Americas

Asia

Oceania

Steven Sim
by Steven Sim

The Assumed Breach conundrum

Opinion
23 Apr 20244 mins
SecurityZero Trust

Assumed Breach is the third but often overlooked principle of zero trust. When we talk about adopting a “not if, but when” attitude to security, are we merely paying lip service or do we really believe and internalise it?

Middle-age Hispanic man using laptop computer for business studying, watch online financial webinar training meeting, video call. Focused mature Indian or Latin businessman work in office, copy space.
Credit: Stock 4you / Shutterstock

Breaches are inevitable due to the asymmetry of attacks – carpet checks versus guerilla warfare. Companies – regardless of size – have been breached. For years, security leaders have spoken about the myth of the infallible Protection doctrine and reasons for improving on detection, response, and recovery. We broached on the need for threat intelligence, advanced threat-hunting, responding through table-top exercises, and having tightly integrated SIEMs (security information and event management) and SOARs (security orchestration, automation, and response) to quickly contain breaches.

However, the Assumed Breach mindset goes beyond eroded digital perimeters – it delves deep into the supply chain of software, hardware, and services. As the attack surface grows exponentially with greater digitalisation and cloud adoption, third-party risk becomes a mounting concern – and this is where the line gets blurry.

Outsourcing means taking some responsibility off your shoulders and accepting the ensuing risks – or is it? While security leaders often speak of governance as “doing the right things right”, how can we ensure that things are actually done correctly on the ground?

The unfortunate truth of humans as the weakest link haunts every organisation because outsourced services are managed by people who may not feel as strongly as you do about your cybersecurity. In short, what’s lacking is skin in the game.

You may reach a stage where a decision has to be made – either in-source or apply more controls and oversights. But this runs counter-intuitive to the fundamental value proposition of outsourcing. This is a tough decision to make. It also raises a fundamental question: why outsource and adopt a cloud-first strategy? Were the inherent risks apparent and were the residual risks truly accepted?

Many prefer to have their cake and eat it. Some prefer answers to be in zeros and ones. But a mature culture is necessary when internalising an Assumed Breach mindset.

No matter the number of oversights, there will fundamentally be that additional residual risk that comes with outsourcing. If a vendor’s commitment is purely transactional, they have no skin in the game and there is no sense of urgency – they may do the bare minimum if their obligation lies with the service provider and not with your company.

Where does this leave cybersecurity professionals? While necessary, there is only so much to be done with third-party posturing tools and additional oversights. Unless you prefer to spend a lot more cost and effort than you actually do simply by in-sourcing, you would need a strong RACI (responsible, accountable, consulted, informed) framework and a robust risk management doctrine that everyone believes in to manage and accept a higher level of residual risk.

The success in risk optimisation and cybersecurity controls hinges first and foremost on a strong RACI framework that extends to risk acceptance, incident management, and recovery. Risk assessment has to take into account that a breach with the vendor is inevitable and the risk owner must be well-informed of such an inevitability.

With an understanding of this inevitability, always play out the assumption that your vendor is breached and focus on the ability to manage such risks. It is also important to ring-fence vendors to prevent lateral movement into your organisation, targeting your crown jewels.

Ultimately, the success of cybersecurity in this era is not the ability to prevent a breach but the ability to disrupt a breach, fending off significant impact to the organisation – and this hinges on a mature mindset in accepting inevitability of breaches above and beyond due care, ensuring clear roles and responsibilities, having a robust risk management and acceptance regime, and focusing on the ability to successfully disrupt such breaches.

Steven Sim
by Steven Sim
Contributor

Steven Sim has more than 25 years’ experience in cybersecurity with large end-user enterprises and critical infrastructure. He has undertaken a global CISO role and driven award-winning security governance and management initiatives. He leads cybersecurity across a multinational firm with operations in 42 countries. He oversees Governance, Technology Management and Incident Response as well as Cyber Security Masterplan Office. He also leads Group Cybersecurity Centre of Expertise, Technology Scanning and Cybersecurity Practice Forum to franchise best practices to business units, driven cyber initiatives, developed standards, managed threats, identified 0day vulnerabilities and promoted awareness. Always keen to give back to community, he helmed the ISACA Singapore Chapter (which won ISACA Global Outstanding Chapter Achievement in 2022) as President (from 2021 to 2022) as well as at OT-ISAC (since 2021), as Chair of the Executive Committee, and held a Masters in Computing, CCISO, CGEIT, CRISC, CISM, CISA, CDPSE, CISSP as well as technical certifications GICSP, GREM, GCIH and GPPA. He is an APMG-accredited trainer for ISACA's core certifications and member of Geneva Dialogue for Responsible Behaviours in Cyberspace Technical Community, Working Group on Technical Reference for Securing the Cyber-Physical Systems for Buildings, SANS CISO Network, SANS Offensive Operations Community, Frost & Sullivan Growth Innovation Leadership Council, Microsoft APAC CISO Council, Cybereason Cyber Defense Council, Fortinet Executive Cyber Exchange (ECE), etc. He is also part of ISACA’s Information Security Advisory Group and the Emerging Trends Working Group. He regularly shares his thoughts on cyber risk and security, lectures on an adjunct basis at National University of Singapore Institute of System (on Enterprise Security Architecture), Nanyang Technological University (on Cybersecurity), and other institutes of higher learning, speaks on panels and keynote sessions of both international and local conferences and published several articles. He has been a topic leader for various forums including ISACA’s Emerging Technology and Governance. He was also part of industry consultation for MCI’s Digital Economy Blueprint and CSA’s Singapore OT Cybersecurity Masterplan 2nd Edition and was involved in the reviews of various ISACA CISA, CRISC and CGEIT manuals. Key areas of expertise and experience lie with Cybersecurity Governance, Risk Optimisation, Compliance, Security Engineering, Security Assessment, Incident Management, Training, Awareness. Planned and oversee deployment of cybersecurity solutions enabling business for large IT enterprises and critical OT infrastructure with focus on Internet of LogisticsTM, CP 4.0TM, Supply Chain 4.0, Cyber-Physical or Phygital Systems as well as Emerging Technology. He was recognised with a few awards including #1 CSO in IDG’s CSO30 ASEAN Awards (2021), CSO50 Program, ISACA Chapter Achievement, ISACA Outstanding Chapter Leader, Tech Talent Builder, Skillsfuture Fellow, Global Cyber Security Thought Leaders (IFSEC), Global Cybersecurity Leader, Top 10 Cyber Security Influencers, Top 10 CISOs of the year, Top 29 Highly Influential CISOs, Top 100 Global CISOs, Professional (Leaders) Finalist in Singapore’s Cybersecurity Awards 2018, etc. Reach out to him for: Advisory board member, adjunct lecturer, speaking opportunities, technical reviews, mentorship, thought leader, author, award judge.

More from this author