Extended Detection and Response Capabilities Are Emerging to Improve Detection Accuracy and Security Productivity – according to Gartner.
But what about Risk Management and Process Compliance Metrics?
According to Gartner, in their report entitled: “Top Security and Risk Management Trends,” there is an unrelenting adoption of cloud and mobile computing that is disrupting the traditional market and redefining network and server security requirements, with newer solutions required:
- Network security is transforming to a cloud-based service delivery model with virtualized firewalls, and cloud-based AI/ML solutions, from vendors like Palo Alto Networks, and AI/ML offerings from vendors like Cybraics, Stellar Cyber, and others.
- Container security in the cloud, with Kubernetes-based solutions are creating numerous new challenges for securing workloads as teams adapt to an agile application world, from vendors like RedHat, and others.
- Zero trust network access (ZTNA) from vendors like ColorTokens (and others) is replacing legacy VPNs, where encrypted network access just means hackers hack securely.
According to Gartner’s report above, the following Fig. 1, is a typical architecture, including: EDR: Endpoint Detection and Response, CASB: cloud access security broker, IAM: Identity and Access Management, DLP: Data loss prevention, and Network Firewalls: NTA: network traffic analysis.
Fig.1: Extended Detection and Response Conceptual Architecture – Source Gartner.
While NG-Firewalls (next generation) address part of the above, Workflow Process Compliance, solutions, Automation with AI/ML and vulnerability scanning is needed, along with secure APIs.
So What about Risk Management?
The ISO 27005 Risk Management Standard is part of a suite of standards for information security management.
Fig. 2: The ISO 27005 Risk Management workflow – Source ISO.org
Kovair’s task-based workflow helps automate all the phases of reviewing and monitoring risks on a regular basis and then continuously updates the risk plans, which can be part of the ISO 27005 Risk Management Process.
Fig.3: Risk Management Process
As shown in the Risk Management Process diagram above, Kovair’s solution helps organizations to capture, manage risks as well as define mitigation plan for every risk without compromising on risk management efficiency. Some of the key capabilities offered by Kovair are:
- Provides industry-specific, guided templates empowering teams to instantly begin risk analysis
- Allows users to prioritize Risks based on their probability of occurrence and severity
- Provides on-screen Risk Matrix based on the likelihood and severity of Risks
- Provides integrations with multiple security tools providing visibility to security vulnerabilities
- Gives complete visibility of Risks threats or opportunities through real-time reports & dashboards
- Allows to define and maintain instantaneous traceability between Design, Process requirements, Risks and Hazards
CIOs and Software Architects of Enterprises embarking on Digital Transformation projects should explore Kovair’s latest DevSecOps-based offerings as they re-vector to newer hybrid multi-cloud datacenters offering newer services: with security vulnerability assessments built-in, via integrated partners, with added Risk Management functions.
In this blog we have discussed the basics of ISO 27005, Risk Management process and how Kovair solution facilitates both of them. Follow-on blogs will include Use Case Scenarios and further benefits of the Kovair solution set.