When the word "but" is used in a phrase, it nullifies the words that come before it, placing the focus on the statement that comes after it. Similar to the "but," a small flaw in your security composition might make all of your other efforts pointless. The adage "security is deployed in layers" illustrates how each layer contributes to total security. In order to address system vulnerabilities, a number of controls and safeguards are implemented.
Security is deployed in layers to ensure that the confidentiality, integrity, and availability of a system are preserved. Any weakness in any of the layers can lead to an irrecoverable security breach. To explore in-depth these layers, I have used a different approach to bring home the message.
Composition of Security
For a system to be secure, three components need to be involved in ensuring the confidentiality, integrity, and availability of enterprise data. You cannot leave one out and claim that you have done your due diligence to ensure a secure system. Security encompasses technology, process and people
Technology layer
These refer to the technical devices or components used to secure a system. Such as firewalls, intrusion protection and detection systems, web application firewalls, endpoint detection and response, and so on and so forth. There are several weaknesses too in technological components, which include.
Misconfigurations are one of the top vulnerabilities in technology.
Mitigating Technology Vulnerabilities
Process layer
Without the right processes, technology alone cannot help you. What is the purpose of a misconfigured firewall or a protection tool? Process is used to define the acceptable operating mode of a device, people, etc. When safe operating procedures are defined, it makes all other controls effective.
Below are cracks in the process layer.
Mitigation of cracks in the process layer
People Layers
This is one of the most significant layers. While I say significant, it does not make others less significant. The people’s function of security ties technology and the process together. Without the right people, no one forces the process and operates the technology.
Types of People Vulnerabilities
Identifying People's Vulnerabilities
Mitigating People Vulnerabilities
Technology often receives the most attention. As a result of this, most organisations assume that they have sufficient security in place just because they have invested in security technologies or appliances.
On the contrary, we need both the human factor and the process factor in addition to technical factors in building formidable security. Any weakness or vulnerability in any of the layers can have major consequences.
We can safely conclude that no security layer should be exempted. Just as security requires people, processes, and technology, any weakness in any of the layers can jeopardise your security endeavours.
Please share by clicking this button!
Visit our site and see all other available articles!