Our approach to security
But how can you be sure that an MSP can deliver the goods and keep your organisation secure? Here are five core approaches Brennan take that consider the tactical, the practical, and the strategic.
1. Audits are sanity checks. If your business has been promised the world by an MSSP (and yes, even by an MSP), be sure to pressure test those assurances regularly, just as you would any other part of your business. Be it a penetration test, a risk assessment, or a maturity assessment, there’s always value in a second set of eyes. If your security is held by an MSSP, I’d argue your MSP is ideally placed to run pen testing. Your MSP should know your networks and infrastructure and applications inside out. It stands to reason they’ll also have the ability to exploit them better than an MSSP can.
2. Pick a few things. Do them well. One of the recurring security challenges we encounter are when organisations elect to do something, heroically complete 90%, then move on. But it’s that 10% gap that threat actors live to find, then exploit. Conversely, organisations electing to do 100 things (and doing all badly) will be far more susceptible to breaches and will struggle to detect and respond to incidents. Security doesn’t have to be hard. Focus on a handful of things that are relevant to your business’s risk, do them really well, and only then move on to the next things.
3. Who’s holding what? When considering your ability to respond to incidents, it’s good to know who’s on the hook for what. If there are controls and alerts, who’s looking at them? What are they doing? Why are they doing it? Ensure someone is responsible and accountable for looking at your technology, for making sure it’s patched, and for ensuring alerts are monitored and responded to. Knowing exactly who’s holding the baby will get you through a lot of recurring business challenges.
4. Complexity is not your friend. When it comes to security, we’ve a two-fold philosophy: have as few service providers as possible; and have as simple a technology and operating model as possible. If it’s not clear who does what, or there are too many providers in the mix, you will pay the price when something goes wrong. By simplifying your IT environment and rolling your managed services and security into a single provider, the odds of a robust, timely, and effective response will only multiply.
5. Strike a posture. Reactivity and proactivity. These two postures are powerful allies in building and maintaining a robust security stance.
A strong proactive posture will focus on things like good vulnerability management and an associated programme of works. Look beyond subsets to scan as much as you possibly can, as regularly as you can, fixing vulnerabilities as they arise. Threat actors seeking weak spots run scans, much like vulnerability scans. If they can’t find the chinks, they’ll cut their losses and find something else to do.
A good reactive capability will run security operations 24/7/365, ensuring alerts and logs are generated, correlated, and looked at by security professionals. If someone does gain access to your environment, not only will there be a trigger, but someone will be primed to act on it. A good Security Operations Centre will also give ongoing guidance as to where your environment may need to be hardened.
And the additional dividend of aligning both postures under a single MSP: greater visibility on what else needs to be done in your business, be it end-of-life operating systems, exposing expired switches, or blacklisting applications in your environment.
Sure. There will always be exceptions that put an MSSP in the box seat. Some jobs – like P1 and P0 incident responses, and forensic analysis – will likely always command highly skilled security specialists.
But the vast majority of workloads can now be delivered in a more responsive and integrated fashion by MSPs. It’s time to debunk the myth that MSPs can’t deliver the security goods.