With the hybrid infrastructure model, the public cloud portion is the easiest part to secure because there are well-known use cases and associated security tools for Big Tech cloud platforms including AWS, Azure, and GCP. For example, most cloud security products can be turned on from their respective app store; from there, they assess virtual public cloud instances, toggle the appropriate switches, and insert themselves into the traffic path.
However, imagine you want to manage your on-prem infrastructure, such as in a hospital or manufacturing plant, in the same way. Consider the digital services stack of:
In Figure 1, you can see only a fraction of available security players and products required for a defense-in-depth strategy.
Figure 1: Too many cybersecurity products from too many vendors.
Courtesy of: The Momentum Cyberscape 2021
(Click to Enlarge)
The challenge for IT is figuring out how to deploy a mix of products that work best for them, and that also provide cybersecurity coverage for different locations across the infrastructure. The common approach is to use the one or two solutions that are easiest to deploy. In addition, some organizations address the remaining gaps by purchasing costly cyber insurance.
Organizations need to be able to bring together the solutions that are best suited to defend their on-prem infrastructure. These include third-party applications and solutions of their choice.
During the pandemic, IT teams needed remote access to equipment. This caused many to expose management ports—even of remote desktops—directly to the Internet. Adversaries were able to find this equipment and attack using the exploits described earlier (stealing credentials, breaking through unpatched systems). Had teams deployed private out-of-band infrastructure, these systems would have remained protected while still allowing them remote access.
There are two categories of human error: slips or lapses, which are small mistakes (as in typos and configuration errors) that occur when performing familiar tasks or activities, and decisions (like delaying updates or patches), which occur from a lack of