Forever a Remote Workforce
As I write this article, I just finished two video calls with vCISO customers. Each customer has been tasked with the same business problem: "The company wants to go XX% remote forever."
Being their CISO, I have several confidentiality, integrity, and availability questions. With that, I am going to start examining their current security architecture and begin asking hard security questions.
Considerations for the business goal:
- Is this security architecture sufficient in maintaining a remote workforce?
- Do our current security toolsets make sense now that we're staying remote?
- Where are our bottlenecks, hardware, network, security?
- What does our Internet bandwidth look like, and do we need to make changes?
- Is cloud an answer to problems now that we have adopted remote on a more permanent basis?
- Where do our VPNs terminate, and is that a bad idea now that we are xx% remote?
- Are we still hosting our email on-prem, and should we go cloud? Do we need more cloud services to remain remote?
- How do we make sure our remote workers are getting their security patch updates, security AV updates, and all CIS top 20 controls aligned?
- How do we manage this new distributed model?
- How do we manage these forensic logs and get forensic detail of a breach?
- What do backups look like now?
- What does Disaster Recovery and BCP look like now?
It is clear that business is becoming agile and adopting this remote business strategy, but is IT ready to move and maintain confidentiality, integrity, and availability? Have you thought through what maintaining a significant number of remote workers entails? Here are some pitfalls to consider.
Pitfalls:
- That one VPN system is it failing, and does business remain available if that one VPN IP address goes offline? (DDoS?)
- Where is the data, and how is it being secured under this new distributed paradigm?
- How is that new data being managed, and can it be backed up and restored?
- If a Nation-State does successfully take down a core internet provider, how will the company stay online when the workforce's internet is offline?
- What type of shadow IT is being used to fill a gap your company isn't satisfying, and how deep does that rabbit hole go with remote workers?
- What attacks are your remote worker's home networks dealing with, and is the Information Technology Department now responsible for understanding that security landscape too?
- Does your security perimeter need a new definition of termination points?
- How do you deploy new employee resources? Do they come to the corporate office, or do you FedEx, and can you support that new hire deployment?
- Should we write policies to address these various new concerns?
- Remote cultural responsibilities are different from in-person responsibilities. Do we need more training to elevate our team's ability to meet the new remote challenges?
These are some of the conversations I am having with my customers, and some of the questions I am bringing up to my executives. Now that your employees are working from remote the "emergency" conditions you have built may not be sufficient enough to run a company for the long term. Nor are these emergency configurations adequate to be "secure forever."
Here are some things to consider to secure your emergency deployment of a remote workforce.
- Do a penetration test. You opened up some security holes to enable the remote workforce. What do those holes look like to an attacker? (CIS #20)
- What does that inventory look like (software/hardware), and what is being used for shadow IT? (CIS #1 & #2)
- Are your remote workers secure? (CIS #5, #16)
- If someone is breached, will we know? (CIS #6 & #19)
- Can our remote workers defend themselves? (CIS #7, #8, #9, #14)
- Can our remote workforce back up their data, and restore it? (CIS #10)
- What is our boundary we need to protect now that we are remote? (CIS #12)
- Where is our data? (CIS #13)
- What Wireless risks do we have now? (CIS #15)
- Do our remote workers know what to do for security? (CIS #17)
- What are our developers doing? We know that the group is still making software. (CIS #18)
- Jimmy has been breached at his home, and his laptop, company VPN, and data were accessed, what do we do? (CIS #19 Incident Response)
Its a "New Normal" thing right?
👍
You are wise, a great leader and writer Jerry Craft! Thank you for taking time to capture and share your insights.