The Why

Let's face it, security comes after business. And why shouldn't it be for most of the commerce systems? A security decision against business is hardly accepted. An operation team member may left open a known service port on an Internet facing service with default or easy to guess username/password for just "in order service to be up and running". The security team should continually scan the services for these types of "innocent vulnerabilities" and gets them fixed.

Another reality is that information security specialists are in general outnumbered even by the physical security personnel let alone operational and business oriented employees. That begs the answer to the question of "how will the security personnel will overcome the speed of change happen in the IT infrastructure?" Security specialist not only should scan periodically, but also put the results into a perspective. This means analyzing the reports, eliminating the false positives and prioritizing actions. Moreover, running only automated scanners, while has an important value, isn't enough anymore. So security personnel should also run manual analysis on the target systems, especially against the web applications. All these actions require considerable time, and given the number of security oriented employees, might get out of hand quickly.

Continuous security scan technologies periodically scan a target network, applications and find & report vulnerabilities. So such a service should not just "scan and find" vulnerabilities, it also has to simplify this management process helping information security authorities to prioritize and utilize manual audits for hard to find business logic and design vulnerabilities.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request


Please sign in to leave a comment.
Powered by Zendesk