SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Applying Lean Methodology for Cyber Security Management*
.
Over the years manufacturing industries have adopted TQM (Total Quality Management) systems such
as Lean and 6 Sigma with great deal of success. In recent times, these systems have been implemented
in service industries with varying degree of success. Lean or Toyota Way as it has come to be known, has
its roots in Toyota Production System (TPS ) which can adopted for cyber security operations by
applying same principles.
Toyota Way’s 4P model is based on Philosophy, Process, People & Partners, and Problem Solving.
Security practitioners are already familiar with people, processes and products triad which is similar to
4P principle. Let us see how these 4P principles can be applied to information security operations.
Philosophy
Principle 1-Long Term Philosophy: Articulate and evangelize mission and policy statement for
Cyber Security to ensure executive and operational staff are aware of fiduciary duties towards
company’s customers and employees. Develop KPI’s to measure security performance based on
parameters such as operational resilience achieved, return on security investments , people’s
awareness and compliance level achieved.
Investments in security should be strategic in nature considering ever changing threat
landscape, existing and emerging actors and effectiveness of existing defensive measures.
Security is never point-in-time solution. It needs strategic risk-based thought process rather than
quick fixes. Security should have mission statement to make customers and employees data
safe, protect organization’s intellectual property while transacting business, ensure their privacy
is maintained and ensure compliance.
Process
Principle 2-Create continuous process flow to bring problems to surface:
Create continuous process flow to bring problems to surface through two fold approach:
1) Integrating SIEM and vulnerability scanning tool with Service desk tool to generate
actionable tickets based on severity.
2) Ensuring monitoring team within SOC work closely with IT operations team to ensure that
configuration, patches, and false alarms are managed effectively. This would require
constant and ongoing communication between security operations and IT operations
Infosec practitioners can perform Value stream mapping by identifying repetitive operational
processes such as:
 Running vulnerability scans, evaluating it’s value based on risk posed, remediating through
patching, pushing secure configuration settings, loading predefined images, hardening and
reflecting on results.
 Tuning false positives thrown by intrusion prevention, advanced malware and breach
detection system to ensure that SOC (security operation center) operators and analyst are
not overwhelmed with alerts which do not add value.
Principle 3: Use “pull” system so as not to overwhelm staff by prioritizing tickets based on their
severity level. Similarly triage can performed by networking modelling and event enrichment in
SIEM tool for assets which might be target of attack and directing efforts to respond to it.
Principle 4: Levelling out workload. In infosec world 80% of vulnerabilities can be fixed with 20%
of efforts. These quick wins and low hanging fruits will help to level out workload (Heijunka) and
not stress the scarce security resources.
Principle 5: Building culture of stopping to fix problems to get quality right the first time.
During red team exercises create attack scenarios, identify devices which will generate logs,
alerts and notifications. Stop to fine tune IPS, anti-malware, advanced threat detection system
or co-relation rules within SIEM to ensure only impactful alerts and notification are generated.
This can go long way in continual improvement (kaizen).
Principle 6: Use standardized tasks: SOC tasks needs to be standardized through appropriate
operating manuals, minimum security baselines etc. which are based on applications, operating
and database systems. Use standards and framework like ISO 27001, CI Security and CoBIT.
Standardized tasks are the foundation for continuous improvement & employee empowerment.
Principle 7: Use visual controls so that no problems are hidden. Video walls with appropriate
dash boards and alerts identify events of interest and any action if it needs to be taken. White
boards can similarly be used for brain storming during incident investigation.
Dash boards with pie charts, bar charts, histogram, trending graphs and scatter diagram on
these video walls give visual view of events of interest, vulnerabilities and incidents. 5S
methodology could consist of Standardize, Scan, Sort, Straighten and Sustain
Principle 8: Use only reliable thoroughly tested technology that serves your people and
processes. Before adapting any security solution, understand skill level, organization culture and
its integration in current security processes. Decisions on implementing new and emerging
technologies versus mature and stable one needs to be thoroughly analyzed.
People & Partners
Principle 9 : Grow leaders who thoroughly understand the work, live the philosophy & teach it
to others.
Principle 10: Develop exceptional people & teams who follow your company’s philosophy.
Staff working in security operations should understand critical functions and services which they
are entrusted with to protect, articulate that mission and vision of cyber security. Leaders
should be groomed from exceptional staff within the infosec team. These leaders should
propagate the concept of managing risks, protecting customer data and privacy. Train staff on
regular basis to keep their motivational level high.
Principle 11: Respect your extended network of partners and suppliers by challenging them &
helping them improve. In cyber security, managed security services providers, partners,
suppliers and vendors play important role with timely patches and advisories. This eco system
needs to be developed and enhanced through constant communication, interaction, updates
and bug fix assistance from the vendors.
Problem Solving
Principle 12: Go and see for yourself to thoroughly understand the situation. CISOs, Infosec
managers and executive need to visit or teleconference with SOC (Security Operations Center)
Straighten & fix
technology or
processes
Sustain it by third
party reviews &
audits
Scan network
regularly, analyze
information &
events
Optimize efforts & time to reduce
& eliminate frivolous alerts
Standardize on
schedule &
methodology to
manage risks
Sort high impact
vulnerabilities
for outsourced or geographically dispersed locations on regular basis to review incidents and
overall operational performance.
Principle 13: Make decision slowly by consensus thoroughly considering all options &
implement decisions rapidly. Cyber strategy requires long term planning by on boarding all
business stake holders considering regulatory environment, changing business priorities, threat
scenarios, global and regional political scenarios. Get concurrence of all stakeholders on
identified risks, evaluate current technology and processes thoroughly with consensus before
implementing solutions
Principle 14: Become a learning organization through relentless reflection and continuous
improvement (kaizen). It is incumbent in ever changing cyber security field to continuously keep
learning lessons from past incidents, improve your defenses and further bolster security.
Edward Deming’s Plan-DO-Check-Act (PDCA) which Infosec professional are familiar with,
reiterates this principle.
Lean management principles can thus be applied to services industries like information security
operations to achieve greater cyber resilience and bolster the security.
*Reference-Toyota Way- 14 Management Principles by Jeffrey Liker
(The views expresses herein are author’s personal views & does not reflect the views of his
employers, their principals, affiliates or clients)

