Three-pillar strategy is a must for cyber defence
Skip to main content
  • Home
  • Economy
  • Stocks
  • Analysis
  • World+Biz
  • Sports
  • Features
  • Epaper
  • More
    • Subscribe
    • COVID-19
    • Bangladesh
    • Splash
    • Videos
    • Games
    • Long Read
    • Infograph
    • Interviews
    • Offbeat
    • Thoughts
    • Podcast
    • Quiz
    • Tech
    • Archive
    • Trial By Trivia
    • Magazine
    • Supplement
  • বাংলা
The Business Standard

Tuesday
August 16, 2022

Sign In
Subscribe
  • Home
  • Economy
  • Stocks
  • Analysis
  • World+Biz
  • Sports
  • Features
  • Epaper
  • More
    • Subscribe
    • COVID-19
    • Bangladesh
    • Splash
    • Videos
    • Games
    • Long Read
    • Infograph
    • Interviews
    • Offbeat
    • Thoughts
    • Podcast
    • Quiz
    • Tech
    • Archive
    • Trial By Trivia
    • Magazine
    • Supplement
  • বাংলা
TUESDAY, AUGUST 16, 2022
Three-pillar strategy is a must for cyber defence

Tech

B M Zahid ul Haque, Head of Information and Security, Brac Bank
06 August, 2022, 09:55 am
Last modified: 06 August, 2022, 09:59 am

Related News

  • Taiwan urges its firms to boost cybersecurity as attacks jump amid China tensions
  • First ever cyber security Summit in Bangladesh banking sector kicks off
  • Brac Bank launches country's first Cyber Fusion Centre 
  • Espionage-focused hacker group, Bitter APT, allegedly targets RAB
  • Amazon CEO pledges logistics, cybersecurity support for Ukraine

Three-pillar strategy is a must for cyber defence

With the growing sophistication of global cyber threats and the expanding digital attack surface, a vigilant three-pillar strategy is a must for a robust cyber defence

B M Zahid ul Haque, Head of Information and Security, Brac Bank
06 August, 2022, 09:55 am
Last modified: 06 August, 2022, 09:59 am
Photo: Collected
Photo: Collected

The volume, velocity and aggressiveness of cyber attackers continue to increase. As a result, it's not a matter of 'if' an organisation will be attacked; rather, it's a matter of 'when'. In the new 'digital normal', traditional perimetre defence is no match against the influx of cyber threats coming from all directions. And because of this reality, organisations must become more active in defending against attackers. 

Cybersecurity needs to be viewed holistically by organisations. Organisations must develop their cybersecurity strategy comprising three significant pillars: security by design, defence in depth, and zero-trust.

Security by design (SbD)

Security by design is the origination point of a cyber-risk management process. A complete lifecycle consideration is a must in practical cybersecurity risk management. It is similar to the product development lifecycle, as it starts with an idea and ends with delivery and support. Security by design ensures that an organisation continually manages, monitors and maintains cybersecurity risk governance and management.

While any software/hardware/project is developed, the design considers cybersecurity. Security by design ensures that organisations consider cybersecurity at the beginning of a project. It means that developers design the software to be secure from the outset to reduce the likelihood of flaws that might compromise information security.

Security by design enables an organisation to build security into its IT management processes. It focuses on preventing a cybersecurity breach rather than repairing and restoring a system after an organisation has been hit by a cybersecurity breach. 

Defence in depth (DiD)

Defence in depth cyber security strategy follows multi-layered defensive mechanisms/barriers of protection across the organisation to integrate people, technology and operational capabilities. By layering heterogeneous security technologies along common attack vectors, a defence in depth strategy helps ensure that attacks get missed or bypassed. This redundancy completes greater security and can protect against a wider variety of attacks. DiD is also called the castle approach because it resembles the walls of a castle.

The strategy assumes that attackers will, or already have, penetrated different layers (compromised various tools/solutions) of the organisation's defences. Therefore, multiple layers of security are needed to detect attackers at every stage of their attack cycle. In addition, no security tool or measure is perfect, so organisations need to account for potential failures. By building multiple layers of security, organisations can reduce the chance of a single point of failure occurring in their systems.

The defence in depth strategy combines administrative, technical and physical controls. It can also include additional security layers, like other access controls, endpoints defence, data protection, perimetre defences, monitoring and prevention, threat intelligence, etc. 

Zero-trust (ZT)

Zero-trust (ZT) is an evolving set of cybersecurity paradigms. It has shifted security from static, network-based perimetres to a more specific focus on users, assets and resources. A zero-trust architecture (ZTA) follows zero-trust principles to plan industrial and enterprise infrastructure and workflows. The zero-trust concept centred on the belief that organisations should not automatically trust anything inside or outside their perimetres. Verifying anything and everything trying to connect to any systems is a must before granting access.

Zero-trust assumes no implicit trust is granted to any system or user solely based on locations (i.e., local area networks versus the internet) or asset ownership (enterprise or personally owned). Authentication and authorisation (subject and device) are discrete functions performed before a session to an enterprise resource is established. Zero-trust focuses on protecting resources (accounts, assets, network, services, workflows, etc.), not solely the network zone.

