Q1. What are some of the biggest security challenges raised by enterprise digital transformation efforts? Typically, where do the biggest gaps in capability exist?
The digital transformation journey that many companies undertook has [significantly increased] the digital biodiversity within organizations. Cloud adoption, enterprise mobility, DevOps, application containerization, IoT and OT are just examples of how diversified, expanded and complex this landscape became.
The biggest challenge afflicting security practitioners and professionals is definitely the lack of visibility. Because you cannot assess, you cannot secure. You cannot protect what you do not see or what you do not know exists. This missing visibility is causing side effects such as unwanted exposure of sensible data, due to incorrect or incomplete configurations of storage in cloud environment. Too often we read news of data leaks because a cloud archive or bucket was left unprotected, or because a list of authorized IPs was not restricted, or even because database instances were left with default credentials.
[Data leaks can happen] because the relationship between resources in the cloud are not fully understood and secured [or] maybe because a group of containerized applications had a vulnerable surface or they drifted too much from the original image instead of remaining immutable as they should. That cheap batch of smart bulbs might pose a security issue by broadcasting geolocation information and the list of SSIDs they see to a server in another continent to help analytics of the manufacturer. [So could] smart IoT devices such as a Bluetooth and Wi-Fi enabled digital toothbrush [that] connect to a corporate network getting credentials from the smartphone of an employee.
Visibility remains the capability where the biggest gaps are still there. It becomes the capability that every organization strives to achieve.
Q2. How can the security team ensure that it gets involved in enterprise digital transformation projects early in the planning stages and not at the very end of it?
There is only one possible approach: have the security built-in and not bolted on. As much as this sounds like a fluffy marketing slogan, it can gain tangibility and great value when properly implemented and executed.
Let's take for example the DevOps world: how to turn it into DevSecOps instead of the more frequent... DevOoops?
Security should become non-intrusive [and] not perceived as an obstacle to overcome. It should become ergonomic to the process.
A technique could be to integrate it with commonly used tools within the CI/CD pipeline, such as Jenkins, CircleCI, Bamboo, etc. When the developers commit the code from one stage (e.g. coding) to the next (e.g. QA), this integration will leverage APIs to trigger a dynamic application security testing to verify and assess the vulnerable surface within the committed code. If the severity of vulnerabilities is too critical (as in "remotely exploitable"), then the build process will fail and the build report will contain indications about remediation. This approach not only blends the security within the process, but also provides developers with the needed autonomy and context to remediate the vulnerable code.
Another example relates to cloud adoption with a PaaS paradigm. Visibility in this environment is a real challenge, because of the volume, velocity and variance of the instantiated resources and their interconnections, potentially in a multi-provider cloud landscape. While a traditional approach based on scanning or deploying agents would fail, security can be once again built-in by connecting via an API-based connector the cloud accounts with a security solution. Such a solution would provide instant visibility across all the instantiated resources, how they are inter-related and even overlaying security controls (e.g. CIS) with the purpose of validating compliance and exposing remediation when it fails.
Q3. What does Qualys plan on highlighting at Black Hat Europe 2019? What are you hoping enterprises will take away from your organization's presence at the event?
Because visibility is the challenge with the biggest gaps, Qualys [will] grant augmented visibility to everyone with a free Global IT Asset Inventory app for unlimited devices.
[The Qualys solution] is grounded on a range of specialized sensors deployed across the IT landscape with different form factors such as network scanners, passive network sensors, software agents, cloud connectors, container sensors etc. [It] processes data streamed to a central "brain" by all these "eyes" to provide unmatched visibility across the most diversified digital biodiversity. Everything gets indexed, normalized and categorized to become instantly actionable.
Hardware details, software installed, running services, configured users, geolocation information, network ports communication, traffic details—everything becomes observable via fully customizable dashboards. The monitored population can be interrogated with response in seconds, for unlimited devices and with the possibility to trial the integration with external CMDB through an API-based, bidirectional sync. The app can be extended via a "pay as you need" license to expand the discoverable metadata with non-discoverable information such as End of Life, End of Maintenance, Market Version, License Type information and more.
Beside this expanded visibility, Qualys empowers other crucially important capabilities such as accuracy in detection, scale to cope with any volume and velocity and immediacy in response when interrogating the monitored population. [Qualys enables] transparent orchestration to create secure information flows towards other platforms and technologies such as IT Service Management Systems, CMDBs, SIEM, network security systems, etc. We are delivering the fundamental capability to create a single source of truth, consumable within a single pane of glass where over 20 apps can be combined to harmonize the needs of IT, Security and Compliance.