Providing protection from the ground up
With reactive approaches to cyberthreats proving futile in preventing data breaches, companies are embedding design principles into the core of their systems and processes to give them the protection they require
Digital transformation and connectivity have provided unprecedented opportunities for businesses and revolutionised industries as a result. But this has come at a price as organisations have now been opened up to a growing array of cyberthreats.
Companies are under near-constant attack and a traditionally reactive, sticking-plaster approach to dealing with the online assault has proved ineffective, making cybersecurity by design a growing and crucial feature of any organisational structure.
Introduction of the General Data Protection Regulation in 2018 has forced organisations to take a more proactive approach to cybersecurity. Previously, only strongly regulated companies in sectors such as insurance and banking were required to take strict measures to protect customer data. Now, facing hefty fines for non-compliance, companies in all industries are prioritising investment in cybersecurity.
However, there is still a long way to go. Most small companies are unable to hire security specialists because of the added cost and enterprise-level businesses are often hindered by legacy systems. The result is many organisations are unprepared for current cybersecurity threats and unable to take a proactive approach to protecting their business.
Cybersecurity-by-design frameworks advocate embedding a proactive stance against threats into business processes. The security team is involved in all development processes and use their expertise to review and provide advice on cybersecurity best practice before anything is rolled out. Implementing a security-savvy design process into all product development and implementation protects an organisation from the inside out.
“Security teams need to think of the worst possible situation and then work backwards to implement a cybersecurity-by-design process and measures that will either stop threats or reduce the damage,” says Dominik Malowiecki, chief information security officer (CISO) at smart home insurance provider Neos.
“Teams need to approach this from the perspective of an outsider and check all possible entries to customer data. Cybersecurity should always be an ongoing process.”
Introducing a cybersecurity-by-design framework means security becomes a proactive, end-to-end strategy and spans across the entire organisation and supply chain. Solutions are always tailored to the business, rather than a one-size-fits-all model.
Cybersecurity is a fundamental business practice that affects people, processes and technology, and a core principle of implementing design processes is integrating security at the beginning of the product development life cycle rather than just as a feature of a product. This enables organisations to model and fortify the ongoing cybersecurity posture and build resilience against threats and risks that are also continually evolving.
“This is an approach that should be adopted by all,” says Inga Schorno, head of information security at Tandem Bank. “As a bank built on open banking, we are a data-driven business and understand the benefits of efficiency and productivity, but acknowledge this must be balanced by identifying digital risks. It is only through an organisation-wide security culture and early involvement that those risks can be successfully identified and mitigated.
It is only through an organisation-wide security culture and early involvement that risks can be successfully identified
“Incorporating cybersecurity-by-design principles will help to adapt to the changing threat landscape by involving information security and risk teams at early stages of development. Failing to see it that way can leave you vulnerable to unexpected threats with a rigid framework unsuitable for fast response. Organisations must cultivate a wider cyber-resilient culture with ongoing training and adoption of the security framework.”
It is crucial that senior management are involved in the cybersecurity design process. This typically begins with due diligence whereby each company’s CISO or chief information officer is involved in agreeing the protection, access and permitted sharing of data. People are often the weakest link in security so it is important to ensure all employees are well trained on aspects such as cybersecurity best practice. System designers and developers should also be involved at the very least in the planning and implementing stages.
Before adopting any systems, design principles require the business to identify what they are for, what’s needed to operate them and what risks are acceptable, while ensuring there is no ambiguity about responsibilities. Organisations must make any compromise difficult by reducing the attack surface, designing for easy maintenance and making it easy for users to do the right thing. They should make disruption difficult by designing for scalability, identifying bottlenecks and testing for high load and denial-of-service conditions.
“Any compromises should be easier to detect through collecting all relevant security events and logs, making it difficult for attackers to detect security rules through external testing,” says Kevin Curran, senior member of the IEEE (Institute of Electrical and Electronics Engineers) and professor of cybersecurity at Ulster University. “Organisations should also remove unnecessary functionality, especially where unauthorised use would be damaging, anonymising data when it’s exported to reporting tools and avoiding unnecessary caches of data.”
As a company that specialises in digital due diligence, security is very important to Neotas and its clients. As such, a decision was made early on to keep everything in-house with a heavy emphasis on data encryption, Microsoft SharePoint and information resources management.
A cybersecurity-by-design framework has been key to achieving this. Neotas shares thousands of links around structures and has many restrictions on its libraries, so it requires a reactive security approach with an ability to see who has access to what and why.
As part of ISO 27001 accreditation, Neotas needed a robust system to complement its cybersecurity-by-design framework and help mitigate risks. A system from Torsion provides peace of mind by enabling quick changes throughout its architecture and solving the problem of limited control or visibility over data access, which often leads to security and compliance issues.
“The reaction internally has been very positive,” says Patrick Reynolds, head of operations at Neotas. “Users are confident they are using a simple, secure information security system. We have seen bigger vendors with software that is bamboozling, but not as effective for what we require. It’s about finding a cybersecurity-by-design approach that works for your business.”
Introducing cybersecurity by design into an organisation provides a holistic set of pragmatic guidelines which can enable businesses to consider the full remit of protection. Companies that don’t put design processes in place to cope with the ever-present avalanche of cyberthreats will be more open to damaging vulnerabilities.