This is the second in a series of three blog posts focusing on Critical National Infrastructure (CNI) cybersecurity. This blog looks at the problem space through the lens of "People and Processes."
- Enterprise security challenges for CNI organizations: Overview
- Enterprise security challenges for CNI organizations: People and processes
- Enterprise security challenges for CNI organizations: Technical solutions
As mentioned in the previous blog post, CNI cybersecurity is not just a technical problem—technology and tools can be enablers to help reduce risk, but you should also identify the "people and processes" required to put good security practices in place.
"If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology." - Bruce Schneier
For those of you aware of the Open Systems Interconnection (OSI) model, you can see people as "Layer 8." To take the analogy further, you could say that organizational processes, governance and policies are "Layer 9." People are needed to put all the relevant pieces together correctly to reach the desired state of security.

People
Imagine buying a bookshelf from a certain Nordic flat-pack retail company. You have all the relevant parts and documentation to create the bookshelf, but you don't have the actual skills to piece them all together. If you continue without the appropriate skills, you may end up with a bookshelf that isn't fit for the purpose or, even worse, could actually be dangerous. This scenario could cause a catastrophic event within CNI organizations. Therefore, enabling Layer 8 security is paramount to enhancing the security posture of all CNI platforms. IT engineers and administrators must understand how to build, configure and integrate the various products to reach an agreed end state using repeatable and compliant methodologies.
Several security-related phrases bear this out, such as "security is everybody's concern," "security is a process, not a product" and "security is key to your business success." You can create a "security by design" culture and embed security processes earlier into the platform design and architecture phases by having trained and security-aware staff across the whole CNI organization.
There are many cybersecurity training areas that could be beneficial for CNI organizations. These include:
- CNI threat intelligence techniques
- Cloud security processes
- Data protection
- Data sovereignty
- Social engineering
Making this behavioral and cultural shift to a DevSecOps-focused mindset doesn't happen overnight. It takes perseverance and a willingness to change. CNI organizations need to fully understand all security and safety aspects before making any major changes. This understanding should come from a bottom-up and a top-down approach. Engineers and developers must embrace security via osmosis as part of a cross-functional team or through official training (either internal or external). Senior managers and CISOs should articulate the security requirements and risk management strategies across the organization so that every staff member understands why they need to build in security by default.

Processes
Security processes are designed as a series of steps to be followed as a consistent and repetitive approach or cycle to accomplish better security within organizations. For CNI organizations, stability and resilience are critical to drive continuous operations. Processes should be certified, repeatable and automated where possible.
In addition to individual internal processes, CNI organizations have requirements and governance policies laid down by various regulatory bodies. Being able to provide attestation to these requirements means implementing many processes, some of which could benefit from being automated.
Oftentimes, security risks are borne of honest mistakes, or people making necessary compromises to make technology usable on a daily basis. If a computer doesn't help a user encrypt a file and keep it encrypted through daily use, then a file goes unencrypted. If a computer doesn't help a user manage passwords, then the same password gets used for everything. It's human nature, but it's easy for computers to perform the steps that humans don't have the time or mental energy to do themselves.
Work with your users to discover what could be made easier through automation. Find the shortcuts people have to take, whether they like it or not, to save time and energy or just to make two applications work together, and then build automation to solve those problems. This can start with the IT and DevOps teams, where automation tends to be integrated, at least to some degree, with existing workflows already.
Expand the principle out to other users from there.
Conclusion
Improving and optimizing the way your users work is important to the security of your CNI organization. The more you provide users with tools and techniques to enable best practices, the safer your organization becomes at every level.
Discovering what users need can be a challenge, and it's important to implement solutions in such a way that they improve rather than slow down work. But this is a puzzle that can be solved with careful consideration and a lot of listening to the humans involved.
Find out what you can do to improve how data is processed. When it comes to automation, don’t try to automate everything in a “big bang” approach. Identify simple tasks to be automated then take the time to optimize the tasks first. Remember, if you automate a bad process, you will just end up with a bad process which runs quicker! This helps users avoid mistakes and helps ensure computers are using the same reliable and secure methods of data transfer and processing, no matter what.
저자 소개
Chris Jenkins is an experienced EMEA based Chief Technologist who provides a broad range of technical and and non-technical skills to enterprise customers.
유사한 검색 결과
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
오리지널 쇼
엔터프라이즈 기술 분야의 제작자와 리더가 전하는 흥미로운 스토리
제품
- Red Hat Enterprise Linux
- Red Hat OpenShift Enterprise
- Red Hat Ansible Automation Platform
- 클라우드 서비스
- 모든 제품 보기
툴
체험, 구매 & 영업
커뮤니케이션
Red Hat 소개
Red Hat은 Linux, 클라우드, 컨테이너, 쿠버네티스 등을 포함한 글로벌 엔터프라이즈 오픈소스 솔루션 공급업체입니다. Red Hat은 코어 데이터센터에서 네트워크 엣지에 이르기까지 다양한 플랫폼과 환경에서 기업의 업무 편의성을 높여 주는 강화된 기능의 솔루션을 제공합니다.