Cybersecurity

Cybersecurity manages security risks across all stages of the business value chain and helps gain the trust of customers and stakeholders. Cybersecurity leverages technology to provide better visibility and control across cloud infrastructures. It secures modern workplaces, establishes a modern zero-trust architecture, and holistically secures transformation initiatives.

Cybersecurity's evolution to counter attacks

Market dynamics across the three horizons
Show all horizons

H3

AI/ML-driven solutions integrated with capabilities for advanced analytics and real-time threat intelligence delivering cloud-ready, next-generation security capabilities

Key Patterns

  • Zero-trust security
  • Just-in-time and just-enough access
  • Security posture management of security as a service (SaaS) offerings
  • Decentralized digital identities and veriable credentials
  • Nano segmentation
  • AI and ML in cybersecurity solutions
  • Managed extended detection and response (MXDR)
  • 5G security
  • Cloud-native application protection
  • Automated vehicle security
  • Security convergence of IT and OT
  • Quantum cryptography
  • Quantitative cyber risk management

H2

Automation in streamlining security operations; identity as a service (IDaaS) and integrated security frameworks for managing threats across cloud and enterprise landscapes

Key Patterns

  • IDaaSContextual and adaptive authentication
  • DevSecOps
  • Secure landing zone
  • Container security
  • Serverless security
  • Microsegmentation
  • SOAR
  • Security automation
  • Secure remote access
  • Data protection for SaaS applications
  • GRC automation

H1

Pointed security solutions; correlation with tools across cyber domains; evolving cyber standards and protocols

Key Patterns

  • Legacy authentication protocols
  • Customized identity integration patterns
  • Static application security testing (SAST)/dynamic application security testing (DAST)
  • Application penetration testing
  • Network security
  • TDR
  • On-premises data leak prevention

Key trends across cybersecurity subdomains

Infrastructure security

Trend 1

SASE framework gains ground over legacy security controls

Software-defined wide-area network adoption is already at speed. By replacing legacy multiprotocol, label-switching, and wide area networks, the SASE framework is transforming security controls to the edge.

Trend 2

ZTNA becomes mainstream for secure and seamless zero-trust access

ZTNA enforces granular, adaptive, and context-aware policies, leading to secure and seamless zero-trust access to private applications hosted across clouds and corporate data centers, from any location and device.

Identity and access management

Trend 3

Risk-based authentication gains prominence to minimize security risks

A strong identity helps establish robust security standards for a zero-trust model. It connects legacy and cloud applications with policies applied to manage access risks and secure attack surfaces.

Trend 4

Identity becomes a core component with zero-trust security model

The zero-trust model maintains that all users or devices, irrespective of their access location, are authenticated and authorized to access requested applications or services.

Data security

Trend 5

Enhanced security at all touchpoints with integrated data protection and classification tools

Data loss prevention (DLP) tools protect data onpremises on endpoints (when in use), during transit (network) or at rest (on storage). DLP can be integrated with a CASB to ensure the same DLP policies are applied to cloud-hosted data. User entity behavior analysis (UEBA) capabilities in CASB can be used to provide role-based access control to applications or cloud-hosted data and detect suspicious user access activity.

Trend 6

Certificate life cycle management and automation gain consideration

With increasing cloud adoption and remote connections, the number of certificates in the environment has gone up drastically. In the transition phase, a valid certificate for secure communication became essential. Generally, enterprise-level certificates will have two years of expiry. In recent times, where most companies have completed two years of cloud adoption, we have seen many application downtime issues because of expired certificates.

Governance, risk management, and compliance

Trend 7

Supply chain security and vendor risk management (VRM) gain focus

As organizations increasingly collaborate with partners and outsource work, the risk of compromise also increases in the supply chain. VRM identifies a business' vendor relationships and associated cyber risks. The tool categorizes risks from vendors and helps track and mitigate those risks. VRM also tests potential suppliers before they are approved as vendors.

