Analyst & Research Reports

O'Reilly Modern Defense in Depth

Issue link:

Contents of this Issue


Page 52 of 53

In Conclusion As you've seen, integrated lines of defense are desperately needed— both within the enterprise and in the cloud. Because the entire con‐ cept of cybersecurity is all about providing availability, confidential‐ ity, and integrity to systems, applications, and the data we hold essential, integration today is a must-have to be successful in the modern cyber battlefield. The way a military battlefield operates is a great example of how to integrate our defenses today, whether you're using an on-premises or outsourced SOC. Cloud providers today must move toward full integration of their lines of defense, or their customers will likely experience similar data breaches as seen throughout the internet. If that happens, it could seriously slow down or even halt cloud adoption overall. Modern, cutting-edge SECaaS and infrastructure-as-a-service (IaaS) providers already are bringing some of these concepts to reality. It's only a matter of time before all organizations (enterprise, SMB, government, education, healthcare, finance, and so forth) will begin to move in this same direction and implement methods to integrate their own defenses and make measurable improvements to their security postures. The same concepts and approaches discussed throughout this book can be applied to the independent and stand‐ alone security technologies so often found in these organizations today. Finally, following the recommendations herein, not only can organi‐ zations experience the fastest time to attack detection, they can also achieve the most effective attack mitigation, likely for the lowest possi‐ ble cost. Simply put, this is where the industry is headed today. In Conclusion | 43

Articles in this issue

view archives of Analyst & Research Reports - O'Reilly Modern Defense in Depth