The zero-trust approach relies on various technologies and governance processes to secure the enterprise IT environment. As a result, zero-trust requires ongoing effort. Yet developing a zero-trust environment isn't just about implementing any individual technologies. It's about using existing and/or other technologies to enforce the idea that no one and nothing has access until they are proven to be trusted. While designing zero-trust, it is crucial to consider continuous monitoring and validation, least privilege, device access control, micro-segmentation, preventing lateral movement, multi-factor authentication (MFA), etc.

 Combining the pillars

Cybersecurity becomes stronger when Security by Design, Defence in Depth, and Zero-trust are combined. These three pillars of cybersecurity risk management must be incorporated into the organisations' cybersecurity development framework to identify the gaps, mitigate threats and build business resilience. With the growing sophistication of global cyber threats and the expanding digital attack surface, a vigilant three-pillar strategy is a must for a robust cyber defence.


 The author is an Information Security and Cyber Digital Transformation practitioner & technology expert. The author can be reached at [email protected].

Features

Cybersecurity / Cyber defence / Digital Attack

Comments

While most comments will be posted if they are on-topic and not abusive, moderation decisions are subjective. Published comments are readers’ own views and The Business Standard does not endorse any of the readers’ comments.

Top Stories

  • Photo: PMO
    PM Hasina asks ministries to find a way to import oil from Russia
  • Photo: Collected
    HC questions legality of fuel price hike without public hearing
  • Photo: Collected
    1.7 crore married women in Bangladesh suffer from malnutrition

MOST VIEWED

  • Don’t let regulations hurt OTT platform growth: Stakeholders
    Don’t let regulations hurt OTT platform growth: Stakeholders
  • Sketch: TBS
    What do the artists think about AI image generators?
  • Passkeys: Microsoft, Google and Apple’s commitment to a secure passwordless future
    Passkeys: Microsoft, Google and Apple’s commitment to a secure passwordless future
  • YouTube. Photo: Collected
    YouTube plans to launch streaming video service
  • DALL-E created an image from “A bowl of soup that is a portal to another dimension as digital art” text description. Photo: OpenAI
    DALL-E: Potential to usher in a creative revolution
  • Samsung unveils next gen foldables at 'Galaxy Unpacked'
    Samsung unveils next gen foldables at 'Galaxy Unpacked'

Related News

  • Taiwan urges its firms to boost cybersecurity as attacks jump amid China tensions
  • First ever cyber security Summit in Bangladesh banking sector kicks off
  • Brac Bank launches country's first Cyber Fusion Centre 
  • Espionage-focused hacker group, Bitter APT, allegedly targets RAB
  • Amazon CEO pledges logistics, cybersecurity support for Ukraine

Features

Photo: Collected

Welcome to the age of glass facades

5h | Habitat
Photo: Mumit M/TBS

Why artificial oyster reefs are the answer to our coastal embankments problems

5h | Panorama
Illustration: TBS

Anwar Group: From comb maker to owner of 20 companies

6h | Panorama
TBS Sketch

Bangabandhu and the spirit of Liberation War were killed in 1975

23h | Supplement

More Videos from TBS

Cumilla agro entrepreneur gains success in growing te in Lalmai hills

Cumilla agro entrepreneur gains success in growing te in Lalmai hills

37m | Videos
Footage of tragic accident in Uttara

Footage of tragic accident in Uttara

1h | Videos
Indian FM Jaishankar's video shown at Imran Khan's rally

Indian FM Jaishankar's video shown at Imran Khan's rally

6h | Videos
Experts advise on uniform exchange rate to deal with dollar crisis

Experts advise on uniform exchange rate to deal with dollar crisis

6h | Videos

Most Read

1
Dollar crisis: BB orders removal of 6 banks’ treasury chiefs 
Banking

Dollar crisis: BB orders removal of 6 banks’ treasury chiefs 

2
From left Afzal Karim, Murshedul Kabir and Mohammad Jahangir
Banking

Sonali, Agrani and Rupali banks get new MDs

3
Photo: TBS
Bangladesh

5 crushed to death as BRT girder falls on car in Uttara

4
Dollar price drops by Tk8 in kerb market
Economy

Dollar price drops by Tk8 in kerb market

5
Representational Image. Photo: Collected
Bangladesh

Air passengers should plan extra commute time to airport: DMP

6
Photo: Collected
Transport

Will Tokyo’s traffic model solve Dhaka’s gridlocks?

EMAIL US
[email protected]
FOLLOW US
WHATSAPP
+880 1847416158
The Business Standard
  • About Us
  • Contact us
  • Sitemap
  • Privacy Policy
  • Comment Policy
Copyright © 2022
The Business Standard All rights reserved
Technical Partner: RSI Lab

Contact Us

The Business Standard

Main Office -4/A, Eskaton Garden, Dhaka- 1000

Phone: +8801847 416158 - 59

Send Opinion articles to - [email protected]

For advertisement- [email protected]