Cyber Security

The rapid expansion of the software attack surface has made cybersecurity mainstream technology. What first began as a method to provide point solutions and isolated regulatory compliance has evolved to address more sophisticated attack vectors and ever-changing complex regulatory compliances. A comprehensive cybersecurity program should embed security by design, be sustainable, cater to all compliance and gain customer and stakeholder confidence. Security has to be an invisible element of all digital programs to provide the assurance stakeholders want.

Cybersecurity’s evolution to counter attacks

Adapting to market dynamics: the three horizons
Show all horizons
Velocity, Variety, Volume

H3

AI/ML-DRIVEN, PLATFORM-BASED SECURITY SOLUTION

Modernized Design Principles, Intelligent Security

Key Patterns

  • Zero-Trust Security
  • Secure Cloud
  • Container Security
  • XDR
  • Data Security
  • Secure Remote Workforce
  • AI Security
  • Connected Devices Security
  • Multi-Cloud Security

H2

SECURITY AUTOMATION, ORCHESTRATION AND OPTIMIZATION

Unified Security, Automation at Scale

Key Patterns

  • Automation
  • DevSecOps
  • Unified Security
  • Security Orchestration
  • Exhaustive Container Security
  • Cloud Security, Governance and Compliance
  • MSS

H1

SECURITY ARCHITECTURE FOR LEGACY SYSTEMS

Growth Edge, Primitive Security

Key Patterns

  • Periodic Monitoring
  • Source Code Review
  • Network Security
  • TDR

Key trends across cybersecurity subdomains

Infrastructure Security

Trend 1

Legacy security controls are transformed with a secure access services edge framework

Software-defined wide-area network adoption is already at high speed with many of our customers. By replacing legacy multi-protocol, label-switching, widearea networks, the secure access services edge (SASE) framework transforms the security controls toward the edge.

Trend 2

Extended detection and response provides cross-layer security across the enterprise

XDR tools allow a security incident detection and response platform to consume the data from endpoints, network devices and security devices. This cross-layer security supports automated AI and ML actions that protect multiple vectors – from apps and data to end users – from security attacks.

Identity and Access Management

Trend 3

Strengthened access governance brings greater transparency

The modernized needs of digital transformation require strengthened identity and access governance solutions to establish transparent access across onpremise, hybrid and cloud-hosted applications and infrastructure assets.

Trend 4

A zero-trust security model maintains identity as a core component

A zero-trust model establishes that the legacy approach that involves inherently trusting services, individuals or devices within the corporate network is flawed. Zero trust maintains that all users or devices, irrespective of their access location, be authenticated and authorized to access the requested applications or services.

Data Security

Trend 5

Integrated data protection and classification tools enhance security at all touchpoints

Data loss prevention (DLP) tools protect data onpremises on endpoints (when in use), during transit (network) or at rest (on storage). DLP can be integrated with a CASB to ensure the same DLP policies are applied to cloud-hosted data. User entity behavior analysis (UEBA) capabilities in CASB can be used to provide role-based access control to applications or cloud-hosted data and detect suspicious user access activity.

Trend 6

Data encryption with key management becomes a best practice in cloud protection

Encrypting all sensitive data in the cloud helps prevent inadvertent access to other tenants or CSPs. However, key control needs to be with the organization. Key management-as-a-service (KMAAS) is a best practice wherein keys from vendors such as Thales can be used along with cloud-native encryption capabilities.

Governance, Risk Management and Compliance

Trend 7

Greater focus is placed on supply chain security and vendor risk management

As organizations increasingly collaborate with partners and outsource work, the risk of compromise also increases in the supply chain. A single weak link can impact an organization’s security and reputation. Multiple high-profile third parties have experienced breaches, including consumer retailer Target, showing any business could be at risk.

Trend 8

Cyber metrics lead security governance enabling enterprise-wide stakeholder collaboration

As cyber threats increase and organizations deploy multiple security tools, chief information security officers (CISOs) struggle to understand the impact of their security posture and track the effectiveness of their initiatives. Transaction systems such as SIEMs provide only a snapshot of their current status and include excessive data for a strategic review.

Vulnerability Management

Trend 9

Secure by design adoption embeds security early and ensures digital trust

Secure by design is the concept of identifying security requirements upfront and during the architecture definition and design phases, and then ensuring that security is verified during the build and test phases before go-live. Similarly, regulations for privacy such as GDPR mandate the concept of privacy by design, which ensures consent is captured and managed via data collection.

Trend 10

ERP on cloud adoption leads to a greater focus on business-critical ERP application security

ERP systems have been fundamental enablers and the epicenter of business. For decades, SAP and Oracle have been the largest ERP players. With enterprise assets and data collected, processed, analyzed and reported through ERP systems, they have been the target of frequent breaches. These threats have only increased with ERP applications moving to the cloud.

Managed Security Services and Threat Detection and Response

Trend 11

Orchestration, automation and response technology revolutionizes incident management

Incident management has traditionally been executed with defined standard operating procedures or playbooks. However, security analysts who were given these playbooks during an investigation provided inconsistent outcomes and delayed responses.

Trend 12

Cloud-specific protection programs provide advanced security monitoring

Traditionally, an organization’s data resided in its physical data center, where security controls were deployed and monitored. Now, as they move their data to reside in the cloud, its security is in question regarding who is accessing the data, how it is accessed and who is sharing the data. CASB solutions can help by shadowing data and IT.

Internet of Things, Operational Technology and 5G

Trend 13

Complete network visibility is enabled with tools that track operational technology

Main requirements from organizations included the visibility of IoT and OT assets, traffic and associated risk. The distributed nature of the assets made it difficult for enterprises to track and manage their critical infrastructure. The increasing attacks against their infrastructure necessitated the demand for monitoring operational and security events and implementing a proper incident management program.

Trend 14

Real-time security monitors detect vulnerabilities and violations in 5G

The evolution of 5G opens exciting doors for emerging technologies like IoT-based smart meters, connected cars and telehealth with lower latency, higher capacity, low energy, high throughput and increased bandwidth capabilities. But 5G infrastructure virtualization, network resource sharing, dynamic network topologies and slicing introduce novel security challenges like isolation flaws in 5G infrastructure virtualization.

Cloud Security

Trend 15

Cloud security as code

A wide range of solutions for security are available from cloud service providers and cloud securityfocused providers that employ advanced technology. However, a dramatic change in implementation is needed if they want to empower developers to consume cloud services without compromising the implementation of security controls.

Trend 16

Context-aware and intelligent security technology emerges

Compliance and regulatory requirements are a big challenge in hybrid clouds. Today, these requirements are addressed through advanced and intelligent platforms from CSPs and specialized third-parties like Prisma Cloud that provide ready-to-use templates and policies for almost all known frameworks.

Download Insights

Ask Experts

Kishore Susarla

Kishore Susarla

Delivery Manager

M Sujatha

M Sujatha

Practice Manager-Cyber Security

Mohit Jain

Mohit Jain

Principal Technology Architect

Rajeshwar Shende

Rajeshwar Shende

Principle Consultant - Infrastructure Management

Sangamesh Shivaputrappa

Sangamesh Shivaputrappa

Group Manager - Information Security

Subscribe

To keep yourself updated on the latest technology and industry trends subscribe to the Infosys Knowledge Institute’s publications

Infosys TechCompass