{"id":2529,"date":"2020-07-28T09:03:19","date_gmt":"2020-07-28T13:03:19","guid":{"rendered":"https:\/\/zzzptm.com\/wordpress\/?p=2529"},"modified":"2020-07-28T09:03:19","modified_gmt":"2020-07-28T13:03:19","slug":"security-for-all-sizes-the-size-of-the-business-matters","status":"publish","type":"post","link":"https:\/\/zzzptm.com\/wordpress\/?p=2529","title":{"rendered":"Security for All Sizes: The Size of the Business Matters"},"content":{"rendered":"\n<p>My choice of the title is based on the fact that the size of the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/business\">business<\/a>&nbsp;matters when we define security solutions. We don&#8217;t just consider the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/budget\">budget<\/a>&nbsp;available, but the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/staff\">staff<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/skill\">skill<\/a>&nbsp;levels, user population, and overall levels of departmentalization.<\/p>\n\n\n\n<p>Consider what can happen if a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/firewall\">firewall<\/a>&nbsp;admin notices a stream of outbound&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/traffic\">traffic<\/a>&nbsp;to an unusual&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ip-address\">IP address<\/a>&nbsp;that resolves to Minsk in Belarus&#8230;<\/p>\n\n\n\n<p>At a small company, the admin will walk down the hall to where the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ceo\">CEO<\/a>&nbsp;sits and ask if it&#8217;s cool to block traffic going to Belarus. &#8220;Sure,&#8221; says the CEO, &#8220;we don&#8217;t do any business with Belarus. Block the whole country.&#8221; Once the traffic is blocked, the firewall admin, who is really an all-around IT person, checks the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/pc\">PC<\/a>&nbsp;that was sending traffic and makes sure its&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/antivirus-software\">antivirus software<\/a>&nbsp;is up-to-date. Maybe that&#8217;s when it&#8217;s discovered that their&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/av\">AV<\/a>&nbsp;licenses have expired and they need to have a quick conversation with their&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vendor\">vendor<\/a>&nbsp;about renewal&#8230;<\/p>\n\n\n\n<p>At a medium company, the firewall admin may notify his manager and wait an hour or two for a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/response\">response<\/a>&nbsp;to block just that&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ip\">IP<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/address\">address<\/a>, since they may expand business to Eastern Europe at some time in the near future. Maybe. Once authorized to block, the admin may dash off an email to the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/desktop\">desktop<\/a>&nbsp;admin to check out the client at 10.1.2.3 that was the source of outbound traffic.<\/p>\n\n\n\n<p>At a large company, the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/soc\">SOC<\/a>&nbsp;may be up to its eyeballs in preparing&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/reports\">reports<\/a>&nbsp;for auditors to even notice just one more stream of traffic going to a Bad Place. Maybe they do notice it and generate an alert. That&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/alert\">alert<\/a>&nbsp;goes to the level one helpdesk person who then has to follow up with&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/engineering\">engineering<\/a>&nbsp;about approval of a change request to shut down the traffic. In the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/course\">course<\/a>&nbsp;of the escalation, other teams get involved and start to build a full&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/forensic\">forensic<\/a>&nbsp;picture over the next few days and they confirm that, yes, the traffic is originating from 10.1.2.3 and going to a Bad Place in Belarus. As they debate about what to do &#8211; they can&#8217;t just block the IP, since it&#8217;s a major&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/isp\">ISP<\/a>&nbsp;in Belarus that they use for B2B&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/communications\">communications<\/a>&nbsp;&#8211; the flow of traffic stops&#8230; so they decide to wait and see if it happens again before doing anything final.<\/p>\n\n\n\n<p>Now those aren&#8217;t the only possible outcomes, but they illustrate the differences between getting security at different levels of business. I&#8217;d like to start a conversation of &#8220;war stories&#8221; that can help other professionals understand all the wrinkles involved in implementing&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/security-solutions\">security solutions<\/a>, so that we can be more aware of those wrinkles as we discuss security with the decision-makers at those firms.<\/p>\n\n\n\n<p>So what are your impressions and experiences, working at different levels and types of organizations?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>My choice of the title is based on the fact that the size of the&nbsp;business&nbsp;matters when we define security solutions. We don&#8217;t just consider the&nbsp;budget&nbsp;available, but the&nbsp;staff&nbsp;skill&nbsp;levels, user population, and overall levels of departmentalization. Consider what can happen if a&nbsp;firewall&nbsp;admin notices a stream of outbound&nbsp;traffic&nbsp;to an unusual&nbsp;IP address&nbsp;that resolves to Minsk in Belarus&#8230; At a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2529","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2529"}],"version-history":[{"count":1,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2529\/revisions"}],"predecessor-version":[{"id":2530,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2529\/revisions\/2530"}],"wp:attachment":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}