Reduce IT Vulnerabilities by Bridging the SecOps Gap

BY

reduce IT vulnerability

Security threats are becoming a more serious and frequent problem than ever before, costing companies millions of dollars per breach event. The good news is that many of these could be avoided, as hackers frequently take advantage of known vulnerabilities.  The bad news is that many organizations are unprepared because IT Operations and Security teams aren’t able to work together effectively to identify, remediate, and track vulnerabilities easily.  They are caught on either side of the SecOps Gap.  Competing priorities, tools that don’t tie together, and a lack of automation make it really tough for them to meet the demands of the business and stare down the threat of hackers.   IT Leaders are starting to recognize the gravity of this problem and are struggling to come up with new solutions to help them.

Solve the Root Cause
Similar to DevOps, SecOps links the Security and Operations teams together to work with shared accountability, processes, and tools to ensure that companies do not have to sacrifice security to maintain a commitment to business agility.

  • Shared Accountability

One of the first steps in moving toward a SecOps culture is removing the “us” versus “them” perspective between Security and Operations teams. Leaders need to step in and demonstrate that, they are all accountable for making sure the organization and its customers are protected. Gone are the days of dropping off the indecipherable results of the latest vulnerability scan on someone else’s desk and thinking you’re “done.”

  • Automation

Evaluate tools and processes to see if they enable or inhibit collaboration. When I speak with teams grappling with these issues, I see processes buried in time-consuming, repetitive, manual steps with rough handoffs. Tasks that have predictable or required steps and need to be repeated over and over again should be automated. Another issue I see is the inability to sort and prioritize to get the most important security vulnerabilities to the top of the queue. This can be addressed with tools that automate the process of mapping vulnerabilities to infrastructure and prioritizing which to fix first. Without automation, these processes are performed by hand — making them error-prone, time-consuming, and cumbersome.

Tools to Support SecOps

You need the right SecOps solution to transform disconnected initiatives into a single, unified, secure, and comprehensive process which improves collaboration between Security and Operations. Your solution should be able to accelerate vulnerability resolution, reduce the cost of remediation, and enable companies to avoid major security issues.

Specifically, the solution should provide the following key capabilities out of the box:

  • Tie “what to fix” with “how to fix it” by linking vulnerabilities to identified fixes.
  • Automate the deployment of the fixes based on rules, policies, and priorities set by the business.
  • Bring together Security and Operations teams by enabling them to share data on vulnerabilities present before and after remediation.
  • Remove tedious and error-prone manual efforts by providing direct integration with change management and reporting.

Take a Comprehensive Approach – Manage by Policy to Identify, Remediate, and Track Vulnerabilities

Some organizations get bogged down and fail to meet objectives because they are too reactive and manage by alert. Instead, when organizations focus on becoming more proactive and manage by policy, they can automatically address security issues to protect their company.

By taking a comprehensive approach that identifies vulnerabilities, organizations can plan ahead and automate tasks. This makes it possible to speed up security and compliance-related activities significantly and help the eliminate disruption of normal business activity. As a result, both audit and remediation become routine, ongoing activities and not emergencies.

The ability to prioritize vulnerability data by importance, enables IT Operations to prioritize patching and make better use of resources and provide the Security team with more granular, actionable visibility into the state of security.

Use Cases: Benefits of Taking a Unified SecOps A

.

  • A major insurance company managed by policy and was able to reduce resolution times for compliance issues from days or even weeks down to just minutes. The company also saved more than 9,000 hours in staff time in the first seven months by defining more than 135 automated responses and handling nearly 95,000 events automatically.
  • A leading provider of IT products and services reduced the time for server provisioning from two months to five days.
  • A government entity reduced the time for audit report creation from 32 hours to 15 minutes.


To learn more about how to fill the SecOps gap to close security loopholes faster and unite Security and IT Operations, watch this webinar: https://www.brighttalk.com/webcast/7591/144035

Forbes & BMC: SecOps Survey


Explore new security policies and technologies to keep pace with your evolving business. This Forbes survey report examines the industry response to unprecedented risks and threats.

Download Report ›

These postings are my own and do not necessarily represent BMC's position, strategies, or opinion.

Share This Post


David Cramer

David Cramer

David Cramer joined BMC in 2015 and serves as Vice President of Product Management for the Cloud/DCA business unit. Prior to BMC, David was head of product management for CA Technologies. During his tenure at CA, David was responsible for application delivery, cloud management, virtualization and Infrastructure automation solutions. Before joining CA, David held executive positions at AlterPoint, Motive, NetSolve, and Nortel Networks. David’s focus is on Continuous Delivery, Cloud Management and web scale IT. David received his MBA from Southern Methodist University and a BS in Finance from Georgia State University.