hard the majority of hackers will go looking for an easier target.

Passive Offensive can be implemented in a number of ways and I will describe them in following articles.

Lets play to win and not rely on a purely defensive network infrastructure.

No comments:

Post a Comment