Skip to main content

Security as 'Product'

One of the (many) challenges that attracted me to a role within Information Security was to seek a way of better integrating and aligning the benefits of both amazing products alongside amazing information security.

Now, 'amazing' security need not require multi-million $ appliance-level technology or investment, but should be sat close to the edge of the trail-blazing curve from both an AppSec and InfoSec standpoint both through practices, culture and attitude.

What do I mean?

Well, right now I'm not 100% certain, hence this blog post (I'm looking for ideas and validation/criticism) but here's the concept:

What if Security itself became a 'Product' for the business much like any other they produce?

Or perhaps - but I am shying away from the idea for a few reasons I'll explain - a set of features/requirements that are baked in to every product we release?

Sure, best practices and ISMS frameworks mandate/dictate what 'best practices' look like, but there is something deeper and more resonant that I think they miss - especially when 'regulation' isn't the reason to include a feature, for example password complexity on consumer accounts.

The example I've been using lately is the concept of 'time travel' and the fact that customers may not realise they want the e-retailers they choose to do business with to be 'time travel aware':

By this I'm thinking of a scenario where the consumer is shown (via application logs to a SOC) to login from IP X (let's say found to be based in Paris) but then 5 minutes, and hour, or perhaps 3 later from IP Y based - say - in Vietnam...or China...or Indonesia. Time travel. They sure didn't jump on a jet and buy a widget from you in that time. Nor did they likely choose to VPN to that location and then loop back and browse our sites.

Now, ask a consumer if they'd like this functionality within the products they use...and I'd guess they'd say 'yes' - it seems like a sensible way of detecting someone 'rattling the lock' of the retailer's security practices. But until asked they probably didn't know they needed, or even expected this product/feature.

Often - and in light of well-publicised recent industry breaches - I feel it's fair to say that consumers don't always know or are able to articulate what these Product features would be that would help keep them and their data safe and warm in the vaults of their trusted retailer. They DO care, but they may have expectations they've simply assumed we all follow.

So this is where 'Security as a Product' comes from in my mind. Security doesn't sit on the periphery of 'Product'. nor the same for 'Engineering' as its own entity. Instead Security becomes a product (or perhaps a set of tailored features?) with a assigned Product Owner ensuring that the best interests of the product are always represented from a Security perspective. Perhaps part of Site Reliability Engineering?

Yes, you can argue it's just a twist on, or perhaps explicit part of, what a CISO's role is. However the reality is that the CISO is usually only one person with a constrained team, and conversely the product-set a wide ranging catalogue too large to manage day to day at the level I'm trying to convey in this thought piece.

The diversity of Products requires dedicated care and attention - and a vanilla set of requirements from 'Security' are hard to whitewash across all in the same way...and, too, are unlikely to be applicable to all and potentially even damage the Products, UX and ultimately the business.

So that's where my head is at right now - Security as a Product - I'd welcome thoughts, feedback, criticism.

Comments

  1. Security as a product is an interesting concept. I think one of the main issues I see is the security team investing in excellent technical solutions which are by passed by the business functions. Recently there has been a shift to the value of integrated solutions from point concepts. But for the business lines to buy in we need to design these with user experience in mind. There is no point investing in the best solutions the market has to offer if these aren't intelligently designed from a security and user experience perspective. Maybe changing to the product view could drive this forward. Susanna Holden (Harper) IBM UK Ltd

    ReplyDelete

Post a Comment

Popular posts from this blog

Cultural mugs

One of the main challenges that drew me to Information Security (and management in general) was that of helping to build a working culture that is genuine, sustainable and is aligned to support 'the vision'. I've had the benefit to have learned directly, and from the experiences of past bosses, leaders and mentors how not to approach cultural change initiatives: Knowing what bad change-approaches looks like, usually without any real clarity around what perfect (or even good! ) may be is a useful head-space to occupy. At least in the absence of knowing what to do, knowing what not to do provides a useful reference point. I find that this simple psychological tool helps me to sanity check if I'm falling into those past gotchas and traps as shared with me by the wise few who've been there, seen it, burnt that bridge, picked themselves up and started all over. Haven't we all? The challenge of raising Information Security awareness through driving a work

Introducing the Conosco Security Division

One thing you’ll notice is that I quite like to blog about what I’m up to at Conosco. As the CEO for a private company, this may be somewhat unusual, and it would certainly make other company Boards nervous.  Thankfully not ours.  We believe that being ‘open’ betters the understanding among our staff, future employees, clients and prospects of what Conosco does, how we do it, and what we strive for. It also follows an ethos that I believe has helped mature the Information Security community – sharing knowledge that adds insight and value to its members. This approach has allowed the Information Security community to build strong bonds,  improve its members’ collective defences and lower the barrier to knowledge proliferation as a result. Conosco has a new and niche security offering for the SME market that has benefitted from such open thought, opinion sharing and an honest approach to solving our clients’ genuine security needs. The new Conosco Security Division provides

A SOC is cooking - with a sprinkle of Machine Learning and SRE

This week sees the start of an exciting new chapter in our ever-maturing InfoSec story, with our Group Security team forming a new Security Operations Centre (SOC). It has been founded using key staff from our existing Network Information Security (NIS) and AppSec analyst capabilities and I believe we are taking an interesting approach to the its creation that sees us using our ASV ( Surecloud ) as our first internal SOC client: The rationale is simple - Surecloud's consultants are tasked with poking and probing our applications, network and supporting infrastructure (all BAU as part of our PCI-DSS routines), and our SOC is challenged to be able to report back to the testers what it is they did. To achieve this the new SOC team has been empowered (provided time, creative freedom, engineering resource access and budget) to architect whichever technical solution(s) they require to be gain the required insight, and so a Red/Blue team dynamic is born between 'them' a