![]() |
How? Software-defined Trusted IT will come in no small part from product security: the art and science of building threat resiliency and compliance in from the start. Product security: Building threat resilient productsTrusted IT means securely developed products. Defending against advanced threats is an endless arms race with a battlefield that has to balance prevention controls with sophisticated detection. We also cannot solely rely on effectiveness of one or two solutions. We need depth to our defenses, which includes security within each product itself. Software powering our environment is a critical line of defense against threats; it must be developed securely. In 2012, more than 5000 software vulnerabilities were registered on commercial products and open source software. Most recent high profile attacks have involved the exploitation of software vulnerabilities. Each software vulnerability in a product represents a new opportunity for attackers to compromise entire environments. There never will be “vulnerability-free” software but there are well-known steps vendors can take to minimize occurrence and severity of security flaws:
Product security: Building products that adapt to security policies of customersTrusted IT means security-aware products. Most security policies are driven by some combination of external and internal pressures – regulatory compliance and risk appetite. Security policies are the foundation on which products are used and architectures are built. We need policies to tell us how to grant and remove user access, what type of access is authorized, which activities need to be logged, which data needs to be encrypted, and so forth. Too often customers are forced to change their preferences and adopt security practices that fit the limitations of products they deploy. It should be the other way around. IT products must be deployed in a way that integrates with existing security architectures and processes. The switch requires only three simple things:
Product security: Building products that enable advanced security and complianceTrusted IT means security and compliance intelligence built-in. Advanced, intelligence-driven security with active governance is an essential ingredient of Trusted IT. They demand deep access to business intelligence to detect advanced threats or to measure compliance. However, this access too often is one-way: security and compliance solutions extrapolate information from IT products without the product’s awareness of what is required for compliance or advanced security. The product managing a critical IT function is in an excellent position to detect risk, anomalies or optimize a function for compliance. IT products must become active participants in advanced security and the governance ecosystem in two ways:
Product security: The foundation of IT trustProduct security is about building threat resilient products capable of adapting to customers’ security policies while providing intelligence for detecting advanced threats and enabling active governance. It is a foundational component of trust for any product participating in the IT infrastructure. Product security is a process. It is a way of building products that trusted technology providers must adopt as part of their product management lifecycle. Trusted technology providers typically make their product security practices public through a dedicated page of their website; that’s why ours are at www.EMC.com/security. The post Building Trust through Product Security appeared first on Product Security Blog. |
