Far too often, the relationship between engineering and security departments at an organization is highly antagonistic. Both of these teams have the same set of overarching goals, so why is there such animosity here?
Below, I outline a few reasons why these two teams can butt heads and what we can all do to bridge the divide.
Assume good faith
When the security team comes to the systems engineering team with a new project, tool, or vulnerability, and the risk assessment is inappropriate, the need for respect cuts both ways. The systems engineering team must be willing to bring a documented dialog to the security team. Correspondingly, security teams must be willing to trust the technical expertise of their operational teams. They are the subject matter experts, and they live the infrastructure day in and day out. If there is some minutia of the environment that protects you from a certain vulnerability, or a tool will not work as expected in the environment, this must be taken into consideration.
Additionally, though, the security team did nothing wrong by raising what they did. They cannot be expected to be experts in every aspect of the organization. This give and take must come from both sides of the organization, with each focusing on what they do best and sharing information when necessary. When this is done respectfully, and with an assumption of good faith, we build healthy relationships across the organization.
Explain the "why"
The organization's engineering side is full of deeply curious folks who seek to understand how and why complex systems operate as they do. If the security team suppresses
or obfuscates the reasoning behind policies, procedures, or frameworks, willingly or unwillingly, this can be perceived as an unwillingness to cooperate. At worst, an engineering team will think that you do not trust them with the information.
Involve the engineering side in the planning sessions when building a compliance framework for the organization. Actively solicit input on policies and procedures. Explain why models like SOC2 or BSIMM are appropriate for the organization and what benefits they bring. By doing so, you can help demonstrate for the engineering side that these things are not being built in a vacuum, and they provide real value. The intellectual rigor of being challenged on your assumptions will help build a better security program, as those with a fresh, unbiased perspective may bring up issues with the program that you may not have ever considered.
[ You might also like: 3 best practices for working on a distributed team ]
Create theory out of practice
As a security department, you need to ensure that the policies and procedures you are bringing to the organization will bring tangible value. The most direct way to do this is to build out from the material conditions of your organization today. The industry is awash in frameworks, policies, procedures, models, standards, checklists, programs, guidelines, protocols, and principles that might be wildly inappropriate for the operational reality of your organization. Read these, know them, take inspiration from them, maybe even implement them one day, but understand that they are simply a variety of options that you can pull from, not the default option. You have the ability to build whatever security culture your organization needs to derive the best outcomes. If that means your policy will be highly flexible on who can approve a change management request, be flexible. Focus on the operational outcomes and not blind adherence to orthodoxy.
All one team
Everyone is working to keep the bad guys out, keep our systems up, and have a little fun along the way. Keep it light, and remember that we are all on the same team.
[ New research from HBR Analytic Services - IT talent strategy: New tactics for a new era ]
저자 소개
Jonathan Roemer is a senior DevOps engineer at Drizly with an interest in security, automation, and the human side of IT. He can usually be found hiking or reading a book on his porch.
유사한 검색 결과
Slash VM provisioning time on Red Hat Openshift Virtualization using Red Hat Ansible Automation Platform
Red Hat Ansible Automation Platform: Measuring Business Impact with Dashboard and Analytics
Technically Speaking | Platform engineering for AI agents
Technically Speaking | Driving healthcare discoveries with AI
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
가상화
온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래