Author: Niranjan Maka
The Louvre Heist has been in the headlines. And CISO/CIO/CEOs donโt envy them.
๐ป๐๐ ๐๐๐๐๐๐ ๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐๐๐๐ โ๐๐๐๐๐
๐๐๐
๐๐๐๐
โ ๐๐๐๐
๐๐๐๐๐๐๐ ๐๐๐
๐๐๐๐ ๐๐๐๐
๐๐ ๐๐๐๐ ๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐
This is not surprising for many enterprise โoperationalโ teams.ย They have seen it in their own environment and understand the huge challenges in trying to stay on top if this issue.
โ๐ช๐๐๐๐๐๐๐๐ #1: The teams are all different org units โ like security/surveillance, factory floor team, facilities, AV/IT teams etc., ย They all have their own processes and, complying with InfoSec commandments is not the easiest as, they are responsible and measured for operational performance not just keeping their digital assets secure!
โ๐ช๐๐๐๐๐๐๐๐ #2: The sheer number / variety of vendorsโ technologies is a huge challenge.ย Each Org Unit has itโs own sets of devices / models, management interface, patching schedules, maintenance requirements.ย Keeping track of just their own digital assets inventory and be on top of what needs to be done cutting across those vendorโ technologies is humanly impossible!
โ๐ช๐๐๐๐๐๐๐๐ #3: Translating CIOโs InfoSec guidelines and implementing them across their own digital assets defined by org boundaries, is no easy obstacle โ what do those NIST controls mean, what does compliance guidelines translate to; or what is the mitigation or process to stay compliant? In the absence of enterprise level automation, the easy way out is to โstandardiseโ on credentials, try to stay compliant with โone time, point in time auditsโ!
๐ด๐๐, ๐๐ ๐ฆ๐๐ข โ๐๐ฃ๐ ๐๐๐ ๐๐๐ ๐๐๐ข๐๐ก๐๐๐ ๐ก๐๐๐ ๐๐๐๐๐๐ ๐๐๐๐ฃ๐๐๐ ๐ฆ๐๐ข๐ ๐๐๐ก๐๐๐๐๐ ๐ ๐๐๐ ๐๐๐ ๐ก ๐ โ๐ ๐ก๐๐๐๐๐๐โ ๐๐๐๐๐๐๐ก๐๐๐ ๐๐ ๐กโ๐ ๐๐๐๐ ๐ค๐๐โฆ ๐ฆ๐๐ข ๐๐๐ฆ ๐๐ ๐๐ข๐๐๐๐๐ก๐๐๐ ๐ก๐ โ๐๐ก ๐กโ๐ โ๐๐๐๐๐๐๐๐ !
There are ways to start sizing this problem, and put in place a process (based on tools that are available).ย If you need a quick half-hour chat on what are best practice checklists and where to start, message us.ย








