6 Steps for Ensuring Continuous Compliance in a Complex, Hybrid IT Environment

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Next

Security Gaps

Identify security gaps and align to the policy.

At this stage, CISOs should consider the organization's unified security policy the "desired" state of the network, and not necessarily the "actual" state of the network. The actual state comes from the segmented network topology that was modeled in step 2. This is when it's necessary to compare the two. Chances are, they will not be identical. Identify any security gaps that exist between the two and take measures to close those gaps. Continuing with the previous hypothetical PCI example, the "desired" state is that no other application has access to the network segment where your payment process application is stored. After comparing your model to the actual state of your network, you learn that a marketing application also resides on that portion of the network in order to have occasional access to customer data from the payment application. Not only is this a significant violation of PCI DSS, but it also puts the enterprise at risk for a costly data breach. This condition should be flagged for remediation immediately.

CISOs and their network security teams are under increasing pressure to adhere to an expanding "alphabet soup" of regulatory requirements that have a direct impact on the enterprise network. On top of that, every business has its own internal policies and best practice workflows to follow. One way to reduce the compliance enforcement and audit-readiness burden is to work toward the goal of continuous compliance — attaining a state where all compliance requirements are met, and then continuously maintaining that state.

Even with the many challenges of managing today's complex IT environment, it's possible to achieve continuous compliance through proper organization, thorough processes and technology automation. In this slideshow, Ellen Fischl Bodner, Tufin, has identified six steps that are critical to ensuring continuous compliance.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

IT_Man85-290x195 Business in the Front, Balance All Around: Working with Gen Z

In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. ...  More >>

KavaliroITSkills0x 5 Essential Skills for the IT Leader

Successful IT leaders have to have very specific skills, but still know how to run a team, meaning they must master the so-called soft skills that are not taught formally. ...  More >>

ITCareers47-290x195.jpg Finding the Right Employer: 6 Interview Questions

Like Goldilocks, finding a job that's just right can be a challenge. Here are six questions you need to bring to your next interview. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.