Cyber security: Reducing attack surfaces in the digital age

|
  • 0

Cyber security: Reducing attack surfaces in the digital age

Wednesday, 21 August 2024 | Ripu Bajwa

Cyber security: Reducing attack surfaces in the digital age

As cyber threats become more sophisticated, cybersecurity requires a proactive approach. Advancing security practices through Zero Trust principles is key

As cyber threats continue to evolve, it’s important to remember cybersecurity is not a one-time task but an ongoing process. Advancing cybersecurity and Zero Trust maturity starts by focusing on three core practice areas: reducing the attack surface, detecting and responding to cyber threats and recovering from a cyberattack throughout the infrastructure, including edge, core and cloud.

The attack surface refers to all potential areas in an environment that a cyber attacker can target or exploit. These points can include software vulnerabilities, misconfigurations, weak authentication mechanisms, unpatched systems, excessive user privileges, open network ports, poor physical security and more. This is achieved by minimizing the potential vulnerabilities and entry points that attackers can exploit to compromise a system, network or organization across various domains including the edge, the core or the cloud.

Some ways we can strengthen our security posture:

Apply Zero Trust principles: Zero Trust is a security concept centred on the belief that organizations should not automatically trust anything inside or outside their perimeters and instead must verify everything trying to connect to their systems before granting access. Organizations can achieve a Zero Trust model by incorporating solutions like micro-segmentation, identity and access management (IAM), multi-factor authentication (MFA) and security analytics, to name a few.

Patch and update regularly: Keeping operating systems, software and applications up to date with the latest security patches helps address known vulnerabilities and minimize the risk of exploitation.

Ensure secure configuration: Systems, networks and devices need to be correctly configured with security best practices, such as disabling unnecessary services, using strong passwords and enforcing access controls, to reduce the potential attack surface.

Apply the principle of least privilege: Limit user and system accounts to only have the minimum access rights necessary to perform their tasks.

Use network segmentation: Dividing a network into segments or zones with different security levels helps contain an attack and prevents lateral movement of a cyber threat by isolating critical assets and limiting access between different parts of the network.

Ensure application security: Implementing secure coding practices, conducting regular security testing and code reviews and using web application firewalls (WAFs) help protect against common application-level attacks and reduce the attack surface of web applications.

Utilize AI/ML:

According to the Dell Technologies 2024 Innovation Catalyst report, 58% of Indian businesses feel GenAI will provide automation to help with the efficiency and scale needed to deal with the influx of threats. We can leverage AI capabilities to help proactively identify and patch vulnerabilities, significantly shrinking the attack surface.

Work with suppliers who maintain a secure supply chain: Ensure a trusted foundation with devices and infrastructure that are designed, manufactured and delivered with security in mind. Suppliers that provide a secure supply chain, secure development lifecycle and rigorous threat modeling keep you a step ahead of threat actors.

Educate users and promote awareness: By proactively implementing these measures, organizations can effectively reduce the attack surface, helping to mitigate risks and making it more challenging for adversaries to exploit vulnerabilities, enhancing the overall defence posture against new and emerging threats.

(The writer is Director and General Manager, Data Protection Solutions, Dell Technologies India; views are personal)

State Editions

Chief Minister donates millets, fruits

10 September 2024 | Staff Reporter | Bhopal

Demanding Rs 6,000 MSP for soyabean crop, Congress to agitate

10 September 2024 | Staff Reporter | Bhopal

Union Minister Shivraj visits AIIMS Bhopal, praises arrangements

10 September 2024 | Staff Reporter | Bhopal

Physiotherapy Day observed with focus on backache awareness

10 September 2024 | Staff Reporter | Bhopal

119 cataract surgeries to be performed

10 September 2024 | Staff Reporter | Bhopal

Harassed by moneylenders, BMC dailywager commits suicide

10 September 2024 | Staff Reporter | Bhopal

Sunday Edition

India’s tourism boom: A journey beyond the icons

08 September 2024 | Pioneer | Agenda

Unveiling the future of India’s hospitality and tourism industry

08 September 2024 | Kumar Chellappan | Agenda

Celebrate The Spirit Of Onam With Sadhya Rooted In Tradition

08 September 2024 | Sharmila Chand | Agenda

A Fusion of Luxury, Tradition and Culinary Excellence

08 September 2024 | SAKSHI PRIYA | Agenda

Canvas of Heritage and Contemporary Expression

08 September 2024 | SAKSHI PRIYA | Agenda

Thetuningfork | Behave like a child when Nature is your Mother …

08 September 2024 | C V Srikanth | Agenda