Cyber security: Reducing attack surfaces in the digital age

|
  • 0

Cyber security: Reducing attack surfaces in the digital age

Wednesday, 21 August 2024 | Ripu Bajwa

Cyber security: Reducing attack surfaces in the digital age

As cyber threats become more sophisticated, cybersecurity requires a proactive approach. Advancing security practices through Zero Trust principles is key

As cyber threats continue to evolve, it’s important to remember cybersecurity is not a one-time task but an ongoing process. Advancing cybersecurity and Zero Trust maturity starts by focusing on three core practice areas: reducing the attack surface, detecting and responding to cyber threats and recovering from a cyberattack throughout the infrastructure, including edge, core and cloud.

The attack surface refers to all potential areas in an environment that a cyber attacker can target or exploit. These points can include software vulnerabilities, misconfigurations, weak authentication mechanisms, unpatched systems, excessive user privileges, open network ports, poor physical security and more. This is achieved by minimizing the potential vulnerabilities and entry points that attackers can exploit to compromise a system, network or organization across various domains including the edge, the core or the cloud.

Some ways we can strengthen our security posture:

Apply Zero Trust principles: Zero Trust is a security concept centred on the belief that organizations should not automatically trust anything inside or outside their perimeters and instead must verify everything trying to connect to their systems before granting access. Organizations can achieve a Zero Trust model by incorporating solutions like micro-segmentation, identity and access management (IAM), multi-factor authentication (MFA) and security analytics, to name a few.

Patch and update regularly: Keeping operating systems, software and applications up to date with the latest security patches helps address known vulnerabilities and minimize the risk of exploitation.

Ensure secure configuration: Systems, networks and devices need to be correctly configured with security best practices, such as disabling unnecessary services, using strong passwords and enforcing access controls, to reduce the potential attack surface.

Apply the principle of least privilege: Limit user and system accounts to only have the minimum access rights necessary to perform their tasks.

Use network segmentation: Dividing a network into segments or zones with different security levels helps contain an attack and prevents lateral movement of a cyber threat by isolating critical assets and limiting access between different parts of the network.

Ensure application security: Implementing secure coding practices, conducting regular security testing and code reviews and using web application firewalls (WAFs) help protect against common application-level attacks and reduce the attack surface of web applications.

Utilize AI/ML:

According to the Dell Technologies 2024 Innovation Catalyst report, 58% of Indian businesses feel GenAI will provide automation to help with the efficiency and scale needed to deal with the influx of threats. We can leverage AI capabilities to help proactively identify and patch vulnerabilities, significantly shrinking the attack surface.

Work with suppliers who maintain a secure supply chain: Ensure a trusted foundation with devices and infrastructure that are designed, manufactured and delivered with security in mind. Suppliers that provide a secure supply chain, secure development lifecycle and rigorous threat modeling keep you a step ahead of threat actors.

Educate users and promote awareness: By proactively implementing these measures, organizations can effectively reduce the attack surface, helping to mitigate risks and making it more challenging for adversaries to exploit vulnerabilities, enhancing the overall defence posture against new and emerging threats.

(The writer is Director and General Manager, Data Protection Solutions, Dell Technologies India; views are personal)

State Editions

Revamp of all ISBTs expected to be over in month

17 September 2024 | Staff Reporter | Delhi

Kejriwal proposal to resign not out of ethics but compulsion: BJP

17 September 2024 | Staff Reporter | Delhi

AAP has put ball in BJP court: Bharadwaj

17 September 2024 | Staff Reporter | Delhi

Kejriwal resignation political stunt: Congress

17 September 2024 | Staff Reporter | Delhi

Man drowns after falling into open drain in Bhajanpura

17 September 2024 | Staff Reporter | Delhi

Sunday Edition

Paris Paralympics Para athletes bask in glory and gold

15 September 2024 | Rishabh Malik | Agenda

DUBLIN'S HIDDEN GEM

15 September 2024 | AKANKSHA DEAN | Agenda

From wheels to wings

15 September 2024 | Gyaneshwar Dayal | Agenda

We hope to instil a respect for our heritage:Tarun Thakral

15 September 2024 | Pioneer | Agenda

The Monsoon’s Whisper in Every Note

15 September 2024 | SAKSHI PRIYA | Agenda