Mais conteúdo relacionado

Mais procurados

Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset ManagementNada G.Youssef
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementPriyanka Aash
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewalldavidjohnrace
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security ManagementJonathan Coleman
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysisCarlo Dapino
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
 

Mais procurados (20)

Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset Management
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
CyberArk
CyberArkCyberArk
CyberArk
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewall
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 

Destaque

Introduction to malware analysis with Cuckoo Sandbox
Introduction to malware analysis with Cuckoo SandboxIntroduction to malware analysis with Cuckoo Sandbox
Introduction to malware analysis with Cuckoo Sandboxsysinsider
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.360factors
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
5s Audit Checklist
5s Audit Checklist5s Audit Checklist
5s Audit ChecklistBen Geck
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Investigation de cybersécurité avec Splunk
Investigation de cybersécurité avec SplunkInvestigation de cybersécurité avec Splunk
Investigation de cybersécurité avec SplunkIbrahimous
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destaque (8)

Introduction to malware analysis with Cuckoo Sandbox
Introduction to malware analysis with Cuckoo SandboxIntroduction to malware analysis with Cuckoo Sandbox
Introduction to malware analysis with Cuckoo Sandbox
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
5s Audit Checklist
5s Audit Checklist5s Audit Checklist
5s Audit Checklist
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Investigation de cybersécurité avec Splunk
Investigation de cybersécurité avec SplunkInvestigation de cybersécurité avec Splunk
Investigation de cybersécurité avec Splunk
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Semelhante a Applying Lean for information security operations centre

Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itChandra Sekhar Tondepu
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)Partha_bappa
 
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient Path
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient PathEmbarking on Your ServiceNow SecOps Journey: A Secure and Efficient Path
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient PathAelum Consulting
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Ajay Kumar Uppal
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldTEWMAGAZINE
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfAbdulbasit Almauly
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information SecurityAjay Kumar Uppal
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docxyoroflowproduct
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 

Semelhante a Applying Lean for information security operations centre (20)

Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient Path
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient PathEmbarking on Your ServiceNow SecOps Journey: A Secure and Efficient Path
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient Path
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
S Rod Simpson Resume
S Rod Simpson ResumeS Rod Simpson Resume
S Rod Simpson Resume
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Applying Lean for information security operations centre