Trend 8

New cyber controls enable effective cybersecurity governance

With evolving cyber threats, CISOs struggle to measure and track the effectiveness of their control measures. Transaction systems such as SIEMs provide only a snapshot of their status and include excessive data for a strategic review. Using GRC automation tools for cyber metrics management is a long and expensive process.

Vulnerability management

Trend 9

SBD adoption embeds security early and ensures digital trust

SBD identifies and verifies security requirements during the build and test phases before go-live. Similarly, privacy regulations, such as GDPR, mandate PbD, ensuring the consent is captured and managed via data collection. The personally identifiable information must be secured while in use and destroyed when no longer needed.

Trend 10

Enterprise resource planning (ERP) on cloud adoption emphasizes business-critical ERP application security

With ERP solutions now exposed to the cloud, hacker activities have significantly increased. While ERP vendors have native solutions, there are niche solutions from vendors such as Onapsis that provide end-to-end protection of business-critical ERP solutions.

Trend 11

Ticketless infrastructure VM minimizes manual efforts

Infrastructure vulnerabilities are identified using automated scanning tools in real time. Post-identification, the critical step is to prioritize and remediate the vulnerabilities. The tracking and assignment of these vulnerabilities were done manually using spreadsheets until the recent past.

Managed security services - threat detection and response

Trend 12

Orchestration, automation, and response technology ease incident management

Incident management has traditionally been executed with defined standard operating procedures or playbooks. However, security analysts who were given these playbooks during an investigation provided inconsistent outcomes and delayed responses.

Trend 13

Advanced security monitoring through cloud-specific protection programs

As organizations move their data to the cloud, security becomes vulnerable. CASB solutions can help by shadowing data and IT.

Internet of things, operational technology, and 5G

Trend 14

IoT and OT tools enable complete network visibility

Enterprises were finding it difficult to track and manage their critical infrastructure due to the distributed nature of assets. However, increasing attacks necessitated the demand for monitoring operational and security events and implementing a proper incident management program. Organizations mainly required visibility on IoT and OT assets, traffic, and associated risks.

Trend 15

Real-time security monitors help detect vulnerabilities and violations in 5G

The evolution of 5G opens opportunities for emerging technologies such as IoT-based smart meters, connected cars, augmented and virtual reality, and telemedicine with lower latency, higher capacity, low energy, high throughput, and increased bandwidth capabilities. But 5G infrastructure virtualization, network resource sharing, dynamic network topologies, and slicing introduce novel security challenges such as isolation flaws in 5G infrastructure virtualization.

Cloud security

Trend 16

Secure landing zones gain prominence for cyber resilience and security as a built-in culture

Enterprises are increasingly adopting public cloud platforms such as Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP). However, distributed models of these cloud environments have become a newer security issue for enterprises. Multiple accounts or subscriptions are created based on departments (e.g., marketing, sales, HR, IT) or criticality (e.g., production, nonproduction, sandbox, test).

Trend 17

Cloud security as code ensures continuous compliance in production

A wide range of security solutions is natively available from cloud service and cloud security-focused providers. However, these providers need to employ the latest advancements and strengthen the implementation framework to empower developers to use cloud services without compromising security controls.

Data privacy

Trend 18

Integrated frameworks and privacy technologies enable effective data protection

Automated privacy assessments use privacy-enabled technologies to efficiently assess cloud, IoT, OT, AI, big data, and surveillance systems. Organizations should establish a PbD policy to embed privacy throughout the life cycles of technologies, from the early design stage through deployment, use, and ultimate disposal or disposition.

Ask Experts

Kishore Susarla

Kishore Susarla

Delivery Manager

M Sujatha

M Sujatha

Practice Manager

Mohit Jain

Mohit Jain

Principal Technology Architect

Sangamesh Shivaputrappa

Sangamesh Shivaputrappa

Group Manager

Subscribe

To keep yourself updated on the latest technology and industry trends subscribe to the Infosys Knowledge Institute's publications

Infosys TechCompass