📜 ⬆️ ⬇️

Dangerous security

Hello dear habrazhiteli, recently thought about the applicability of various services in the field of information security and that's what happened.

Currently, many developers offer centralized solutions for monitoring the state of information security and identifying malicious (hacker) activity in the information systems of companies and organizations of the following nature:

Cisco (Sourcefire) , Check Point, Palo Alto Networks and Symantec have similar products.

In this approach, there are, of course, significant advantages:

But there are also disadvantages from the implementation of this approach. No, this is not a weakness of the technology or its practical implementation. The main disadvantage is the dependence of the service consumer on the decision taken by the service provider, how to treat an event, as an incident or as an ordinary event . In addition, the supplier may be interested in "hushing up" individual incidents by design or by coercion. I would like to note that all these products are offered mainly by foreign vendors. Considering the current foreign policy situation and possible sanctions against our country, there are significant risks in the implementation of these decisions.

These risks include:

')
In the light of the material presented, one should pay attention to the unequivocal interest of domestic vendors in the development of such solutions. But some decisions of domestic developers rely, unfortunately, still rely on servers and decision-making centers that are " abroad ." And this approach does not remove the previously mentioned risks. Therefore, domestic suppliers using their own event processing and analysis centers in the Russian Federation will logically be of particular interest to consumers of this kind of information security services.

In conclusion, I would like to note that domestic companies while this direction is developing slightly. There are reasons for this :
  1. Most companies working with the public sector show little interest in this area of ​​activity. Their work "rotates" in terms of meeting the requirements for information security defined by regulators, and in the governing documents such an approach to information security is practically not described and there are no requirements for building such an interaction system;
  2. most domestic solutions, including those certified, are designed to timely identify the prerequisites for the occurrence of incidents (various types of vulnerabilities), they do not implement the full cycle of incident management actions;
  3. small and medium-sized companies often lack any interest in ensuring information security until such time as the company incurs tangible financial losses due to the actions of violators;
  4. Large companies that might be interested in such projects are often “ shy ” to disclose their information security incidents to outsiders, or, taking into account the participation of foreign information processing centers about incidents, are not in a hurry to deploy such solutions.


Although in essence, such solutions are quite “convenient” for an individual company as a means of closing most of the information security threats to its resources, which do not require the company to incur significant costs in maintaining its information resources in a secure state.

Source: https://habr.com/ru/post/223463/


All Articles