  • 1. Applying Lean Methodology for Cyber Security Management* . Over the years manufacturing industries have adopted TQM (Total Quality Management) systems such as Lean and 6 Sigma with great deal of success. In recent times, these systems have been implemented in service industries with varying degree of success. Lean or Toyota Way as it has come to be known, has its roots in Toyota Production System (TPS ) which can adopted for cyber security operations by applying same principles. Toyota Way’s 4P model is based on Philosophy, Process, People & Partners, and Problem Solving. Security practitioners are already familiar with people, processes and products triad which is similar to 4P principle. Let us see how these 4P principles can be applied to information security operations. Philosophy Principle 1-Long Term Philosophy: Articulate and evangelize mission and policy statement for Cyber Security to ensure executive and operational staff are aware of fiduciary duties towards
  • 2. company’s customers and employees. Develop KPI’s to measure security performance based on parameters such as operational resilience achieved, return on security investments , people’s awareness and compliance level achieved. Investments in security should be strategic in nature considering ever changing threat landscape, existing and emerging actors and effectiveness of existing defensive measures. Security is never point-in-time solution. It needs strategic risk-based thought process rather than quick fixes. Security should have mission statement to make customers and employees data safe, protect organization’s intellectual property while transacting business, ensure their privacy is maintained and ensure compliance. Process Principle 2-Create continuous process flow to bring problems to surface: Create continuous process flow to bring problems to surface through two fold approach: 1) Integrating SIEM and vulnerability scanning tool with Service desk tool to generate actionable tickets based on severity. 2) Ensuring monitoring team within SOC work closely with IT operations team to ensure that configuration, patches, and false alarms are managed effectively. This would require constant and ongoing communication between security operations and IT operations Infosec practitioners can perform Value stream mapping by identifying repetitive operational processes such as:  Running vulnerability scans, evaluating it’s value based on risk posed, remediating through patching, pushing secure configuration settings, loading predefined images, hardening and reflecting on results.  Tuning false positives thrown by intrusion prevention, advanced malware and breach detection system to ensure that SOC (security operation center) operators and analyst are not overwhelmed with alerts which do not add value. Principle 3: Use “pull” system so as not to overwhelm staff by prioritizing tickets based on their severity level. Similarly triage can performed by networking modelling and event enrichment in SIEM tool for assets which might be target of attack and directing efforts to respond to it. Principle 4: Levelling out workload. In infosec world 80% of vulnerabilities can be fixed with 20% of efforts. These quick wins and low hanging fruits will help to level out workload (Heijunka) and not stress the scarce security resources. Principle 5: Building culture of stopping to fix problems to get quality right the first time. During red team exercises create attack scenarios, identify devices which will generate logs, alerts and notifications. Stop to fine tune IPS, anti-malware, advanced threat detection system or co-relation rules within SIEM to ensure only impactful alerts and notification are generated. This can go long way in continual improvement (kaizen). Principle 6: Use standardized tasks: SOC tasks needs to be standardized through appropriate operating manuals, minimum security baselines etc. which are based on applications, operating and database systems. Use standards and framework like ISO 27001, CI Security and CoBIT. Standardized tasks are the foundation for continuous improvement & employee empowerment. Principle 7: Use visual controls so that no problems are hidden. Video walls with appropriate dash boards and alerts identify events of interest and any action if it needs to be taken. White boards can similarly be used for brain storming during incident investigation.
  • 3. Dash boards with pie charts, bar charts, histogram, trending graphs and scatter diagram on these video walls give visual view of events of interest, vulnerabilities and incidents. 5S methodology could consist of Standardize, Scan, Sort, Straighten and Sustain Principle 8: Use only reliable thoroughly tested technology that serves your people and processes. Before adapting any security solution, understand skill level, organization culture and its integration in current security processes. Decisions on implementing new and emerging technologies versus mature and stable one needs to be thoroughly analyzed. People & Partners Principle 9 : Grow leaders who thoroughly understand the work, live the philosophy & teach it to others. Principle 10: Develop exceptional people & teams who follow your company’s philosophy. Staff working in security operations should understand critical functions and services which they are entrusted with to protect, articulate that mission and vision of cyber security. Leaders should be groomed from exceptional staff within the infosec team. These leaders should propagate the concept of managing risks, protecting customer data and privacy. Train staff on regular basis to keep their motivational level high. Principle 11: Respect your extended network of partners and suppliers by challenging them & helping them improve. In cyber security, managed security services providers, partners, suppliers and vendors play important role with timely patches and advisories. This eco system needs to be developed and enhanced through constant communication, interaction, updates and bug fix assistance from the vendors. Problem Solving Principle 12: Go and see for yourself to thoroughly understand the situation. CISOs, Infosec managers and executive need to visit or teleconference with SOC (Security Operations Center) Straighten & fix technology or processes Sustain it by third party reviews & audits Scan network regularly, analyze information & events Optimize efforts & time to reduce & eliminate frivolous alerts Standardize on schedule & methodology to manage risks Sort high impact vulnerabilities
  • 4. for outsourced or geographically dispersed locations on regular basis to review incidents and overall operational performance. Principle 13: Make decision slowly by consensus thoroughly considering all options & implement decisions rapidly. Cyber strategy requires long term planning by on boarding all business stake holders considering regulatory environment, changing business priorities, threat scenarios, global and regional political scenarios. Get concurrence of all stakeholders on identified risks, evaluate current technology and processes thoroughly with consensus before implementing solutions Principle 14: Become a learning organization through relentless reflection and continuous improvement (kaizen). It is incumbent in ever changing cyber security field to continuously keep learning lessons from past incidents, improve your defenses and further bolster security. Edward Deming’s Plan-DO-Check-Act (PDCA) which Infosec professional are familiar with, reiterates this principle. Lean management principles can thus be applied to services industries like information security operations to achieve greater cyber resilience and bolster the security. *Reference-Toyota Way- 14 Management Principles by Jeffrey Liker (The views expresses herein are author’s personal views & does not reflect the views of his employers, their principals, affiliates or clients)