Micro Focus is now part of OpenText. Learn more >

You are here

You are here

How to marry security and IT operations

public://webform/writeforus/profile-pictures/travis_greene_headshot_india.jpg
Travis Greene IT Evangelist, Micro Focus
 

Like it or not, conflict exists between most IT security and operations teams. Whether it simmers beneath the surface of polite tolerance or involves the flipping of furniture, or something in-between, the difference in priorities for each team is bound to create tension.

While IT security ultimately is concerned with the confidentiality, integrity, and availability of IT services and information, IT operations focuses more on performance, efficiency, and availability.

You might think there's common ground over availability, but even this identical term is viewed through different lenses. The security perspective focuses on countering intentional sabotage, while operations seeks to mitigate accidental service disruption. The result of this divide is overlapping organizations and tools in many organizations, with conflict arising over the boundaries between them.

how you view security operations makes a difference in how fast your organization can deliver software and mitigate breach damage. A bigger-picture view that includes IT operations is necessary to address the agile threat environment that exists today.

Here's how to make that shift in your organization.

Top approaches to security operations

While the divide is almost universal, security must have an avenue to effect change in the infrastructure and applications of the organization in order to remediate vulnerabilities and respond to attacks. The challenge is a blurring of lines between the authority, responsibility, and accountability for implementing change.

The approach taken by many organizations can be organized into three main categories.

1. Security administration

This is the everyday activities performed by IT security in support of its responsibilities. These can include the implementation and maintenance of policies and controls, threat analysis, compliance assessments, and security monitoring and incident investigation from a SOC or similar structure. These operational activities are clearly in the security domain, and while they will intersect with operations (for example, enabling log collection on a server), there is usually less gray area on who is the authority.

2. Secure ops 'frenemies'

This is the necessary collaboration that must occur between IT security and operations. Every organization handles this a little differently, and ideally, there is documentation that clearly defines who provides management of credentials and access, who changes rules on the firewalls, and who patches servers to eliminate a vulnerability, as examples. Things get contentious when time frame and priorities differ. When security detects the exfiltration of data from a database, it often must rely on operations to shut it down. But they may be reluctant to do so if that database supports a mission-critical service for the business.

3. DevSecOps

As more enterprises adopt DevOps practices, there is a greater integration of developers and operations teams in planning, building, testing, deploying, and maintaining code in production to accelerate release velocity. As bottlenecks or constraints are removed, security is gaining the spotlight, and often not in a good way.

Security testing at the end of the development cycle will identify code that's insecure, but at the point when it's costly to change. So there is a movement to “shift left” security testing by including it earlier in the cycle. That's helpful for developers, but the issue of operations/security integration remains unaddressed. It's unclear whether DevOps, which is developer-focused, will shift its center of gravity more toward operations, and in doing so, help to bridge security and operations.

Which approach is correct?

The correct answer, of course, is the one that supports the business's need for speed of software delivery, and the confidentiality, integrity, and availability of services and data. That means that you must cover all three approaches, but they need improvement. And the greatest potential for improvement comes from the interaction between security and operations teams.

One of the keys to the success of DevOps is the automation of handoffs between steps in the tool chain that allows for the continuous delivery of code. That kind of orchestration is sorely needed to bridge the divide between security and operations tools. The political and budgetary walls that exist between these organizations are unlikely to be dissolved, and there is no good reason to force full integration or cross-use of all tools. But connections and automation made for specific activities can address the most pressing concerns.

For example, your SIEM platform may be able to initiate tickets in a service desk tool. Automated processes in the service desk can then be triggered to perform a remediation action that IT operations has approved. This reduces the workload on both the security and operations teams and can enable a feedback loop for continuous improvement that will also support mutual trust.

That trust, leading to cooperation, is sorely needed in a time when security threats are innovating faster than the enterprise can keep pace. The greater the partnership between security and operations, the better the chance your organization can deliver software faster and minimize breach damage.

Keep learning

Read more articles about: SecurityInformation Security